TOP TAKEAWAYS FOR SECURITY IN FINANCIAL SERVICES
TOP TAKEAWAYS FOR SECURITY IN FINANCIAL SERVICES
Published by Gbaf News
Posted on June 18, 2014

Published by Gbaf News
Posted on June 18, 2014

Sharat Sinha, Vice President, Asia Pacific, Palo Alto Networks
A recent spate of high profile hacking incidents targeted at financial institutions across Asia Pacific has put the spotlight back on data security and the need to be diligent about cyber security more than ever.
Data breaches against Standard Chartered’s customer data and phishing websites designed to steal PINs and One-Time-Passwords (OTPs) from POSB customers have made it increasingly important for financial and banking institutions to re-examine the way they are protecting their data and customers.

Sharat Sinha
Palo Alto Networks recently participated in the FS-ISAC summit held in Florida, where the topic of cybersecurity formed the basis of much of the discussion. Cybercrime is a very global problem, and an issue that is becoming more sophisticated as cybercriminals strive to find new and improved ways to access enterprise networks.
It was widely acknowledged during the summit that financial institutions will always be a prime target for cybercriminals. However, there is a lot that can and should be done to protect against such attacks.
A number of key learnings for financial institutions emerged from discussions during the summit, including:
Segmentation
More needs to be done on segmentation across organisations and their IT infrastructure. This is a broad topic that involves employees, contractors, data centres, endpoints, computing infrastructure and more. It includes better segmentation of facilities, branches, remote offices or business partners located in high-risk geographies or conducting business with high-risk geographies. Of particular importance is the sharing of best practices to protect facilities and groups in high-risk geographies as well as a need for clear segmentation of assets, systems and data based on their risk level and access control of users and applications.
Organisations must be proactive when it comes to the growing dilemma between controlling IT costs versus the imperative to tighten security. This is especially important around technology initiatives such as:
Organisations are living under a constant state of compromise. This topic is one of greater concern. We keep hearing that threats are more often coming from the inside of an organization, making obsolete any security strategy based only on perimeter protection. Network segmentation helps significantly by blocking attacks from propagating from one zone of your network to another. Next-generation firewall will directly contribute to a stronger overall security platform, starting with the endpoint and detecting attacks there as well as detecting when threats are attempting lateral moves within networks.
Finally, there’s broad acknowledgement that threat information sharing is critical to raise the bar for the bad guys. It’s ironic but in many ways it feels like the bad guys are better organised as a community compared to the enterprises that need to protect themselves. I have not heard one objection against the need for the private sector to collaborate though communities like the Association of Financial Advisers (AFA) and the Association of Banks (ABS) in Singapore, to share threat intelligence more systematically. With Palo Alto Networks, we share all findings across all our customers as soon as new malware is detected, but we also continue to hear about the high value of information sharing with a specific industry sector, such as finance.
To conclude, the threat landscape across the region and the world continues to evolve and change, however financial institutions will always be a prime target for cybercrime. These institutions have a responsibility to protect their customers, making it imperative for organisations and their employees to understand the vulnerabilities that exist in the network. On a top level, it is also vital for enterprises, governments and standard organisations to collaborate and leverage expertise to adapt and overcome the sophisticated, multifaceted security threats faced by the ecosystem of information security.