Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking and Finance Review

Global Banking & Finance Review

Company

    GBAF Logo
    • About Us
    • Profile
    • Privacy & Cookie Policy
    • Terms of Use
    • Contact Us
    • Advertising
    • Submit Post
    • Latest News
    • Research Reports
    • Press Release
    • Awards▾
      • About the Awards
      • Awards TimeTable
      • Submit Nominations
      • Testimonials
      • Media Room
      • Award Winners
      • FAQ
    • Magazines▾
      • Global Banking & Finance Review Magazine Issue 79
      • Global Banking & Finance Review Magazine Issue 78
      • Global Banking & Finance Review Magazine Issue 77
      • Global Banking & Finance Review Magazine Issue 76
      • Global Banking & Finance Review Magazine Issue 75
      • Global Banking & Finance Review Magazine Issue 73
      • Global Banking & Finance Review Magazine Issue 71
      • Global Banking & Finance Review Magazine Issue 70
      • Global Banking & Finance Review Magazine Issue 69
      • Global Banking & Finance Review Magazine Issue 66
    Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

    Global Banking & Finance Review® is a leading financial portal and online magazine offering News, Analysis, Opinion, Reviews, Interviews & Videos from the world of Banking, Finance, Business, Trading, Technology, Investing, Brokerage, Foreign Exchange, Tax & Legal, Islamic Finance, Asset & Wealth Management.
    Copyright © 2010-2025 GBAF Publications Ltd - All Rights Reserved.

    ;
    Editorial & Advertiser disclosure

    Global Banking and Finance Review is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    Home > Technology > Why The Pret Index Matters to Cybersecurity Asset Management
    Technology

    Why The Pret Index Matters to Cybersecurity Asset Management

    Why The Pret Index Matters to Cybersecurity Asset Management

    Published by Jessica Weisman-Pitts

    Posted on December 13, 2021

    Featured image for article about Technology

    By Ian Jennings, co-founder of BlueFort Security

    Latest figures from Bloomberg’s Pret Index, a weekly indicator of the return to offices, train stations and pre-pandemic shopping habits, reveals that bankers in London are returning to the office at a rate that has outstripped their counterparts in Paris and New York. Spending at Pret a Manger’s stores in the City of London and Canary Wharf surged to 86 percent of pre-pandemic levels last week, the highest since the start of the crisis.

    However, many firms are still trying to square the circle of data security with staff who want to work in a more flexible way. Deutsche Bank has said it will let people continue working from home two to three days a week once the coronavirus pandemic is no longer deemed a threat, while UBS Group said at least two-thirds of staff in the investment bank should be able to do some of their work from home.

    It’s widely acknowledged that this hybrid working model has been – and continues to be – beneficial for many of us. But this new arrangement presents a significant data security challenge for financial firms, especially as many turned to cloud-based services to enable employees to continue working during the enforced ‘Work At Home’ order. For many CISOs the scope of these cloud-based services were (and still are) outside of their organisation’s visibility. The unintended consequence they now face is one of heightened risk from cyber criminals looking to exploit an extended, yet unprotected, threat surface.

    In highly regulated industries the importance of mitigating this new threat surface just clocked ‘critical’ on IT and security teams’ scale of things to address. In October the UK’s Financial Conduct Authority updated its guidance regarding working from home warning that it has “powers to visit any location where work is performed, business is carried out and employees are based (including residential addresses) for any regulatory purposes”. The FCA has said that firms must prove that they have the systems and controls, including the necessary IT functionality and these systems are robust. They must also be able to prove they have considered any data, cyber and security risks, particularly as staff may transport confidential material and laptops more frequently in a hybrid arrangement.

    You can’t protect what you don’t know

    This old(ish) cyber security maxim profoundly illustrates one of the biggest problems facing cyber security professionals today: how can I defend my organisation from attackers when I no longer know what my cyber estate looks like? To illustrate the point, a recent study found that 30% of CISOs admitted that since March 2020 they’ve lost track of movers, joiners and leavers, and 29% stated they are missing corporate devices. This is a direct result of the enforced work from home order.

    The key issue for CISOs and their security teams is simple: you can’t protect what you don’t know is there. If you want to apply effective security controls, knowing what assets you have within your environment is fundamental. It’s far easier to protect things that you know about.

    Cybersecurity Asset Management Explained

    Cybersecurity is all about IT assets. When companies are hacked, it is through their IT assets; their networks, hardware, and software are the points of entry for cyber attackers.

    Poor asset management practices dramatically increase the chances that threat actors will be able to achieve their objectives, whether that’s to steal sensitive data, disrupt business operations, or otherwise put the organisation at risk. Asset management is essential to being able to address such risks efficiently and consistently.

    Cybersecurity asset management is the process of identifying, on a continuous, real-time basis, the IT assets that your organisation owns and the potential security risks or gaps that affect each one. From a cybersecurity perspective, assets are best described as something that must be configured or managed to achieve security outcomes or something that may be impacted as a result of a cyber incident (usually the things you are trying to protect).

    Generally speaking a cybersecurity asset management strategy has four key elements:

    1. Gathering data from any source that provides detailed information about assets
    2. Correlating that data to generate a view of every asset and what’s on it
    3. Continually validating every asset’s adherence to the overall security policy
    4. Creating automatic, triggered actions whenever an asset deviates from that security policy

    Approaching cybersecurity asset management

    Because IT resources and security risks come in so many forms, cybersecurity asset management is a process that involves a variety of activities. Hardware, software, virtual infrastructure, information, and online accounts must all be considered.

    The diversity of asset types and their sheer volume, even in small organisations, can make asset management a challenging task.  Here are the key areas that should be addressed, broken down into relatively bite-size tasks:

    • Device discovery and protection – identify network endpoints and assess each one for security vulnerabilities; ensure any insecure endpoints are segmented from the rest of the network immediately.
    • Vulnerability management – detect and address active vulnerabilities, such as unpatched software running on a device.
    • Cloud security – identify all cloud resources, especially those that are vulnerable due to insecure software or lack of access control.
    • Continuous policy enforcement – when new devices are added to the network that match a particular device profile with an active policy, they are automatically protected.

    Whether at work or going about our daily lives, we’re generally drawn to the things that look to be the most exciting. In cybersecurity, threat-hunting or red-teaming sounds, on the face of it, more exciting than asset management. But asset management is a critical foundational activity for all security programs, including those who spend their days spotting intrusions and fighting malware.

    For asset management to deliver its full potential, it needs to be automated and easy to implement. Many organisations already have in place some of the automated resource discovery and threat identification tools that can help get things back on track. And get back on track they must, because any organisation that relies on software and hardware to power its operations – which virtually every business does today – is putting themselves at risk if they don’t.

    By Ian Jennings, co-founder of BlueFort Security

    Latest figures from Bloomberg’s Pret Index, a weekly indicator of the return to offices, train stations and pre-pandemic shopping habits, reveals that bankers in London are returning to the office at a rate that has outstripped their counterparts in Paris and New York. Spending at Pret a Manger’s stores in the City of London and Canary Wharf surged to 86 percent of pre-pandemic levels last week, the highest since the start of the crisis.

    However, many firms are still trying to square the circle of data security with staff who want to work in a more flexible way. Deutsche Bank has said it will let people continue working from home two to three days a week once the coronavirus pandemic is no longer deemed a threat, while UBS Group said at least two-thirds of staff in the investment bank should be able to do some of their work from home.

    It’s widely acknowledged that this hybrid working model has been – and continues to be – beneficial for many of us. But this new arrangement presents a significant data security challenge for financial firms, especially as many turned to cloud-based services to enable employees to continue working during the enforced ‘Work At Home’ order. For many CISOs the scope of these cloud-based services were (and still are) outside of their organisation’s visibility. The unintended consequence they now face is one of heightened risk from cyber criminals looking to exploit an extended, yet unprotected, threat surface.

    In highly regulated industries the importance of mitigating this new threat surface just clocked ‘critical’ on IT and security teams’ scale of things to address. In October the UK’s Financial Conduct Authority updated its guidance regarding working from home warning that it has “powers to visit any location where work is performed, business is carried out and employees are based (including residential addresses) for any regulatory purposes”. The FCA has said that firms must prove that they have the systems and controls, including the necessary IT functionality and these systems are robust. They must also be able to prove they have considered any data, cyber and security risks, particularly as staff may transport confidential material and laptops more frequently in a hybrid arrangement.

    You can’t protect what you don’t know

    This old(ish) cyber security maxim profoundly illustrates one of the biggest problems facing cyber security professionals today: how can I defend my organisation from attackers when I no longer know what my cyber estate looks like? To illustrate the point, a recent study found that 30% of CISOs admitted that since March 2020 they’ve lost track of movers, joiners and leavers, and 29% stated they are missing corporate devices. This is a direct result of the enforced work from home order.

    The key issue for CISOs and their security teams is simple: you can’t protect what you don’t know is there. If you want to apply effective security controls, knowing what assets you have within your environment is fundamental. It’s far easier to protect things that you know about.

    Cybersecurity Asset Management Explained

    Cybersecurity is all about IT assets. When companies are hacked, it is through their IT assets; their networks, hardware, and software are the points of entry for cyber attackers.

    Poor asset management practices dramatically increase the chances that threat actors will be able to achieve their objectives, whether that’s to steal sensitive data, disrupt business operations, or otherwise put the organisation at risk. Asset management is essential to being able to address such risks efficiently and consistently.

    Cybersecurity asset management is the process of identifying, on a continuous, real-time basis, the IT assets that your organisation owns and the potential security risks or gaps that affect each one. From a cybersecurity perspective, assets are best described as something that must be configured or managed to achieve security outcomes or something that may be impacted as a result of a cyber incident (usually the things you are trying to protect).

    Generally speaking a cybersecurity asset management strategy has four key elements:

    1. Gathering data from any source that provides detailed information about assets
    2. Correlating that data to generate a view of every asset and what’s on it
    3. Continually validating every asset’s adherence to the overall security policy
    4. Creating automatic, triggered actions whenever an asset deviates from that security policy

    Approaching cybersecurity asset management

    Because IT resources and security risks come in so many forms, cybersecurity asset management is a process that involves a variety of activities. Hardware, software, virtual infrastructure, information, and online accounts must all be considered.

    The diversity of asset types and their sheer volume, even in small organisations, can make asset management a challenging task.  Here are the key areas that should be addressed, broken down into relatively bite-size tasks:

    • Device discovery and protection – identify network endpoints and assess each one for security vulnerabilities; ensure any insecure endpoints are segmented from the rest of the network immediately.
    • Vulnerability management – detect and address active vulnerabilities, such as unpatched software running on a device.
    • Cloud security – identify all cloud resources, especially those that are vulnerable due to insecure software or lack of access control.
    • Continuous policy enforcement – when new devices are added to the network that match a particular device profile with an active policy, they are automatically protected.

    Whether at work or going about our daily lives, we’re generally drawn to the things that look to be the most exciting. In cybersecurity, threat-hunting or red-teaming sounds, on the face of it, more exciting than asset management. But asset management is a critical foundational activity for all security programs, including those who spend their days spotting intrusions and fighting malware.

    For asset management to deliver its full potential, it needs to be automated and easy to implement. Many organisations already have in place some of the automated resource discovery and threat identification tools that can help get things back on track. And get back on track they must, because any organisation that relies on software and hardware to power its operations – which virtually every business does today – is putting themselves at risk if they don’t.

    Related Posts
    Treasury transformation must be built on accountability and trust
    Treasury transformation must be built on accountability and trust
    Financial services: a human-centric approach to managing risk
    Financial services: a human-centric approach to managing risk
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    LakeFusion Secures Seed Funding to Advance AI-Native Master Data Management
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Clarity, Context, Confidence: Explainable AI and the New Era of Investor Trust
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Data Intelligence Transforms the Future of Credit Risk Strategy
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    Architect of Integration Ushers in a New Era for AI in Regulated Industries
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    How One Technologist is Building Self-Healing AI Systems that Could Transform Financial Regulation
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    SBS is Doubling Down on SaaS to Power the Next Wave of Bank Modernization
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    Trust Embedding: Integrating Governance into Next-Generation Data Platforms
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    The Guardian of Connectivity: How Rohith Kumar Punithavel Is Redefining Trust in Private Networks
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    BNY Partners With HID and SwiftConnect to Provide Mobile Access to its Offices Around the Globe With Employee Badge in Apple Wallet
    How Integral’s CTO Chidambaram Bhat is helping to solve  transfer pricing problems through cutting edge AI.
    How Integral’s CTO Chidambaram Bhat is helping to solve transfer pricing problems through cutting edge AI.

    Why waste money on news and opinions when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Previous Technology PostFintech trends 2021-2023
    Next Technology PostThree security trends for 2022

    More from Technology

    Explore more articles in the Technology category

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Physical Infrastructure Still Matters in a Digital Economy

    Why Compliance Has Become an Engineering Problem

    Why Compliance Has Become an Engineering Problem

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Can AI-Powered Security Prevent $4.2 Billion in Banking Fraud?

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    Reimagining Human-Technology Interaction: Sagar Kesarpu’s Mission to Humanize Automation

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    LeapXpert: How financial institutions can turn shadow messaging from a risk into an opportunity

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Intelligence in Motion: Building Predictive Systems for Global Operations

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    Predictive Analytics and Strategic Operations: Strengthening Supply Chain Resilience

    How Nclude.ai   turned broken portals into completed applications

    How Nclude.ai turned broken portals into completed applications

    The Silent Shift: Rethinking Services for a Digital World?

    The Silent Shift: Rethinking Services for a Digital World?

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Culture as Capital: How Woxa Corporation Is Redefining Fintech Sustainability

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Securing the Future: We're Fixing Cyber Resilience by Finally Making Compliance Cool

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    Supply chain security risks now innumerable and unmanageable for majority of cybersecurity leaders, IO research reveals

    View All Technology Posts