<p>The threat of a cyber attack has moved up the agenda at financial institutions (FIs) after a number of high profile attacks involving data breaches, ransom demands, distributed denial of service (DDoS) attacks and other hacks. Examples include the Carbanak gang that stole $1bn from 100 banks across 30 countries and the JP Morgan Chase data breach in the US and the latest $101m Bangladesh incident.</p>
<p>This report examines best practices for managing the risks of cyber attacks, the threat vectors as technology advances, and what FIs can do to protect themselves and their supply chain partners. Expenditure trends, and the regulatory, reputational and technology drivers are examined. Chartis gathered feedback from 105 institutions, involving 32 qualitative face-to-face interviews with FIs and vendors, and 73 participants in the Chartis Cyber Risk Management Global Survey. Conclusions include:</p>
<ul>
<li><strong>The regulators are closing in.</strong> Cyber security has been embedded in regulations for years, but there is an increasing focus on more specific compliance requirements. Some of these regulations carry potentially firm-destroying consequences, such as the European General Data Protection regulation in which firms may be penalized 4% of global turnover for non-compliance. In addition, more firms outside of financial services are being fined for cyber breaches or security failures, from telecom companies to hotel chains. FIs have escaped significant regulatory censure thus far, but when the precedent for fining FIs for breaches is established, the floodgates will open.</li>
<li><strong>With respect to breaches, the question is not “if” but “when.</strong>” Only a small minority (5%) of respondents reported a decrease in cyber security incidents last year. 37% reported a double figure increase, with 11% experiencing a rise of between 25-50%. Beyond this, the delivery vectors for cyber crime have increased with mobile and online banking, and soon the “internet of things.” In addition, there is an increasing commoditization of cyber crime tools in the black markets, and emerging complex persistent threats from organized crime and nation states. Firms expecting that they will not be breached are not merely optimistic, but unrealistic.</li>
<li><strong>Investment is increasing.</strong> 68% of respondents report a double figure increase in cyber risk management expenditure for 2015-16. 24% are increasing their budget by 15% or more. The cyber risk management technology market for financial services is now worth $1.9bn. Cyber risk management is the fastest growing segment in the financial crime risk management (FCRM) technology sector.</li>
<li><strong>Cyber security is not enough.</strong> High expenditure is being driven by more investment in technology and staff as FIs seek to protect their intellectual property (IP), data, customers, systems and ecosystems. However, expenditure is frequently tactical, and aligned to a mixture of external standards and siloed internal functions.</li>
<li><strong>Firms should begin the move from cyber security to cyber risk management. </strong>It is no longer enough to only try to protect assets, and potential breaches must be analyzed within the context of both probability and impact. Thus, cyber security should be established as a tactical subset of an enterprise-wide strategic risk management framework. Key to this is the quantification of cyber risks.</li>
</ul>
<p>The quantification of cyber risks can inform capital allocations and enable insurance against cyber attacks, as well as providing justifications for business decisions to the regulators who will increasingly be testing and fining firms. However, this is one of the final goals in a journey which most FIs are barely starting. Low-hanging fruit at the start of the journey include establishing clear lines of communication between chief risk officers (CROs) and those who have the responsibility for cyber security such as the Chief Information Officer (CIO) and Chief Security Officer (CSO), and establishing processes for delivering cyber security information (numbers of breaches, specific vulnerabilities) up to the board level.</p>
<p> </p>
Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.
To access these options, along with all other subscription benefits, please contact info@risk.net or view our subscription options here: http://subscriptions.risk.net/subscribe
You are currently unable to print this content. Please contact info@chartis-research.com to find out more.
You are currently unable to copy this content. Please contact info@chartis-research.com to find out more.
Copyright Infopro Digital Limited. All rights reserved.
As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (point 2.4), printing is limited to a single copy.
If you would like to purchase additional rights please email info@chartis-research.com
Copyright Infopro Digital Limited. All rights reserved.
You may share this content using our article tools. As outlined in our terms and conditions, https://www.infopro-digital.com/terms-and-conditions/subscriptions/ (clause 2.4), an Authorised User may only make one copy of the materials for their own personal use. You must also comply with the restrictions in clause 2.5.
If you would like to purchase additional rights please email info@chartis-research.com