Cloud Security Authors: Tim Hinds, Maria C. Horton, Elizabeth White, Ayman Sayed, Pat Romanski

Related Topics: @CloudExpo, Cloud Security

@CloudExpo: Blog Post

Financial Institutions Are Vulnerable to Cyber Attacks | @CloudExpo #Cloud #Cybersecurity

The introduction of nascent technologies to improve financial access is also accompanied by increased vulnerability

Financial Institutions are Vulnerable to Cyber Attack as the Increase in Technologies Improves

It is impossible to go outside and not notice banks offering consumers new ways to save, send, spend, and access their money at a bank. This trend-to ease access to funds – extends well beyond the retail banking sector and is equally prevalent among investment banks, private banks, hedge funds, mutual funds, ETFs and just about any financial institution, large or small. It is arguably the single most compelling commercial driver in the financial services sector. Financial institutions compete aggressively and continuously for dominance in this regard and technology is, in all cases, the single most important differentiator across institution, customer, and geography.

Unfortunately the introduction of nascent technologies to improve financial access is also accompanied by increased vulnerability to the very currency and associated details at the heart of the financial services industry. This is the cost of an increasingly open marketplace for financial services and a dynamic that is only further complicated by the growing array of devices and techniques customized for each device to engage in financial transactions. Fortunately there are technologies and strategies available that can be embedded within the security infrastructure of financial institutions to defensively and prospectively detect and eliminate threats, which vary in scope and nature.

General Scope of Threat
Financial institutions are ripe for cyber attacks because of the breadth of personal and business data embedded within their networks as well as financial information. An approximately 35-40% increase in cyber crime targeting the financial sector was recorded in 2015 and a staggering record 21 million fraud attacks and 45 million BOT attacks were detected in Q4 of 2015 alone. Q3 to Q4 BOT attacks increased tenfold and there is little reason to see this trend reversing course. The threat is neither one dimensional or lacking in sophistication – attacks are highly organized and are multi-channel in nature. BOTs and other complex attacks (e.g., malware) are structured to behave as authentic customers to circumvent traditional security defenses. The consequences and costs are severe: data loss and its wide-reaching proximate impact as well as direct financial losses that can easily reach billions of dollars for a single firm.

At Risk Sub-Sectors
The complex nature of financial institutions demands different technological approaches and structures for each sub-sector. This is also the inherent challenge in devising dynamic strategies to protect against cyber attacks across all vulnerability points of a firm or specific categories of firms. Mobile usage as well as online lending and alternative payment techniques are primary target areas with perceived weak security infrastructure. Part of this vulnerability comes from the speed of the transaction cycle, compared to traditional lending, but also due to the less traditional and smaller lenders that are enabled by online lending to issue loans and are less likely to have powerful security infrastructure on par with traditional lenders. Vulnerability from a single lender can create systemic vulnerabilities reaching beyond the lender itself. A weakness in a small lender can create a vulnerability that exposes a larger institution on the other side of the transaction.

Financial institutions involved in e-commerce are also soft targets for cyber attacks. Mobile transaction volume increased more than 200% between 2014 and 2015 and is estimated to maintain that growth trajectory as more mobile devices, with greater sophistication and applications tied to financial institutions, enter the e-commerce system. With multiple technologies and institutions collaborating to enable e-commerce, the complexion of any approach to cyber security must be multi-layered to enable businesses to detect and prevent various attacks such as malware, device spoofing, and mobile bot attacks.

Methods and Strategies
In an environment where the challenges are not static or one-dimensional, neither should the solution. Speed and comprehensiveness of a defense and response system is critical to effectiveness in minimizing risks and mitigating damages in the event of an attack. Unified risk assessment and threat prevention techniques must be core to a financial institution's cyber attack strategy. Financial institutions must recognize their central role in core financial services activity as well as e-commerce and mobile payment products. But how should financial institutions with disparate sizes, services, and, most importantly, balance sheets make decisions about cyber security? How can varied budget sizes be accounted for in maintaining consistently effective approaches to similar threats?

For large institutions the risks are too considerable and far-reaching to implement anything short of the most comprehensive systems available in the market. Speed, synchronization and uniformity should be paramount considerations and, fortunately, there are technologies available that accomplish these objectives while retaining a degree of malleability to adjust with evolving threats and risk points.

For smaller firms the solutions that are being implemented tend to be more patchwork (though even larger financial institutions have similar ‘band-aid' approaches). "Cyber-as-a-service" firms are increasingly common service providers for smaller and medium sized companies as well as concentrated on key risk areas through the utilization of dedicated computers for sensitive transactions, which can be monitored for unusual activity. These methods, while often effective defensively, lack the key elements of speed and comprehensiveness; they are reactionary in nature, but lack the embedded and dynamic technical characteristics to be prospective in their approach to risk.

In devising a cyber attack strategy financial institutions should be mindful of four dynamics:

  • The role that the interconnected nature of the financial services industry, regardless of firm size and scope of services offered, plays in widening the scope of vulnerabilities outside the immediate ambit of a firm
  • The value of an integrated and uniform solution to ensuring responsiveness across platforms and vulnerability points
  • The importance of speed in detection and responsiveness to preventing attacks and mitigating damages
  • The crucial role that comprehensive internal and external monitoring will play in anticipating unforeseen attacks that exploit vulnerabilities in newly introduced technologies

More Stories By Yuri Frayman

Yuri Frayman is the Chief Executive of ZENEDGE. He recently sold his last company to Google.

@ThingsExpo Stories
"There's plenty of bandwidth out there but it's never in the right place. So what Cedexis does is uses data to work out the best pathways to get data from the origin to the person who wants to get it," explained Simon Jones, Evangelist and Head of Marketing at Cedexis, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial C...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term.
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
With privacy often voiced as the primary concern when using cloud based services, SyncriBox was designed to ensure that the software remains completely under the customer's control. Having both the source and destination files remain under the user?s control, there are no privacy or security issues. Since files are synchronized using Syncrify Server, no third party ever sees these files.
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
In his session at 21st Cloud Expo, Carl J. Levine, Senior Technical Evangelist for NS1, will objectively discuss how DNS is used to solve Digital Transformation challenges in large SaaS applications, CDNs, AdTech platforms, and other demanding use cases. Carl J. Levine is the Senior Technical Evangelist for NS1. A veteran of the Internet Infrastructure space, he has over a decade of experience with startups, networking protocols and Internet infrastructure, combined with the unique ability to it...
"Cloud Academy is an enterprise training platform for the cloud, specifically public clouds. We offer guided learning experiences on AWS, Azure, Google Cloud and all the surrounding methodologies and technologies that you need to know and your teams need to know in order to leverage the full benefits of the cloud," explained Alex Brower, VP of Marketing at Cloud Academy, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clar...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Internet-of-Things discussions can end up either going down the consumer gadget rabbit hole or focused on the sort of data logging that industrial manufacturers have been doing forever. However, in fact, companies today are already using IoT data both to optimize their operational technology and to improve the experience of customer interactions in novel ways. In his session at @ThingsExpo, Gordon Haff, Red Hat Technology Evangelist, shared examples from a wide range of industries – including en...
"Space Monkey by Vivent Smart Home is a product that is a distributed cloud-based edge storage network. Vivent Smart Home, our parent company, is a smart home provider that places a lot of hard drives across homes in North America," explained JT Olds, Director of Engineering, and Brandon Crowfeather, Product Manager, at Vivint Smart Home, in this SYS-CON.tv interview at @ThingsExpo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
delaPlex is a global technology and software development solutions and consulting provider, deeply committed to helping companies drive growth, revenue and marketplace value. Since 2008, delaPlex's objective has been to be a trusted advisor to its clients. By redefining the outsourcing industry's business model, the innovative delaPlex Agile Business Framework brings an unmatched alliance of industry experts, across industries and functional skillsets, to clients anywhere around the world.
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or per...