Bank Automation News

No products in the cart.

Subscribe
  • News
  • Data
  • Transactions
  • Events
    • Bank Automation Summit
    • Apply to Speak
    • Apply to Demo
  • Podcast
  • WEBINARS
    • On-Demand Webinar: Emerging fintechs: New technologies you need to know now
    • Webinar Library
Log In
No Result
View All Result
  • AI
  • Business Banking
  • Core
  • Cloud
  • Payments
  • Retail Banking
  • Risk & Security
Bank Automation News
  • News
  • Data
  • Transactions
  • Events
    • Bank Automation Summit
    • Apply to Speak
    • Apply to Demo
  • Podcast
  • WEBINARS
    • On-Demand Webinar: Emerging fintechs: New technologies you need to know now
    • Webinar Library
BAN PLUS
Log In
No Result
View All Result
Bank Automation News
No Result
View All Result

Organizing for the Cyber Wars

GonzoBankerbyGonzoBanker
November 8, 2012
in Archive
Reading Time: 6 mins read
0
Share on Facebook

There is an uneasy feeling on the streets among bankers today that is slowly yet steadily churning their guts. The winds of a new war are blowing, and, like generals reviewing a ragtag militia, executives are feeling woefully unprepared for battle. Information security and protecting customer information have been headline priorities for bankers for more than a decade, but the once-rote tactics and drills encouraged by experts and regulators are now taking on a new meaning for bankers.

The chances of significant information security breaches, financial losses and high-stakes reputation risk seem more real to bankers at the end of 2012 than ever before. Recent stories are almost surreal in their impact and magnitude:

  • Major U.S. banks are hit with denial of service attacks that cripple their Internet sites, with some suspecting Iranian involvement.
  • A stealthy and wickedly powerful Flame virus morphs several times into variants like Stuxnet, Mini Flame and now the Gauss virus, which has already been identified in Middle East banks.
  • Unencrypted data tapes lost in transit by TD Bank result in disclosure to more than a quarter million customers and stoke controversy on how long the company took to initiate notification procedures.
  • Regulators issue a stern letter to one of the industry’s largest technology providers following a data breach citing lax information security organization and processes.

As the cyber war environment heats up, most bank executives trained in the fine arts of lending, finance and retail branches are asking, “What the hell am I supposed to be doing at my bank about this?”

121107aThe answer to this question can be addressed by using warfare as a metaphor. There is a potential enemy out there that could do damage, has no concern for our interests and may possess capabilities that we cannot presently match. And just because our armaments are not tattered and burning today does not mean something horrific might not be lurking only a few months away. Most importantly, bank executives cannot shuck this off as a delegated challenge for the techies in the basement – the next wave of this war is about how well the top organizes for the long fight. There are five key pillars of warfare that Gonzo executives should review in their organizations and upgrade pronto.

Pillar #1: Intelligence and monitoring

Warfare is fed by intelligence, and leaders build their plans from monitoring information. Bank executives should reflect for a minute, “Do I even know what type of monitoring we are doing in our organization and what the procedures are?” Additionally, effective intelligence is outward looking and far reaching. Bank executives should be wondering if any systematic monitoring of trends regarding security, data breaches and fraud is being conducted in their organizations. Do your I.T. folks know about Gauss? Have they consulted experts? Project-heavy and resource-stretched I.T. staffs who can barely keep their heads above water are clearly at risk of falling out of the loop.

Pillar #2: Leadership and clear lines of authority

Want to have a good laugh? Ask the average bank executive to name both his Information Security Officer and his Chief Privacy Officer. The names won’t roll off the tongue like they would for the Chief Financial Officer or Chief Credit Officer. Candidly, most banks have responded to regulatory requirements for information security and privacy accountability by having some busy operations, I.T. or compliance manager wear this title as one of her many hats. While a CFO is obviously required to close the books monthly and deliver a budget, and the CCO is instinctually expected to craft a credit policy, most bank executives would struggle to identify the expected “deliverables” for ISOs and CPOs – except for boring policies no one reads or cares about. The first step in being prepared for a more serious cyber war is to assess, focus on and better elevate these critical positions. There are growing professional organizations that can foster better development of these management positions, but they need the bright political light and support of top executives.

121107bPillar #3: Regular briefing and plan development in the bunker

All the classic war movies portray a Western scout riding up on a panting horse or a gritty corporal skidding up in a Jeep to deliver the news from the battlefield. Bank executives should ask themselves, “How often have I received a briefing on our information security position and battle plan this year?” This managerial behavior is an improvement that can easily be implemented as we speak in banks of any size. More formal security and privacy briefings and discussion of “battle” initiatives can be covered by the bank’s Enterprise Risk Committee or as periodic agenda items at senior management meetings. The important thing is to create a regular process, reporting framework and deliverables to make sure it happens. Like any risk, there will be tradeoffs regarding potential impact and the resources required to mitigate such risks. The growing magnitude of information security means these should be deliberated at higher levels in the typical banking organization.

Pillar #4: Focus and esprit among the troops

Most security officers grumble that it’s nearly impossible to get adequate attention for fortifying their organizations’ defenses among employees. It’s akin to a war movie where an enemy is approaching but the G.I.s are drinking, laughing and playing cards in the mess tent. The ease with which banks can be socially engineered by their own hired security experts is comical at first and nausea-inducing in the end. Unfortunately, employees associate the internal “brand” of Information Security today with annoying e-mail attachment limits and too-frequent password changes. We haven’t executed the creative and clever approaches to develop a more risk-focused culture without it seeming bureaucratic. Some Gonzo bankers are getting serious about building more security-aware cultures. One organization has found it effective to put a “penalty cone” on the desk of an employee who errantly leaves customer information unprotected or violates a policy. This Scarlett Letter of a cone cannot be removed until the employee’s supervisor is made aware. Another organization has incorporated effective “war stories” about actual bank security breaches and fraud losses into its employee training program. A stronger culture around security will not happen by accident: it’s time to make a list of tactics your bank will use to move the behavioral dial.

Pillar #5: Alliances to face a common opponent

Here’s a difficult question for bank executives to answer: “How are my forces working with other allies to share information and resources to defeat our enemy?” While there have been fledgling attempts at peer groups and information sharing among security and privacy officers, it’s time for the trade groups and influential bank executives to take it up a notch.

121107cWhile it does not need to be public, more serious efforts need to be made to build smart and nimble INTERPOL for bankers. It might even be fun to have a secret handshake and code word (“Jingle Bells – Batman Smells”) to identify fellow agents. In the meantime, bank executives should be encouraging their security and privacy officers to participate in industry peer groups and to build an informal network of the smartest eggs out there to face these challenges.

121107dIt would be just plain wrong to write an article with a warfare metaphor and not quote Sun Tsu from the Art of War. So here goes:

“Know thy self, know thy enemy. A thousand battles, a thousand victories.” –Sun Tzu

For bank executives, don’t freeze up on this topic just because you don’t have deep technical knowledge regarding information security. (I personally fall at the shallow end of that gene pool.) Instead, remember the job of the executive is to define challenges, face reality and marshal focus and resources to win. Ask yourself if your bank has done that sufficiently and responsibly as we potentially face a more serious cyber war.
-spw


Are you staging a top-down defense against cyber crime?

Is your organization’s Information Security Program and overall I.T. Plan ready for the future?

Are the institution’s chief executives comfortable that the bank’s I.S. Program will adequately protect it and your customers and be acceptable in the emerging regulatory environment?

Cornerstone Advisors can shed insight into the overall effectiveness of your Information Security Program and help craft a comprehensive Strategic Technology Plan for your organization. And we can assist your organization in implementing our findings and recommendations.

Contact us today to learn more.

Cornerstone-logo


Tags: Information TechnologyRisk ManagementStrategyWeb & Mobile Banking
Previous Post

Real Time Analysis of the U.S. Business Cycle

Next Post

Bank Innovation Wins Readers’ Choice Award for Best Banking Blogs

Related Posts

Image by CanStock
Archive

Blend Labs integrates acquisition’s mortgage automation process

August 20, 2021
Photo by CanStock
Archive

Chilean fintech looks for slice of giant money transfers market

August 5, 2021
Image by CanStock
Risk & Security

Listen: How banks can protect themselves against cybersecurity risks

August 3, 2021
Next Post

Bank Innovation Wins Readers' Choice Award for Best Banking Blogs

Please login to join discussion

Stay Informed with Our Newsletters

EMERGING FINTECH DIRECTORY

Emerging Fintech Directory

The Buzz Podcast

RETAIL BANKING

Huntington Bank’s new branch in Spartanburg

Huntington Bank resolves outage

May 7, 2025
bank

Barclays, Banco Santander, Lloyds plan product expansion

May 5, 2025
satisfactiin

Online banks lead FIs in customer satisfaction

May 2, 2025

SPONSORED

Just Released! 2025 Strategy Benchmark

May 1, 2025

Leverage Treasury Management to Turn Fraud Prevention Into a Strategic, Revenue-Generating Opportunity

April 1, 2025

A growth mindset in banking requires AI

March 27, 2025
  • About Us
  • Help Center
  • Contact Us
  • Privacy Terms
  • ADA Compliance
  • Advertise

 Manage Cookie Consent

Connect

twitter linkedin podcast podcast podcast
© 2025 Royal Media
No Result
View All Result
  • NEWS
    • All News
    • AI
    • Business Banking
    • Core
    • Cloud
    • Payments
    • Retail Banking
    • Risk & Security
  • DATA
  • TRANSACTIONS
  • EVENTS
    • Bank Automation Summit
  • PODCAST
  • WEBINARS
    • Upcoming Webinar
    • Webinar Library
  • SUBSCRIBE
  • Log In / Account

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • NEWS
    • All News
    • AI
    • Business Banking
    • Core
    • Cloud
    • Payments
    • Retail Banking
    • Risk & Security
  • DATA
  • TRANSACTIONS
  • EVENTS
    • Bank Automation Summit
  • PODCAST
  • WEBINARS
    • Upcoming Webinar
    • Webinar Library
  • SUBSCRIBE
  • Log In / Account

THIS WEBSITE USES COOKIES

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “I CONSENT”, you consent to the use of ALL the cookies.

Cookie settingsI CONSENT

Review our Cookie Policies
.
Manage Cookie Consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
__cfruidsessionCloudflare sets this cookie to identify trusted web traffic.
__RequestVerificationTokensessionThis cookie is set by web application built in ASP.NET MVC Technologies. This is an anti-forgery cookie used for preventing cross site request forgery attacks.
_abck1 yearThis cookie is used to detect and defend when a client attempt to replay a cookie.This cookie manages the interaction with online bots and takes the appropriate actions.
34f6831605sessionGeneral purpose platform session cookie, used by sites written in JSP. Usually used to maintain an anonymous user session by the server.
a64cedc0bfsessionGeneral purpose platform session cookie, used by sites written in JSP. Usually used to maintain an anonymous user session by the server.
ak_bmsc2 hoursThis cookie is used by Akamai to optimize site security by distinguishing between humans and bots
ARRAffinitysessionARRAffinity cookie is set by Azure app service, and allows the service to choose the right instance established by a user to deliver subsequent requests made by that user.
ARRAffinitySameSitesessionThis cookie is set by Windows Azure cloud, and is used for load balancing to make sure the visitor page requests are routed to the same server in any browsing session.
AWSELBsessionAssociated with Amazon Web Services and created by Elastic Load Balancing, AWSELB cookie is used to manage sticky sessions across production servers.
bm_sz4 hoursThis cookie is set by the provider Akamai Bot Manager. This cookie is used to manage the interaction with the online bots. It also helps in fraud preventions
cf_ob_infopastThe cf_ob_info cookie is set by Cloudflare to provide information on HTTP Status Code returned by the origin web server, the Ray ID of the original failed request and the data center serving the traffic.
cf_use_obpastCloudflare sets this cookie to improve page load times and to disallow any security restrictions based on the visitor's IP address.
CONCRETE5sessionThis cookie is set by the provider Concrete5 web content management system. This is a necessary cookie used for maintaining the user session between pages.
connect.sid1 monthThis cookie is used for authentication and for secure log-in. It registers the log-in information.
cookielawinfo-checkbox-advertisement1 yearSet by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category .
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
cookiesession11 yearThis cookie is set by the Fortinet firewall. This cookie is used for protecting the website from abuse.
crmcsrsessionGeneral purpose platform session cookie, used by sites written in JSP. Usually used to maintain an anonymous user session by the server.
ep20130 minutesThis cookie is set by Wufoo for load balancing, site traffic and preventing site abuse.
JSESSIONIDsessionThe JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application.
LS_CSRF_TOKENsessionCloudflare sets this cookie to track users’ activities across multiple websites. It expires once the browser is closed.
PHPSESSIDsessionThis cookie is native to PHP applications. The cookie is used to store and identify a users' unique session ID for the purpose of managing user session on the website. The cookie is a session cookies and is deleted when all the browser windows are closed.
sxa_sitesessionThis cookie is used to identify the webiste visitor's session state across page requests on server.
ts3 yearsPayPal sets this cookie to enable secure transactions through PayPal.
ts_c3 yearsPayPal sets this cookie to make safe payments through PayPal.
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
wordpress_test_cookiesessionThis cookie is used to check if the cookies are enabled on the users' browser.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
CookieDurationDescription
__cf_bm30 minutesThis cookie, set by Cloudflare, is used to support Cloudflare Bot Management.
_zcsr_tmpsessionZoho sets this cookie for the login function on the website.
663a60c55dsessionThis cookie is related to Zoho (Customer Service) Chatbox
bcookie2 yearsLinkedIn sets this cookie from LinkedIn share buttons and ad tags to recognize browser ID.
bscookie2 yearsLinkedIn sets this cookie to store performed actions on the website.
e188bc05fesessionThis cookie is set in relation to Zoho Campaigns
geosessionThis cookie is used for identifying the geographical location by country of the user.
iamcsrsessionZoho (Customer Support) sets this cookie and is used for tracking visitors (for performance purposes)
langsessionLinkedIn sets this cookie to remember a user's language setting.
languagesessionThis cookie is used to store the language preference of the user.
lidc1 dayLinkedIn sets the lidc cookie to facilitate data center selection.
optimizelyEndUserId1 yearOptimizely uses this cookie to store a visitor's unique identifier which is a combination of a timestamp and a random number. Different variations of web parts are shown to users that optimizes the website's user experience.
tableau_localesessionTableau uses this cookie to determine the preferred language and country-setting of the visitor - This allows the website to show content most relevant to that region and language.
UserMatchHistory1 monthLinkedIn sets this cookie for LinkedIn Ads ID syncing.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
CookieDurationDescription
AWSELBCORS20 minutesThis cookie is used by Elastic Load Balancing from Amazon Web Services to effectively balance load on the servers.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
CookieDurationDescription
__gads1 year 24 daysThe __gads cookie, set by Google, is stored under DoubleClick domain and tracks the number of times users see an advert, measures the success of the campaign and calculates its revenue. This cookie can only be read from the domain they are set on and will not track any data while browsing through other sites.
_ga2 yearsThe _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.
_gcl_au3 monthsProvided by Google Tag Manager to experiment advertisement efficiency of websites using their services.
_gid1 dayInstalled by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously.
ajs_anonymous_idneverThis cookie is set by Segment to count the number of people who visit a certain site by tracking if they have visited before.
ajs_group_idneverThis cookie is set by Segment to track visitor usage and events within the website.
ajs_user_idneverThis cookie is set by Segment to help track visitor usage, events, target marketing, and also measure application performance and stability.
browser_id5 yearsThis cookie is used for identifying the visitor browser on re-visit to the website.
CONSENT2 yearsYouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data.
sid1 yearThe sid cookie contains digitally signed and encrypted records of a user’s Google account ID and most recent sign-in time.
uid1 yearThis is a Google UserID cookie that tracks users across various website segments.
vuid2 yearsVimeo installs this cookie to collect tracking information by setting a unique ID to embed videos to the website.
WMF-Last-Access1 month 21 hours 5 minutesThis cookie is used to calculate unique devices accessing the website.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
CookieDurationDescription
_dc_gtm_UA-1038974-41 minuteUsed to help identify the visitors by either age, gender, or interests by DoubleClick - Google Tag Manager.
_fbp3 monthsThis cookie is set by Facebook to display advertisements when either on Facebook or on a digital platform powered by Facebook advertising, after visiting the website.
_pxhdpastUsed by Zoominfo to enhance customer data.
fr3 monthsFacebook sets this cookie to show relevant advertisements to users by tracking user behaviour across the web, on sites that have Facebook pixel or Facebook social plugin.
IDE1 year 24 daysGoogle DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile.
test_cookie15 minutesThe test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies.
VISITOR_INFO1_LIVE5 months 27 daysA cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface.
YSCsessionYSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages.
yt-remote-connected-devicesneverYouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
yt-remote-device-idneverYouTube sets this cookie to store the video preferences of the user using embedded YouTube video.
yt.innertube::nextIdneverThis cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen.
yt.innertube::requestsneverThis cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
CookieDurationDescription
049fc2ef5beb27056b07d9e4c4d13fd3sessionNo description
akaalb_http_misc_subssessionNo description
AnalyticsSyncHistory1 monthNo description
BIGipServermsocu-web-2-rr.webfarm.ms.com.10882sessionNo description
bm_misessionNo description available.
CX_4061522881 yearNo description
DCID20 minutesNo description
debugneverNo description available.
DrupalVisitorMobilesessionNo description available.
ep2033 monthsNo description available.
frbatlanta#langsessionNo description
geo_info1 yearNo description available.
GoogleAdServingTestsessionNo description
li_gc2 yearsNo description
loglevelneverNo description available.
loom_anon_commentsessionNo description available.
loom_referral_videosessionNo description
mkjs_group_idneverNo description available.
mkjs_user_idneverNo description available.
MorganStanley.ClientServ.Common.IPZipAccess.IPZipCookie.DEFAULT_COOKIE_NAMEpastNo description
NSC_us_nbsl-83+63+21+25-91sessionNo description
nyt-a1 yearThis cookie is set by the provider New York Times. This cookie is used for saving the user preferences. It is used in context with video and audio content.
nyt-gdpr6 hoursNo description available.
nyt-purr1 yearNo description available.
OCC_Encrypted_CookiesessionNo description
polleverywhere_session_id14 daysNo description
ppnet_2020sessionNo description available.
ppnet_2777sessionNo description available.
reuters-geosessionNo description
shell#langsessionNo description
smcx_0_last_shown_atsessionNo description available.
tableau_public_negotiated_localesessionNo description available.
vary1 monthNo description
www#langsessionNo description
X-Vive-CountrysessionNo description
xn_uuid1 monthNo description
Save & Accept
Powered by CookieYes Logo