SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
Financial Services Security:
The Real Extent Of The Dangers
Cybercrime is Hitting Financial
Services Firms Hard
Cybercrime is the 2nd most
commonly reported type of
economic crime for financial
services companies – and it
is also the fastest growing.
Just two years ago, it went
almost entirely unreported.
Cybercrime is Hitting Financial
Services Firms Hard
Types of cybercrime reported, 2011:
Asset misappropriation
67%
59%
Source: Fighting Economic Crime in the
Financial Services sector - PwC
2011
2009
Cybercrime is the 2nd most
commonly reported type of
economic crime for financial
services companies – and it
is also the fastest growing.
Just two years ago, it went
almost entirely unreported.
Cybercrime is Hitting Financial
Services Firms Hard
Types of cybercrime reported, 2011:
Cybercrime
38%
0%
Source: Fighting Economic Crime in the
Financial Services sector - PwC
2011
2009
Cybercrime is the 2nd most
commonly reported type of
economic crime for financial
services companies – and it
is also the fastest growing.
Just two years ago, it went
almost entirely unreported.
Cybercrime is Hitting Financial
Services Firms Hard
Types of cybercrime reported, 2011:
Accounting fraud
26%
19%
Source: Fighting Economic Crime in the
Financial Services sector - PwC
2011
2009
Cybercrime is the 2nd most
commonly reported type of
economic crime for financial
services companies – and it
is also the fastest growing.
Just two years ago, it went
almost entirely unreported.
Cybercrime is Hitting Financial
Services Firms Hard
Types of cybercrime reported, 2011:
Money laundering
24%
28%
Source: Fighting Economic Crime in the
Financial Services sector - PwC
2011
2009
Cybercrime is the 2nd most
commonly reported type of
economic crime for financial
services companies – and it
is also the fastest growing.
Just two years ago, it went
almost entirely unreported.
Cybercrime is Hitting Financial
Services Firms Hard
Types of cybercrime reported, 2011:
Bribery and corruption
16%
19%
Source: Fighting Economic Crime in the
Financial Services sector - PwC
2011
2009
Cybercrime is the 2nd most
commonly reported type of
economic crime for financial
services companies – and it
is also the fastest growing.
Just two years ago, it went
almost entirely unreported.
How Crooks Target Financial Firms
Thieves have developed a range of techniques
to snatch money from financial services firms.
Here’s how.
Source: Gordon M. Snow, Assistant Director, Cyber Division, FBI
Cyberattacks in
financial services
Account
takeovers
Attacking
payment
processors
How Crooks Target Financial Firms
Thieves have developed a range of techniques
to snatch money from financial services firms.
Here’s how.
Source: Gordon M. Snow, Assistant Director, Cyber Division, FBI
Cyberattacks in
financial services
Account
takeovers
Attacking
payment
processors
Stock market
exploitation
ATM skimming
Mobile banking
attacks
How Crooks Target Financial Firms
Thieves have developed a range of techniques
to snatch money from financial services firms.
Here’s how.
Source: Gordon M. Snow, Assistant Director, Cyber Division, FBI
Cyberattacks in
financial services
Account
takeovers
Attacking
payment
processors
Stock market
exploitation
ATM skimming
Mobile banking
attacks
Insider jobs
Supply chain
infiltration
Disrupting
communications
networks
The Effect on Financial Customers
Source: KPMG Data Loss Barometer 2012
Financial services customers represent 14.8% of the people affected by
data loss between 2008-2012.
Government
Healthcare
Education
Financial services
Retail
Professional services
Technology
Insurance
Media
Organization
Not for profit
Industrial markets
Data services
Other business sectors
5.2%
3.2%
5.4%
14.8%
13.7%
0.7%
23.6%
1.3%
12.5%
2%
0.8%
1.5%
14.2%
1.1%
The Effect on Financial Customers
Source: KPMG Data Loss Barometer 2012
Financial services customers represent 14.8% of the people affected by
data loss between 2008-2012.
Government
Healthcare
Education
Financial services
Retail
Professional services
Technology
Insurance
Media
Organization
Not for profit
Industrial markets
Data services
Other business sectors
5.2%
3.2%
5.4%
14.8%
13.7%
0.7%
23.6%
1.3%
12.5%
2%
0.8%
1.5%
14.2%
1.1%
It’s Only Getting Worse...
Source: Detica Cybersecurity Monitor, May 2012
88%
88% of financial services
companies expect the number
of cyberattacks to grow in the
next few years
It’s Only Getting Worse...
Source: Detica Cybersecurity Monitor, May 2012
88% 5%
88% of financial services
companies expect the number
of cyberattacks to grow in the
next few years
5% say that the number will
remain constant
It’s Only Getting Worse...
Source: Detica Cybersecurity Monitor, May 2012
88% 5% 8%
88% of financial services
companies expect the number
of cyberattacks to grow in the
next few years
5% say that the number will
remain constant
While 8% don’t know
No financial services
organizations think that the
number will shrink.
The Budget Barrier
Lack of sufficient budget is the biggest barrier to
implementing an effective information security
program, say financial institutions.
Barrier to info security program:
Lack of sufficient budget
43.9%
Source: Deloitte 2012 Global Financial Services Industry (GFSI) Security Study
The Budget Barrier
Lack of sufficient budget is the biggest barrier to
implementing an effective information security
program, say financial institutions.
Barrier to info security program:
Lack of sufficient budget Lack of clarity or mandate
43.9% 27.1%
Source: Deloitte 2012 Global Financial Services Industry (GFSI) Security Study
The Budget Barrier
Lack of sufficient budget is the biggest barrier to
implementing an effective information security
program, say financial institutions.
Barrier to info security program:
Source: Deloitte 2012 Global Financial Services Industry (GFSI) Security Study
Lack of sufficient budget Lack of clarity or mandate Increasing sophistication
of threats
43.9% 27.1% 27.9%
It’s Getting Serious
Just remember...
Cybercrime is on the
rise within the financial
services sector
It’s Getting Serious
Just remember...
Cybercrime is on the
rise within the financial
services sector
Crooks have their arsenals
well stocked with a variety of
dastardly methods
It’s Getting Serious
Just remember...
Cybercrime is on the
rise within the financial
services sector
Crooks have their arsenals
well stocked with a variety of
dastardly methods
Sufficient budgetary
allowances and adequate data
security measures are vital
for data compliance - and
to bring an end to the surge
in cybercrime
For more information about new
threats, download our eGuide:
Pitfalls for Compliance
Officers: The Changing
Threat and Technology
Landscape
www.clearswift.com
1
www.clearswift.com
Pitfalls for Compliance Officers:
The Changing Threat and Technology Landscape
Stay ahead of the game and prepare yourself for the newest threats
www.clearswift.com
1
www.clearswift.com
Pitfalls for Compliance Officers:The Changing Threat and Technology LandscapeStay ahead of the game and prepare yourself for the newest threats
DOWNLOAD NOW!

Mais conteúdo relacionado

Último

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Último (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

Destaque

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by HubspotMarius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 

Destaque (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Slideshare financial-services-security-the-real-extent-of-the-dangers

  • 1. Financial Services Security: The Real Extent Of The Dangers
  • 2. Cybercrime is Hitting Financial Services Firms Hard Cybercrime is the 2nd most commonly reported type of economic crime for financial services companies – and it is also the fastest growing. Just two years ago, it went almost entirely unreported.
  • 3. Cybercrime is Hitting Financial Services Firms Hard Types of cybercrime reported, 2011: Asset misappropriation 67% 59% Source: Fighting Economic Crime in the Financial Services sector - PwC 2011 2009 Cybercrime is the 2nd most commonly reported type of economic crime for financial services companies – and it is also the fastest growing. Just two years ago, it went almost entirely unreported.
  • 4. Cybercrime is Hitting Financial Services Firms Hard Types of cybercrime reported, 2011: Cybercrime 38% 0% Source: Fighting Economic Crime in the Financial Services sector - PwC 2011 2009 Cybercrime is the 2nd most commonly reported type of economic crime for financial services companies – and it is also the fastest growing. Just two years ago, it went almost entirely unreported.
  • 5. Cybercrime is Hitting Financial Services Firms Hard Types of cybercrime reported, 2011: Accounting fraud 26% 19% Source: Fighting Economic Crime in the Financial Services sector - PwC 2011 2009 Cybercrime is the 2nd most commonly reported type of economic crime for financial services companies – and it is also the fastest growing. Just two years ago, it went almost entirely unreported.
  • 6. Cybercrime is Hitting Financial Services Firms Hard Types of cybercrime reported, 2011: Money laundering 24% 28% Source: Fighting Economic Crime in the Financial Services sector - PwC 2011 2009 Cybercrime is the 2nd most commonly reported type of economic crime for financial services companies – and it is also the fastest growing. Just two years ago, it went almost entirely unreported.
  • 7. Cybercrime is Hitting Financial Services Firms Hard Types of cybercrime reported, 2011: Bribery and corruption 16% 19% Source: Fighting Economic Crime in the Financial Services sector - PwC 2011 2009 Cybercrime is the 2nd most commonly reported type of economic crime for financial services companies – and it is also the fastest growing. Just two years ago, it went almost entirely unreported.
  • 8. How Crooks Target Financial Firms Thieves have developed a range of techniques to snatch money from financial services firms. Here’s how. Source: Gordon M. Snow, Assistant Director, Cyber Division, FBI Cyberattacks in financial services Account takeovers Attacking payment processors
  • 9. How Crooks Target Financial Firms Thieves have developed a range of techniques to snatch money from financial services firms. Here’s how. Source: Gordon M. Snow, Assistant Director, Cyber Division, FBI Cyberattacks in financial services Account takeovers Attacking payment processors Stock market exploitation ATM skimming Mobile banking attacks
  • 10. How Crooks Target Financial Firms Thieves have developed a range of techniques to snatch money from financial services firms. Here’s how. Source: Gordon M. Snow, Assistant Director, Cyber Division, FBI Cyberattacks in financial services Account takeovers Attacking payment processors Stock market exploitation ATM skimming Mobile banking attacks Insider jobs Supply chain infiltration Disrupting communications networks
  • 11. The Effect on Financial Customers Source: KPMG Data Loss Barometer 2012 Financial services customers represent 14.8% of the people affected by data loss between 2008-2012. Government Healthcare Education Financial services Retail Professional services Technology Insurance Media Organization Not for profit Industrial markets Data services Other business sectors 5.2% 3.2% 5.4% 14.8% 13.7% 0.7% 23.6% 1.3% 12.5% 2% 0.8% 1.5% 14.2% 1.1%
  • 12. The Effect on Financial Customers Source: KPMG Data Loss Barometer 2012 Financial services customers represent 14.8% of the people affected by data loss between 2008-2012. Government Healthcare Education Financial services Retail Professional services Technology Insurance Media Organization Not for profit Industrial markets Data services Other business sectors 5.2% 3.2% 5.4% 14.8% 13.7% 0.7% 23.6% 1.3% 12.5% 2% 0.8% 1.5% 14.2% 1.1%
  • 13. It’s Only Getting Worse... Source: Detica Cybersecurity Monitor, May 2012 88% 88% of financial services companies expect the number of cyberattacks to grow in the next few years
  • 14. It’s Only Getting Worse... Source: Detica Cybersecurity Monitor, May 2012 88% 5% 88% of financial services companies expect the number of cyberattacks to grow in the next few years 5% say that the number will remain constant
  • 15. It’s Only Getting Worse... Source: Detica Cybersecurity Monitor, May 2012 88% 5% 8% 88% of financial services companies expect the number of cyberattacks to grow in the next few years 5% say that the number will remain constant While 8% don’t know No financial services organizations think that the number will shrink.
  • 16. The Budget Barrier Lack of sufficient budget is the biggest barrier to implementing an effective information security program, say financial institutions. Barrier to info security program: Lack of sufficient budget 43.9% Source: Deloitte 2012 Global Financial Services Industry (GFSI) Security Study
  • 17. The Budget Barrier Lack of sufficient budget is the biggest barrier to implementing an effective information security program, say financial institutions. Barrier to info security program: Lack of sufficient budget Lack of clarity or mandate 43.9% 27.1% Source: Deloitte 2012 Global Financial Services Industry (GFSI) Security Study
  • 18. The Budget Barrier Lack of sufficient budget is the biggest barrier to implementing an effective information security program, say financial institutions. Barrier to info security program: Source: Deloitte 2012 Global Financial Services Industry (GFSI) Security Study Lack of sufficient budget Lack of clarity or mandate Increasing sophistication of threats 43.9% 27.1% 27.9%
  • 19. It’s Getting Serious Just remember... Cybercrime is on the rise within the financial services sector
  • 20. It’s Getting Serious Just remember... Cybercrime is on the rise within the financial services sector Crooks have their arsenals well stocked with a variety of dastardly methods
  • 21. It’s Getting Serious Just remember... Cybercrime is on the rise within the financial services sector Crooks have their arsenals well stocked with a variety of dastardly methods Sufficient budgetary allowances and adequate data security measures are vital for data compliance - and to bring an end to the surge in cybercrime
  • 22. For more information about new threats, download our eGuide: Pitfalls for Compliance Officers: The Changing Threat and Technology Landscape www.clearswift.com 1 www.clearswift.com Pitfalls for Compliance Officers: The Changing Threat and Technology Landscape Stay ahead of the game and prepare yourself for the newest threats www.clearswift.com 1 www.clearswift.com Pitfalls for Compliance Officers:The Changing Threat and Technology LandscapeStay ahead of the game and prepare yourself for the newest threats DOWNLOAD NOW!