SlideShare a Scribd company logo
1 of 22
Download to read offline
Financial Services Security:
The Real Extent Of The Dangers
Cybercrime is Hitting Financial
Services Firms Hard
Cybercrime is the 2nd most
commonly reported type of
economic crime for financial
services companies – and it
is also the fastest growing.
Just two years ago, it went
almost entirely unreported.
Cybercrime is Hitting Financial
Services Firms Hard
Types of cybercrime reported, 2011:
Asset misappropriation
67%
59%
Source: Fighting Economic Crime in the
Financial Services sector - PwC
2011
2009
Cybercrime is the 2nd most
commonly reported type of
economic crime for financial
services companies – and it
is also the fastest growing.
Just two years ago, it went
almost entirely unreported.
Cybercrime is Hitting Financial
Services Firms Hard
Types of cybercrime reported, 2011:
Cybercrime
38%
0%
Source: Fighting Economic Crime in the
Financial Services sector - PwC
2011
2009
Cybercrime is the 2nd most
commonly reported type of
economic crime for financial
services companies – and it
is also the fastest growing.
Just two years ago, it went
almost entirely unreported.
Cybercrime is Hitting Financial
Services Firms Hard
Types of cybercrime reported, 2011:
Accounting fraud
26%
19%
Source: Fighting Economic Crime in the
Financial Services sector - PwC
2011
2009
Cybercrime is the 2nd most
commonly reported type of
economic crime for financial
services companies – and it
is also the fastest growing.
Just two years ago, it went
almost entirely unreported.
Cybercrime is Hitting Financial
Services Firms Hard
Types of cybercrime reported, 2011:
Money laundering
24%
28%
Source: Fighting Economic Crime in the
Financial Services sector - PwC
2011
2009
Cybercrime is the 2nd most
commonly reported type of
economic crime for financial
services companies – and it
is also the fastest growing.
Just two years ago, it went
almost entirely unreported.
Cybercrime is Hitting Financial
Services Firms Hard
Types of cybercrime reported, 2011:
Bribery and corruption
16%
19%
Source: Fighting Economic Crime in the
Financial Services sector - PwC
2011
2009
Cybercrime is the 2nd most
commonly reported type of
economic crime for financial
services companies – and it
is also the fastest growing.
Just two years ago, it went
almost entirely unreported.
How Crooks Target Financial Firms
Thieves have developed a range of techniques
to snatch money from financial services firms.
Here’s how.
Source: Gordon M. Snow, Assistant Director, Cyber Division, FBI
Cyberattacks in
financial services
Account
takeovers
Attacking
payment
processors
How Crooks Target Financial Firms
Thieves have developed a range of techniques
to snatch money from financial services firms.
Here’s how.
Source: Gordon M. Snow, Assistant Director, Cyber Division, FBI
Cyberattacks in
financial services
Account
takeovers
Attacking
payment
processors
Stock market
exploitation
ATM skimming
Mobile banking
attacks
How Crooks Target Financial Firms
Thieves have developed a range of techniques
to snatch money from financial services firms.
Here’s how.
Source: Gordon M. Snow, Assistant Director, Cyber Division, FBI
Cyberattacks in
financial services
Account
takeovers
Attacking
payment
processors
Stock market
exploitation
ATM skimming
Mobile banking
attacks
Insider jobs
Supply chain
infiltration
Disrupting
communications
networks
The Effect on Financial Customers
Source: KPMG Data Loss Barometer 2012
Financial services customers represent 14.8% of the people affected by
data loss between 2008-2012.
Government
Healthcare
Education
Financial services
Retail
Professional services
Technology
Insurance
Media
Organization
Not for profit
Industrial markets
Data services
Other business sectors
5.2%
3.2%
5.4%
14.8%
13.7%
0.7%
23.6%
1.3%
12.5%
2%
0.8%
1.5%
14.2%
1.1%
The Effect on Financial Customers
Source: KPMG Data Loss Barometer 2012
Financial services customers represent 14.8% of the people affected by
data loss between 2008-2012.
Government
Healthcare
Education
Financial services
Retail
Professional services
Technology
Insurance
Media
Organization
Not for profit
Industrial markets
Data services
Other business sectors
5.2%
3.2%
5.4%
14.8%
13.7%
0.7%
23.6%
1.3%
12.5%
2%
0.8%
1.5%
14.2%
1.1%
It’s Only Getting Worse...
Source: Detica Cybersecurity Monitor, May 2012
88%
88% of financial services
companies expect the number
of cyberattacks to grow in the
next few years
It’s Only Getting Worse...
Source: Detica Cybersecurity Monitor, May 2012
88% 5%
88% of financial services
companies expect the number
of cyberattacks to grow in the
next few years
5% say that the number will
remain constant
It’s Only Getting Worse...
Source: Detica Cybersecurity Monitor, May 2012
88% 5% 8%
88% of financial services
companies expect the number
of cyberattacks to grow in the
next few years
5% say that the number will
remain constant
While 8% don’t know
No financial services
organizations think that the
number will shrink.
The Budget Barrier
Lack of sufficient budget is the biggest barrier to
implementing an effective information security
program, say financial institutions.
Barrier to info security program:
Lack of sufficient budget
43.9%
Source: Deloitte 2012 Global Financial Services Industry (GFSI) Security Study
The Budget Barrier
Lack of sufficient budget is the biggest barrier to
implementing an effective information security
program, say financial institutions.
Barrier to info security program:
Lack of sufficient budget Lack of clarity or mandate
43.9% 27.1%
Source: Deloitte 2012 Global Financial Services Industry (GFSI) Security Study
The Budget Barrier
Lack of sufficient budget is the biggest barrier to
implementing an effective information security
program, say financial institutions.
Barrier to info security program:
Source: Deloitte 2012 Global Financial Services Industry (GFSI) Security Study
Lack of sufficient budget Lack of clarity or mandate Increasing sophistication
of threats
43.9% 27.1% 27.9%
It’s Getting Serious
Just remember...
Cybercrime is on the
rise within the financial
services sector
It’s Getting Serious
Just remember...
Cybercrime is on the
rise within the financial
services sector
Crooks have their arsenals
well stocked with a variety of
dastardly methods
It’s Getting Serious
Just remember...
Cybercrime is on the
rise within the financial
services sector
Crooks have their arsenals
well stocked with a variety of
dastardly methods
Sufficient budgetary
allowances and adequate data
security measures are vital
for data compliance - and
to bring an end to the surge
in cybercrime
For more information about new
threats, download our eGuide:
Pitfalls for Compliance
Officers: The Changing
Threat and Technology
Landscape
www.clearswift.com
1
www.clearswift.com
Pitfalls for Compliance Officers:
The Changing Threat and Technology Landscape
Stay ahead of the game and prepare yourself for the newest threats
www.clearswift.com
1
www.clearswift.com
Pitfalls for Compliance Officers:The Changing Threat and Technology LandscapeStay ahead of the game and prepare yourself for the newest threats
DOWNLOAD NOW!

More Related Content

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Slideshare financial-services-security-the-real-extent-of-the-dangers

  • 1. Financial Services Security: The Real Extent Of The Dangers
  • 2. Cybercrime is Hitting Financial Services Firms Hard Cybercrime is the 2nd most commonly reported type of economic crime for financial services companies – and it is also the fastest growing. Just two years ago, it went almost entirely unreported.
  • 3. Cybercrime is Hitting Financial Services Firms Hard Types of cybercrime reported, 2011: Asset misappropriation 67% 59% Source: Fighting Economic Crime in the Financial Services sector - PwC 2011 2009 Cybercrime is the 2nd most commonly reported type of economic crime for financial services companies – and it is also the fastest growing. Just two years ago, it went almost entirely unreported.
  • 4. Cybercrime is Hitting Financial Services Firms Hard Types of cybercrime reported, 2011: Cybercrime 38% 0% Source: Fighting Economic Crime in the Financial Services sector - PwC 2011 2009 Cybercrime is the 2nd most commonly reported type of economic crime for financial services companies – and it is also the fastest growing. Just two years ago, it went almost entirely unreported.
  • 5. Cybercrime is Hitting Financial Services Firms Hard Types of cybercrime reported, 2011: Accounting fraud 26% 19% Source: Fighting Economic Crime in the Financial Services sector - PwC 2011 2009 Cybercrime is the 2nd most commonly reported type of economic crime for financial services companies – and it is also the fastest growing. Just two years ago, it went almost entirely unreported.
  • 6. Cybercrime is Hitting Financial Services Firms Hard Types of cybercrime reported, 2011: Money laundering 24% 28% Source: Fighting Economic Crime in the Financial Services sector - PwC 2011 2009 Cybercrime is the 2nd most commonly reported type of economic crime for financial services companies – and it is also the fastest growing. Just two years ago, it went almost entirely unreported.
  • 7. Cybercrime is Hitting Financial Services Firms Hard Types of cybercrime reported, 2011: Bribery and corruption 16% 19% Source: Fighting Economic Crime in the Financial Services sector - PwC 2011 2009 Cybercrime is the 2nd most commonly reported type of economic crime for financial services companies – and it is also the fastest growing. Just two years ago, it went almost entirely unreported.
  • 8. How Crooks Target Financial Firms Thieves have developed a range of techniques to snatch money from financial services firms. Here’s how. Source: Gordon M. Snow, Assistant Director, Cyber Division, FBI Cyberattacks in financial services Account takeovers Attacking payment processors
  • 9. How Crooks Target Financial Firms Thieves have developed a range of techniques to snatch money from financial services firms. Here’s how. Source: Gordon M. Snow, Assistant Director, Cyber Division, FBI Cyberattacks in financial services Account takeovers Attacking payment processors Stock market exploitation ATM skimming Mobile banking attacks
  • 10. How Crooks Target Financial Firms Thieves have developed a range of techniques to snatch money from financial services firms. Here’s how. Source: Gordon M. Snow, Assistant Director, Cyber Division, FBI Cyberattacks in financial services Account takeovers Attacking payment processors Stock market exploitation ATM skimming Mobile banking attacks Insider jobs Supply chain infiltration Disrupting communications networks
  • 11. The Effect on Financial Customers Source: KPMG Data Loss Barometer 2012 Financial services customers represent 14.8% of the people affected by data loss between 2008-2012. Government Healthcare Education Financial services Retail Professional services Technology Insurance Media Organization Not for profit Industrial markets Data services Other business sectors 5.2% 3.2% 5.4% 14.8% 13.7% 0.7% 23.6% 1.3% 12.5% 2% 0.8% 1.5% 14.2% 1.1%
  • 12. The Effect on Financial Customers Source: KPMG Data Loss Barometer 2012 Financial services customers represent 14.8% of the people affected by data loss between 2008-2012. Government Healthcare Education Financial services Retail Professional services Technology Insurance Media Organization Not for profit Industrial markets Data services Other business sectors 5.2% 3.2% 5.4% 14.8% 13.7% 0.7% 23.6% 1.3% 12.5% 2% 0.8% 1.5% 14.2% 1.1%
  • 13. It’s Only Getting Worse... Source: Detica Cybersecurity Monitor, May 2012 88% 88% of financial services companies expect the number of cyberattacks to grow in the next few years
  • 14. It’s Only Getting Worse... Source: Detica Cybersecurity Monitor, May 2012 88% 5% 88% of financial services companies expect the number of cyberattacks to grow in the next few years 5% say that the number will remain constant
  • 15. It’s Only Getting Worse... Source: Detica Cybersecurity Monitor, May 2012 88% 5% 8% 88% of financial services companies expect the number of cyberattacks to grow in the next few years 5% say that the number will remain constant While 8% don’t know No financial services organizations think that the number will shrink.
  • 16. The Budget Barrier Lack of sufficient budget is the biggest barrier to implementing an effective information security program, say financial institutions. Barrier to info security program: Lack of sufficient budget 43.9% Source: Deloitte 2012 Global Financial Services Industry (GFSI) Security Study
  • 17. The Budget Barrier Lack of sufficient budget is the biggest barrier to implementing an effective information security program, say financial institutions. Barrier to info security program: Lack of sufficient budget Lack of clarity or mandate 43.9% 27.1% Source: Deloitte 2012 Global Financial Services Industry (GFSI) Security Study
  • 18. The Budget Barrier Lack of sufficient budget is the biggest barrier to implementing an effective information security program, say financial institutions. Barrier to info security program: Source: Deloitte 2012 Global Financial Services Industry (GFSI) Security Study Lack of sufficient budget Lack of clarity or mandate Increasing sophistication of threats 43.9% 27.1% 27.9%
  • 19. It’s Getting Serious Just remember... Cybercrime is on the rise within the financial services sector
  • 20. It’s Getting Serious Just remember... Cybercrime is on the rise within the financial services sector Crooks have their arsenals well stocked with a variety of dastardly methods
  • 21. It’s Getting Serious Just remember... Cybercrime is on the rise within the financial services sector Crooks have their arsenals well stocked with a variety of dastardly methods Sufficient budgetary allowances and adequate data security measures are vital for data compliance - and to bring an end to the surge in cybercrime
  • 22. For more information about new threats, download our eGuide: Pitfalls for Compliance Officers: The Changing Threat and Technology Landscape www.clearswift.com 1 www.clearswift.com Pitfalls for Compliance Officers: The Changing Threat and Technology Landscape Stay ahead of the game and prepare yourself for the newest threats www.clearswift.com 1 www.clearswift.com Pitfalls for Compliance Officers:The Changing Threat and Technology LandscapeStay ahead of the game and prepare yourself for the newest threats DOWNLOAD NOW!