SlideShare a Scribd company logo
1 of 8
CyberSecurity
It’s a marathon, not a sprint.
Think big, Start small and grow fast …
CyberSecurity Is nolonger an option for business
Over time, cyberattacks on financial companies have increased in sophistication. Cybercriminals are now attacking
financial institutions with very advanced methods like ransomware, social engineering, and machine learning.
Cyberattacks have now joined in 2024 the top 5 global risks that could present a material crisis for organizations.
Data breaches have become an expensive setback for many organizations, with the global financial sector experiencing
an average cost of nearly 5.97 million U.S. dollars per breach. As these numbers continue to rise, it’s clear that the task
of protecting sensitive customer data grows more complex and demanding
https://phoenix.security/dora-implementation/
CyberSecurity
What are the challenges ?
Sophisticated
cyberattacks
Access to Data
New disruptive
technologies
Third party
Integration
Complex
Architecture
Lack of Skills
Regulatory
constraints
Our mission is to protect our customer data from
Theft, Loss, Unauthorized access or Fraud despite the increasing challenges.
CyberSecurity
Understand your environment
The digital finance sector faces a continuous and evolving cyber threat landscape, where malicious actors constantly rely on advanced &
sophisticated techniques to exploit vulnerabilities and compromise the security of financial institutions, transactions, and sensitive
customer data. As you cannot protect what you don’t know, it’s becoming crucial to understand our environment and corresponding threats
and actors. There are many Cybersecurity Frameworks to support in assessing your environment and providing security measures to better
protect customer’s data.
https://finance.ec.europa.eu/digital-finance/cyber-resilience_en
Know your threat landscape …
Data breach Data Loss Ransomwares Insider threats Supply chain Regulatory
Know your control environment (As-Is situation)
Level 1
Level 2
Level 3
Level 4
Level 5
Choosing the right Framework
https://atwork.safeonweb.be/tools-resources/cyberfundamentals-framework/choosing-right-cyber-fundamentals-assurance-level-your-organisation
3
1
2
Since each organization will have different Business Objectives, a different strategy, a different Risk exposure, a different
control environment maturity, different resources, each board needs to set its own direction and tone for the cybersecurity
journey. Obviously
o the roadmap
o the budget
o the timeline
o the governance
o …
to reach the target should also be specific to the organization. A strong support from the senior management is not optional.
CyberSecurity
The path to reach the target
There is no wrong strategy…
Nevertheless, the target will not be reached without:
o A strong sponsorship by the Senior Management
o A clear commitment on the Risk Appetite
o A clear communication about the priorities
o An adequate resources to get the best results
o A continuous monitoring of the control effectiveness
o A transparent report towards the key stakeholders
There are different ways to go to the moon
As-IS
To-Be
Think big, Start small and grow fast …
6
CyberSecurity is not a one-shot program, as the threat landscape is constantly evolving, and the target is moving, we must keep
Monitoring – Measuring – Testing - Remediating – Reporting
CyberSecurity
@DegroofPetercam – It’s a never-ending story
CyberSecurity
As a bank we expect from a Fintech …
https://finance.ec.europa.eu/digital-finance/cyber-resilience_en
• Follow GDPR requirements
• Encrypt active data (at-rest & in motion)
• Isolate and Encrypt backups
• Support any kind of authentication (MFA)
• Implement a patch management process
• Secure your entire Development life cycle (SDLC)
• Train your employees via a security awareness program
• Regularly perform Pentestings on critical & exposed systems
• Incident Management process in place
• Monitoring & logging capabilities
• Frequently test your backup policy (Inline with your BIA)
• ISO certification or a SOC type 2 report
Continuous
Vulnerability Management
Operational Resilience
Data Privacy
• Gaining Executive buy-in
• Reviewing ICT third-party providers will require a
huge sorting effort to focus on the most critical.
• Test resilience capabilities on a regular basis
• Timely and transparent incident reporting
• DORA brings a holistic approach to ICT Risk Mgt.
• DORA is harmonizing efforts to protect customer data.
• DORA is clearly focusing on Resilience by combining
 CyberSecurity,
 Business Continuity
 IT Service Continity
Challenges Opportunities
8
Thank you

More Related Content

Similar to 03_Emmanuel Ndiaye_Degroof Petercam.pptx

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
Threat Lifecycle Management_Whitepaper
Threat Lifecycle Management_WhitepaperThreat Lifecycle Management_Whitepaper
Threat Lifecycle Management_Whitepaper
Duncan Hart
 
threat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaperthreat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaper
Rudy Piekarski
 

Similar to 03_Emmanuel Ndiaye_Degroof Petercam.pptx (20)

What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
CRISC Course Preview
CRISC Course PreviewCRISC Course Preview
CRISC Course Preview
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
2017 october supplementary_reading
2017 october supplementary_reading2017 october supplementary_reading
2017 october supplementary_reading
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Top 7 Cyber Security Challenges of Financial Institutions.pdf
Top 7 Cyber Security Challenges of Financial Institutions.pdfTop 7 Cyber Security Challenges of Financial Institutions.pdf
Top 7 Cyber Security Challenges of Financial Institutions.pdf
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Risk assessment
Risk assessmentRisk assessment
Risk assessment
 
Threat Lifecycle Management_Whitepaper
Threat Lifecycle Management_WhitepaperThreat Lifecycle Management_Whitepaper
Threat Lifecycle Management_Whitepaper
 
threat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaperthreat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaper
 

More from FinTech Belgium

S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdfS5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
FinTech Belgium
 
S5_3_3_Norway NEW VERSION OK to publish.pptx
S5_3_3_Norway NEW VERSION OK to publish.pptxS5_3_3_Norway NEW VERSION OK to publish.pptx
S5_3_3_Norway NEW VERSION OK to publish.pptx
FinTech Belgium
 

More from FinTech Belgium (20)

Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Pitch Ogloba Feb 2nd 2024 .pptx
Pitch Ogloba Feb 2nd 2024           .pptxPitch Ogloba Feb 2nd 2024           .pptx
Pitch Ogloba Feb 2nd 2024 .pptx
 
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal.    .pptx20240315 _E-Invoicing Digiteal.    .pptx
20240315 _E-Invoicing Digiteal. .pptx
 
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson.          .pptx04_Gambit_Laurent Bodson.          .pptx
04_Gambit_Laurent Bodson. .pptx
 
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden.       .pdf03_Discai_Dagmar Schouterden.       .pdf
03_Discai_Dagmar Schouterden. .pdf
 
01_DLA Piper_Nicolas Kalokyris. .pptx
01_DLA Piper_Nicolas Kalokyris.    .pptx01_DLA Piper_Nicolas Kalokyris.    .pptx
01_DLA Piper_Nicolas Kalokyris. .pptx
 
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx
 
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
 
Fintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdfFintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdf
 
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
 
AMS_04 Toon Daenen. .pptx
AMS_04 Toon Daenen.                .pptxAMS_04 Toon Daenen.                .pptx
AMS_04 Toon Daenen. .pptx
 
AMS_03 François De Witte_. .pptx
AMS_03 François De Witte_.         .pptxAMS_03 François De Witte_.         .pptx
AMS_03 François De Witte_. .pptx
 
AMS_01_Rie_.De Sordo Cock pptx
AMS_01_Rie_.De Sordo Cock           pptxAMS_01_Rie_.De Sordo Cock           pptx
AMS_01_Rie_.De Sordo Cock pptx
 
AMS_00 FTBE_0126_2024. .pptx
AMS_00 FTBE_0126_2024.             .pptxAMS_00 FTBE_0126_2024.             .pptx
AMS_00 FTBE_0126_2024. .pptx
 
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdfS5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
 
S5_3_3_Norway NEW VERSION OK to publish.pptx
S5_3_3_Norway NEW VERSION OK to publish.pptxS5_3_3_Norway NEW VERSION OK to publish.pptx
S5_3_3_Norway NEW VERSION OK to publish.pptx
 

Recently uploaded

Sealdah $ Cheap Call Girls In Kolkata ₹7.5k Pick Up & Drop With Cash Payment ...
Sealdah $ Cheap Call Girls In Kolkata ₹7.5k Pick Up & Drop With Cash Payment ...Sealdah $ Cheap Call Girls In Kolkata ₹7.5k Pick Up & Drop With Cash Payment ...
Sealdah $ Cheap Call Girls In Kolkata ₹7.5k Pick Up & Drop With Cash Payment ...
soniyagrag336
 
Obat Penggugur Kandungan Aman Bagi Ibu Menyusui 087776558899
Obat Penggugur Kandungan Aman Bagi Ibu Menyusui  087776558899Obat Penggugur Kandungan Aman Bagi Ibu Menyusui  087776558899
Obat Penggugur Kandungan Aman Bagi Ibu Menyusui 087776558899
Cara Menggugurkan Kandungan 087776558899
 
Sonagachi % High Profile Call Girls in Kolkata Real photos of Female Escorts ...
Sonagachi % High Profile Call Girls in Kolkata Real photos of Female Escorts ...Sonagachi % High Profile Call Girls in Kolkata Real photos of Female Escorts ...
Sonagachi % High Profile Call Girls in Kolkata Real photos of Female Escorts ...
soniyagrag336
 

Recently uploaded (20)

najoomi asli amil baba kala jadu expert rawalpindi bangladesh uk usa
najoomi asli amil baba kala jadu expert rawalpindi bangladesh uk usanajoomi asli amil baba kala jadu expert rawalpindi bangladesh uk usa
najoomi asli amil baba kala jadu expert rawalpindi bangladesh uk usa
 
Retail sector trends for 2024 | European Business Review
Retail sector trends for 2024  | European Business ReviewRetail sector trends for 2024  | European Business Review
Retail sector trends for 2024 | European Business Review
 
Sealdah $ Cheap Call Girls In Kolkata ₹7.5k Pick Up & Drop With Cash Payment ...
Sealdah $ Cheap Call Girls In Kolkata ₹7.5k Pick Up & Drop With Cash Payment ...Sealdah $ Cheap Call Girls In Kolkata ₹7.5k Pick Up & Drop With Cash Payment ...
Sealdah $ Cheap Call Girls In Kolkata ₹7.5k Pick Up & Drop With Cash Payment ...
 
Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...Test bank for advanced assessment interpreting findings and formulating diffe...
Test bank for advanced assessment interpreting findings and formulating diffe...
 
Pension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdfPension dashboards forum 1 May 2024 (1).pdf
Pension dashboards forum 1 May 2024 (1).pdf
 
uk-no 1 kala ilam expert specialist in uk and qatar kala ilam expert speciali...
uk-no 1 kala ilam expert specialist in uk and qatar kala ilam expert speciali...uk-no 1 kala ilam expert specialist in uk and qatar kala ilam expert speciali...
uk-no 1 kala ilam expert specialist in uk and qatar kala ilam expert speciali...
 
cost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptxcost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptx
 
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
Certified Kala Jadu, Black magic specialist in Rawalpindi and Bangali Amil ba...
 
Famous Kala Jadu, Black magic expert in Oman Or Kala ilam expert in Kuwait
Famous Kala Jadu, Black magic expert in Oman Or Kala ilam expert in KuwaitFamous Kala Jadu, Black magic expert in Oman Or Kala ilam expert in Kuwait
Famous Kala Jadu, Black magic expert in Oman Or Kala ilam expert in Kuwait
 
Collecting banker, Capacity of collecting Banker, conditions under section 13...
Collecting banker, Capacity of collecting Banker, conditions under section 13...Collecting banker, Capacity of collecting Banker, conditions under section 13...
Collecting banker, Capacity of collecting Banker, conditions under section 13...
 
Premium Call Girls bhadrachalam 🧿 6378878445 🧿 High Class Call Girl Service A...
Premium Call Girls bhadrachalam 🧿 6378878445 🧿 High Class Call Girl Service A...Premium Call Girls bhadrachalam 🧿 6378878445 🧿 High Class Call Girl Service A...
Premium Call Girls bhadrachalam 🧿 6378878445 🧿 High Class Call Girl Service A...
 
GIFT City Overview India's Gateway to Global Finance
GIFT City Overview  India's Gateway to Global FinanceGIFT City Overview  India's Gateway to Global Finance
GIFT City Overview India's Gateway to Global Finance
 
Obat Penggugur Kandungan Aman Bagi Ibu Menyusui 087776558899
Obat Penggugur Kandungan Aman Bagi Ibu Menyusui  087776558899Obat Penggugur Kandungan Aman Bagi Ibu Menyusui  087776558899
Obat Penggugur Kandungan Aman Bagi Ibu Menyusui 087776558899
 
Production and Cost of the firm with curves
Production and Cost of the firm with curvesProduction and Cost of the firm with curves
Production and Cost of the firm with curves
 
Benefits & Risk Of Stock Loans
Benefits & Risk Of Stock LoansBenefits & Risk Of Stock Loans
Benefits & Risk Of Stock Loans
 
Sonagachi % High Profile Call Girls in Kolkata Real photos of Female Escorts ...
Sonagachi % High Profile Call Girls in Kolkata Real photos of Female Escorts ...Sonagachi % High Profile Call Girls in Kolkata Real photos of Female Escorts ...
Sonagachi % High Profile Call Girls in Kolkata Real photos of Female Escorts ...
 
The Pfandbrief Roundtable 2024 - Covered Bonds
The Pfandbrief Roundtable 2024 - Covered BondsThe Pfandbrief Roundtable 2024 - Covered Bonds
The Pfandbrief Roundtable 2024 - Covered Bonds
 
Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...
Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...
Solution Manual For Financial Statement Analysis, 13th Edition By Charles H. ...
 
No 1 Top Love marriage specialist baba ji amil baba kala ilam powerful vashik...
No 1 Top Love marriage specialist baba ji amil baba kala ilam powerful vashik...No 1 Top Love marriage specialist baba ji amil baba kala ilam powerful vashik...
No 1 Top Love marriage specialist baba ji amil baba kala ilam powerful vashik...
 
Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024Lion One Corporate Presentation May 2024
Lion One Corporate Presentation May 2024
 

03_Emmanuel Ndiaye_Degroof Petercam.pptx

  • 1. CyberSecurity It’s a marathon, not a sprint. Think big, Start small and grow fast …
  • 2. CyberSecurity Is nolonger an option for business Over time, cyberattacks on financial companies have increased in sophistication. Cybercriminals are now attacking financial institutions with very advanced methods like ransomware, social engineering, and machine learning. Cyberattacks have now joined in 2024 the top 5 global risks that could present a material crisis for organizations. Data breaches have become an expensive setback for many organizations, with the global financial sector experiencing an average cost of nearly 5.97 million U.S. dollars per breach. As these numbers continue to rise, it’s clear that the task of protecting sensitive customer data grows more complex and demanding https://phoenix.security/dora-implementation/
  • 3. CyberSecurity What are the challenges ? Sophisticated cyberattacks Access to Data New disruptive technologies Third party Integration Complex Architecture Lack of Skills Regulatory constraints Our mission is to protect our customer data from Theft, Loss, Unauthorized access or Fraud despite the increasing challenges.
  • 4. CyberSecurity Understand your environment The digital finance sector faces a continuous and evolving cyber threat landscape, where malicious actors constantly rely on advanced & sophisticated techniques to exploit vulnerabilities and compromise the security of financial institutions, transactions, and sensitive customer data. As you cannot protect what you don’t know, it’s becoming crucial to understand our environment and corresponding threats and actors. There are many Cybersecurity Frameworks to support in assessing your environment and providing security measures to better protect customer’s data. https://finance.ec.europa.eu/digital-finance/cyber-resilience_en Know your threat landscape … Data breach Data Loss Ransomwares Insider threats Supply chain Regulatory Know your control environment (As-Is situation) Level 1 Level 2 Level 3 Level 4 Level 5 Choosing the right Framework https://atwork.safeonweb.be/tools-resources/cyberfundamentals-framework/choosing-right-cyber-fundamentals-assurance-level-your-organisation 3 1 2
  • 5. Since each organization will have different Business Objectives, a different strategy, a different Risk exposure, a different control environment maturity, different resources, each board needs to set its own direction and tone for the cybersecurity journey. Obviously o the roadmap o the budget o the timeline o the governance o … to reach the target should also be specific to the organization. A strong support from the senior management is not optional. CyberSecurity The path to reach the target There is no wrong strategy… Nevertheless, the target will not be reached without: o A strong sponsorship by the Senior Management o A clear commitment on the Risk Appetite o A clear communication about the priorities o An adequate resources to get the best results o A continuous monitoring of the control effectiveness o A transparent report towards the key stakeholders There are different ways to go to the moon As-IS To-Be Think big, Start small and grow fast …
  • 6. 6 CyberSecurity is not a one-shot program, as the threat landscape is constantly evolving, and the target is moving, we must keep Monitoring – Measuring – Testing - Remediating – Reporting CyberSecurity @DegroofPetercam – It’s a never-ending story
  • 7. CyberSecurity As a bank we expect from a Fintech … https://finance.ec.europa.eu/digital-finance/cyber-resilience_en • Follow GDPR requirements • Encrypt active data (at-rest & in motion) • Isolate and Encrypt backups • Support any kind of authentication (MFA) • Implement a patch management process • Secure your entire Development life cycle (SDLC) • Train your employees via a security awareness program • Regularly perform Pentestings on critical & exposed systems • Incident Management process in place • Monitoring & logging capabilities • Frequently test your backup policy (Inline with your BIA) • ISO certification or a SOC type 2 report Continuous Vulnerability Management Operational Resilience Data Privacy • Gaining Executive buy-in • Reviewing ICT third-party providers will require a huge sorting effort to focus on the most critical. • Test resilience capabilities on a regular basis • Timely and transparent incident reporting • DORA brings a holistic approach to ICT Risk Mgt. • DORA is harmonizing efforts to protect customer data. • DORA is clearly focusing on Resilience by combining  CyberSecurity,  Business Continuity  IT Service Continity Challenges Opportunities