{"id":11458,"date":"2018-11-05T11:41:22","date_gmt":"2018-11-05T11:41:22","guid":{"rendered":"http:\/\/bulletins.bfconsulting.com\/?p=11458"},"modified":"2018-11-05T11:41:22","modified_gmt":"2018-11-05T11:41:22","slug":"the-inside-out-approach-to-cybersecurity-in-banking","status":"publish","type":"post","link":"https:\/\/bulletins.bfconsulting.com\/en\/the-inside-out-approach-to-cybersecurity-in-banking\/","title":{"rendered":"The inside-out approach to cybersecurity in banking"},"content":{"rendered":"<p>The outside-in mindset (where cyber threats are treated as external influencers) leaves financial institutions in a reactive mode and needs to change. The inside-out approach (where cybersecurity is aligned to business priorities and is adaptable to an ever-changing threat landscape) will prove much more successful in the long run. Instead of thinking of cybersecurity as an IT-level concern, it should be treated as a business-level matter, meaning that every individual employee and third party who may have access to sensitive data and environments needs to understand and take seriously cybersecurity risks and concerns. Similarly, cybersecurity professionals need to be included in business conversations as cybersecurity needs to be considered when making high-level decisions about priorities, directions and new products\/services.<\/p>\n<p>Perhaps the hardest part for financial institutions is the cybersecurity talent gap that makes it difficult to find and retain qualified cybersecurity professionals. Outsourcing, however, represents a viable and cost effective solution that can provide broader insight as well as access to expertise that is challenging for individual institutions to develop internally. As long as roles are clear, communication is emphasized and goals are set, outsourcing cybersecurity operations \u2013 in part or whole and for long or short periods of time \u2013 can have great results.<\/p>\n<div class=\"rpbt_shortcode\">\n\n<div id='rpbt-related-gallery-1' class='gallery related-gallery related-galleryid-11458 gallery-columns-3 gallery-size-thumbnail'><figure class='gallery-item' role='group' aria-label='How to identify a phishing site'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/how-to-identify-a-phishing-site\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/10\/how-to-identify-a-phishing-site-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-11368\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-11368'>\n\t\t\t\tHow to identify a phishing site\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='Central Bank Digital Currencies for Cross-Border Payments'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/central-bank-digital-currencies-for-cross-border-payments\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2021\/07\/ca8a1371-9976-807c-0eb2-10d8d84d77ea1-150x150.png\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-16165\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-16165'>\n\t\t\t\tCentral Bank Digital Currencies for Cross-Border Payments\n\t\t\t\t<\/figcaption><\/figure><figure class='gallery-item' role='group' aria-label='What is P2P lending?'>\n\t\t\t<div class='gallery-icon landscape'>\n\t\t\t\t<a href='https:\/\/bulletins.bfconsulting.com\/en\/what-is-p2p-lending\/'><img width=\"150\" height=\"150\" src=\"https:\/\/bulletins.bfconsulting.com\/wp-content\/uploads\/2018\/05\/modern-technology-background-with-connecting-lines-and-dots_1048-7461-150x150.jpg\" class=\"attachment-thumbnail size-thumbnail\" alt=\"\" decoding=\"async\" aria-describedby=\"rpbt-related-gallery-1-9902\" loading=\"lazy\" \/><\/a>\n\t\t\t<\/div>\n\t\t\t\t<figcaption class='wp-caption-text gallery-caption' id='rpbt-related-gallery-1-9902'>\n\t\t\t\tWhat is P2P lending?\n\t\t\t\t<\/figcaption><\/figure>\n\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The outside-in mindset (where cyber threats are treated as external influencers) leaves financial institutions in a reactive mode and needs to change. The inside-out approach (where cybersecurity is aligned to business priorities and is adaptable to an ever-changing threat landscape) will prove much more successful in the long run. Instead of thinking of cybersecurity as &hellip;<\/p>\n","protected":false},"author":5,"featured_media":11512,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[184,193],"_links":{"self":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11458"}],"collection":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/comments?post=11458"}],"version-history":[{"count":3,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11458\/revisions"}],"predecessor-version":[{"id":11513,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/posts\/11458\/revisions\/11513"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media\/11512"}],"wp:attachment":[{"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/media?parent=11458"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/categories?post=11458"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bulletins.bfconsulting.com\/en\/wp-json\/wp\/v2\/tags?post=11458"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}