Although nearly 14 years have passed, the events of Sept. 11, 2001, are never far from anyone’s thoughts. Few events in human history have so changed the landscape of any given society, and yet despite the thousands of man-hours spent to determine how we failed to recognize the threat, we continue to repeat those same procedural mistakes in different industries.

After 9/11, the U.S. government implemented changes to law, regulation, policy, etc., all to ensure that critical intelligence and information flowed freely across agencies so everyone had access to what they needed to identify and stop serious threats. While one could argue that the efforts of the government have been successful, as evidenced by a lack of a major catastrophe, the private sector has largely been left to fend for themselves.

Understanding the Threat Environment

In order for an organization to protect against an overwhelming threat environment, it first needs to understand the cybersecurity threat landscape; that is to say, enterprises must know:

  • Why are they being attacked? Or, what is the desired outcome?
  • Who are the attackers?
  • What methods are the cybercriminals using?
  • How are they executing the attack?

Having a clear understanding of the battle space is just the first hurdle. It is then incumbent upon the organization to know itself and its security:

  • What are the vulnerabilities?
  • What assets can be applied today?
  • What assets are needed in the future?
  • How do we employ those assets?
  • How do we configure ourselves to mitigate the risk?
  • What does success look like, and how do we measure that success?

All of these are great questions to lay the foundation for understanding the threat environment. Getting to an answer may take weeks or even months, however, and it will likely shift over time; it’s a continuous evolution. What is important is for organizations to seriously dedicate themselves to understanding the threat environment, assessing their organic capabilities, identifying and documenting gaps, deploying resources, developing internal policies and forming organizational structures to maximize their efforts.

Learning to Live in a New Landscape

No one will argue that the threat environment is rapidly changing, or that this fact seriously impacts multiple sectors in our economy. Every day a new data breach, attack against our infrastructure or financial crime is costing the economy millions of dollars — not to mention leaving our organizations in a vulnerable position. Left unchecked, these attacks will continue to grow and chip away at an already severely weakened infrastructure, eventually leading to a collapse.

What we need are leaders who can recognize that the threat landscape in the financial industry is drastically different from what it was 14 years ago. These decision-makers must be willing to implement solutions such as threat intelligence sharing in their organizations to mitigate modern-day risks. Changes to any enterprise are never easy, but given the serious nature of the threat landscape, industry leaders are left with little choice.

Read the white paper to learn more: The Pre-9/11 Financial Crimes Landscape

More from Fraud Protection

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

New Fakext malware targets Latin American banks

6 min read - This article was made possible thanks to contributions from Itzhak Chimino, Michael Gal and Liran Tiebloom. Browser extensions have become integral to our online experience. From productivity tools to entertainment add-ons, these small software modules offer customized features to suit individual preferences. Unfortunately, extensions can prove useful to malicious actors as well. Capitalizing on the favorable characteristics of an add-on, an attacker can leverage attributes like persistence, seamless installation, elevated privileges and unencrypted data exposure to distribute and operate banking…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today