Banks’ Cyber Intelligence Assessment
Top 30 questions to understand the maturity of your Cyber Intelligence program
- Adversaries — What adversaries are likely to target financial services organizations?
- Financial (Motivation) — What are the financial motivations for targeting banks or financial services organizations?
- Nation State (Motivation) — What nation-state agendas may result in the targeting of financial services organizations?
- Ideological (Motivation) — What are the political, social, economic and ideological motivations for targeting financial services organizations?
- Malware & Tools — What malware or tools are likely to be used to target financial services organizations?
- Tactics, Techniques, and Procedures (TTPs) — What TTPs are likely to be used to target the financial services organization? What tactics are used to gain initial access, dumping credentials, move laterally and exfiltrate data against financial organizations?
- Services and Enablers — What external or associated support might adversaries leverage in their operations? (e.g. MaaS, Exploit Kits, Spam Service)
- Criminal Forum Activity — What financial fraud related activity can be observed on underground forums, markets, or messaging applications? What financial customer data can be observed on underground forums, markets, or messaging applications?
- Indicators — What infrastructure, resources, or indicators of compromise are associated with activity targeting financial organizations?
- Critical Business Data — What types of critical business data are adversaries likely to target at financial services organizations?
- Sensitive Data — What types of sensitive financial data, strategic business documents and personally identifiable information (PII) are targeted by adversaries?
- Critical Business Processes — What types of critical business processes (e.g. procurement processes, finance, IT, HR) are adversaries likely to target or exploit at financial services organizations?
- Critical Business Infrastructure — What common business infrastructure, OS and applications is the adversary likely to target or exploit at financial services organizations?
- Vulnerabilities — What vulnerabilities are being exploited to target
- Monetization — How are adversary operations monetized?
- Individuals — What are the cyber threats targeting the organization’s executives, employees and customers?
- Customer Financial Data — What are the cyber threats to customer financial account information?
- Loan Fraud — What fraudulent activity can be associated with loans and credit-related processes?
- Payment Cards (Debit/Credit) — What fraudulent activity can be associated with payment cards?
- Identity fraud — What tactics and techniques are adversaries using to conduct identity fraud?
- Account Takeover — What fraudulent activity can be associated with account takeover?
- Identity Theft — What fraudulent activity can be associated with individual’s identities?
- Phone Number Porting/Hijacking — What fraudulent activity can be associated with phone number porting?
- ATM — What are the cyber threats to ATMs and their related networks?
- Geo-political events — How could geo-political events or initiatives impact organizations and their employees operating in various regions of the world?
- Data Exposure and Breaches — What data exposures and breaches have been observed for organization in the financial services sector?
- Mobile Applications — What are the cyber threats to mobile bank applications?
- Point of Sale (PoS) — What are the cyber threats to Point of Sale systems?
- Technology Supply Chain — What are the cyber threats to the Technology Supply Chain?
- Insider Threats — How do you monitor insider threats?
FOLLOW ME ON TWITTER: