CYBER & DATA SECURITY

Mitigation

Prevention and risk mitigation are key components in every aspect of bank operations - the same holds true in the protection of customer data.


Vulnerabilities & Mitigation

Cybersecurity and data security vulnerabilities come in many forms. Use these resources to know what you are dealing with and how to stay one step ahead.

Name Source Date

Alerts

Cybersecurity and Technology News

DeFi platform crypto hack might be largest ever

Mar 30, 2022 | NewsWatch Today
Decentralized finance platform Ronin Network announced a hack of more than $625 million in cryptocurrencies, possibly the largest crypto hack on record.

Cyber officials: Be on alert for Russian cyberattack

Mar 23, 2022 | NewsWatch Today
Federal cybersecurity officials called on U.S. critical infrastructure to be prepared to defend against a possible Russian state-sponsored cyberattack.

CISA stakeholder call on Russia-Ukraine conflict today

Mar 22, 2022 | NewsWatch Today
The Cybersecurity and Infrastructure Security Agency is hosting an unclassified stakeholder call today to address the U.S. homeland impact of the Russia-Ukraine conflict.

FS-ISAC offers Russia-Ukraine cyber update

Mar 18, 2022 | NewsWatch Today
The Financial Services Information Sharing and Analysis Center’s latest weekly risk summary report offers the latest on the Russo-Ukraine conflict, including a joint advisory on Russian state-sponsored cyber actors.

ICBA Summary of President Biden’s Executive Order on Digital Assets

Mar 16, 2022 | News
On March 9, 2022, President Joe Biden signed an executive order that outlines the administration’s strategy to address cryptoasset risks, develop a framework to promote responsible innovation and competition with digital assets, and conduct more research on the potential impacts of a digital dollar.

FS-ISAC: Global cyber threats to accelerate

Mar 14, 2022 | NewsWatch Today
FS-ISAC said the rapid digitization of the financial services sector has led to an increase in global cyber threats in 2021, specifically cyberattacks targeting third-party suppliers and critical zero-day vulnerabilities.