Risk

4/13/2017
03:35 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Financial Services Firms Report Spike in Cyber Preparedness, Anticipated Regulatory Scrutiny

NEW YORK, NY April 11, 2017 –  Duff & Phelps, the premier global valuation and corporate finance advisor, today highlighted research affirming that financial services professionals are poised to significantly accelerate resources dedicated to preventing and combating cyber breaches. The survey of nearly 200 senior financial services professionals included the following highlights:

  • 86% of financial services firms intend to increase the time and resources they spend on cybersecurity in the next year.  This contrasts with 2016, when less than 60% said they planned to spend more resources and time on cybersecurity planning and initiatives.
  • 31% of respondents expect cybersecurity to be the top priority for regulators this year - a 63% increase over 2016 when just 19% of respondents held this view.
  • 21% of respondents believe that Anti-Money Laundering and “Know Your Customer” considerations – which are increasingly converging with cybersecurity and technology – will be a top regulatory focus.

Jason Elmer, Managing Director, Compliance and Regulatory Consulting at Duff & Phelps, commented:  

“Cybersecurity is at the top of the agenda for financial services firms today. In the wake of high profile cyberattacks, many are anticipating clearer and more punitive cybersecurity regulation to be implemented. Firms are proactively looking to strengthen cyber defences as a result, and this is an opportunity for regulators to collaborate with financial institutions to form new rules. What’s also clear is that commercial pressures from investors concerned about the security of their sensitive data will accelerate any attempt to improve cybersecurity measures.  For all these reasons, 2017 is set to be an important year for cybersecurity regulation.”

About Duff & Phelps

Duff & Phelps is the premier global valuation and corporate finance advisor with expertise in complex valuation, real estate, M&A, restructuring, dispute and legal management consulting and compliance and regulatory consulting. The firm’s more than 2,000 employees serve a diverse range of clients from offices around the world. For more information, visit www.duffandphelps.com.

M&A, capital raising and secondary market advisory services in the United States are provided by Duff & Phelps Securities, LLC. Member FINRA/SIPC. Pagemill Partners is a Division of Duff & Phelps Securities, LLC. M&A and capital raising services are provided in a number of European countries through Duff & Phelps Securities Ltd, UK, which includes branches in Ireland and Germany.

About the survey:

Duff & Phelps surveyed 183 senior financial services executives, compliance professionals and investment managers operating in the US, Europe and Asia.  This was conducted in conjuncture with Duff & Phelps’ fifth annual Global Regulatory Outlook report and respondents were contacted in Q1 2017.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.