Lots of energy are being spent on ensuring that IT systems in financial institutions are 'safe' or can be declared as such to the public. However, we have to observe a gap between what needs to be told and the cyber-risks that are actually incurred by financial institutions. In this webinar, we keep away from the technical considerations which, as useful as these may be, inevitable end up in the dead-end when confidentiality has to be alleged. Instead, we challenge where the approach may err: when cyber-security teams have to keep their specialist knowledge to themselves instead of enrolling the other functions of the bank into a cyber-security systemic approach which can cover cyber-risks whatever their sources and natures: from organized crime to internal negligence, and including reputational risks.

Why Should You Attend

Cyber-security frameworks are often based upon inherited approaches, which have started in the military. We question the limits of such thinking, all the more so when a large part of the defenses set up is a direct reaction of damages that have been actually incurred in the profession, and limited in terms of reputation risk by a specific communication policy.

Learning Objectives

  • We examine what are the components of a cyber-security system, and which parts can be the weakest links in the chain. The weakest parts have invariably been the non-core parts, starting with the behaviors of the people using or managing external IT links, including customers.

  • We then suggest a more organic approach based upon a risk handling framework, which can include a non-hyped a version of resilience and set to be more flexible than traditional approaches. Lots of hype are being seen about the mysteries and intricacies of cyber-security, but do cyber defenses stand to cleverer challenges?

Areas Covered in the Webinar

  • T and cyber-security: what are the individual risks
  • The framework, inherited from physical security, itself inherited from the military
  • Dungeon, walls, and perimeters
  • Reactive approaches
  • Miscommunication of the framework
  • If cyber-security hanged in a vacuum
  • The peripherals to the cyber-security system, or tools
  • The weak points: customers
  • The weak points: carbon-based units within
  • An organic approach

Who Will Benefit

This workshop is intended for professionals in financial institutions, regulatory bodies and advisory firms, as well as individuals with a professional interest in the course material. Specific titles and functions that are of particular relevance include:

  • Market Risk Management and Analytics
  • Traded Market Risk
  • Correlation Trading
  • Market Risk Modelling
  • Credit Risk Modelling
  • Risk Methodology
  • Risk Analysis
  • Model Validation
  • Regulatory and Economic Capital
  • Implementation of Basel Accords
  • Stress-testing
  • Risk Internal Audit — Quantitative Analysis
  • Finance and Treasury
  • Regulation & Compliance
  • Financial Institutions Advisory
  • Bank Supervision
  • Bank Regulation
  • Financial Stability and Economic Analysis