Preprint
Review

Regulation Cybersecurity in Financial Technology: Insight into Challenges, Compliance, and Best Practices

Altmetrics

Downloads

89

Views

86

Comments

0

This version is not peer-reviewed

Submitted:

22 September 2024

Posted:

23 September 2024

You are already at the latest version

Alerts
Abstract
While the financial technology (FinTech) sector has revolutionized conventional banking services with technology-driven solutions, it also faces considerable cybersecurity hurdles to guard against data protection and sustain the overall financial performance. The main purpose of this paper is to identify the key cybersecurity challenges encountered by FinTech companies, such as data confidentiality concerns, complex cyber-attacks, difficulties with regulatory compliance and third-party risks or technological innovations. This also assesses the regulatory responses to those challenges, such as data privacy regulations, macroprudential regimes, industry-specific guidance and international regulatory cooperation. Through this analysis, the paper attempts to synthesize current state of cybersecurity domain within FinTech and provides suggestions for strengthening data shelter and financial stability by implementing best practices with regulatory strategies.
Keywords: 
Subject: Business, Economics and Management  -   Finance

Introduction

Financial technology or FinTech is one of the most fast emerging industrial sectors that has altered global financial services scene with innovative solutions ranging from digital payments and blockchain transactions to crowd funding, P2P lending, robo-advisory services etc. FinTech firms have dramatically increased their operational efficiency, financial inclusivity, and user experience using a combination of cutting-edge technologies such as artificial intelligence (AI), big data analytics, cloud computing. Yet this era of technological evolution has brought with it major cyber security risks that pose a systematic peril with widespread integrity on the nation's financial systems and sensitive data is put at stake.
And cybercriminals, realizing the sheer amount of monetary and personal identification information available in FinTech ecosystems, are making every effort to develop advanced attack vectors ranging from phishing and ransomware to ATP. Add to that the use of third-party services, cross-border transactions and new technologies like blockchain, you make a real hodgepodge of different services, international legislation and experiments with products. FINMA further maintained that these risks are dangerous not just for the customers of FinTech firms, but also to the overall financial stability suffered by markets globally.
In response to these demands, regulatory bodies around the world have developed extensive frameworks to protect privacy and maintain financial systems. Data protection are reinforced with heavy penalties since legislations like GDPR in Europe and CCPA in the United States impose strict data management practices, still other areas of specific industries such as PCI for processing transactions. Photo Credit: Financial regulatory authorities further impose cyber risk management, incident reporting and business continuity planning mandates.
FinTech firms face current challenges scheduled to the developing nature of cyber threats and the complexity of regulatory compliance despite these measures. Present regulatory frameworks are evaluated in this paper and the FinTech sector's distinctive cybersecurity challenges are explored. The paper intends to propose strategies and to showcase key areas for improvement by supplying a comprehensive overview of these aspects, thus ensuring the stability of the financial technology landscape and enhancing cybersecurity.

2. Cybersecurity Challenges in FinTech

The FinTech revolution creates riveting cybersecurity threats that require rapid consideration. The sector's problems originate from its dependence on cutting-edge technologies, its management of classified data, and its incorporation of manifold extraneous services. The successive sections outline the paramount cybersecurity concerns affecting the FinTech industry.

2.1. Data Privacy Concerns

Manipulation huge amounts of confidential monetary information requires FinTech companies to prioritize confidentiality and data security. This data should be handled in line with rigid data protection laws engaging GDPR and CCPA requirements. Intense repercussions can stem from data breaches, comprehensive identity theft, significant monetary losses, and critical harm to an organization's standing. However, the problem is further complicated by having to safeguard delicate information on diverse devices and mediums, such as cloud calculating systems and mobile device apps.

2.2. Sophisticated Cyberattacks

The monetary data these firms handle makes FinTech companies upper priorities for cyberattacks carried out by advanced hackers. Counterfeit attempts to obtain delicate information usually involve disguising a trustworthy entity through deceiving tactics. Malware such as ransomware encrypts a firm's data, and its attackers then demand payment in exchange for releasing the data. Targeted threats, known as Advanced Persistent Threats, are aimed at unapproved extended-term access to delicate data over many periods of time.

2.3. Regulatory Compliance

For FinTech firms, a significant challenge is managing the involved prescribed landscape. Jurisdictions worldwide have separate prescribed needs which incorporate laws for data protection, along with standards and regulations for both finance and cybersecurity. Supporting operating efficiency while ensuring compliance with these regulations can be requesting. Putting into effect strong compliance management systems is critical for FinTech firms, as non-compliance can result in sizable lawful and financial penalties.

2.4. Third-Party Risks

Multiple FinTech companies outsource various crucial functions such as data analytics, cloud storage, and payment processing to outside service providers. Services supplying functional efficiencies can, however, carry additional cybersecurity risks into the scene. The security of a FinTech company's systems may be threatened by vulnerabilities in or breaches of third-party operations. Compliance with sturdy security practices by service providers can be assured through thorough vetting, continuous monitoring, and agreed agreements.

2.5. Technological Complexity

Emerging technologies like artificial intelligence (AI) and blockchain are elating the complexities facing cybersecurity through their integration. The introduction of these technologies brings about both substantial benefits and novel vulnerabilities. Although blockchain technology improves transaction security and transparency, it remains vulnerable to exploitation by attackers beholding to latent smart contract vulnerabilities or implementation flaws. However, AI security systems can be exploited by attackers to create intricate countermeasures.

2.6. Rapid Technological Change

Swift innovative advancements in FinTech steadily lead to the emergence of novel tools and platforms. Swift changes in evolution may more swiftly exceed traditional security protocols, unveiling companies to soaring forms of threats. To maintain strong defences it is crucial that current security frameworks are enhanced by enduring on top of innovative advancements.

3. Regulatory Measures for Data Protection and Financial Stability

Regulatory bodies have implemented diverse measures to address cybersecurity challenges as the FinTech sector continues to evolve for data protection and financial stability. Data protection regulations, financial stability frameworks, sector-specific guidelines, and cross-border regulatory coordination are incorporated within these measures. These regulatory measures are detailed in the subsequent sections.

3.1. Data Protection Regulations

All data protection regulation is created to protect both personally identifiable and financial information from being accessed or breached. Key regulations include:
  • General Data Protection Regulation (GDPR) — Applies to data of citizens in the European Union and creates strict guidelines for when, why, and how personal data is stored and used. The GDPR requires organizations to seek clear consent from individuals before collecting their data, to bolster security practices, and forces them to disclose data breaches within 72 hours. Failure to follow can lead to severe fines and consequences.
  • California Consumer Privacy Act (CCPA) – gives California residents the right to know what data is being collected. It also calls for businesses to take reasonable steps to safeguard the personal data.
HIPAA (the Health Insurance Portability and Accountability Act): HIPAA was enacted by the United States in 1996 with the aim of establishing security standards to protect health insurance coverage for employed individuals who lose or change jobs. Health–related financial services by FinTech firms targeting patient, must follow the safeguarding health information practices defined by HIPAA.

3.2. Financial Stability Regulations

Regulations in the realm of financial stability are intended to preserve a sound and dependable financial system. The key regulatory measures the city announced are:
  • DSI DSS: Payment Card Industry Data Security Standard, this is a standard for the payment card industry Six Core Principles Say Keep Hacking Off My Encryption Key Servers as a Serverless Frame work commerce transactions and organizations that store, process or transmit credit card data must comply with these standards. For FinTech firms which are responsible for processing payment data, compliance with PCI DSS is crucial to mitigating the occurrence of fraud and preventing a data breach.
  • Anti-Money Laundering (AML) and Know Your Customer (KYC) Regulations -These require FinTech firms to take measures to safeguard against means utilised for money laundering or terrorism. It consists of identifying customers, transaction control and suspicious activity reporting.
  • Basel III: A set of international standards on capital adequacy and liquidity for banks, including stress testing. Due to its influence over the banking industry in general, it significantly impacts on the regulatory space that mostly commercial banks and traditional financial institutions operate.

3.3. Industry-Specific Guidelines

Specific to FinTech companies, different industry-specific regulations include specific security enhancements:
  • National Institute of Standards and Technology (NIST) Cybersecurity Framework: A market leading approach to cybersecurity framework for addressing and managing enterprise security risk by providing rigorous guidelines on how to detect, protect, respond, recover from cyber incidents with built-in flexibility which is designed keeping in mind large scale distributed systems.
  • Cybersecurity Maturity Model Certification (CMMC) [Standard Assessment Methodology]: This model was developed to provide a consistent and scalable approach to assessing the cybersecurity posture of U.S. Department of Defence contractors, as well as small and medium-sized defence industrial base suppliers in order to enhance their cybersecurity processes and maturity level. It is of particular interest to enterprises dealing with sensitive government-coupled information.

3.4. Cross-Border Regulatory Coordination

Since FinTech operations are global, it is essential for the regulators to cooperate and harmonize regulations in international measures.
  • Financial Action Task Force (FATF): FATF establishes international standards for combatting money laundering and terrorist financing. The recommendations made by FATF also have a universal impact regulating guidelines all around the globe, regulations which are necessary to ensure that FinTech firms conform to common anti-money laundering precautions.
  • Global Financial Innovation Network (GFIN): GFIN enables financial authorities to interact with a view to cooperation on innovation and the use of technology in the way consumers and firms experience financial services.

3.5. Emerging Frameworks

With the changing nature of the cybersecurity landscape there are always new regulatory frameworks and guidelines:
  • EU Digital Operational Resilience Act (DORA): Set to come into force in late 2022, DORA seeks to enhance the resilience of financial sector entities by introducing new obligations for managing ICT risks and incidents and testing. European Union-based FinTech firms will be effected.
  • Open Banking Regulations – These are regulations in some jurisdictions that mandate financial institutions to provide secure ways through open APIs, for third-party providers to access customer data. Innovation: They promote innovation But at the same time they also give rise to new challenges of security.

4. Case Studies

Focusing on real-life cases of cyber incidents and compliance wins not only helps us understand how compliance works in practice, but also the ways companies address the modern security threats FinTech industry faces. This part will expose and examine some of the data breaches as well as compliance success stories.

4.1. High-Profile Data Breaches

4.1.1. Capital One Data Breach (2019)

Background: A misconfigured firewall in the Capital One cloud led to the exposure of data on a large scale, a financial services giant. More than 100 million customers had their personal details such as names, addresses, credit scores and other sensitive information exposed.
Consequence: The incident resulted in a hefty fine, with the U.S. Office of the Comptroller of the Currency (OCC) doling out an $80 million penalty. It also tarnished Capital One’s reputation and landed the bank with countless lawsuits and regulatory scrutiny.
Lessons Learned:
  • Cloud Security: This breach has also demonstrated the imperative for secure cloud implementations with design reviews and operational configurations checks to prevent misconfigurations.
  • Reduce Incident Response: Improved detection and response add Event Listener. The sooner the security vulnerability is found and correct, the less attackers will have gotten a hold of.
  • Meet Regulatory Compliance: It is essential to abide by industry standards and regulations, so you do not face any legal action and lose the trust of your customers.

4.1.2. Equifax Data Breach (2017)

Background: Equifax data breach http://www.wsfa.com/story/37501788/equifax-data-breach-what-you-need-to-knowREALITY: The Equifax breach in 2017 impacted nearly 147 million people to include social security numbers, birth dates and addresses. The vulnerability was traced back to the use of Apache Struts, an open source software framework that Equifax had neglected to patch.
Consequence: The breach cost the organization hundreds of millions of dollars, which it had to pay as part of a $700 million settlement to victims. It was met with widespread criticism and a crisis of consumer confidence.
Lessons Learned:
  • Patch Management: Fixing vulnerabilities in the software in a timely manner is necessary in order to avoid exploitation of such vulnerabilities by intruders.
  • Data Protection: Pollution of sensitive information is unavoidable if sufficient access control measures, data encryption, and other protection methods are not adopted.
  • Transparency: It is necessary to deal openly with those who may be affected by a breach or who are part of the decision making process so as to maintain their credibility and deal with the consequences of the breach.

4.2. Successful Compliance Strategies

4.2.1. Stripe’s PCI DSS Compliance

Overview: Stripe as one of the top payment processing companies has taken all steps necessary to comply with Payment Card Industry Data Security Standard (PCI DSS). Every day, Stripe processes millions of transactions, and that is why the company has to follow a set of stringent security requirements in order to safeguard the cardholder’s information.
Strategies:
  • Payment Tokenization: Whenever a user wants to pay for something and provides his or her credit card data, the payment information is first temporarily converted into a token known as tokenization by Stripe.
  • Total Data Encryption: The travelling and the stored database of Stripe is protected by encryption in order to prevent unauthorized access to the data.
  • Evolving Threats-Continuous Monitoring: Security testing, in general, monitoring including penetration testing is conducted regularly so as to provide a good proactive approach against vulnerabilities.
  • Impact: Stripe adheres to PCI DSS standards thus enhancing its security and reliability which in turn earns the confidence of partners and customers in line with the proper management of payment information.

4.2.2. Revolut’s GDPR Compliance

Overview: Revolut, which operates worldwide as a FinTech Company, has taken appropriate steps to comply with the General Data Protection Regulation, and in that regard adoption of mechanisms. This involves the range of measures that addresses users to the fullest noticing how the data is handled.
Strategies:
  • Data Subject Rights: Revolut permits users to obtain copies of their data, have their information rectified, and request the erasure of their data.
  • Data Minimization: The company manages a level of data minimization strategy and only stores the information that is required to provide the services.
  • Privacy by Design: The company also measures privacy and security risks during the design stage, and at the same time makes sure that it maintains the privacy of its users.
  • Impact: These positive results of practice of fulfilling the requirements of the regulation have positively contributed to Revolut’s enhanced image and user confidence that the company adheres to high standards of data ethics and legislative requirements.

5. Conclusion

The growth of the FinTech market is quite rapid, with profound changes in most financial services, the convenience of which attributes to the consumer. But this growth comes with great cybersecurity risks which need to be mitigated to safeguard data as well as financial integrity.
The security risks that FinTech firms experience includes data privacy issues, advanced cyber threats, and compliance requirements, third parties, and technology. Much of the reasons as outlined above highlights the need for proper security systems and risk management in place.
It is noteworthy that legal and regulatory initiatives constitute an important levers for managing these risks. Data protection regulations like GDPR, CCPA impose suitable legal obligations towards humen DIP and financial stability regulations including PCI DSS and AML/KYC standards safeguard the credentials of financial systems. Such measures are complemented by industry-specific recommendations and cooperation with foreign counterparts to improve the efficiency of these activities.
Examples of major data breaches that occurred in Capital One and Equifax show that insufficient cybersecurity measures have catastrophic outcomes and emphasize the need for timely patching, comprehensive data security solutions, and clear reporting. On the other hand, good compliance initiatives, as good as demonstrated by financial players such as Stripe as well as Revolut, show how great adherence to legal provisions strengthens assurance, breeds confidence, and improves business enormity.
Therefore, in conclusion, the laws as a framework to defend the data and to maintain the companies’ stability can be viewed as perfect, mainly because the problems, connected with cyber threats and new technologies, are immensely versatile and require changes. FinTech firms need to continue to demonstrate action to update their security policies frequently, to deal with the regulatory environment in the FinTech sphere, as well as to work with partners and competitors to counteract threats. In doing so they can enhance the defense of their activities, encompass consumers’ data, and ensure their contribution to the steadiness of the precise financial area.

6. Recommendations

We recommend that they change some of the rules to see if this can help the Fintech firms cope with these cybersecurity problems and improve data protection and financial stability. Their recommendations would include: Improve personnel assessment and cybersecurity practices. Optimise general cybersecurity practice in firms. Minimise regulatory compliance burden. Foster resilience of the financial system.

6.1. Enhancing Cybersecurity Practices

  • Embrace a More Effective Security Strategy:
    -
    Implement Robust Security Measures: These include advanced cyber protection measures like AI threat detection, behaviour analytics and use of encryption systems which would help mitigate escalating cyber threats.
    -
    Vulnerability Management: Perform ongoing vulnerability assessment, penetration testing and security audits to address potential flaws.
  • Reinforce The Incident Response, Recovery And Business Continuity:
    -
    Prepare For And Perform Incident Response Drills. These are predefined multidiscipline incident response and recovery plans for the organization which include how cyber incidents will be detected, contained, and mitigated. These plans should be tested and revised periodically.
    -
    Adequate Backup and Data Recovery Solutions. Perform data backup on a regular basis and establish data recovery and backup solutions to reduce the severity of data loss or the damage inflicted by ransom ware.
  • Improve Employee Training And Promotion Of Security.
    -
    Organize Security Awareness Training Programs. Regular cybersecurity training should be organized for workers so that they learn phishing, social engineering and other popular attack methods.
    -
    Foster Security At The Workplace. Safety measures should be acknowledged and practiced at the workplace, employees should be encouraged to abide by such protocols and also report suspicious activities.
  • Secure Third-Party Relationships:
    -
    Implement Vendor Risk Management. It is very important to create a vendor risk management process in order to assess the security level of external service providers and ensure monitoring of their security policies.
    -
    Define Security Requirements: Specify the security measures, responsibilities, and administration policies in contracts with third parties for their compliance.

6.2. Navigating Regulatory Complexity

  • Formulate a Strategic Plan for Compliance:
    -
    Regulatory Requirements Technology: Review the current reporting requirements so that it is clear how compliance should be achieved in the future. Make use of tools to enhance compliance.
    -
    Contact Regulators: Establish direct contact with regulators and receive updates on regulation and seek assistance regarding compliance.
  • Establish Effective Compliance Management.
    -
    Compliance Processes Compliance: Employ a management solution for compliance that among others, tracks requirements, controls processes, and documents, and submits reports.
    -
    Audit for Compliance: Perform compliance audits i.e. internal audits to regulatory requirements at intervals to affirm compliance and areas of enhancement.
  • Promote Compliance Across Borders:
    -
    Differences Across Borders: When conducting legal and compliance assessments, acknowledge the fact that regulatory requirements differ from one country to another.
    -
    Engage in Industry Associations: Contact forums or industry associations where such activities are discussed and address cross-border compliance issues.

6.3. Fostering International Cooperation

  • Advocate for International Cybersecurity Standards:
    -
    Support International Initiatives: Join the international campaigns and organizations oriented on the gaining of the experience for developing the cyber standards focusing on the Financial Action Task Force (FATF) or the GFIN.
    -
    Embrace Adopted Best Practise: Employ internationally accepted security frameworks and regulatory principles in order to enhance the security of the firm.
  • Foster Information Sharing and Collaboration:
    -
    Become an Active Associate of the Industry Collaboration Initiatives: Take part in the initiative and activities of sharing threat intelligence, best practices and lessons learned from cyber security incidents within the company and across the industry.
    -
    Develop the Cooperation of Public and Private Sectors: Improve the situation at hand through cooperation between the private sector and the government in response to new crimes in the cyberspace.
  • Promote Proactive Evolution of Regulatory Output:
    -
    Push More for Soft Regulations: Advocate the need for such regulations that respond to the industry’s dynamics by being able to support change with time.
    -
    Focus on R&D Efforts: Seek to put more resources towards enhancing this intelligence and compliance in the domain of cyber laws and technologies.

Source of Funding

Nil

Acknowledgement

The author would like to thank all his mentors. The paper compiled here are collected over a period of time and may have been reproduced verbatim. Apologize to all researchers if in-advertently failed to acknowledge them in the references.

Conflict of Interest

Nil

References

  1. General Data Protection Regulation (GDPR). (2018). European Union. Retrieved from https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016R0679.
  2. California Consumer Privacy Act (CCPA). (2020). California Legislative Information. Retrieved from https://leginfo.legislature.ca.gov/faces/codes.xhtml.
  3. Health Insurance Portability and Accountability Act (HIPAA). (1996). U.S. Department of Health & Human Services. Retrieved from https://www.hhs.gov/hipaa/index.html.
  4. Payment Card Industry Data Security Standard (PCI DSS). (2022). PCI Security Standards Council. Retrieved from https://www.pcisecuritystandards.org/pci_security/.
  5. Anti-Money Laundering (AML) Regulations. (2023). Financial Action Task Force (FATF). Retrieved from https://www.fatf-gafi.org/publications/methodandtrends/.
  6. Basel III: International Regulatory Framework for Banks. (2011). Basel Committee on Banking Supervision. Retrieved from https://www.bis.org/bcbs/basel3.htm.
  7. National Institute of Standards and Technology (NIST) Cybersecurity Framework. (2018). NIST. Retrieved from https://www.nist.gov/cyberframework.
  8. Cybersecurity Maturity Model Certification (CMMC). (2020). U.S. Department of Defense. Retrieved from https://www.acq.osd.mil/cmmc/.
  9. EU Digital Operational Resilience Act (DORA). (2022). European Commission. Retrieved from https://ec.europa.eu/finance/banking-union/digital-operational-resilience_en.
  10. Global Financial Innovation Network (GFIN). (2023). GFIN. Retrieved from https://www.fca.org.uk/about/the-global-financial-innovation-network.
  11. Capital One Data Breach Analysis. (2019). U.S. Office of the Comptroller of the Currency (OCC). Retrieved from https://www.occ.treas.gov/news-issuances/news-releases/2019/nr-occ-2019-62.html.
  12. Equifax Data Breach Settlement. (2019). Federal Trade Commission (FTC). Retrieved from https://www.ftc.gov/enforcement/cases-proceedings/refunds/equifax-data-breach-settlement.
  13. Stripe PCI DSS Compliance. (2023). Stripe. Retrieved from https://stripe.com/docs/security/pci-dss.
  14. Revolut GDPR Compliance Overview. (2023). Revolut. Retrieved from https://www.revolut.com/legal/privacy.
  15. Financial Action Task Force (FATF) Recommendations. (2021). FATF. Retrieved from https://www.fatf-gafi.org/publications/fatfrecommendations/.
  16. IBM Security: Cost of a Data Breach Report 2023. (2023). IBM. Retrieved from https://www.ibm.com/security/data-breach.
  17. Verizon Data Breach Investigations Report (DBIR) 2023. (2023). Verizon. Retrieved from https://enterprise.verizon.com/resources/reports/dbir/.
  18. Cybersecurity and Infrastructure Security Agency (CISA): Ransomware Guide. (2023). CISA. Retrieved from https://www.cisa.gov/publications-library/ransomware-guide.
  19. European Banking Authority (EBA): Guidelines on ICT and Security Risk Management. (2021). EBA. Retrieved from https://www.eba.europa.eu/regulation-and-policy/information-communication-technology-and-security-risk-management.
  20. SANS Institute: The State of Cybersecurity in Financial Services. (2023). SANS Institute. Retrieved from https://www.sans.org/white-papers/44958/.
  21. Gartner: Magic Quadrant for IT Risk Management. (2023). Gartner. Retrieved from https://www.gartner.com/en/doc/4481044.
  22. Forrester Research: The State of Cybersecurity in Financial Services. (2023). Forrester. Retrieved from https://go.forrester.com/research/.
  23. CISO Magazine: Best Practices for FinTech Cybersecurity. (2023). CISO Magazine. Retrieved from https://cisomag.eccouncil.org/.
  24. Federal Trade Commission (FTC) Report: Protecting Personal Information. (2023). FTC. Retrieved from https://www.ftc.gov/tips-advice/business-center/privacy-and-security/protecting-personal-information.
  25. Cybersecurity Ventures: Cybersecurity Market Report 2024. (2024). Cybersecurity Ventures. Retrieved from https://cybersecurityventures.com/cybersecurity-market-report/.
  26. Securities and Exchange Commission (SEC): Cybersecurity and Cyber Threats. (2022). SEC. Retrieved from https://www.sec.gov/spotlight/cybersecurity.
  27. Office of the Comptroller of the Currency (OCC): Cybersecurity and Operational Resilience. (2022). OCC. Retrieved from https://www.occ.treas.gov/topics/supervision-and-examination/bsa/.
  28. International Organization for Standardization (ISO): ISO/IEC 27001 Information Security Management. (2022). ISO. Retrieved from https://www.iso.org/isoiec-27001-information-security.html.
  29. European Union Agency for Cybersecurity (ENISA): Cybersecurity in the Financial Sector. (2023). ENISA. Retrieved from https://www.enisa.europa.eu/topics/csirt-cert-services/financial-sector.
  30. McKinsey & Company: How FinTech Companies Can Improve Cybersecurity. (2023). McKinsey & Company. Retrieved from https://www.mckinsey.com/industries/financial-services/our-insights.
  31. Deloitte: Cybersecurity in Financial Services: Key Challenges and Solutions. (2023). Deloitte. Retrieved from https://www2.deloitte.com/us/en/insights/industry/financial-services/cybersecurity.html.
  32. PWC: Financial Services Cybersecurity: The Need for Enhanced Controls. (2023). PwC. Retrieved from https://www.pwc.com/gx/en/financial-services/cybersecurity.html.
  33. KPMG: Cybersecurity in the Financial Services Sector. (2023). KPMG. Retrieved from https://home.kpmg/xx/en/home/insights/2020/03/cyber-security-in-financial-services.html.
  34. The Financial Stability Board (FSB): Enhancing the Resilience of the Financial Sector to Cyber Threats. (2022). FSB. Retrieved from https://www.fsb.org/.
  35. Harvard Business Review: Managing Cybersecurity Risks in Financial Services. (2023). Harvard Business Review. Retrieved from https://hbr.org/2023/01/managing-cybersecurity-risks-in-financial-services.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated