• About
  • Subscribe
  • Contact
Thursday, June 19, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
No Result
View All Result
FutureCISO
No Result
View All Result
Home Process Compliance and Governance

Legacy systems may be sabotaging bank's cyber resilience posture

FutureCISO Editors by FutureCISO Editors
May 9, 2025
Legacy systems may be sabotaging bank's cyber resilience posture

Photo by Andrea Piacquadio: https://www.pexels.com/photo/high-rise-buildings-during-night-time-949931/

Share on FacebookShare on Twitter

The advent of artificial intelligence (AI) and automated attack tools has transformed the cyber landscape, leading to more frequent and high-profile data breaches and ransomware attacks. As these threats escalate, the imperative for firms to bolster their cyber defences has reached critical levels.

Broadridge’s recent Digital Transformation & Next-Gen Technology Study reveals that 83% of firms (surveyed) now consider cybersecurity a strategic priority, with nearly 90% planning substantial investments this year.

Neha Singh, head of Post-Trade Transformation at Broadridge Financial Solutions, emphasised the urgency of the situation: “The combination of higher volatility, shorter settlement cycles, and the growing risk from cyber bad actors has made operational and cyber resilience a critical priority for our financial services clients.”

She noted that it is no longer a question of if a cyber event will occur, but rather how prepared organisations will be for recovery.

Broadridge's enhanced cyber recovery solutions—featuring secure immutable storage—offer a lifeline to firms struggling with operational resilience. These solutions create unalterable, point-in-time copies of critical data, allowing for rapid restoration in the event of a cyber incident.

However, the reliance on legacy systems remains a significant concern, leaving many firms vulnerable. As the industry grapples with these challenges, the question arises: can financial institutions afford to overlook the risks associated with outdated technology?

The growing consensus is clear—without immediate action, the financial services sector may find itself at the mercy of cyber threats, with potentially devastating consequences.

Related:  PodChats for FutureCISO: Incorporating enterprise-wide GenAI strategies
Tags: automated attack toolsBroadridgecyber resilience
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • PodChats for FutureCISO: AI-powered ransomware: Time to rethink data resilience
  • The Game Plan: Navigate evolving threats and compliance demands
  • APAC's AI growth risks data security without strong governance
  • Networks must evolve or face failure, warns Cisco
  • AISP to address growing security challenges from AI use

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl