• About
  • Subscribe
  • Contact
Friday, December 19, 2025
    Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Process Compliance and Governance

Rewiring banks’ cyber defence from reactive to preemptive in 2026

Allan Tan by Allan Tan
December 19, 2025
Rewiring banks’ cyber defence from reactive to preemptive in 2026

Photo by ANH LÊ: https://www.pexels.com/photo/young-athletes-stretching-on-football-field-in-hanoi-35215095/

Share on FacebookShare on Twitter

As 2025 draws to a close, banks and financial institutions across Asia face an escalating and increasingly sophisticated cyber threat landscape. Regulatory scrutiny is intensifying, digital transformation continues unabated, and attackers—now armed with generative AI—are operating at unprecedented speed and scale.

According to the 2025 Cost of a Data Breach Report by IBM, the average cost of a breach in the financial sector globally reached USD 5.73 million, with Asia-Pacific organisations experiencing a 12% year-on-year increase in incident frequency. In this context, the traditional reactive security model—focused on detection and response—is no longer sufficient.

CISOs across the region are under mounting pressure to future-proof their institutions. The answer, increasingly, lies in preemptive cybersecurity: a proactive strategy that seeks to deny, disrupt, and deceive attackers before they can inflict harm.

Why preemptive cybersecurity matters now

Gartner defines preemptive cybersecurity as “a strategic approach that proactively denies, disrupts, and deceives attackers before an attack can succeed,” marking a decisive shift from reactive to anticipatory defence.

For Cezary Piekarski, group chief information security officer at Standard Chartered, this means “not waiting for harm to reach the Bank or our clients.” He explains: “It is about actively shaping the environment so adversaries waste time, expose themselves, and fail at scale.”

In Asia’s dense fintech ecosystems—where open banking, real-time payments, and cross-border digital wallets are proliferating—attack surfaces have expanded exponentially. Cybercriminals are exploiting these seams, particularly through supply chain compromises and identity-based attacks.

Piekarski notes that “traditional security tools often fail to detect advanced threats before impact,” underscoring the urgency for more dynamic defences.

“An advanced deception environment needs to integrate multiple components such as decoys, lures, and breadcrumbs across enterprise systems, and blend with legitimate assets creating a digital maze that safely attracts and studies the attackers in real time,” he continues.

Cezary Piekarski

“Given our privileged role in safeguarding client assets and trusts, financial institutions need to be more actively disrupting criminal operations, going beyond networks and endpoints to disrupt the financial value chain itself.” Cezary Piekarski

He argues that deception enables security teams to shift from reacting to incidents to anticipating them. “It helps us make the bank a far more resilient and unpredictable environment for attackers, while ensuring our customers’ assets, transactions, and digital experiences remain safe and trusted,” he concludes.

Related:  PwC offers cyber security scholarships in Hongkong

AI and machine learning: From detection to prediction

Artificial intelligence and machine learning are central to the preemptive paradigm. As Piekarski observes, “Organisations can harness AI and machine learning for anomaly detection, behavioural analysis, fraud pattern recognition and AI-assisted alert triage.”

One critical application is identifying beaconing behaviour—when malware “calls home”—by establishing baseline behavioural profiles for every device. Deviations from these norms can trigger automated responses, potentially halting zero-day exploits before execution.

AI also plays a preventive role in human error. Piekarski highlights how “AI assistants can learn email patterns to understand the link between the email content and intended recipient,” thereby flagging misdirected emails that could lead to data leakage.

In Asia, where multilingual and multicultural workforces increase communication complexity, such contextual AI safeguards are especially valuable.

Threat intelligence and zero-day defences

The financial sector’s threat intelligence needs are uniquely demanding. Piekarski emphasises the importance of integrating “active infrastructure scanning, malware repositories, and brand-abuse identification” into a unified view.

Modern platforms using relational hypergraphs now enable institutions to map complex attacker infrastructures—crucial for anticipating campaigns targeting regional payment systems like India’s UPI or Thailand’s PromptPay.

Yet zero-day threats remain a stubborn challenge. “Many existing solutions rely on signature-based or pattern-based detection, which cannot identify new, previously unseen attacks,” Piekarski cautions.

However, he adds that “advanced controls that incorporate AI, machine learning, and behavioural analytics are improving detection capabilities by identifying anomalies.”

Still, he stresses that “no control can guarantee complete protection,” underscoring the need for layered, adaptive architectures.

Measuring what matters: Outcomes over activity

How should CISOs gauge the success of their preemptive strategies? Piekarski offers a clear framework: “First and foremost, by the outcomes: fewer successful compromises, lower client loss rates, reduced fraud losses, and faster containment of incidents when they do occur.”

He also advocates measuring “adversary friction”—for example, how often attackers are lured into decoys or how swiftly money-out channels are shut down.

Related:  81% of consumers trust broadband operators for Internet Security

Red and purple team exercises, he notes, provide independent validation, while “responsiveness and speed to deploy controls following new intelligence” reflect operational agility.

Ultimately, “when the organisation becomes a consistently expensive, high-friction target, the strategy is working.”

Regulatory realities in Asia

Asia’s regulatory environment is evolving rapidly. In 2025, the Monetary Authority of Singapore (MAS) updated its Technology Risk Management (TRM) Guidelines to expect “proactive threat-hunting and predictive controls” for systemically important institutions.

Similarly, Hong Kong’s HKMA now requires banks to demonstrate “resilience against AI-enabled attacks” in their cyber stress tests.

However, preemptive techniques—particularly deception technologies and autonomous AI responses—raise legal and compliance questions.

For instance, deploying honeypots that mimic customer data environments may conflict with data minimisation principles under Thailand’s PDPA or Indonesia’s PDP Law. CISOs must therefore ensure that deception fabrics are architected to avoid storing or simulating real personal data, aligning with local privacy frameworks.

Moreover, the use of AI in cybersecurity must comply with emerging AI governance codes. Singapore’s Model AI Governance Framework and Japan’s AI Principles both stress transparency and human oversight—requirements that apply equally to defensive AI systems.

Strategic shifts for 2026

“By 2030, preemptive cybersecurity solutions will account for 50% of IT security spending, up from less than 5% in 2024, replacing standalone detection and response (DR) solutions as the preferred approach to defend against cyberthreats.” Gartner

Piekarski urges CISOs to “take Gartner’s prediction as a mandate to move first,” advocating a reallocation of investments “from pure detection towards capabilities that continuously deny, disrupt, and deceive attackers.”

For the Bank’s group CISO, this includes AI-driven intelligence that anticipates behaviour, automated hardening, and deception fabrics embedded into critical journeys.

“With adversaries already weaponizing AI to scale reconnaissance and accelerate attack cycles, defensive AI must be used to stay ahead, not catch-up.” Cezary Piekarski

He stresses the need for “tight fusion between cybersecurity, fraud, and financial crime teams,” reflecting the blurred lines between cyber intrusions and monetary fraud in Asia’s digital-first banking landscape.

Additionally, CISOs must “help their Boards understand attacker economics—success is measured by making the institution commercially unviable to attackers.”

Tags: adversary frictionautonomous AI agentspreemptive cybersecurityStandard Chartered
Allan Tan

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • Rewiring banks’ cyber defence from reactive to preemptive in 2026
  • PodChats for FutureCISO: What needs to happen for AI to deliver on its promises in 2026
  • AI security fabric is a step towards safe AI implementation
  • Over 90% of CISOs emphasise importance of OT/IT security convergence
  • From data loss to data security: Why traditional DLP Is no longer enough

Categories

  • Blogs
  • Compliance and Governance
  • Culture and Behaviour
  • Cybersecurity careers
  • Data Protection
  • Endpoint Security
  • Incident Response
  • Network Security
  • People
  • Process
  • Resources
  • Risk Management
  • Technology
  • Training and awarenes
  • Videos
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl