Skip to content

Key Security Trends in Financial Services White Paper

security

This research looks at the present but also towards the future of how institutions expect to behave moving back towards pre-pandemic conditions.

Our findings show that whilst the pandemic undoubtedly has had a huge impact on security within institutions, technologies are ever changing. With a large move towards cloud solutions and the rise of state-backed hacking, the security world is constantly looking at how to ensure their integrity and protect their data. There is constant demand for better measures, faster measures, more reliable measures, and as such we understood it was important to look at not only what institutions are using currently for their security but also what they believe will be the best course of action/solution going forwards.

You can request a copy at the bottom of the page.

Sponsored by Citrix.

Key areas covered include:

  1. Remote working
    1. Percentage remote working
    2. Change in the next 2 years
  2. Technologies used
    1. Provision of digital workspace solution
    2. Satisfaction of this solution
    3. Technologies adopted because of pandemic
    4. Technologies relied upon during the pandemic
  3. BYOD
    1. Amount of BYOD in organisation
    2. Change in BYOD usage in last 2 years
    3. Secured by business or employee
    4. Level of concern on shadow IT
  4. Security
    1. Change in IT security risks
    2. Importance of security in company
    3. Change in cyber security budget over last 24 months
    4. How often training is provided
    5. Comfort of IT security posture/provisions
    6. Implementation of zero-trust cloud-based services
    7. Zero-trust cloud-based service drivers
    8. Impact of security measures on end user experience
  1. Staffing and Skills
    1. Level of current skills
    2. If re-skilling is need
    3. Use of external skills
    4. Use of Automation to close skills gap
  2. Vendor/Partner supply chain
    1. Policies and controls used
    2. Change of security requirements in last 18 months
  3. Security Influences
    1. Pressures to change
    2. Who leads the charge on security
  4. Future issues