From Hope to Action: Tackling Cyber Risk in Financial Services

      If you are in financial services today, cyber risk is not theoretical. It is a growing, persistent threat and it is hitting firms in the UAE more frequently than ever.

      This is not based on headlines or scare tactics, it is based on what we have seen first-hand. Over the past few months alone, Waystone has either been made aware or helped clients respond to more than 15 cyber-related incidents.

      These were not isolated cases. They cut across different sectors, firm sizes, and business models. And in most cases, the breach did not start with a sophisticated hack, it started with something small, overlooked, or wrongly assumed to be “under control”.

      Whether you are in asset management, insurance, wealth advisory, or investment services, one thing is clear: you need to be prepared before, not after, an incident occurs.

      The Basics of Readiness, Without the Buzzwords

      A well-functioning Cyber Risk Management Framework (‘CRMF’) is not a document that sits in a policy folder. It is something that actually guides how your firm operates day-to-day. It should help you prevent what you can, detect issues early, respond quickly, and recover with control and transparency.

      From the work we have done recently, here are the things that really matter.

      1. Know What You’re Protecting image/svg+xml Atoms / Icons / plusExpand
      Too many firms still do not have a clear inventory of what systems they use, who manages them, what data they hold, or how they connect with each other. This is a major blind spot.

      Tip: do a short exercise. Ask each team what platforms they use, where they store data, and what would happen if those systems went down. The results are often surprising.

      Read more
      2. Have a Real, Tested Response Plan image/svg+xml Atoms / Icons / plusExpand
      A policy that has never been tested is not much use during a breach. You need a plan that is practical, well understood, and actionable; especially within the first 30 to 60 minutes.

      Tip: run a tabletop exercise. Make it realistic. Simulate a phishing attack or account compromise. See what happens when you walk through the actual steps with your team.

      Read more
      3. Train for What Actually Happens image/svg+xml Atoms / Icons / plusExpand
      We have seen breaches start from one mistaken click on a fake internal email. Many firms had awareness training in place, but not enough to change behaviour or prompt staff to act quickly.

      Tip: make training relevant. Show real phishing examples. Talk about how attackers imitate trusted contacts (e.g. SEO/CEO fraud). Build this into onboarding and regular staff refreshers.

      Some firms have gone the extra mile and tried to get a fake invoice paid, or change an existing clients bank details through email. With clear oversight and controls in place, these scenarios can serve as another way of testing your controls. Would yours pass?

      Read more
      4. Understand What Regulators Will Expect image/svg+xml Atoms / Icons / plusExpand
      Following a breach, regulators will ask detailed questions. They want to understand what controls were in place before the incident, what data may have been accessed, how quickly you detected the issue, and whether internal processes were followed.

      Tip: ask yourself now: If this happened to us, could we explain what went wrong, show the audit trail, and demonstrate how we fixed it? Does your breach register clearly evidence this and was a breach report completed and signed off?

      Read more
      5. Get the Board Engaged image/svg+xml Atoms / Icons / plusExpand
      Cyber is a governance issue. Boards need visibility, not just IT updates. They need to understand the risks, the readiness, and the gaps, and they need to be asking the right questions.

      Tip: put cyber risk on your next board or EXCO agenda. Start with a short, plain-language briefing on the top risks and your current controls. Then talk about what’s missing.

      On that point, the budget is always going to be a concern, but the cost (e.g. fixing the issue, time to report, update regulator, produce reports, loss business, etc) of incident or breach could be double or more that asking a third party to assist!

      Read more
      6. Do not Overlook Third Parties image/svg+xml Atoms / Icons / plusExpand
      In several recent incidents we’ve helped with, the problem didn’t originate within the firm. It started with a vendor, a service provider, or a cloud platform. But the impact landed squarely on the regulated firm.

      Tip: review your vendor list. Are cyber risks considered in your due diligence? Do your contracts include clear expectations? Would you know what to do if a third party suffered a breach?

      Read more
      7. Build a Culture That Expects the Unexpected image/svg+xml Atoms / Icons / plusExpand
      Cyber resilience is not about eliminating every risk. It’s about being able to spot issues early, respond fast, and learn every time something goes wrong.

      Tip: keep an internal log of incidents and near misses. Use it to evolve your controls and update your CRMF. It shows maturity, and it strengthens your position if you’re ever asked to explain your approach.

      Read more

      We Have Seen The Effect of Cyber Incidents First Hand

      The number of breach responses that Waystone has supported in just the past few months is more than we saw over the entire previous year. That trend should concern every firm operating in the regulated space.

      But the good news is, preparation works. The firms that had tested plans, clear escalation paths, and trained staff were able to manage their incidents with confidence and transparency. Others needed more support, and that is exactly where a partner with real-world experience can make a difference. Once again, the point is not to eliminate all risks, because that’s simply not possible, but rather to ensure that the firm is prepared. The difference in impact between being prepared and unprepared when an incident occurs is like night and day

      A Better Question to Ask

      Too many firms still ask, “do we have a cyber policy in place?”, however, a better question to ask is, “if we were breached tomorrow, would we know exactly what to do?”

      If the answer is no, you are not alone, but now is the time to act.

      You do not need to become experts overnight. But you do need to know your gaps and take steps to close them. A targeted cyber review, gap analysis, or response walkthrough tailored to your firm can mean the difference between a controlled incident and a regulatory headache.

      Being prepared does noy guarantee you will avoid an incident. But it does mean you will be ready when (not IF) it happens.

      The Waystone Cyber Security Team is well-equipped to assist organisations in navigating the complexities of these regulations, implementing effective cybersecurity frameworks, and staying ahead of both global and regional cyber threats. Contact us today to learn how we can support your firm in building a robust and compliant IT risk management strategy.

      Contact us

       Next post
      Share

      More like this

      Navigating FSRA IT Risk Management Guidance: A Critical Step Towards Securing Your Organisation's Future

      The Financial Services Regulatory Authority's (‘FSRA’) Information Technology (‘IT’) Risk Management Guidance was created to help organizations establish a robust…
      Read more

      Regulation S-P Amendments are Here

      The US Securities and Exchange Commission (SEC) has finalized significant amendments to Regulation S-P (Reg S-P), which governs how financial…
      Read more

      DFSA High-Level Cyber Risk Management Guide

      In line with the Dubai Financial Services Authority (‘DFSA’) regulations, specifically General Rulebook (‘GEN’) Rule 5.5 on Cyber Risk Management,…
      Read more

      FSRA IT Risk Management Expectations: A High-Level Summary

      The Financial Services Regulatory Authority (‘FSRA’) IT Risk Management Guidance, published in November 2024, provides a structured approach to help…
      Read more

      Cyber security trends to watch in 2025 - predictions and preparations

      As 2024 draws to a close, the cyber security landscape continues to evolve at a rapid pace. Businesses, governments, and…
      Read more

      Cyber Security Awareness Month - strengthening defenses together

      With cyber threats continuing to evolve, collaboration is key to building resilient defenses against malicious actors.
      Read more
      Contact us