Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

It is learnt that Silver Bank carrying out its business continuity plan (BCP) with the help of Diamond Security. Critically analyse Silver Banks business continuity

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

It is learnt that Silver Bank carrying out its business continuity plan (BCP) with the help of Diamond Security. Critically analyse Silver Banks business continuity plan (BCP).  What are the strategies? what are the suggestions made by Diamond security? Challenges? opportunities?
Silver bank: vulnerability and risks during cyberattacks Csar Jhonnatan Horna, Leonardo Toro and Otto Regalado-Pezua Introduction Csar Jhonnatan Horna is The morning of Tuesday, September 15, 2020, Diamond Security Co. Chief Operations based at the Department of Manager Ivn Ramirez was finishing up a basic security system installation in the offices of University, Lima, Peru. Silver Bank when a new cyberattack blasted financial entities around the world. The Leonardo Toro and financial entities that could defend themselves were those that had sufficient security Otto Regalado-Pezuaboth protocols and the software necessary to face the pernicious attack. However, those that did are based at the not possess these mechanisms had to pay a high price for their lack of preparation. In the Department of Marketing. case of Silver Bank, its security system had multiple vulnerable points. ESAN University, Lima, Cyberattacks on financial institutions seek to gain access to clients' accounts to withdraw or transfer money. Gaps in the security systems are exploited to access critical information technology (IT) infrastructure. Some infiltration mechanisms include using the credentials of hacked accounts, sending phishing emails, using advanced anti-virtual machines (VM)/ Sandbox techniques and using malware-laced proxy applications. On the day of the attack, Santiago Or, General Manager of Silver Bank, and Marcelo Tapia, IT and Organization Director, urgently called for a meeting with Ramirez and asked him to take immediate action against the attack. Ramirez left the meeting very satisfied with the agreements made therein, as he had been a firsthand witness to the devastation the attack had brought. He was forced to act quickly to safeguard not only the bank's contidential information but also the money put at risk. Diamond security and its fight against cyberattacks Diamond Security offered IT security packages to implement a system to protect the privacy of the information stored in its clients' computer systems. This package was supplemented by various consulting sessions, training programs and awareness-raising measures for its clients' employees. These practices aligned with Diamond Security's vision for information safety, in which everyone in a client company was committed and involved. Diamond Security's satisfactorily implemented projects together with its years in the market had forged a reputation for the company. Moreover, the organization had invested in research on new internet-based threats, which made it possible to provide services to governmental organizations, as well as companies in the telecommunications, banking and insurance sectors. Solely for educational purposes and is not tintended to represent Disclaimer. This case is written The company had been founded at the end of the 1990s, when the internet was beginning successtul or unsuccessful its worldwide expansion. At first, its client portfolio was made up of small businesses that managenaldecision-mak The authors may have wanted to incorporate new technologies in preparation for the new millennium. Years later, disguised names; financial and other recognisable information when cyberattacks against all kinds of entities were on the rise, Diamond Security decided to protect confidentiality. to specialize in providing services specifically against this type of threat. Its hard work and excellent service soon became recognized in its country of origin, and it was able to expand into other markets, as well. By 2020, Diamond Security was operating in five Latin American countries (Colombia, Peru, Ecuador, Brazil and Chile), providing specialized IT security services. It possessed a technical team consisting of hundreds of employees all throughout its many offices and continued to work with both state and private entities. In recent years, however, the company had been losing its competitive edge. Reports showed that it was being displaced by its competitors in the most relevant sectors: insurance and banking. Even so, in other sectors, it was possible to position the brand to obtain the desired results, but these clients represented just a small market share. Diamond Security decided its goal was to recover its position with clients in the financial sector, so management began using a strategy specifically directed at banks: security packages tailored to clients' specific needs and vulnerabilities, along with upgrade programs. The goal set was to sign yearlong IT security service contracts with at least five financial institutions over a 12-month period. Additionally, once the contract was signed, opportunities to provide related services were to be analyzed so that Silver Bank could become the main cyber-security provider for these companies. Although the established goals presented a challenge, the established action plan made them reachable. Ramirez, as the sales representative, attended meetings with potential clients to offer them Diamond Security's packages. In preparation for these meetings, Ramirez and his team would start by running a diagnostic of the potential client company's security situation so that the possible package to solve its particular problems could be presented. During these diagnostics, several recurring themes kept popping up: lack of understanding about the vulnerability of IT systems and risk control; lack of interest in information protection systems: low frequency of severe cyberattacks; lack of historical data on the damage caused by attacks; and limited budget for cyber-security. Due to normative changes put in place by the Peruvian regulatory entity that supervised financial institutions' IT security, companies were being forced to improve their IT systems. One of these companies was Silver Bank, which received proposals from various IT security providers: Diamond Security, Safety Web and Virus Block. In the end, its years of experience in the market tipped the scale in the favor of Diamond Security. In mid-June 2020, the two companies came to an agreement. Diamond Security's basic package would be installed over a period of three months, and the total price would be paid once approved by the regulatory entity. Although at first it appeared it would be a simple job, as the system was being installed, gaps were identified in basic systems, which made the project more complicated. This caused an almost 50% increase in the total price to be paid by Silver Bank, although the final installation date remained unchanged. Silver bank and its presence in the Peruvian market The services provided by Silver Bank included a product portfolio ranging from personal loans, mortgages and vehicle loans to credit and debit card services. It also offered different savings account and life insurance products, interbank transfers and benefits for its most faithful clients. Silver Bank was founded more than 80 years ago and had both domestic and foreign shareholders. Despite the difficulties it had faced, the company had been able to expand its domestic operations by increasing its market share and expanding to the country's major cities (see Exhibit 1). This expansion was made possible by the organizational structure, which emphasized commercial development through the opening of new branches throughout the country (see Exhibit 2). That is how Silver Bank was able to increase its number of savings account clients and loan clients. As the years passed and the bank expanded its operations, it was able to make its presence felt throughout the entire nation. In addition to opening new branches, it partnered with bank agents in even the most remote parts of the country. The trust its clients had in the bank was due to the great lengths it went to satisfy them. During the COVID-19 pandemic, things were no different: Silver Bank worked hard to protect its employees' and clients' health. Additionally, it carried out different projects to show solidarity with those affected by the pandemic to contribute to the common good. As mentioned, Silver Bank had a broad product portfolio, and it had an even broader client portfolio. The sectors it worked with ranged from business to manufacturing, agriculture, mining, fishing, construction and real estate. It carried out loyalty campaigns for both small business owners and large corporations, not to mention its individual clients. The bank was constantly working to improve its policies to satisfy its clients. Its deep-rooted philosophy puts the client at the center of its decision-making process. Therefore, it invested a great deal in employee training at every level. Moreover, this customer-centric culture and overarching goal of customer satisfaction carried over to its virtual platforms. Or, in his strategic leadership role in Silver Bank, was well aware of the importance of investing in IT to guarantee the effective delivery of the services offered and to maintain clients' trust; that is why he wished to expand the bank's vision. With this in mind, he scheduled numerous meetings with Tapia and Ramirez to try to understand how the IT area worked, as well as what its needs and contributions were, to revise the company's vision statement. However, most members of the Silver Bank board of directors did not consider this new vision very important and thought that the bank was already investing enough in IT, as it was. At Silver Bank, Tapia led a team of engineers in charge of IT infrastructure and operations who were all following the security policies instituted five years ago. This team was trying to carry out, albeit in a very general way, a business continuity plan (BCP) and a simplified processes outline for disaster recovery planning (DRP) in case any threat to cybersecurity ever came up. Additionally, Or had taken Ramirez to several meetings with the board of directors so that Ramirez, as an expert, could explain the importance of increasing the bank's investment in cybersecurity and of formulating an IT strategy more heavily focused on cybersecurity. In multiple meetings with the board of directors, Ramirez had suggested that it would be ideal to implement a new manager-level role: a Chief Information Security Officer, who would be in charge of developing a security strategy, developing a risk mitigation strategy and effectively monitoring how security resources were used, as there was currently no specialized, cybersecurity-focused team within the IT area. Another suggestion that Ramirez had, since Diamond Security had carried out several external audits of the bank's security systems, was the implementation of ISO 27001 standards to ensure that the bank's processes complied with international security standards. The Diamond Security audits had identified vulnerable points related to the lack of updates in the Secure Socket Layer cryptographic protocols and the public-private key infrastructure. These were both vital elements to ensuring that information remained secure. However, one issue the company could not ignore was cyberattacks. With the expansion of the Internet and its integration into all of the bank's operations, the risk of infiltration was inevitable. No financial entity can permit classified information to be leaked, but this was hard to get management to understand, due to the complexity of the matter and management's belief that investment in security would not be profitable. Cyberattacks on silver bank In 2015, Silver Bank suffered its first cyberattack with serious consequences when a band of hackers sent emails to employees at different banks. In every case, these emails appeared to come from a reliable source because in the subject line they included the name of the bank manager or another person with an important position at the bank. There was no reason to be suspicious of possible system vulnerability. Attached to the emails was a seemingly innocuous file, but once downloaded, this file unleashed a trojan horse virus onto the computer. The virus was disguised as a useful file so that it could access the computers of its targets. However, the virus's malicious code replicated itself in the internal institutional network and took control of the bank's security cameras. In this way, the criminals could see what was happening on the computer screens. They registered operations and clients' PIN numbers after those clients had transferred money into their personal accounts or withdrew it from ATMs. It was only after the victims had communicated with the bank about these irregularities that management realized that bank security had been compromised. The managers immediately contacted their current security provider to fix the problem, although the financial damage had already been done. Then, in 2017, cyber-criminals used a different method to infiltrate the bank's internal network. On this occasion, they hacked the credentials of an employee at one of the branches and were able to get into the network by pretending to be that employee. They also installed a keystroke logger onto the employee's computer. This type of malware keeps track of the user's keystrokes, stores this information and sends it to the perpetrator. The employee worked in customer service, and, as he assisted clients, they introduced their PIN numbers into his computer to carry out certain operations. That was how the criminals were able to access the bank's financial resources. Following client complaints and a long investigation, the problem was identified. On this occasion, not only did the bank reinforce the security system but also employees were given training on data protection, which led to a bigger budget for information technology (IT) security (see Exhibit 3). The following year, the target of cyberattacks was now ATMs, not computers. Through the use of malicious codes, the robbers blocked the confirmation systems that linked a given ATM with another financial entity. When a card is used in the ATM of a bank other than the bank that issued the card, the system links with the issuing bank to approve the operation. In this case, the manipulated ATMs provided the money requested even when the transaction was rejected by the main bank. With help from the authorities, Silver Bank was able to stop those behind this crime and then proceeded to fix the manipulated ATMs. Due to the increase in cyberattacks over the past few months, the Peruvian Association of Banks (ASBANC) had put out an alert to all financial entities so that they could activate their security protocols and keep an especially close watch over all their systems (see Exhibit 4). As for that fateful morning in September 2020, Ramirez was finalizing the details of Silver Bank's security system installation when he noticed that the bank's computer screens had turned blue and that all of the employees seemed very disconcerted, since they could not access any of the bank's information. The internal network was being infiltrated by an external agent, although Silver Bank was not the only institution under threat. The US FBI had warned against a potential cyberattack on financial institutions worldwide, and this threat had finally materialized. However, some banks had ignored this warning and had not taken measures to protect themselves. As the cyberattack began, confusion could be seen on the faces of the personnel in the bank's central office. They did not know what to do because there were no protocols to combat the situation they were facing. The first measures taken by the company were intended to avoid generating panic among its clients: maintaining open channels of communication with them and informing them of what was going on as the root of the problem was being identified. At first, Silver Bank thought it was the only financial entity being attacked, since it had not invested in the most advanced and up-to-date IT security system. This was very worrisome because if it was the only target, the financial, legal and PR consequences would gravely damage the bank and could perhaps even drive its clients to other Peruvian banks. Ramirez could recognize an opportunity to strengthen his company's relationship with the bank when he saw one, so he immediately called Diamond Security's General Manager. During their conversation, he gave a report on what was happening and asked for authorization to solve the problem. Or gave him permission to proceed and made the necessary resources to address the crisis available, including Tapia's entire team. All of this meant additional charges for the bank. The bank's board of directors was informed of Ramirez's proposal and authorized the provision of all of the necessary information to deal with the crisis. Ramirez called up the team, and it began gathering information about the security systems that had been installed by other security companies, reviewing documentation and interviewing the internal IT team to identify vulnerabilities. Once all of this information had been gathered, Ramirez and his team verified the source of the problem: a type of malware called ransomware that sought to extract files from a system and then demand payment for their return. Most criminal acts use ransomware to erase files from the hard drive or take control of the computer on which they have been installed. In some cases, this malicious software goes unnoticed until it is too late to combat. With the information gathered, Ramirez and his team worked together with bank employees to stop the malware from accessing clients' savings accounts. Even so, Ramrez's field experience led him to believe that a cyberattack so easy to solve could not come from an international network of cyber-criminals, and so he carried out a more detailed second analysis that showed that the ransomware designed to extract information from individual clients' savings accounts was just a ploy to distract them from the cyber-criminals' real target: business accounts, which, although fewer in number than personal accounts, had much higher amounts of money in them. Fortunately, the attack was repelled by the Diamond Security team, and greater potential loss, both in terms of finances and reputation, was avoided. Even so, the attackers were able to obtain access to clients' confidential information, such as their cards' PIN numbers, and this had the potential to affect not only the bank's finances but also the trust the clients had in the bank, causing additional legal problems related to the protection of personal information. Once the crisis had passed, Diamond Security became Silver Bank's main IT security provider. Subsequent analysis convinced management of the importance of strengthening the IT security system. Due to new, periodic threats, which neither legislation nor regulators can keep up with, management saw the necessity of carrying out constant improvements to protect client information. The bank's board of directors asked Diamond Security to assess all of the bank's systems and give a quote for what it would take to make those systems more secure. Diamond Security's assessment established the fact that the bank needed to update its internal network in the following areas: - Personal information security systems. - Impediments to data breaches. - Anti-malware firewalls. - Web security. All of this served as a foundation for improving systems and following ISO 27001 standards. Taking into account the different types of attacks and trends, it was necessary to constantly review and update the BCP and DRP. To fulfill Or's vision, the entire board of directors needed to be convinced that cybersecurity was the responsibility of the entire organization at every level. Additionally, all of the software involved needed periodic updates, modifications and improvements. Diamond Security also provided these services, in addition to a training and awareness-raising program on the risks of cybercrime directed at employees. Although these measures would not guarantee that a system would be immune to attack, they lessened the probability of damage and the resulting need to alleviate the financial consequences. A few weeks after the incident, Ramirez, along with Diamond Security's Commercial Director, gave a presentation at Silver Bank to present a timetable for the implementation of the security system and a financial proposal. The opportunity Diamond Security had waited for had finally arrived, and if they could seal the deal, they would more than meet the goals set for the year. Throughout the presentation, Ramirez noted confusion and disagreement among the members of the board of directors, especially among the oldest members; however, he trusted in the support he received from Or. He deduced that it could be due to the financial implications of carrying out the plan. On the one hand, previously implemented security solutions were going to be dismantled and disabled, which meant incurring expenses that would not provide any foreseeable benefit. On the other hand, the plan meant scrutinizing even the most minuscule details of the bank's IT system, which would require an upfront payment of several million dollars and a monthly contract for follow-up, preventative security measures and periodic system adjustments. Even though Diamond Security's proposal appeared ambitious, Ramrez knew that several banks had already invested in this type of solution: an impenetrable security system. The solution being proposed was along the same lines: the installation of a holistic defense system against cyberattacks. Once the presentation was over, the board of directors met in an adjoining room to debate and make a decision. Ramirez's intuition led him to suspect a counter proposal from the board. They would ask for a price reduction of more than 40% for the plan that had been budgeted, but the highest discount the Sales Manager would be willing to offer was 20%. Otherwise, a less wide-sweeping and complex system would be installed. Finally, the board of directors, after a financial evaluation, reached an agreement with Diamond Security in which the holistic cyber-security system was allocated US $20m, after a negotiated 20% discount. Due to the complexity of the project and the importance of carrying it out in less than eight months, the total price of the project increased by 50% more than the initial negotiated price for the basic security system. Facing cyberattacks Keeping in mind what was mentioned regarding Silver Bank's crisis stage and the posture the board of directors took after the cyberattack, please answer the following questions: What are the risks that can be identified in the case? Do you believe the actions taken by both Silver Bank and Diamond Security were appropriate? After carrying out an analysis and evaluation of Silver Bank's cyber-security problem, how would you say that cyberattacks can be mitigated? What basic guidelines did Diamond Security need to develop a strategy aligned with Silver Bank's cyber-security policy? What lessons can be learned from Diamond Security and Silver Bank's experience managing cyber-security risks and the bank's decision-making? Cyberattacks are becoming more frequent. During the COVID-19 pandemic, governments and the financial sector have faced an increase in this kind of attack due to an increase in the use of digital platforms. The degree of sophistication has increased as "island hopping" has become the new and popular way to infiltrate financial institutions' IT systems, and malware, ransomware, and phishing continue to be the most often used tactics applied to this end. Just as the "new normal" caused by COVID-19 is here to stay, cyber-security, too, Keywords: is here to stay, to protect against the cybercrime threats the world must be increasingly strategy, Disaster riskmanvigilant against. agement, IT strategy

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions

Question

Solve the following 1,4 3 2TT 5x- 1+ (15 x) dx 5X

Answered: 1 week ago