Bank of England to test finance sector's cyber security

Day-long war gaming exercise will see how prepared the UK's financial sector is to cyber attacks

Bank of England with Wellington statue

On Friday the Bank of England (BoE) will host a day-long war gaming exercise designed to test the financial sector's resilience to a major cyber incident.

The test will be conducted in partnership with industry and other UK financial authorities (HM Treasury and Financial Conduct Authority)and will involve up to 40 British firms. The aim is to see how prepared financial firms are to any major disruption and how well they respond.

The exercise is part of an annual event, hosted by BoE with input from the National Cyber Security Centre, that looks to shore up the industry and protect the financial systems on which the public relies.

"The exercise will help authorities and firms identify improvements to our collective response arrangements, improving the resilience of the sector as a whole," the BoE said in a statement.

The tests will not be conducted on a pass or fail basis but the BoE is expected to publish some of the lessons learned during the exercise.

The need to test cyber security systems has never been more pressing with companies, both within and beyond the financial sector reporting serious breaches recently.

Earlier in November, HSBC reported a data breach in the US that saw hackers access vast amounts of its customer's data in October. This followed news of multiple airlines such as British Airways, Air Canada and Cathay Pacific all reporting breaches of data. There have even been attacks on organisations such as FIFA and the NHS in recent years, highlighting the scale and reach of malicious actors.

For Jake Moore, a cyber security expert at ESET UK, the need for rigorous testing is a necessity as its no longer a case of 'if' but 'when' with cyber attacks.

"Anything that improves cyber response is a thumbs up from me," he said. "Cyber attacks aren't a possibility, they are an eventuality so we will never have enough people, systems or money to prevent or detect an attack. Therefore, you need to invest in training as well as multiple prevention techniques to make it work.

"However, it is not always as simple as that, so making training engaging and even fun adds impact to the way it sinks in and quickly makes it second nature."

Featured Resources

Security analytics for your multi-cloud deployments

IBM Security QRadar SIEM solution brief

Download now

Five reasons to move to the cloud

Join the enterprises moving their workloads to the cloud

Download now

Architecting hybrid IT and edge for digital advantage

Why business leaders should consider a hybrid IT strategy

Download now

Six reasons to accelerate remote asset monitoring with AI

How to optimise resources, increase productivity, and grow profit margins with AI

Download now

Recommended

Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
Microsoft open sources CodeQL queries used in Solorigate inquiry
Security

Microsoft open sources CodeQL queries used in Solorigate inquiry

26 Feb 2021
CISA warns of ongoing Accellion File Transfer Appliance attacks
hacking

CISA warns of ongoing Accellion File Transfer Appliance attacks

25 Feb 2021
What is a Trojan?
Security

What is a Trojan?

25 Feb 2021

Most Popular

How to build a CMS with React and Google Sheets
content management system (CMS)

How to build a CMS with React and Google Sheets

24 Feb 2021
How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
Oxford University COVID lab falls victim to hackers
hacking

Oxford University COVID lab falls victim to hackers

26 Feb 2021