SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsThe financial sector is a prime target for cyber attackers, and the stakes have never been higher.
The financial sector is a prime target for cyber attackers, and the stakes have - quite literally - never been higher. IBM’s 2024 Cost of a Data Breach Report gave weight to the conversation, indicating the average cost of a data breach in the financial industry has reached an eye watering $6.08M USD. In response to the escalating threat landscape, the European Union (EU) has introduced two groundbreaking regulations: the Digital Operational Resilience Act (DORA) and the Threat Intelligence-Based Ethical Red Teaming (TIBER-EU) framework. These regulations are poised to reshape the cybersecurity landscape for financial institutions, demanding a heightened focus on resilience and preparedness. This focus is especially critical given the rising costs of cybercrime and data breaches, which can have devastating financial and reputational consequences for organisations in the financial sector.
The magnitude of the problem is strikingly illustrated by a Bloomberg article, which puts it simply: if cybercrime were measured as a country, it would be the world's third-largest economy, trailing only the US and China. To shed light on these groundbreaking regulations and their implications, SANS Certified Instructor and penetration tester, Chris Dale, joined The Register in a recent webinar, ‘Cybersecurity Regulation Steps Up’. Offering invaluable perspectives on how new regulations like NIS2, DORA, and TIBER-EU will shape the IT security landscape and the financial sector, the webinar also explored the urgency for proactive cyber resilience measures, best practices, and how to navigate implementation challenges. As Chris highlights, these regulations are not just about ticking compliance boxes; they're about creating a culture of continuous improvement and preparedness in the face of evolving threats.
This blog delves into Dale's expert perspectives on DORA and the TIBER-EU framework, exploring their implications for businesses across the EU's financial sector.
DORA, with its January 2025 deadline, focuses on bolstering the operational resilience of financial entities, including banks, insurance companies, and even IT suppliers. It comprises five pillars that address risk management, information sharing, third-party risk, and, crucially, operational resilience testing:
TIBER-EU is the practical arm of DORA, providing a framework for threat intelligence-based ethical red teaming. It requires financial institutions to engage in advanced penetration testing that simulates real-world attacks, pushing their defences to the limit. As Dale explains, "TIBER-EU requires us to do testing, and the testing has to be basic and advanced". This approach helps organisations identify weaknesses and improve their ability to detect, respond to, and recover from sophisticated cyber-attacks.
Implementing DORA and TIBER-EU is not without its challenges. As Dale candidly points out during the webinar, organisations may grapple with the intricacies of these regulations, struggle to secure adequate resources, and find it challenging to integrate cybersecurity into their overall business strategy. The distinction between ‘basic’ and ‘advanced’ penetration testing under TIBER-EU also raises questions about what truly constitutes effective testing in today's threat landscape.
Key Challenges:
By addressing these challenges head-on and implementing the best practices detailed later in this blog, organisations can position themselves for success in the new regulatory landscape. However, two specific areas warrant further exploration: the complexities of third-party risk management and the ever-present threat of maintaining operational resilience in the face of evolving threats. Let's delve deeper into these critical aspects of cyber resilience in the financial sector.
DORA recognises the interconnected nature of today's financial ecosystem, where organisations rely heavily on third-party vendors and service providers. This reliance, while often necessary for efficiency and innovation, introduces significant cybersecurity risks.
As Dale highlights during the webinar, even seemingly innocuous third-party services can become entry points for attackers. He underscores the importance of regulations like DORA that mandate stringent third-party risk management and require organisations to carefully assess and mitigate the risks associated with their suppliers. This includes conducting thorough due diligence, incorporating security requirements into contracts, and maintaining ongoing communication and monitoring.
However, implementing effective third-party risk management is easier said than done. Complex supply chains, data sharing agreements, and the inherent risks associated with external entities create a complex landscape for organisations to navigate. IBM’s report revealed that third-party involvement was one of the five biggest cost amplifiers, increasing the average cost by more than $370,000 to $4.29M.
Key considerations:
While third-party risk management is a critical aspect of DORA compliance, organisations must also focus on maintaining their own operational resilience in the face of an ever-evolving threat landscape. This requires a proactive and adaptive approach to security, ensuring they can withstand and recover from attacks quickly and effectively.
The dynamic nature of the cyber threat landscape is constantly evolving, with attackers becoming increasingly sophisticated and persistent. DORA's focus on operational resilience testing, including regular penetration testing and the implementation of TIBER-EU, reflects the importance of regularly challenging your defence and identifying weaknesses. As Dale emphasises, "cybersecurity is a moving target”, and organisations need to adopt a proactive and adaptive approach to security, ensuring they can withstand and recover from attacks quickly and effectively.
The ability to adapt to new threats and vulnerabilities is crucial. As Dale points out, the success of advanced persistent threats (APTs) demonstrates that attackers are patient and relentless. Organisations must be able to detect and remediate threats swiftly to minimise the impact of a breach, with a focus on building the capability to withstand and recover from attacks. The financial impact of downtime can be staggering, with some estimates reaching as high as $9,000 per minute for large organisations, according to a recent Forbes article. For higher-risk sectors like finance and healthcare, these costs eclipse $5M an hour in certain scenarios, and these figures do not include any potential fines or penalties. Beyond downtime, the broader costs of a data breach can be immense, encompassing direct expenses like forensic investigations and legal fees, as well as indirect costs like customer churn and reputational damage.
The rise of cryptocurrency-related crimes is predicted to cost the world $30B USD in 2025, according to Cybersecurity Ventures, and the 2023 Data Breach Investigations Report by Verizon, indicates the finance industry was among the top targeted sectors, experiencing a significant number of breaches. These stark numbers only emphasize the importance of making operational resilience not just a security concern, but a financial imperative.
Operational resilience requires a combination of technical controls, robust incident response plans, and a culture of continuous improvement.
Key considerations include:
These two areas, third-party risk management and maintaining operational resilience, particularly through rigorous testing such as TIBER-EU, are critical components of a successful DORA implementation strategy.
Now, let's explore some best practices for navigating these challenges and achieving cyber resilience in the financial sector.
While the challenges of implementing DORA and TIBER-EU are significant, the potential benefits to an organisation’s overall security posture are undeniable. To navigate these challenges and successfully implement DORA and TIBER-EU, consider the following best practices:
Don't wait until the last minute to scramble for compliance. Take the time to understand the requirements, assess your organisations current capabilities, and develop a strategic plan for implementation. By taking proactive steps today, you can ensure that your organisation is prepared to meet the challenges of the evolving cyber threat landscape and safeguard its critical assets.
DORA and TIBER-EU are transforming the cybersecurity landscape for the financial sector. These regulations are driving a shift towards proactive resilience and preparedness, forcing organisations to confront the reality of cyber threats and take concrete steps to protect themselves. By understanding the requirements of these frameworks, embracing best practices, and addressing implementation challenges head-on, financial institutions can strengthen their defences and navigate the new frontiers of cybersecurity with confidence.
The clock is ticking. The deadline for DORA compliance is January 2025. Now is the time to take action and ensure your organisation is prepared to meet the challenges ahead.
Remember, as Dale emphasises, cyber resilience is an ongoing journey, not a destination. By continuously assessing your risks, enhancing your security measures, and learning from the experiences of others, you can protect your organisation and its critical assets from the threats of tomorrow.
Explore SANS’s DORA Resource Hub today for actionable insights and expert guidance on navigating DORA and TIBER-EU. Equip your organization with the tools and strategies needed to achieve cyber resilience and stay ahead of evolving threats in the financial sector.
Launched in 1989 as a cooperative for information security thought leadership, it is SANS’ ongoing mission to empower cyber security professionals with the practical skills and knowledge they need to make our world a safer place.
Read more about SANS Institute