{"id":59867,"date":"2020-03-30T14:50:21","date_gmt":"2020-03-30T21:50:21","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?page_id=59867"},"modified":"2024-03-08T10:05:53","modified_gmt":"2024-03-08T18:05:53","slug":"cybersecurity-research-guide-for-securing-iot-in-financial-services","status":"publish","type":"page","link":"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/","title":{"rendered":"Banking on Security: Leveraging Device Data to Manage Risk in Financial Services"},"content":{"rendered":"<h2 class=\"c-title-medium\">Financial Services organizations face diverse and serious cyber risks.<\/h2>\n<p> Increased activity from nation states is forcing regulated companies to heighten their vigilance against cyberattacks.<\/p>\n<p>Forescout\u2019s Research team analyzed device deployments from some of the world\u2019s leading financial institutions and identified disturbing findings that indicate a lack of maturity in key areas such as device visibility and network segmentation. The research suggests that many banking and retail devices are within proximity of non-traditional (IoT and OT) devices, exposing networks to elevated opportunities for attackers to move laterally between critical infrastructure and the data center. This research report offers guidance on:<\/p>\n<ul>\n<li>How to identify the most vulnerable IoT devices on a financial services network<\/li>\n<li>Understanding the increasing threat posed by building automation systems<\/li>\n<li>How an increased and targeted focus on device visibility, compliance and segmentation can reduce overall risk<\/li>\n<\/ul>\n<p><a target=\"_blank\" href=\"\/company\/legal\/notice-of-collection\/\" rel=\"noopener\">Notice of Collection<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Financial Services organizations face diverse and serious cyber risks. Increased activity from nation states is forcing regulated companies to heighten their vigilance against cyberattacks. Forescout\u2019s Research team analyzed device deployments from some of the world\u2019s leading financial institutions and identified disturbing findings that indicate a lack of maturity in key areas such as device visibility [&hellip;]<\/p>\n","protected":false},"author":112,"featured_media":0,"parent":0,"menu_order":181,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"coauthors":[522],"class_list":["post-59867","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Banking on Security: Leveraging Device Data to Manage Risk in Financial Services - Forescout<\/title>\n<meta name=\"description\" content=\"How to leverage Forescout\u2019s extensive device data to identify, manage and mitigate enterprise-wide IT, OT and IoT cyber risk in financial services networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Banking on Security: Leveraging Device Data to Manage Risk in Financial Services - Forescout\" \/>\n<meta property=\"og:description\" content=\"How to leverage Forescout\u2019s extensive device data to identify, manage and mitigate enterprise-wide IT, OT and IoT cyber risk in financial services networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-08T18:05:53+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/\",\"url\":\"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/\",\"name\":\"Banking on Security: Leveraging Device Data to Manage Risk in Financial Services - Forescout\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"datePublished\":\"2020-03-30T21:50:21+00:00\",\"dateModified\":\"2024-03-08T18:05:53+00:00\",\"description\":\"How to leverage Forescout\u2019s extensive device data to identify, manage and mitigate enterprise-wide IT, OT and IoT cyber risk in financial services networks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Banking on Security: Leveraging Device Data to Manage Risk in Financial Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Banking on Security: Leveraging Device Data to Manage Risk in Financial Services - Forescout","description":"How to leverage Forescout\u2019s extensive device data to identify, manage and mitigate enterprise-wide IT, OT and IoT cyber risk in financial services networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/","og_locale":"en_US","og_type":"article","og_title":"Banking on Security: Leveraging Device Data to Manage Risk in Financial Services - Forescout","og_description":"How to leverage Forescout\u2019s extensive device data to identify, manage and mitigate enterprise-wide IT, OT and IoT cyber risk in financial services networks.","og_url":"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_modified_time":"2024-03-08T18:05:53+00:00","twitter_card":"summary_large_image","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/","url":"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/","name":"Banking on Security: Leveraging Device Data to Manage Risk in Financial Services - Forescout","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"datePublished":"2020-03-30T21:50:21+00:00","dateModified":"2024-03-08T18:05:53+00:00","description":"How to leverage Forescout\u2019s extensive device data to identify, manage and mitigate enterprise-wide IT, OT and IoT cyber risk in financial services networks.","breadcrumb":{"@id":"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/cybersecurity-research-guide-for-securing-iot-in-financial-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"Banking on Security: Leveraging Device Data to Manage Risk in Financial Services"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]}]}},"featured_media_url":false,"is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/59867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=59867"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/pages\/59867\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=59867"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=59867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}