See how a regional bank used layered cybersecurity controls to meet regulatory expectations and reduce cyber risk across its hybrid environment.
Financial institutions sit at the intersection of high-value data, strict regulation and constant attacker attention. ENISA’s finance sector threat landscape report highlights the financial sector as one of the most targeted in Europe between 2023 and mid-2024, with threats ranging from ransomware and DDoS to credential theft and fraud.
This case study is based on typical engagements DACTA Global conducts with regional banks in Europe and Asia. It illustrates how one mid-size bank moved from a fragmented security posture to a multi-layered defence aligned with regulatory expectations such as EBA ICT guidelines, DORA and Basel principles for operational resilience.
The bank in our scenario operates across several countries, with:
Key challenges:
The CISO’s mandate was clear: design a layered security architecture that could stand up to regulator scrutiny and reduce business risk without disrupting ongoing digital transformation projects.
The bank began by establishing a clear security architecture and governance model:
Outcome: A prioritised roadmap that linked specific control improvements to business services and regulatory requirements, giving the board a clear view of why investments were needed.
Given the sector’s exposure to account takeover and payment fraud, the bank strengthened identity-centric controls:
This aligns with supervisory expectations around access management and supports the principle that identity is the new perimeter for financial services.
The bank then tackled its network and cloud posture:
ENISA’s finance threat landscape work underlines the importance of segmentation to limit lateral movement, particularly in hybrid environments where cloud and on-prem infrastructure are tightly interconnected.
The next layer focused on what sits closest to customer and staff activity:
These measures directly support EBA and local guidance on protecting customer information, transaction integrity and confidential data.
To move from reactive to proactive defence, the bank invested in:
Regulators such as FINMA and the EBA increasingly expect evidence that banks can detect, respond to and recover from significant cyber incidents; this layer is where that capability becomes visible.
Outsourcing and SaaS are essential for modern banks, but they also introduce systemic risk. To address this:
The Basel Committee’s emphasis on third-party and operational resilience is clearly reflected in this layer.
Within 18–24 months of this transformation:
Perhaps most importantly, business leaders gained a clearer understanding of how cyber risk related to specific services such as online banking and payments, making it easier to prioritise investments.
For financial institutions, “good enough” security is no longer acceptable. Regulators and customers expect resilience: the ability to withstand, detect and recover from severe cyber events without destabilising core services.
This case study illustrates that multi-layered defence is not just a technical architecture diagram, but a practical way to align governance, identity, infrastructure, applications, data, monitoring and third-party risk. DACTA Global supports banks and other financial organisations through this journey, from initial risk assessments and architecture design to ongoing managed detection, incident response and cloud security assessments.
For institutions facing increasing regulatory scrutiny and a fast-evolving threat landscape, now is the right time to reassess how well each layer of your defence is performing—and where targeted improvements can deliver the greatest reduction in risk.
If you're experiencing an active security incident and need immediate assistance, contact the DACTA Incident Response Team (IRT) at support@dactaglobal.com.