CybersecurityUK Banks Fail to Master Cybersecurity Fundamentals

UK Banks Fail to Master Cybersecurity Fundamentals

Key Takeaways:

  • The U.K. regulators’ approach to cybersecurity testing, known as CBEST, involves live-fire attacks on actual bank systems to uncover real-world weaknesses.
  • The U.S. regulators focus on tabletop exercises and governance, which may not provide the same level of empirical validation as the U.K.’s approach.
  • The 2025 CBEST report found that firms struggled with basic security gaps, including weak patch management and identity controls.
  • The U.K. and U.S. regulatory environments differ in their approach to supervision, with the U.K. employing an outcome-based assessment and the U.S. attempting to pivot away from a process-heavy approach.
  • The U.S. Financial Stability Oversight Council has endorsed the use of scenario-driven tabletop exercises to assess crisis preparedness, but these exercises do not involve the technical exploitation of live production servers.

Introduction to Cybersecurity Testing
The Bank of England’s 2025 cybersecurity stress tests have revealed that despite rigorous, intelligence-led simulations on live banking systems, the United Kingdom’s most critical financial institutions still struggle with foundational cyber hygiene. The findings offer a stark point of comparison for U.S. banks, which comply with regular assessments by regulators that pale in comparison to the live-fire testing that U.K. regulators use on the country’s banks. The U.K. regulator mandates that its largest institutions withstand simulated attacks on their actual production environments, providing a real-time look into the vulnerabilities that plague the global financial system.

The U.K.’s CBEST Framework
The U.K.’s banking regulators use a testing framework known as CBEST, which unlike traditional audits uses threat-led penetration testing that mimics the behaviors of real-world cyber attackers. Testers perform these simulations on the live production systems of the institutions to assess their actual detection and response capabilities, and regulators require these exercises for firms and financial market infrastructure companies deemed systemically important to the country’s financial sector. CBEST is designed to ensure that these key institutions "can continue to deliver their important business services during severe but plausible" disruption. The 2025 analysis of these tests found that firms often failed to maintain "strong configuration practices" and lacked "strong cryptographic protections for data-at-rest."

Common Weaknesses Identified
The CBEST report identified common weaknesses, including "having overly permissive access controls," such as inadequate role-based access, and "not maintaining strong credential hygiene practices," which includes storing passwords in plain text. Furthermore, the testing revealed that staff remain susceptible to social engineering, with instances of "staff being manipulatable by social engineering that seeks to discover passwords or token codes," often facilitated by employees over-exposing sensitive data on social media platforms. The report notes that these weaknesses are often the result of insufficiently hardened or unpatched systems, leaving them vulnerable to known exploits.

Comparison to U.S. Regulatory Approach
Across the Atlantic, U.S. regulators do not completely avoid cybersecurity exercises, but they tend to focus on governance and third-party risk. The Treasury Department announced that it would co-host tabletop exercises offered to small banks, but these exercises do not involve the technical exploitation of live production servers that characterizes the U.K.’s CBEST program. The U.S. Financial Stability Oversight Council has endorsed the use of scenario-driven tabletop exercises to assess crisis preparedness, but these exercises simulate decision-making during a crisis rather than involving the technical exploitation of live production servers.

Regulatory Styles: Prescriptive vs. Outcome-Based
A key difference between the U.K. and U.S. regulatory environments governing bank cybersecurity lies in the execution of supervision. The U.K. model, through CBEST, employs an "outcome-based assessment" of technical capabilities, allowing firms flexibility in how they achieve resilience so long as they can demonstrate it under simulated fire. In contrast, U.S. regulators are currently attempting to pivot away from what has historically been viewed as a process-heavy approach. The U.S. Financial Stability Oversight Council has endorsed the use of scenario-driven tabletop exercises to assess crisis preparedness, but these exercises do not necessarily involve the technical exploitation of live production servers.

Which Approach is More Effective?
Determining whether the U.K. or U.S. banking sector has a more robust cybersecurity stance is difficult given the opacity of specific banks’ results in the CBEST report and the lack of equivalent testing by U.S. regulators. However, the U.K.’s CBEST program offers a level of empirical validation regarding resilience that standard examination processes can miss. The 2025 CBEST report concludes that "tactical fixes alone are insufficient" and that quick remediation often leaves "underlying weaknesses unaddressed," a conclusion similar to that of U.S. regulators that governance is paramount to bank cybersecurity.

Conclusion
In conclusion, the U.K.’s approach to cybersecurity testing, known as CBEST, provides a level of empirical validation regarding resilience that standard examination processes can miss. The U.S. regulators’ focus on tabletop exercises and governance may not provide the same level of validation, and the U.S. banking sector may benefit from adopting a more outcome-based approach to supervision. The 2025 CBEST report highlights the importance of addressing basic security gaps, including weak patch management and identity controls, and the need for a more comprehensive approach to cybersecurity testing. Ultimately, the U.K.’s CBEST program offers a model for other countries to follow in their efforts to strengthen the cybersecurity of their banking sectors.

- Advertisement -spot_img

More From UrbanEdge

US-Iran Conflict Live Updates: Trump Demands Iran Stand Down; US Consulate Stormed

Breaking: U.S. service members killed after Iran's retaliatory strikes on bases. Trump demands Iran's complete stand down. Global tensions rise as China's condemnation and protests unfold. Israeli military plans more strikes; Iran's retaliation intensifies. The next 48 hours could define a regional conflict...

F1 Aus GP Changes: Middle East Conflict Cancels Key Event

The Middle East conflict has led to the cancellation of Pirelli's tyre test in Bahrain, impacting F1 Australian GP logistics. Iranian strikes closed airports, forcing teams to reroute flights. While Melbourne remains on schedule, concerns loom over the upcoming Bahrain and Saudi Arabian Grands Prix...

Oracle Red Bull Racing Partnership: Multi-Year Deal Powers Data-Driven Performance

Oracle and Red Bull Racing extend their groundbreaking partnership, integrating Oracle's advanced AI and cloud technologies into all aspects of race operations. This deal empowers Red Bull Ford Powertrains to excel under the impending F1 regulation shifts and debut revolutionary AI strategy agents trackside in 2025...

Microsoft Bug Hides Mouse Pointer in Classic Outlook Fix

Microsoft has confirmed a bug in classic Outlook that causes the mouse pointer to disappear, affecting usability. The issue also impacts OneNote and other 365 apps. Microsoft is working on a fix, but in the meantime, users can try temporary workarounds involving PowerPoint to navigate blindly...

Fake Job Recruiters’ Malware in Developer Coding Challenges

Cybercriminals are exploiting developer job hunts by embedding malware in coding challenges. These attacks are effective as they leverage routine aspects of the developer workflow. Fake recruiters promise unrealistic salaries while embedding malicious code, making vigilance crucial for job-seekers in the tech industry...

Business Data, Emails & Browsing History Theft by Malicious Chrome Extensions

Cybercriminals exploit Chrome extensions to access confidential business data, emails, and browsing history from millions of users. These malicious tools often disguise themselves as legitimate productivity extensions, putting unsuspecting users at risk. Discover how to identify threats and protect your sensitive information from stealthy cyber intrusions...

Valentine’s Day Cyber Threats & Risks: Protect Yourself

Valentine's Day creates a perfect storm for cybercriminals, with romance scams accounting for $697 million in losses and phishing attempts spiking by 28%. Protect yourself by employing security measures like two-factor authentication and understanding swift actions post-scam to minimize risk and financial damage...

PlayStation 2026 State of Play Games Reveals & Announcements

PlayStation's 2026 State of Play unveiled over 15 new titles, including a surprise God of War spin-off and a remake of the original trilogy. Fans thrilled over the John Wick game reveal featuring Keanu Reeves, with new IPs and third-party revivals like Castlevania also showcased...

Queensland Flood Alerts: Storms to End Extreme Heatwave

Queensland Flood Alerts: Storms to End Extreme Heatwave Projected Rainfall...
- Advertisement -spot_img