Sector Guides

Cybersecurity for Investment Banks: Insider Threat, Market Manipulation via Cyber, and MAR Compliance

Investment banks occupy the highest-risk position in the financial cybersecurity landscape: they hold material non-public information (MNPI) whose misuse constitutes market abuse; they employ privileged users with access to trading systems capable of executing billions in transactions; they are targets of nation-state actors seeking market intelligence; and they face some of the most demanding regulatory obligations in financial services — including the Market Abuse Regulation (MAR), MiFID II's systems and controls requirements, and the FCA's operational resilience framework. A cybersecurity failure at an investment bank is not just a data breach — it can constitute market manipulation, trigger MAR investigations, and cause systemic market disruption.

Investment banks are primary targets for nation-state cyber espionage — MNPI theft via cyber attack enables informed trading and constitutes market abuse under MAR regardless of how the information was obtained.

The Regulatory Intersection: MAR, MiFID II, and Cybersecurity

Investment banks operate under multiple regulatory frameworks that directly intersect with cybersecurity:

  • Market Abuse Regulation (MAR): MAR prohibits insider dealing, market manipulation, and improper disclosure of inside information. Cyber attacks that result in MNPI exfiltration create MAR liability — both for the firm and potentially for the attackers' clients who trade on stolen information
  • MiFID II Article 16: Investment firms must have adequate procedures and arrangements for the security of IT systems — including order management systems, trading algorithms, and client data
  • FCA SYSC 10: Conflicts of interest and information barrier requirements — electronic information barrier breaches via cyberattack constitute regulatory failures
  • PS21/3: Trading execution and client order management are important business services for investment banks — with impact tolerances that must account for cyber attack scenarios
  • DORA: Investment banks with EU operations face DORA's full ICT risk management framework including TLPT (threat-led penetration testing)

Insider Threat: The Unique Risk in Investment Banking

Investment banking presents the highest insider threat density of any financial sector:

  • Privileged access to MNPI: Front office staff routinely access material non-public information. Their devices, accounts, and network access are high-value targets for both attackers and for insider misuse
  • Trading system access: Privileged users with access to order management systems can cause significant market impact — the 2012 Knight Capital Group incident ($440M loss in 45 minutes) illustrates the consequence of inadequate privileged access controls
  • Information barrier integrity: Chinese walls between M&A, research, and sales/trading are regulatory requirements — cyber attacks that bridge these barriers constitute MAR violations
  • Departing employees: Investment bankers who leave take significant knowledge; those with access to client data, deal information, or trading strategies present both legal and regulatory risk
  • Contractor and vendor access: Third-party access to trading and research systems creates elevated risk — vendor access must be time-limited, monitored, and revoked immediately on contract completion

Nation-State Threats and Financial Intelligence

Investment banks are priority targets for nation-state cyber espionage:

  • MNPI theft for geopolitical advantage: Foreknowledge of major M&A transactions, sovereign debt restructuring, or regulatory decisions has significant geopolitical value
  • Market disruption capability: Nation-state actors targeting trading infrastructure or order management systems seek the ability to disrupt markets during geopolitical crises
  • Long-term persistent access: Nation-state actors typically aim for long-term, undetected access — not immediate financial gain. Detection typically occurs months or years after initial compromise
  • NCSC financial sector guidance: The NCSC has specifically flagged investment banks as priority targets for state-sponsored espionage — its guidance for the financial sector reflects this threat reality
  • TLPT requirements: DORA's threat-led penetration testing requirement is specifically designed to test resilience against sophisticated, persistent threat actors — investment banks with EU exposure are subject to this requirement

Required Controls for Investment Bank Cybersecurity

The control framework for investment banks must address regulatory, operational, and threat intelligence requirements simultaneously:

  • Privileged access management: Separate privileged accounts for all admin and elevated-access users; just-in-time access for trading system administration; full session recording for privileged access
  • Information barrier technology: Technical controls enforcing Chinese walls — email monitoring, document classification, access control lists — supported by audit trails that satisfy MAR requirements
  • Endpoint detection and response: EDR capable of detecting sophisticated, persistent threats — not just signature-based malware. Investment banks require EDR at the upper end of capability
  • User behaviour analytics: Baseline normal behaviour for all front office and privileged users; detect anomalies that may indicate insider misuse or compromised accounts
  • Trading system monitoring: Real-time monitoring of order management systems for anomalous activity — unexpected algorithmic behaviour, unusual order patterns, or access from unexpected locations
  • SIEM with financial sector threat intelligence: Correlation of security events against known attack patterns targeting investment banks — including nation-state TTPs (tactics, techniques, and procedures)

Frequently Asked Questions

If MNPI is stolen via a cyber attack, does the firm face MAR liability?

The firm faces potential regulatory scrutiny — particularly if the FCA determines that the firm's security controls were inadequate to protect inside information as required by MAR Article 16. The FCA can investigate whether the firm had appropriate technical and organisational measures to prevent inside information from being accessed or disclosed without authority. Separately, if individuals trade on information stolen via a cyber attack, they may face MAR insider dealing liability even though they obtained it through criminal means rather than legitimate market access.

How does DORA's threat-led penetration testing (TLPT) requirement work?

DORA Article 26 requires "significant" financial entities (generally larger investment banks and systemically important institutions) to conduct TLPT at least every three years. TLPT — also known as CBEST in the UK — is a sophisticated, intelligence-led penetration test that simulates realistic attack scenarios based on threat intelligence about the specific threats facing the firm. It is conducted by accredited testers using threat intelligence briefings, targets live production systems (with careful controls), and is considerably more rigorous than standard annual penetration testing. The FCA's CBEST framework is the UK equivalent.

We have information barriers — are they adequate as cybersecurity controls?

Information barriers (Chinese walls) are regulatory controls implemented through a combination of physical separation, policy, training, and technology. The cybersecurity question is whether the technology layer of your information barriers is robust: are access control lists correctly configured and regularly reviewed? Are email systems configured to prevent cross-barrier communication? Are document management systems enforcing barrier controls? Are you monitoring for barrier breaches? A cyber attack that bypasses or exploits weaknesses in the technology layer of your information barriers constitutes a regulatory failure as well as a security incident.

Assess your investment banking security controls

Kyanite Blue specialises in cybersecurity for iGaming operators. MGA-licensed operators across Malta trust our stack.

Get in touch

Featured Product

Hadrian

Learn more

Ready to secure your iGaming operation?

MGA-licensed operators across Malta trust Kyanite Blue.