Microsites

Cyber Security

Cyber Security refers to the practices, technologies, and measures required to protect sensitive financial information, systems, and infrastructure from unauthorised access, disclosure, alteration, or destruction. It involves safeguarding firms and individuals against cyber threats such as hacking, data breaches, malware, phishing attacks, and other forms of cybercrime.

The PIMFA Cyber Security Working Group shares intelligence, explores a wide range of issues impacting our sector, and develops best practices and guidance.

Previous work includes:

  • Cyber Security Framework mapping
  • Artificial Intelligence (AI) potential impacts on cyber Security
  • Cyber Security when travelling and working from home
  • Reviews of case studies and learnings
  • Cyber Security strategies and culture

If you are interested in joining this member only group, please contact Maria Fritzsche.

Click to expand.

FCA Cyber Resilience Insights

The FCA has published a set of cyber resilience insights based on discussions held in 2025 with around 140 firms through its Cyber Coordination Group. The insights draw on firms’ real world experience and cover incident response, AI related and quantum cybersecurity risks, as well as insider threat management.

Rather than introducing new regulatory expectations, the publication is intended to support peer learning and practical benchmarking, highlighting both areas of good practice and where common weaknesses continue to arise.

Firms are encouraged to use the insights to challenge and strengthen their own cyber resilience approaches.

PIMFA response to Cabinet Office Consultation: Making Public Services work for you with your Digital Identity

PIMFA have responded to the Cabinet Office Consultation on digital identity.

We support the development of a secure, interoperable national digital identity, though we believe that to deliver meaningful benefits for wealth management and financial advice firms and their clients, the framework should provide clarity on AML/KYC recognition and reliance, support interoperability with private-sector providers and maintain high security and assurance standards.

You can read the response in full here

Cyber Uncovered Episode Four: Inside a Social Engineering Attack: How Supply Chain Breaches Really Happen

Associate Members, Mitigo, will be hosting a webinar on Thursday 30 April. This is a practical walkthrough of how attackers use social engineering to exploit trusted relationships within your supply chain, and how this leads to real-world breaches – in the financial services sector and beyond.

In this session, Mitigo’s Head of Technical Development, Karl McAree, will walk through a real-world attack scenario, showing how attackers gather intelligence, impersonate trusted contacts and manipulate processes to gain access to organisations.

Key takeaways:

  • How attackers gather publicly available information to build a picture of your organisation and its suppliers
  • How impersonation is used to exploit trust and manipulate into sharing sensitive information
  • Why your supply chain creates multiple entry points for attackers
  • How a real-world social engineering attack unfolds – from first contact through to business impact
  • Why these attacks are so effective, even in well-run organisations
  • Practical steps to reduce risk and close the cyber gaps attackers exploit

Why attend? Get clarity on where your organisation is most vulnerable to supply chain attacks, and what needs to be in place to strengthen oversight and reduce risk.

Register for the webinar here.

Click here to find out more about Mitigo.

Almost there...

Complete the quick form below to download the Membership Brochure