Skip to main content

Thomas Murray’s global cyber risk practice is built on deep industry expertise. With nearly 30-years’ experience supporting major financial institutions, we apply our collective experience and expertise to our clients’ cyber security challenges, to become their trusted advisors. 

Regardless of your size or maturity, Thomas Murray’s expert services and leading-edge technology can be tailored to help you take the next steps in improving your cyber security posture. 

In this webinar, our cyber experts draw on their experience to show you how a digital bank heist can unfold and how security experts typically respond. They’ll also show you how the lessons apply to all organisations, of whatever size and industry.

Key themes

Join experts from our global cyber advisory practice as they show you how a digital bank heist unfolds. With powerful lessons for all industries, this session is based on our team’s real-world experience in responding to some of the most serious threats facing the banking sector today. Discover:

  • The steps that threat actors take to commit serious fraud
  • How teams can respond to these events effectively
  • How to prepare your own executive and senior stakeholders to respond effectively to a cyber attack

Meet the team

This webinar is hosted by the senior leaders of Thomas Murray’s cyber advisory practice. With extensive experience helping financial institutions, national governments, and clients in every industry to improve their security posture, our experts are well-placed to provide fascinating insights into the lifecycle of successful (and unsuccessful) cyber attacks. Our team, many of whom are former government and law enforcement professionals, are acknowledged experts in their fields and are highly adept at communicating current cyber security issues in an ever-changing threat landscape.

Orbit Security

Orbit Security

Security ratings for enhanced attack surface management and third party risk. Monitor for breaches and vulnerabilities that could be exploited by threat actors.

Learn more