Fifth Third cyber exec: Sharing threat intel comes with risk

Brian Minick Fifth Third
Brian Minick, chief technology and information security officer at Fifth Third Bank, right, talks to American Banker editor Penny Crosman at the Digital Banking conference in Boca Raton, Florida, on Monday.
Carter Pape

BOCA RATON, Florida — The head of cybersecurity for Fifth Third Bank outlined major cybersecurity and fraud threats facing the financial sector during a panel discussion at Digital Banking 2025, a conference hosted by American Banker.

Brian Minick, chief technology and information security officer at Fifth Third, said the primary adversaries to banks were organized crime groups motivated by financial gain. Nation-state intelligence organizations represent the most advanced threats, but organized crime is more frequently encountered in the financial sector, he said.

Minick also discussed challenges with information sharing among banks, which can be a potent defense against cybersecurity threats but can be counterproductive in certain cases.

Information-sharing challenges

Minick on Monday shared an anecdote about a meeting that occurred while he was working in the defense sector. This meeting highlights the challenges and risks associated with sharing highly sensitive threat intelligence, even in seemingly secure environments.

The meeting was held in a SCIF, which stands for Sensitive Compartmented Information Facility. Minick described it as a classified space designed with strict security protocols: no bugs, no listening devices, no phones, although paper was allowed. The purpose of the meeting was to share how Minick's organization was tracking a specific nation-state attacker. They met with "seven or eight defense contractors" to share this method, he said. Minick noted that the method they had developed had been effective at catching this attacker for more than a year.

However, less than a week after that meeting, the attacker changed its pattern. This change meant that the method Minick's team had been using to detect the attacker was no longer effective.

Minick's conclusion was that "someone in that room went back to their company and lost control of that information," he said. This breach allowed the attacker to learn how it was being tracked and subsequently change its tactics to evade detection.

For Minick, this experience reinforced the idea that "very sensitive, very effective" information like specific tracking methods needs to be kept within a trusted group that is capable of managing and controlling it securely. Information that is shared more broadly should ideally be less sensitive or have a shorter expected lifespan for its effectiveness.

Banks attack their own systems

Fifth Third employs a layered approach to detect attackers, according to Minick — a practice adopted by other banks as well. This involves using industry-leading products to handle most attacks and proprietary capabilities coupled with internal intelligence to catch more sophisticated threats.

The goal is to maintain a "dynamic, very morphing defensive postures" to adapt to attacker changes, he said.

Minick affirmed the importance of proactive security measures such as penetration testing and bug bounty programs. The bank also uses internal red teaming to identify potential vulnerabilities before external attackers do.

"Anything we can do to find weaknesses within our systems, within our code, we welcome," he said.

Managing third-party risks

Third-party vendor risk is a substantial challenge, Minick said. He cited MoveIt as an example; a ransomware group exploited a vulnerability in the file-transfer software to steal data from thousands of organizations. The vulnerability compromised data at 60 banks.

Effective management involves vetting vendors' cybersecurity programs, controls and processes. Financial sector requirements are higher than in many other industries, Minick said. He suggested that the industry needs to collaborate to influence vendors on security practices.

Layered defenses are also critical, ensuring visibility into vendor products and integrating them into detection capabilities.

Regarding the shift to cloud computing, Minick sees it as a "shift of risk" rather than elimination. While cloud environments can simplify some security tasks like encryption configuration, they also introduce concentration risk as hyperscalers — companies such as Amazon, Google and Microsoft that have major cloud computing businesses — become potential targets. The bank has moved from a "cloud first" to a "cloud smart" strategy, evaluating various hosting options based on specific business cases.

Insider fraud doesn't work out for the insiders

Minick also addressed the challenge of insider threats, such as in the case of Coinbase customer representatives taking bribes from threat actors, leading to what the company projected would be $180 million to $400 million in remediation costs and voluntary customer reimbursements.

Key mitigation strategies Minick highlighted involve employee awareness, education and fostering a culture where employees are encouraged to report suspicious activity without fear of reprisal, even if they made a mistake.

"Creating that culture where you're encouraging people to let you know what they're seeing, what's going on … is also key," Minick said.

He also emphasized that it's important to highlight the risks employees take on if they collude with bad actors, reminding the audience that the situation did not turn out well for the Coinbase employees who took the bribes. Specifically, the employees lost their jobs; Coinbase referred them for criminal charges; and, according to a Bloomberg report, the Department of Justice has initiated an inquiry into the matter.

"You're the dispensable one in this situation from an attacker's perspective," Minick said of colluders. "They're not here to take care of you in this transaction."

What are the threats faced by banks in cybersecurity?

  • Nation-state intelligence organizations (though more prevalent in defense, still a factor)
  • Organized crime groups primarily motivated by financial gain and stealing money
  • Attackers targeting bank customers directly rather than the bank itself
  • Smishing and text message scams, such as fake toll collection fee messages
  • Fraudsters creating fake bank websites and buying online ad space to trick customers searching for the bank
  • Attacks via third-party vendors and supply-chain vulnerabilities
  • Concentration risk, in which where large cloud providers (also known as hyperscalers) become attractive targets due to housing data from many institutions
  • Employees colluding with attackers, potentially through bribes or deception
  • Deepfakes and AI used to impersonate individuals (like a CEO on a call or a loved one) to facilitate fraud

For reprint and licensing requests for this article, click here.
Fraud prevention Cyber security Cyber attacks Bank Fraud Fraud Fifth Third Bancorp
MORE FROM AMERICAN BANKER