pims

Insight: CYBERSECURITY RISK ASSESSMENT IN BANKING: METHODOLOGIES AND

Published
Share

Winners Consulting Services Co. Ltd. (積穗科研股份有限公司), Taiwan's expert in Privacy Information Management System (PIMS), draws the attention of corporate executives to a landmark 2023 academic study that has already been cited 36 times globally: banks and financial institutions that fail to integrate both quantitative and qualitative cybersecurity risk assessment methodologies are systematically underestimating their exposure to data breaches — and the same blind spot is undermining ISO 27701 compliance, GDPR readiness, and effective DPIA execution across Taiwan's corporate sector.

Paper Citation: CYBERSECURITY RISK ASSESSMENT IN BANKING: METHODOLOGIES AND BEST PRACTICES (Samuel Onimisi Dawodu, Adedolapo Omotosho, Odunayo Josephine Akindote, OpenAlex — Privacy Information Management, 2023)
Original Paper: https://doi.org/10.51594/csitrj.v4i3.659

Read Original Paper →

About the Authors and This Research

This paper was co-authored by three researchers whose combined expertise spans cybersecurity risk governance, digital banking, and information management in emerging economies. Lead author Samuel Onimisi Dawodu has established himself as a significant voice in the intersection of financial services and cybersecurity, with an h-index of 9 and a cumulative citation count of 272 — metrics that place him among the most impactful researchers in this niche within African and global emerging market contexts. Co-author Adedolapo Omotosho brings a complementary perspective focused on fintech and digital risk governance, with an h-index of 5 and 95 cumulative citations. The third author, Odunayo Josephine Akindote, contributes critical field-level insights into the operational realities of banking sector information security.

Published in 2023 and indexed on OpenAlex under Privacy Information Management, the study has garnered 36 citations in a relatively short period, including 3 high-impact citations — a citation velocity that signals strong scholarly and practitioner uptake. While the study is grounded in the Nigerian banking context, its methodological contributions are universally applicable to any organization undergoing digital transformation while handling significant volumes of personal data.

For Taiwanese financial institutions, technology companies, and any organization subject to ISO 27701, GDPR, or Taiwan's Personal Data Protection Act (台灣個資法), this paper provides a rigorous, evidence-based methodological foundation for structured privacy risk assessment.

A Comprehensive Methodology Map for Banking Cybersecurity Risk Assessment

The central contribution of this research is a systematic mapping of risk assessment methodologies available to financial institutions — an intellectual architecture that translates directly into structured PIMS implementation frameworks. The authors argue compellingly that no single methodology is sufficient to address the multi-layered threat environment facing modern banks, and that only an integrated approach combining quantitative analysis, qualitative judgment, threat modeling, and scenario analysis can produce a truly resilient risk assessment posture.

Key Finding 1: Quantitative and Qualitative Assessments Must Be Used Together

The research makes a clear and evidence-supported case that quantitative risk assessment — which assigns numerical probabilities and financial impact values to identified threats — provides decision-makers with clear prioritization signals but fails to capture the full texture of emerging, unstructured threats such as social engineering, insider risks, and novel malware variants. Qualitative methods, while less numerically precise, are essential for understanding contextual risk factors including organizational culture, employee behavior patterns, and vendor relationship risks. The paper's best practice recommendation — a dual-track assessment architecture — maps directly onto the control requirements of ISO 27701 Annex A, which requires organizations to identify and assess privacy risks across both technical and operational dimensions. For Taiwan enterprises conducting DPIA under GDPR Article 35 or Taiwan's Personal Data Protection Act Article 27, this dual-track logic is not merely academically interesting; it is the structural backbone of a legally defensible risk assessment process.

Key Finding 2: The Human Factor Remains the Most Consistently Underestimated Risk Variable

Despite advances in technical security controls, the paper demonstrates that human-related vulnerabilities — particularly susceptibility to phishing attacks, social engineering, and insider threats — remain the leading vector for successful cyberattacks in banking. The authors find that organizations consistently overinvest in technical controls while underinvesting in human-centered risk mitigation: security awareness training, behavioral monitoring, and clear escalation protocols. This finding has direct regulatory implications for PIMS implementation: ISO 27701 Section 6.4 mandates that organizations establish and maintain competence and awareness programs specifically addressing privacy information management. For Taiwanese companies, this means that a PIMS that exists only on paper — with policies and technical systems but without trained personnel — fails to meet the spirit and letter of ISO 27701 requirements.

Key Finding 3: AI and Machine Learning Are Reshaping Risk Assessment Efficiency — and Creating New DPIA Requirements

The research dedicates significant analytical attention to the emerging role of artificial intelligence and machine learning in cybersecurity risk assessment, identifying three primary application areas: anomaly detection for real-time threat identification, automated threat intelligence analysis, and continuous monitoring systems. The authors note that AI-driven tools can dramatically reduce the latency between threat emergence and organizational response. Critically — and this is the insight most immediately relevant to Taiwan's privacy practitioners — the paper also flags that AI systems themselves are personal data processors that generate new privacy risks. Any organization deploying AI for customer data analysis, behavioral profiling, or risk scoring must conduct a DPIA for the AI system itself, assessing its data collection practices, processing logic, retention policies, and third-party data sharing arrangements against the requirements of GDPR and Taiwan's Personal Data Protection Act.

Implications for Taiwan's Privacy Information Management (PIMS) Practice

The methodological framework presented in this paper has three direct and concrete implications for Taiwanese enterprises navigating the intersection of cybersecurity risk management and privacy compliance.

ISO 27701 Alignment: The paper's integrated risk assessment methodology — combining quantitative scoring, qualitative analysis, threat modeling, and scenario planning — provides a practical operational template for satisfying ISO 27701 Clause 6.1.2, which requires organizations to determine risks and opportunities associated with their personal information management system. Taiwanese enterprises seeking ISO 27701 certification should treat this paper's methodological framework as a reference architecture for their privacy risk assessment process design.

GDPR Compliance: For Taiwanese enterprises with exposure to EU data subjects — including exporters, SaaS providers serving European customers, and subsidiaries of European companies — GDPR Article 35 requires a Data Protection Impact Assessment (DPIA) for high-risk processing activities. The scenario analysis methodology advocated in this paper is directly applicable as a DPIA tool, enabling organizations to systematically evaluate the likelihood and severity of privacy harms across multiple threat scenarios before processing commences.

Taiwan Personal Data Protection Act Compliance: Taiwan's Personal Data Protection Act Article 27 requires non-government agencies to adopt appropriate security measures proportionate to the risks of their personal data processing activities. The paper's best practices for continuous monitoring and incident response planning provide a concrete operational definition of "appropriate security measures" — moving Taiwanese enterprises from abstract compliance obligation to actionable implementation checklist.

How Winners Consulting Services Co. Ltd. Helps Taiwan Enterprises Act on These Insights

Winners Consulting Services Co. Ltd. (積穗科研股份有限公司) helps Taiwan enterprises implement ISO 27701, establish personal data protection mechanisms compliant with both GDPR and Taiwan's Personal Data Protection Act, and execute rigorous DPIA processes. Based on the core findings of this research, we recommend the following three specific actions for Taiwan's corporate executives:

  1. Implement a Dual-Track Privacy Risk Assessment Architecture: Drawing directly from the paper's quantitative/qualitative integration model, map your organization's personal data processing activities against ISO 27701 Annex A controls, and build a two-dimensional risk scoring matrix that captures both measurable technical risks and qualitative organizational risk factors. This provides the evidentiary foundation for ISO 27701 certification and GDPR DPIA compliance simultaneously.
  2. Elevate Personnel Training to a Core PIMS Performance Metric: The paper's unambiguous finding that human factors represent the single largest risk variable demands that employee privacy awareness training be treated not as a peripheral HR function but as a core PIMS performance indicator. In accordance with ISO 27701 Section 6.4, organizations should conduct at minimum one annual privacy and cybersecurity awareness training cycle for all staff handling personal data, with documented completion rates tracked as a PIMS KPI.
  3. Initiate DPIA for All AI-Driven Personal Data Processing Systems: Any AI tool currently deployed or under evaluation for customer data analysis, behavioral risk scoring, or automated decision-making involving personal data must be subject to a dedicated DPIA process. This DPIA should assess the AI system's data inputs, processing logic, retention periods, and third-party integrations against GDPR Article 35 requirements and Taiwan's Personal Data Protection Act Article 27 obligations.

Winners Consulting Services Co. Ltd. offers a complimentary PIMS Mechanism Diagnostic, helping Taiwan enterprises establish an ISO 27701-compliant management system within 90 days.

Apply for Free PIMS Diagnostic →

Frequently Asked Questions

Does a banking-focused cybersecurity risk assessment study apply to non-financial enterprises in Taiwan?
Yes, and the application is direct rather than analogical. The paper's core methodological contributions — dual-track quantitative/qualitative assessment, threat modeling, scenario analysis, and continuous monitoring — are domain-agnostic risk management tools. Any Taiwanese enterprise processing significant volumes of personal data, regardless of industry, can map these methodologies directly onto the privacy risk assessment requirements of ISO 27701 Clause 6.1.2. The practical substitution is straightforward: replace "cybersecurity threat" with "personal data breach threat" and the risk assessment logic is identical. Winners Consulting Services Co. Ltd. applies this cross-industry framework in our initial PIMS diagnostic engagements across manufacturing, e-commerce, healthcare, and technology sectors.
What is the most common GDPR compliance gap Taiwan enterprises overlook in their risk assessments?
The most frequently observed gap is treating DPIA as a one-time documentation exercise rather than a living risk management process. GDPR Article 35 does not specify a review frequency, but the European Data Protection Board's guidance is clear that DPIAs must be reviewed and updated whenever the nature, scope, context, or purpose of processing changes significantly. The paper's emphasis on continuous monitoring directly addresses this gap: organizations need systematic mechanisms to detect changes in their processing environments that trigger DPIA review obligations. Winners Consulting Services Co. Ltd. recommends establishing at minimum an annual DPIA review cycle, with trigger-based interim reviews for material business changes such as new system implementations, AI tool deployments, or cross-border data transfers.
How does ISO 27701 certification relate to cybersecurity risk assessment?
ISO 27701 is the international standard for Privacy Information Management Systems (PIMS), structured as an extension to ISO 27001. Its Clause 6.1.2 explicitly requires organizations to conduct systematic risk assessments covering personal information processing activities — a requirement structurally identical to the cybersecurity risk assessment framework described in this paper. Organizations that already hold ISO 27001 certification have a significant head start: the incremental work to achieve ISO 27701 certification involves extending existing risk assessment processes to cover privacy-specific risks and implementing the additional controls specified in ISO 27701 Annexes A and B. Winners Consulting Services Co. Ltd. estimates that ISO 27001-certified organizations can typically achieve ISO 27701 certification readiness within 90 to 120 days with focused gap remediation support.
How long does it take for a Taiwan enterprise to implement a complete PIMS, and what are the key steps?
Implementation timelines vary based on organizational size, existing process maturity, and the complexity of

Was this article helpful?

Share

Related Services & Further Reading

Want to apply these insights to your enterprise?

Get a Free Assessment