The 2026 Data Threat Report Financial Services Edition examines key challenges faced by FinServ organizations, including the fast proliferation of AI-driven cyberattacks targeting personnel, cloud storage, applications, and identity infrastructure. AI adoption by FinServ organizations has also introduced significant insider risks stemming from rapid operational and ecosystem changes. As always, the Data Threat Report encourages and equips security leaders to build stronger alliances spanning their own organizations and partner ecosystems to achieve broader enterprise goals.
This research was based on a segment of 237 security and IT executives working for banks, insurance companies, investment houses, lenders, payment providers and finance companies in 20 countries.
Conducted by

“Insider risk is no longer just about people. It is also about automated systems that have been trusted too quickly. When identity governance, access policies, or encryption are weak, AI can amplify those weaknesses across environments far faster than any human ever could.”
70% of FinServ organizations expressed concerns about rapid change in AI ecosystems, their top AI security risk.
64% suffered prompt injection attacks on their AI applications and 62% had sensitive data disclosure.
60% have experienced deepfake attacks and 50% suffered reputational damage as AI-fueled attacks emerge as a prominent threat.
Only 32% of FinServ organizations said they have complete knowledge of where their data is stored.
Only about half of sensitive data in the cloud is encrypted. 47%
57% are pursuing reworking and refactoring of application and data architectures as their main focus in achieving sovereignty objectives.
38% believe cryptographic protections such as encryption and key management are sufficient to achieve data sovereignty.
79% of FinServ organizations have five or more data protection tools.
48% have five or more key management systems.
61% say future encryption compromise is the top quantum computing concern for FinServ organizations.
61% are prototyping are prototyping and evaluating post-quantum cryptographic (PQC) algorithms.
38% cloud storage, 32% cloud applications and 29% cloud management infrastructure are the top targets for attackers.
Credential theft is the leading attack technique against cloud infrastructure – 70% are seeing credential theft and misappropriated secrets increasing.