Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementBanking/Finance/Insurance

5 Minutes With

Financial Services, Cybersecurity and the Evolving Threat Landscape

By Jordyn Alger, Managing Editor
5 Minutes with Farol
Bio image courtesy of Farol
May 20, 2026

Security magazine talks with Leilani Farol, SVP and CISO at First Horizon Bank about how financial institutions can manage the threats associated with an evolving cyber landscape. 

Security magazine: Tell us about your career and background. 

Farol: My career has spanned cybersecurity, risk management and technology leadership, primarily working within financial services companies and other regulated organizations both within the United States and internationally. In my role as SVP and Chief Information Security Officer at First Horizon, I am focused on developing and overseeing the bank’s information, cyber and technology security. 

Over the course of my 25+ year career, I’ve seen cybersecurity evolve from a more technical function to a core business priority. CEOs, boards and shareholders understand that security can’t be an afterthought. The most cyber-resilient organizations today aren’t operating in silos. They’re strengthening resilience as part of their daily business operations, and that’s exactly what my team and I are focused on at First Horizon.  

Security: What are your thoughts on the evolving threat landscape? How can financial institutions strategically manage these risks? 

Farol: The threat landscape is accelerating faster than ever before, fueled by AI-powered threats and growing regulatory pressures. While AI is creating powerful opportunities to strengthen cyber defenses, threat actors are also leveraging AI to enhance and scale their attacks.

The financial services industry is seeing more frequent and sophisticated phishing and business email compromise attempts. Identity theft, ransomware, Distributed Denial-of-Service (DDoS) attacks and third-party risk are also top of mind. The good news is that, as a long-standing leader in cyber collaboration, governance and risk management, the financial sector is well positioned to stay ahead of this evolving threat landscape.

As a financial institution and partner, we don’t just manage capital, we manage trust. Clients trust us to protect their data and safeguard their accounts. Maintaining that trust requires not only strong technology, but also transparency, collaboration and the right culture.

At my organization, we are focused on delivering the highest level of security possible by building a first-class cyber team, maintaining open lines of communication between cybersecurity leadership and the board and prioritizing the education of associates and clients on cyber hygiene best practices.

Security: What do security leaders need to understand about the intersection between cyber, risk, governance and compliance? 

Farol: CISOs cannot operate in a silo. Over the course of my career, I’ve seen the industry evolve from Information Security to Cyber Security — a connected and critical business risk function that’s on the minds of CEOs, boards and shareholders. By bringing together cyber, risk governance and compliance, organizations can create a stronger, more coordinated function. It’s not just about setting and enforcing rules; it’s about aligning these risk intelligence functions with business strategy. 

The most effective CISOs view themselves as risk advisors, responsible for translating cyber risks into business impact to build sustainable, long-term resilience against an ever-changing threat landscape.  

Security: When implementing new technologies, how can security leaders ensure their organization maintains a security-first mindset? 

Farol: Never trust, always verify. Commit to a zero-trust strategy across the vendor lifecycle and treat everything as a possible threat until proven otherwise. Operating within a zero-trust architecture requires continuous monitoring and verification of everything across your network. By assuming bad actors could already be present, companies can identify issues more quickly and minimize damage. 

More broadly, security leaders need to build a culture of cybersecurity where it’s viewed as a shared responsibility across the organization. This starts with educating and empowering all associates and clients. Prioritize training on how to spot suspicious activity and encourage them to report it. Due to the speed that AI advancements are developing, the number one priority remains data protection to ensure the right protocols are in place to reduce the threat landscape.

Security: Is there anything else you’d like to add? 

Farol: Cyber resilience is a team sport. Today’s threat landscape is dynamic, and organizations are at a disadvantage if they think about cybersecurity in isolation. It requires not only collaboration across the organization, but across the financial services industry. Staying ahead of bad actors is only possible with a collective defense. In the current environment threats aren’t an “if,” they’re a “when;” the key to remaining resilient is how quickly a company recovers.

KEYWORDS: 5 minutes with bank cybersecurity compliance finance cybersecurity governance risk technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

Security guard

Connected Security: How Proactive Real-Time Tech Keeps Security Workers Safe

SEC 2026 Benchmark Banner

Events

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Cyber Threat Landscape

    The evolving cyber threat landscape

    See More
  • securing the financial sector

    Ground truth in the financial threat landscape

    See More
  • hacking automobiles

    Evolving Cybersecurity Threat Landscape Shifts Hiring Patterns Toward Specialization

    See More

Related Products

See More Products
  • threat and detection.jpg

    Surveillance and Threat Detection

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing