Criminals move fast and do not respect company boundaries. One cyberattack can quickly lead to fraud, money laundering and sanctions breaches before most boards even realize what’s happening. Regulators are responding with stricter rules and tighter deadlines. For financial institutions, the line between cybercrime and financial crime no longer exists. This is the new frontline. Are you ready?
Why Convergence Demands Boardroom Attention
At a recent executive breakfast hosted by Kroll in London, senior leaders from across the financial sector discussed how the convergence of cyber and financial crime is reshaping boardroom priorities. The session, held in September 2025, brought together perspectives from risk advisory, cyber resilience and financial crime compliance to explore how these risks are converging. The discussion highlighted that the convergence of cybercrime and financial crime is no longer an emerging issue. It is an operational reality that boards and senior management must now confront.
Cybersecurity and financial crime used to be managed as if they were different worlds. IT departments focused on patching systems and blocking intrusions, while compliance teams concentrated on monitoring transactions and meeting regulatory requirements.
Criminals, however, have never respected that divide. Increasingly, they exploit it. A single phishing email that compromises an executive account can evolve into a fraudulent payment, laundered through mule accounts, obscured by crypto mixers, and eventually flagged as a sanctions breach. This pattern is now playing out on a global scale. INTERPOL’s 2024, Operation HAECHI V, exposed how cyberattacks and financial crime operate as one system, with the online scams generating the funds and the traditional laundering networks moving the money, leading to over 5,500 arrests and USD 400 million seized.
The Regulatory Response
Regulators are closing the gaps. In Europe, the Digital Operational Resilience Act (DORA) mandates integrated ICT risk management and rapid incident reporting. In the US, the SEC’s cybersecurity disclosure rule requires public companies to disclose material cyber incidents within four business days. In the UK, the Payment Systems Regulator’s APP fraud reimbursement regime and the new Failure to Prevent Fraud offence impose strong accountability on firms, effectively shifting liability to those that lack reasonable procedures to detect and prevent fraud.
The Convergence Playbook
The convergence of cyber and financial crime changes the risk playbook. Boards and executives need to move beyond siloed approaches. Based on our discussion, here are concrete steps that firms can take:
Your First 90 Days: Immediate Actions
- Create a Fusion Cell
Bring cyber, AML, fraud, sanctions and legal teams into one weekly forum with shared dashboards and a unified case queue. A fusion cell gives leaders one view of emerging threats and speeds up and coordinates response when incidents span cyber, fraud and financial crime. - Map Controls to Regulation
Align incident reporting with DORA’s deadlines, prepare SEC disclosure templates and design APP reimbursement workflows that deliver within five working days. Integrating reporting workflows avoids missed deadlines and demonstrates proactive regulatory alignment. - Leverage New Payment Controls
In the UK, use new D+4 powers to delay suspicious outbound payments for up to four business days when there is reasonable suspicion of fraud. Using D+4 delay powers can stop funds before they vanish, turning a major fraud loss into a contained event. - Integrate Crypto Monitoring
Screen wallet addresses against OFAC and EU sanctions lists, apply risk-based scoring and implement EBA Travel Rule processes before the December 2024 deadline. Crypto now underpins many fraud and sanctions cases; screening wallets closes a critical blind spot. - Update Suspicious Activity Report (SAR) Playbooks
Explicitly include cyber incidents including ransomware, BEC, sanctioned wallets and account takeovers etc., as triggers for suspicious activity reporting and rehearse evidence-collection processes with law enforcement in mind. Updating SAR playbooks to include cyber triggers ensures faster escalation and meets joint expectations from regulators and audit traceability.
6–12 Month Roadmap: Building Sustainable Resilience
Once the immediate controls are in place, firms should shift focus to embedding resilience and proving readiness across governance, vendor and law-enforcement interfaces.
- Consolidate Case Management
Break down silos by unifying cyber, fraud, AML and sanctions case management. A unified case platform creates consistent risk intelligence across cyber, fraud and AML, improving board oversight and audit traceability. - Build and Maintain an ICT Third-Party Risk Register
Update contracts and governance in line with DORA and comparable resilience frameworks. - Establish Protocols with Law Enforcement
Accelerate freezes and recoveries of illicit funds, learning from recent cases such as Colonial Pipeline’s Bitcoin recovery and the LockBit takedown. Formal protocols with law enforcement speed asset recovery, strengthen cooperation and demonstrates readiness under failure-to-prevent regimes.
Case Studies of Convergence in Action
Several recent cases demonstrate the fast pace at which cyber and financial crime now converge. These case studies show how a single cyber incident can quickly turn into financial fraud, money laundering and the requirement to take fast regulatory action for financial institutions:

