10.45-11.15Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

Ziv Cohen – Director, EMEA
George Tubin Senior Analyst Consumer Banking © 2005 The Tower Group, Inc. May not be reproduced by any means without express permission. All rights reserved.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Microsoft Ignite /16/2017 4:54 PM
IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.
Payment Fraud Trends : What Can you do? Protect Yourself and Your Business from Financial Fraud.
MobileFirst Protect 1. MobileFirst Protect (MaaS360) 2 Mobile Device Management Enable and Manage Apple iOS smartphones, and tablets with Apple DEP Gain.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Top 5 Small Business Tips on Creating a Mobile App.
Norman SecureSurf Protect your users when surfing the Internet.
1© Copyright 2014 EMC Corporation. All rights reserved. Kenny Pool Advisory Systems Engineer Third Platform Apps & EMC: Redefining IT & Helping Our Customers.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
© 2008 Authorize.Net 1 Welcome to Authorize.Net New Reseller Overview 2008.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
1 CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © CUNA Mutual Group 2010 Alaska Credit Union League Annual Meeting.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
Dell Connected Security Solutions Simplify & unify.
CUNA Mutual Group Proprietary Reproduction, Adaptation or Distribution Prohibited © CUNA Mutual Group Top Fraud Trends in 2011 Is Your Credit Union Prepared.
Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.
Data Breaches in Payments Systems- Roles and Best Practices for the Public and Private Sector Response Don Rhodes Director Risk Management Policy American.
Cyber Security & Fraud – The impact on small businesses.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Identity Assurance Emory University Security Conference March 26, 2008.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
FFIEC Cyber Security Assessment Tool
Security A Payments Perspective Terry Dooley EVP & CIO SHAZAM Network.
Secure Authentication Solution. Keypasco – the company Keypasco was founded in 2010 by specialists with over 20 years of experience within online security.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Raj Bank Universal Core Banking System FCBS FINCBS INC Banking Systems & Consulting
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
2014 From Phish to Phraud Kat Seymour October 10, 2014 #GHC
NEXT GENERATION Banking Software Solutions. Next Generation Banking Platform Next generation banking platform is the result of : Collective knowledge.
Security issues DT Fraud Conference 24 th March 2016 Andrew Churchill Technology Strategy.
Deployment Planning Services
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Matrix Video Surveillance Solution for Banking
Do you know who your employees are sharing their credentials with
Journey to Microsoft Secure Cloud
Cyber Security Awareness Workshop
BioCatch Fights Financial Fraud and Detects Online Threats via Behavioral Biometrics, All Powered by the Microsoft Azure Platform MICROSOFT AZURE TECH.
Financial Institutions Identity Based Security
What every consumer should know
Company Overview & Strategy
Office 365 Identity Management
Strong Security for Your Weak Link:
Use of Biometric Technology in Payments to avoid Frauds
Validating Your Information Security Program (ISP 3 of 3)
Securing the Threats of Tomorrow, Today.
Giovanni Carnovale – Regional Sales Manager Central & Eastern Europe
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
The MobileIron® Threat Detection difference:
Information Security – Sep 18
Microsoft Data Insights Summit
Financial Markets Business challenge
NCUCA Fraud and Risk Education April 17, 2019
Cybersecurity Simplified: Phishing
jPS Ensenta Smart Alerts for Real-Time Fraud Monitoring (SAFraud)
Presentation transcript:

Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security

© 2014 IBM Corporation IBM Security 2 IBM Trusteer Pinpoint Services Making advanced research work for you Online/Mobile Banking Trusteer Cloud Snippets forwards data to IBM cloud 3 IBM Cloud returns actionable information via: -API - -Other 5 User connects to Online Banking Application 1 Application returns page, with IBM snippets 2 INTERNET IBM Fraud Experts Analyze Access 4

© 2014 IBM Corporation IBM Security 3 IBM Counter Fraud Management DetectRespondInvestigateDiscover Adapt with Agility - Integrated platform capabilities in one product line - Different fraud typologies need different analytical techniques - Ingest more data to find threats (cyber, aml, fraud, identiity) - Best-in-class capabilities blended together for strong defense - Supported with Integrated Implementation Services IBM Counter Fraud Management An unparalleled arsenal of capabilities to combat today’s fraud and compliance threats … and anticipate tomorrow’s schemes

© 2014 IBM Corporation IBM Security 4 WWW Phishing and Malware Fraud Advanced Threats (Employees) Online Banking Enterprise Apps Account Takeover, New Account Fraud Mobile Fraud Risk Trusteer Apex Trusteer Rapport Trusteer Pinpoint Malware Detection Trusteer Pinpoint Malware Detection Counter Fraud Management Transactional Fraud Fraud Risk Indicators Compromised Device (Malware) Compromised Account/Credentials (Phishing) Criminal Account Takeover Device Risk (Fingerprint/Location/Reputation) Compromise History (Malware + Phishing) Confirmed Fraud Trusteer Pinpoint Criminal Detection Trusteer Mobile SDK/APP Trusteer Mobile Risk Engine IBM Trusteer and CFM: Combine Cyber Fraud Risk with Cross- Channel Customer and Payments Txn Risk

© 2014 IBM Corporation IBM Security 5 IBM Trusteer and CFM: Combine Cyber Fraud Risk with Cross- Channel Customer and Payments Txn Risk Online Banking Counter Fraud Management Trx Review Counter Fraud Management Trx Review Together: High risk! OR Cyber Risk Moderate risk Device Risk New Device ID Remote Access Tool Proxy Device New Location/Time Mobile Risk factors Cyber Fraud Indicators Phished Credentials Malware Infection 12 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile changes New Payees New Beneficiaries New Account 34 Cross Channel, Trx Anomalies Moderate risk Card Online IVR etc

© 2014 IBM Corporation IBM Security 6 Use Case: Fraud via Mobile Banking App (with SDK) New device and/or unusual device location + new acct + mobile deposit Online Banking Counter Fraud Management Trx Review Counter Fraud Management Trx Review Together: High risk! OR Cyber Risk Moderate risk Device Risk New Device ID Remote Access Tool Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 12 Cross Channel Txn Anomalies ATM Wire Check Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 34 Cross Channel, Trx Anomalies Low risk Card Online IVR etc

© 2014 IBM Corporation IBM Security 7 Use Case: Malware Indicator Used to Limit Activity Credential Theft (malware), New Payees Online Banking Counter Fraud Management Txn Review Counter Fraud Management Txn Review Together: Monitor txns (esp higher risk customers) OR Cyber Risk High risk Device Risk New Device ID Remote Access Tool Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 12 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 34 Cross Channel, Trx Anomalies Low risk Card Online IVR etc

© 2014 IBM Corporation IBM Security 8 Use Case : Account Takeover (Phishing) Credential Theft via phishing, possible ATO, password change Online Banking Counter Fraud Management Txn Review Counter Fraud Management Txn Review Together: Monitor high risk activities OR Cyber Risk High risk Device Risk New Device ID Remote Access Tool Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 12 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 34 Cross Channel, Trx Anomalies Low risk Card Online IVR etc

© 2014 IBM Corporation IBM Security 9 Use Case: New Account Fraud Credentials purchased in underground (no malware/phishing), new account setup Online Banking Counter Fraud Management Txn Review Counter Fraud Management Txn Review Together: Moderate Risk. Double check. OR Cyber Risk High risk Device Risk New Device ID Known Fraud Device Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 12 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 34 Cross Channel, Trx Anomalies Low risk Card Online IVR etc