Exposing System Vulnerabilities Within Financial Services

Slides:



Advertisements
Similar presentations
The Integritas System to enforce Integrity in Academic Environments Prof Basie von Solms Mr Jaco du Toit Prof Basie Von Solms Academy for IT University.
Advertisements

Prescription for Criminal Justice Forensics. The government has all but declared a national state of emergency regarding computer-related crimes and has.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Ch.5 It Security, Crime, Compliance, and Continuity
AVG- Protecting those who are vulnerable.  Free Anti-Virus Software ◦ J.R. Smith President of AVG oversees a lineup of antivirus products used by 110.
Ethical Hacking by Shivam.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
LittleOrange Internet Security an Endpoint Security Appliance.
Unifying the Global Response to Cybercrime Measurement of cybercrime Standardisation across Member States CAMINO’s 3rd Experts Workshop 15th-16th June.
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
New Trading Opportunities Fidessa Partnership with ARQA Technologies 19 th February 2009.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
THE THREAT LANDSCAPE FROM CYBERCRIME TO CYBER-WAR David Emm Global Research and Analysis Team.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Computer Skills and Applications Computer Security.
AVAR 2004, Japan, Tokyo Today’s Threats and the Evolution of the Computer Underground Today’s Threats and the Evolution of the Computer Underground Eugene.
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
A threat to global security and economy Koushik Mannepalli CMPE 294.
INTRODUCTION & QUESTIONS.
Safe’n’Sec IT security solutions for enterprises of any size.
Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Information Management System Ali Saeed Khan 29 th April, 2016.
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
Virtualisation in Education: Information Security Lab in Your Pocket Alexandre Karlov, JINR
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Business Process Compromise in Financial Institutes Kavya Kushnoor
Chapter Outline Finance Corporate Finance and the Financial Manager
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
International Conflict & Cyber Security
Cyber Security Zafar Sadik
Executive Director and Endowed Chair
Source: Ecommerce (Chapter 5) Pearson Education
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
And Digital Bait How content theft sites and malware are exploited by cybercriminals to hack into internet users’ computers and personal data.
Malware – A BILLION DOLLAR BUSINESS
The Third Wave of Hacking Cyber-Crime as a Service
RCCU Zephyr South West Regional Cyber Crime Unit.
Equipo 1 Tema: Crímenes cibernéticos en 2016 Ana Yansi Mejía Mendoza (Informática) Lucia Arellano García (Derecho) Margarita Núñez Rosales (Lengua extranjera)
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Online Banking Security
Join In Be Secure Presentation
Internet Security Threat Status
E-Commerce Security and Fraud Issues and Protections
Securing the Threats of Tomorrow, Today.
Chapter 9 E-Commerce Security and Fraud Protection
Defining a global city The Global Power City Index (GPCI) evaluates and ranks the major cities of the world according to their magnetism Their capacity.
Cybercrime ACC/210.
Cyber Security Challenges
Business Compromise and Cyber Threat
Information Security – Sep 18
Internet Safety By: Ayana Shiggs.
Internet Safety By: Ayana Shiggs.
Threat Landscape Update
SECURITY IN THE DIGITAL AGE
Presentation transcript:

Exposing System Vulnerabilities Within Financial Services Zlatko Hristov, APAC IT Security MF Global is a leading cash and derivatives broker-dealer.

web surfers globally fallen victim to cybercrime. 65% web surfers globally fallen victim to cybercrime.

“The hackers planted malware files inside Nasdaq's Directors Desk web …” (theatlanticwire.com/business, Feb 07,2011)

Status quo is unsustainable Zeus Trojan steals $1 million from U.K. bank accounts Malware ads hit London Stock Exchange Fannie Mae Former Employee Convicted for Using Malware

Designed to make profit Targets enterprises Creative The malware economy Designed to make profit Targets enterprises Creative Constantly changing Evasive http://www.installsforyou.biz

Typical botnet

From digital to physical world

From airport lounge to your data centre

Intrusion Detection Systems Endpoint security discipline Security essentials Intrusion Detection Systems Endpoint security discipline Cyber threat research User awareness

System exploitation demo Case 1: exploit system vulnerability Case 2: the malware approach

End of presentation