Threat landscape financial sector

Slides:



Advertisements
Similar presentations
The Threat Landscape Jan Threat Report 2.
Advertisements

English Arabic Cyber Security: Implications of recent breaches MENOG April 2015.
Security for Today’s Threat Landscape Kat Pelak 1.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
THE INFORMATION SECURITY PROBLEM
Using “Account-free” Services to Combat Phishing, Brand Infringement, and Other Online Threats Qi-fense LLC © 2009 Sebastian Holst
Police Service of Northern Ireland Detective Chief Inspector Douglas Grant MSc PSNI Cyber Crime Centre.
Protecting Against Online Fraud F5 SIT Forum
GOVERNMENT OF UGANDA PLANS FOR INFORMATION SECURITY ASSURANCE PETER KAHIIGI, CISSP®. DIRECTOR INFORMATION SECURITY 30th JANUARY 2013 Directorate of Information.
Norman SecureSurf Protect your users when surfing the Internet.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Confidential On-line Banking Risks & Countermeasures By Vishal Salvi – CISO HDFC Bank IBA Banking Security Summit 2009.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Cyber Security Nevada Businesses Overview June, 2014.
Corporate Information Reconnaissance Cell (CIRC).
Ali Alhamdan, PhD National Information Center Ministry of Interior
Identity Assurance Emory University Security Conference March 26, 2008.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
Hurdles in implementation of cyber security in India.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
FFIEC Cyber Security Assessment Tool
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Proprietary and Confidential Don’t be the Next Cyber Crime Statistic C. Kevin deBrucky, Vice President PINACLE ® Security Manager.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
EIC – Jornada ciberatacs cyber risk outlook June 2016.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Cyber Threat Intelligence Program Primer NASCUS August 1, 2016 Chicago, IL Christina Saari, Senior Cyber Intelligence Officer National Credit Union Administration.
IDENTITY PROTECTION INFORMATION SECURITY LEADING DATA SOLUTIONS Innovative technology, collaborative relationships and real-time actionable alerts offer.
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Broadband Challenges 2017 Christopher Tamarin
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Gift Card Risk Mitigation – Presentation A
Malware – A BILLION DOLLAR BUSINESS
Cybercrime: Mitigation Challenges
Cyber Security: State of the Nation
Authentication 2.0: User Generated Security
Hot Topics:Mobility in the Cloud
Gelişmiş Tehdit Korumasının İnkar Edilemez 4 Gerçeği
The Cyber Threats Landscape
Dissecting the Cyber Security Threat Landscape
CSI Survey 2007 Tiffany Gorman
بهترین راهکار را انتخاب کنید...
Security Threats Haunting the E-Commerce Industry. How Can Security Testing Help?
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Andy Hall – Cyber & Tech INSURANCE Specialist
Reducing Cyber Security Risks in the UK Public Sector
AFRICAN UNION- 23RD-27TH July 2018 PRESENTER: Mr. Nawa J.T Samatebele
Auburn Information Technology
Curating an Effective Security Culture
Crime DOES Pay (Unless you get caught)
Securing the Threats of Tomorrow, Today.
Threat landscape financial sector
Cyber Security Culture
Cybercrime and Canadian Businesses
Anatomy of a Large Scale Attack
Business Compromise and Cyber Threat
Information Security – Sep 18
GLOBAL DIGITAL FORENSICS MARKET 2017 – 2025 Published by :Accurize Market Research Pvt. Ltd. Copyright © 2019 Accurize Market Research
Thames Valley Chamber / Claire Logic
Presentation transcript:

Threat landscape financial sector REST ASSURED Threat landscape financial sector Lebanon, November 2017 www.csis.dk

Threat landscape financial sector Agenda 1.00 Trends 2.00 Security solution for the financial sector 3.00 Prediction for Lebanon

Threat landscape financial sector 1.00 Trends

Sophisticated malware attack Distributing malware such as Trickbot

Sophisticated malware attack Targeting specific brands and circumvent two-factor authentication 08080808 1234 ******* 08080808 ******* 14-11-2018

CEO and supplier/vendor fraud Either compromising mail systems or using typo squatting domains

Smaller, more targeted phishing campaigns Try to phish both credit cards and/or login credentials

Mobile malware primarily targeting Android Most mobile malware is only advanced phishing attacks (overlay attacks)

Threat actors becoming more patient, more professional Carbanak case

Threat landscape financial sector 2.00 Security solution for the financial sector

CSIS eCrime solution Dedicated solution developed with the financial sector adopted in to one web portal Sharing platform Incident system Knowledge base 24/7 support platform Crimeware database Forensics system Malware statistics Early warning alerts

CSIS eCrime solution Dedicated solution developed with the financial sector adopted in to one web portal Sharing platform Incident system Knowledge base 24/7 support platform Crimeware database Forensics system Malware statistics Early warning alerts

Threat landscape financial sector 3.00 Prediction for Lebanon

Targeted attacks against employees inside the bank (SWIFT) Prediction for Lebanon Top 5 cyber security threats for the financial sector in Lebanon Targeted attacks against employees inside the bank (SWIFT) Malware attacks once functionality increases in online banking CEO and supplier/vendor fraud attack increasing Targeted phishing attacks against credit cards and logins Ransomware and extortion against banks

Thank you! Jan Kaastrup <jka@csis.dk> CSIS at glance: REST ASSURED CSIS at glance: Danish private security company founded in 2003 Advisory Board member of EC3 since 2013 100+ Employees from 25 different nationalities Data centers located across the globe 150+ financial institutions Advisors to law enforcement agencies Copenhagen Cybercrime Conference hosts Credited by Gartner Group Actionable and renowned threat intelligence Known for outstanding reversing, incident response and forensics capabilities 24/7 center with access to specialists www.csis.dk