Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Security in Banking Emmanuel van de Geer Senior Architect Governance, Risk,

Slides:



Advertisements
Similar presentations
TWO STEP EQUATIONS 1. SOLVE FOR X 2. DO THE ADDITION STEP FIRST
Advertisements

Advanced Piloting Cruise Plot.
1
Feichter_DPG-SYKL03_Bild-01. Feichter_DPG-SYKL03_Bild-02.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
My Alphabet Book abcdefghijklm nopqrstuvwxyz.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
2010 fotografiert von Jürgen Roßberg © Fr 1 Sa 2 So 3 Mo 4 Di 5 Mi 6 Do 7 Fr 8 Sa 9 So 10 Mo 11 Di 12 Mi 13 Do 14 Fr 15 Sa 16 So 17 Mo 18 Di 19.
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
PP Test Review Sections 6-1 to 6-6
ABC Technology Project
EU market situation for eggs and poultry Management Committee 20 October 2011.
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
2 |SharePoint Saturday New York City
Green Eggs and Ham.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
VOORBLAD.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
BIOLOGY AUGUST 2013 OPENING ASSIGNMENTS. AUGUST 7, 2013  Question goes here!
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 6 Ethernet Fundamentals.
Adding Up In Chunks.
Universität Kaiserslautern Institut für Technologie und Arbeit / Institute of Technology and Work 1 Q16) Willingness to participate in a follow-up case.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
Addition 1’s to 20.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
1 Using one or more of your senses to gather information.
Subtraction: Adding UP
What is the value of this coin? How much change is here? 6.
Januar MDMDFSSMDMDFSSS
Week 1.
Analyzing Genes and Genomes
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
1 Chapter 13 Nuclear Magnetic Resonance Spectroscopy.
Energy Generation in Mitochondria and Chlorplasts
CpSc 3220 Designing a Database

Presentation transcript:

Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Security in Banking Emmanuel van de Geer Senior Architect Governance, Risk, Compliance and Security Standard Chartered Bank

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 2 © 2010 Cisco and/or its affiliates. All rights reserved. What are we covering

Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved. Criminals want to steal from Banks Banks succeed because customers trust them with their money Suttons Law “That’s where the money is”

Cisco Confidential 4 © 2010 Cisco and/or its affiliates. All rights reserved. Customers need to know that Banks are safe and secure This isn’t just to do with Information Security. It’s about how a Bank is run. Here For Good Standard Chartered Bank

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. This is one reason why Information Security in Banks is different from other industries Information Security isn’t a technology problem, it is a business asset.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. Another reason why information security is different in Banking: Follow the Money

Cisco Confidential 7 © 2010 Cisco and/or its affiliates. All rights reserved. How Banks Work & Why Risk Is Important

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 8 © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential 9 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 9 © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential 11

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Cisco Confidential 12 Cisco Confidential 12 © 2010 Cisco and/or its affiliates. All rights reserved. Risk management and information security are factors that determine how competitive and successful a Bank is.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Cisco Confidential 13 Cisco Confidential 13 © 2010 Cisco and/or its affiliates. All rights reserved. In the Banking industry, security isn’t just about the technology, rather, it is integrated with Risk Management, Compliance and Fraud. This combined space is called GRC

Cisco Confidential 14 © 2010 Cisco and/or its affiliates. All rights reserved. In 2000, online fraud was unheard of. Now it costs banks 60M in the USA alone.

Cisco Confidential 15 © 2010 Cisco and/or its affiliates. All rights reserved. & what a career in security can mean for you.

Cisco Confidential 16 © 2010 Cisco and/or its affiliates. All rights reserved. Today, I design systems that prevent and detect everything from hackers to money laundering.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Cisco Confidential 18 Cisco Confidential 18 © 2010 Cisco and/or its affiliates. All rights reserved. As the threats of theft and fraud have increased, so has the role of Information Security professionals.

Cisco Confidential 19 © 2010 Cisco and/or its affiliates. All rights reserved. Online Fraud The Insider Threat Cards and Transactions Denial of ServiceData Leakage Trading Fraud Payments Processing Information Theft

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Motivation: who is it and why do they do it? Geopolitical - Government affiliated - NGO - Militant Hacktivism – Crowd Sourced - Anonymous - LulzSec - Occupy Extortion/financial gain - Criminals Targets: what do they target Asia (MY, KR, TW, CH) US Gov Israel, Palestine Banks in Brazil CIA Bank of America

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21

Cisco Confidential 22 © 2010 Cisco and/or its affiliates. All rights reserved. Zeus and SpyEye

Cisco Confidential 23 © 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential 24 © 2010 Cisco and/or its affiliates. All rights reserved. But how bad is it?

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 Cisco Confidential 34 Cisco Confidential 34 © 2010 Cisco and/or its affiliates. All rights reserved. Recap Information in Banking: -People Steal Money, Money lives in Banks. -People Trust Banks & Reputation is key. -Fraud and Risk impact Bank profitability. Information Security is a business problem for Banks.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 Cisco Confidential 35 Cisco Confidential 35 © 2010 Cisco and/or its affiliates. All rights reserved. Recap Online Fraud - Steadily increasing - Some way to go compared to other fraud activity Prediction: -Mobile Security will get worse -The end of SMS OTP