Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.

Slides:



Advertisements
Similar presentations
Steps towards E-Government in Syria
Advertisements

Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
Mobile Technology & Cyber Threats Promoting E-Commerce in Ghana Ruby Saakor Tetteh Ministry of Trade & Industry, Ghana Sixth Annual African Dialogue Consumer.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
1 Supplement to the Guideline on Prevention of Money Laundering Hong Kong Monetary Authority 8 June 2004.
Career at Citi September 17, 2008 Ruslan Belyaev Director St. Petersburg Branch Manager Olga Karpunina HR Head Consumer Bank St. Petersburg Branch.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
(Geneva, Switzerland, September 2014)
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Information Security Zero to 60 in 10 Years Howard Muffler, Information Security Officer Joseph Progar, Information Security Analyst Embry-Riddle Aeronautical.
First Science Park in the Baltics – operating since Founders: University of Tartu, Institute of Physics, Estonian University of Life Sciences, Tartu.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Creating Trust in Critical Network Infrastructures Canadian Case Study Michael Harrop.
IT security seminar Copenhagen, April 4th 2002 M. Jean-Michel HUBERT Chairman of the French Regulation Authority IRG Chairman.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Combating cyber-crime: the context Justice Canada March 2005.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
ICT business statistics and ICT sector: Uzbekistan’s experience Prepared by Mukhsina Khusanova.
IT Market Research Report on Latvia Tatiana Rikure Inga Bakane.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
PAPER AC 1 : E-BUSINESS AND CYBER LAWS. MEANING OF E-BUSINESS  E-business, is the application of information and communication technologies (ICT) which.
Chapter 8 Technology and Auditing Systems: Hardware and Software Defenses.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Information Warfare Playgrounds to Battlegrounds.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
All-Russian Non-governmental Organization of Small and Medium-Sized Business OPORA RUSSIA Sergey R. Borisov President of OPORA RUSSIA Zurich, 19 March.
Cyber Security Nevada Businesses Overview June, 2014.
NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and Resiliency Policy Framework” Scenario for Discussion.
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
Competitive Intelligence for Small Business 2013 / 2014 Dr. Ahmed Nassar.
Recent Cyber Attacks and Countermeasures September 2006.
Advanced attack techniques Advanced attack techniques Increased by passing techniques against the existing detection methods such as IDS and anti- virus.
NIB – Promoting sustainable growth Saint-Petersburg September 29, 2010 Mr. Igor Kovtun, General Representative in Russia.
Information Warfare Playgrounds to Battlegrounds.
Civil society in Russia in 2015: trends, challenges, openings EESC-EU-Russia Civil Society Forum Joint Event Brussels 30 June 2015.
BYTEmag.ru Independent source of technical information for IT professionals!
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
C OMPETITION IN D IGITAL F INANCIAL S ERVICES IN B ANGLADESH Mohammad Naushad Ali Chowdhury Executive Director Bangladesh Bank.
Banking and E-Commerce Group ‘A’ April 23 rd 2003.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
FARGIS Konferansen ITS and Multimodal Services - Ivar Christiansen - ITS Norway 1 ITS and Multimodal Information Services Ivar Christiansen ITS.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Global Digital Security Market WEBSITE Single User License: US$ 2500 No of Pages: 60 Corporate User License: US$ 4000.
COORDINATED STRATEGY TO IMPROVE FIGHT against VAT FRAUD in LITHUANIA September 2013, Riga.
The Future. What will Change Fraud will not go away It will become more sophisticated and clever We have to step up to beat it June 16Caribbean Electronic.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Copyright © Texas Education Agency, All rights reserved. Business and Society Marketing Dynamics Copyright © Texas Education Agency, All rights.
Estonian ICT October, 2009.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
ACAMS CAMS Exam Association of Certified Anti-Money Laundering Specialist Exam
Mr. Roeshink – Financial Operations
Securing Information Systems
Payment & Settlement System Developments
Challenges and Successes in the Zambian ICT Security Sector
PAYMENT SYSTEM IN NEPAL
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu

Topics Hansabank in general Baltic e-crime notes Electronic payments importance Message to my managers Local cooperation

EstoniaLatviaLithuaniaBaltic Population, mil Active customers, mil Internet customers, mil Cards, mil Branches ATMs ,206 Employees 3,2272,5013,384 9,112 data as of September 2007 St. Petersburg Estonia Latvia Lithuania Our target market is the Baltics and Russia. As a universal bank our business model is based on a large customer base. Acquisition and retention of new customers is a key goal for us. Our main focus is on medium-sized companies and private individuals with above average purchasing power, however, we serve all customer groups. With close to 2 million active customers, 300 branches and 9,112 employees, Hansabank is a leading financial institution in all three Baltic countries. Russia Customers4,200 Corporate700 Retail3,500 Branches3 Employees Moscow St. Petersburg Kaliningrad

Baltic e-crime Criminal communication language is Russian E-channels make up to 98% of transactions Before phishing went to Australia, it was called “Ligupidamisega” In DDoS organizers were here (although industry started from Israel) Before dropper attacks were published in England, we saw it in Baltic's Biggest Internet card payment gateway hacker was living in North- East Estonia, studing in Tartu University and working for Webmedia We are living in the criminal gateway and test bed Money laundering pressure is still rising

General Trends for Management “Security explosion” continues: – It will slow growth of net economy – In our “transit” countries money laundering will grow – Security services will develop in IT markets Attacks will be further automated Criminals are internationally “specialising”, industry formed 2003 Police will be forced to enhance international cooperation and private sector involvement Governments have to rethink privacy, introduce hardware ID-s Even more internet banks will be temporarily closed Mobiles will be attacked for profit Most of internal networks will be penetrated through web surfing Servers are attacked for profit Political motivation is already affecting us, trend will grow Hansabank dirct loss trend was, it can turn only up.

Local cooperation Local banks – Internet security is not for competing Telcos – good partners Government – Police is competent – Partners in educating citizens – Joint identification infrastructures – Commercial organisations are unable to fight political risks Early warning by using customers as part of detection CERT-s – Estonian CERT – works – Lithuania – Litnet works, national in process – Latvia – established Customer personalised data is not exchanged, usually IP-s

Needs for successful networking Responsibility of network participants – Starts from timely response of computing device owner – Road traffic behaviour is agreed, including incident resolution Authority of incident resolvers – Who has authority to take down illegal systems (like bot command centers) – defender, police or military – When consumer rights will be sacrificed to rule enforcement – Who has right to develop and use “weapons” Privacy – Hiding identities (car registration number plates) creates “priviledges” for persons with more ressources – Persons should have tools to defend themselves – more information, not less – IP address is like phone number, it should be legal to correlate “insult calls” Governanace in the networks – Border routers enforcing interconnect policies do exist – Visual identification document cross-use does exist Money laundering prevention should cover all e-funds transfer methods Policing needs right measurement – standard reporting should work