Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd.

Slides:



Advertisements
Similar presentations
May 2007 Global Technology & Operations | Network Computing Group | Global Enterprise Access & Desktop Services | Network Services Document Release Level/Version:
Advertisements

Banks and their products VOŠ – 3. ročník – 2. semestr.
Archit Patel Hitesh Chaurasia Lucina Roy Morten Pereira Roopali Navani
Electronic Finance: Reshaping the Financial Landscape Around the World Stijn Claessens Tom Glaessner Daniela Klingebiel.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
TEMENOS ROMANIA March 18, 2003 Every time a step ahead.
Core banking solution Introduction.
Career at Citi September 17, 2008 Ruslan Belyaev Director St. Petersburg Branch Manager Olga Karpunina HR Head Consumer Bank St. Petersburg Branch.
02/12/00 E-Business Architecture
Comtek Bizsoft Pvt. Ltd.1 Corporate Performance Management & Reporting Challenges for Financial Service Organisations Nilesh Sangani Director Comtek Bizsoft.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Training.
Risk Management. Risk Categories Strategic Credit Market Liquidity Operational Compliance/legal/regulatory Reputation.
Stephen S. Yau CSE , Fall Security Strategies.
11 ► Led a multi-national team from Nigeria, Kenya, Uganda & South Africa in a co-sourcing Network Security assessment for MTN Nigeria. Reviewed.
Network Security. Trust Relationships (Trust Zones) High trust (internal) = f c (once you gain access); g p Low trust ( ) = more controls; fewer privileges.
Step 1: A.User enters id/pw for FI: encrypted in Quicken PIN vault B.Id/pw transmitted to Intuit CustomerCentral Servers at NCR using 128 bit SSL Step.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
INTRANETS DEFINITION (from Cambridge International Dictionary of English) intra- Combining form used to form adjectives meaning 'within' (the stated place.
I NFORMATION S YSTEMS IN B ANKING Introduction. C HALLENGES FACING B ANKING EXECUTIVES Customer retention Cost pressures Increased competition (new entrants)
National Discount Broker Site Compromised “National Discount Brokers’ site, which has 200,000 customers, was down for more than an hour Thursday as company.
Slide 1 Intellectual property of Vayana Vayana – Next Generation Banking using Social Connect.
Treasury in the Cloud Bob Stark – Vice President, Strategy September 17, 2014.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Securing Information Systems
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Step into Careers in Banking Friday 3 February Registration and refreshments 09.20Welcome Jenny Barber, Head of Education and Careers, Financial.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
E-BANKING E-banking is defined as the automated delivery of new and traditional banking products and services directly to customers through electronic,
Joseph Ferracin Director IT Security Solutions Managing Security.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Chapter 6 of the Executive Guide manual Technology.
E-banking in Hong Kong Financial institution in Hong Kong Group 6.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
Technology Readiness, MIS for Business Expansion Reji Varghese AVP – IT Consulting, BASIX.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
IMFO Annual Conference – 2015 S21: Good Governance & Oversight B2B.
Jeff Miller Tamra Pawloski IT Procurement Summit headline news…
Identity Assurance Emory University Security Conference March 26, 2008.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Blue Print for Nationwide Industry Transformation BUSINESS IDEOLOGY.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS © 2011 Wolf & Company, P.C. The Future of Technology in Financial Services Matt.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Chapter 8 Auditing in an E-commerce Environment
1 TEMENOS HOME Global Conference on Access to Finance Washington DC 30 th and 31 st May 2006 Murray Gardiner.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Finance (Basic) Ludek Benada Department of Finance Office 533
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Safe’n’Sec IT security solutions for enterprises of any size.
Raj Bank Universal Core Banking System FCBS FINCBS INC Universal Core Banking Solution FCBS – Fin Core Banking Solution
Core Banking Systems (CBS)
Raj Bank Universal Core Banking System FCBS FINCBS INC Banking Systems & Consulting
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Welcome to our Presentation on ORACLE Flexcube & Bank Asia- Banking Technology.
AS Finance Solutions Pvt. Ltd. Accounting/Financial Consultancy, Business & Tax Advisory.
Performing Risk Analysis and Testing: Outsource or In-house
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Internet Payment.
Banking.
35 years of business with Security and Cloud solutions
12 STEPS TO A GDPR AWARE NETWORK
John Carlson Senior Director, BITS
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Presentation transcript:

Looking beyond the obvious!! HOW SECURE IS BANKS’ CORE DATA? Prashant Pande Head Professional Services IDBI Intech Ltd

Looking beyond the obvious!! NATURE of BANK’S DATA Critical: Financial, Personal, Organisational Data Privacy and Confidentiality High Availability Ease of Use & Operations Archival & Retrieval if Data

Looking beyond the obvious!! Ledgers and Registers ALPM and Branch Based Solutions Stand Alone Systems –Trade finance, Treasury etc. Multiple Applications in CBS Complex Networking Integrated Systems Backups of Diverse Systems Concentration of Resources EVOLUTION of DATA IN CBS

Looking beyond the obvious!! ATMs Internet Banking Mobile Banking Credit Cards, Currency Cards etc Insurance Companies Online Trading Ticket Vending CHANNELS & STRATEGIC TIE UPS

Looking beyond the obvious!! Core Banking Solution Consumer Banking CASA Term Deposit Consumer Lending Mortgages Bill Payment Corporate Banking ImportExportGuarantee Current/ Overdraft Commercial Lending Trade Financing Wealth Management Investor Services Mutual Fund Insurance Distribution Equity & Bonds Trading Structured Products Cash Management Investor Services Accounts Management Payments Collections Allied Solutions Regulatory Reporting Risk Management Payments Middleware AML Office A/Cs Branch Call Center IVR Portal Internet Mobile Call CenterKiosk Customer Delivery Channel

Looking beyond the obvious!! SECURING DATA Infrastructure Set up ITIL standards – Data Centre Level III DR Site DR Drills BCP Users Need to know basis Access rights Authentication

Looking beyond the obvious!! Application Software Customer Relationship Management Transaction processing Product Definitions Reports – Regulatory, MIS, DSS Interfaces, Payment middleware Database security SSL encryption IDS Barriers Firewalls Secure data with strong encryption REORGANIZATION

Looking beyond the obvious!! Channels Indirect Access to CBS Independent Systems Interdependent Systems Multiple Authentication Outsourced Services Drafting and Monitoring of SLA’s Non Disclosure Clauses Meaningful Reports Review and Monitoring of Reports and Outputs RISK MITIGATION

Looking beyond the obvious!! Multiple servers OS Hardening Settings as per the Application Requirement Physical Security Surveillance Camera Critical Applications in a Cluster SECURITY MEASURES

Looking beyond the obvious!! Network Security Intrusion Detection Systems Internal and External Firewalls Penetration Testing Monitoring Attacks Virus Protection and Constant Updates User Profile Continuous Training Reviewing of the Access Rights Sub-dividing the Processes Use of Bio-metric Devices Core Data Security STRENGTHENING MEASURES

Looking beyond the obvious!! Controls and Processes Emerging Vulnerabilities Perform Control Self Assessment Integrity of Information Systems Security Policy.. AUDITS & ASSURANCES

Looking beyond the obvious!! Regulatory and Other Compliances Effectiveness of Internal Controls. Risk Management Implementing International / Quality Standards… ASSURANCE

Looking beyond the obvious!! Thank You