Presidio Bank Business Online Banking Security Overview.

Slides:



Advertisements
Similar presentations
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
Advertisements

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Workspace Concept and Technology Overview Ceedo Client Workspace.
HQ in Israel Threat research, security operations center 24/7. In-depth understanding and insight into how cyber crime works. Over 10 million online identities.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Rodney Buike IT Pro Advisor, Microsoft Canada
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
George Tubin Senior Analyst Consumer Banking © 2005 The Tower Group, Inc. May not be reproduced by any means without express permission. All rights reserved.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Module 2.2 Security, legal and ethical issues Theme: Finding solutions.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Securing Online Transactions with a Trusted Digital Identity Dave Steeves - Security Software Engineer Microsoft’s.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Chapter 12 Network Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Unit 28- Website Development Assignment 1- THEORY P3
Factors to be taken into account when designing ICT Security Policies
Payment Card Industry (PCI) Data Security Standard
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
Information Security Technological Security Implementation and Privacy Protection.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
“Passwords are No Longer Sufficient” Brian Rivers University of Georgia.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Proprietary and Confidential rev. 3/2012 Topic Module Overview 1 Consumer Experience2 Administrator Set-Up3 System Maintenance4 User Maintenance 5 Reports6.
Managing Network Security ref: Overview Using Group Policy to Secure the User Environment Using Group Policy to Configure Account Policies.
© All Rights Reserved. Mining Big Data for Fun, Fraud and Profit Vitaly Levin
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Chapter 2. Core Defense Mechanisms. Fundamental security problem All user input is untrusted.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Initial Tiger Team Briefing New Dells with TPM Peter Leight Richard Hammer May 2006.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
0 1 WHAT KEEPS USERS AWAY? 2 47% 46% 43% 39% 40% 50% 45% 34% 21% 15% 20% 19% 13% 26% 20% 12% I fear that my account information will be viewed by an unauthorized.
Module 11: Designing Security for Network Perimeters.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
© ITT Educational Services, Inc. All rights reserved. IS3230 Access Security Unit 7 Authentication Methods and Requirements.
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Transaction Generators: Root Kits for Web By: Collin Jackson, Dan Bonch, John Mitchell Presented by Jeff Wheeler.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Policies and Security for Internet Access
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
Millions of Dollars Lost. MAN IN THE BROWSER. TABLE OF CONTENTS Introduction Brief Examples of Man in the middle Defining MitB From Infection to Pay Day.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Information Management System Ali Saeed Khan 29 th April, 2016.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
7 Tips To Improve Your Website Security. Introduction Use of Content management systems like WordPress, Joomla & Drupal, utilization of various tools,
Protect your Digital Enterprise
Port Knocking Benjamin DiYanni.
TECHNOLOGY GUIDE THREE
Check Point Connectra NGX R60
Global One Communications
Presentation transcript:

Presidio Bank Business Online Banking Security Overview

What We Are Doing To Fight Cybercrime 2 A layered security approach using these elements Multi-Factor out of Band Behavioral Analytics and Transactional Anomaly Detection Data Encryption VPN Tunneling Keyboard Encryption Harden Shell Browser and Operating System Tokens Anti-Virus Software Strong Password Configuration

Layered Security Solution 3 Taking a unique approach which assumes the client’s computer is infected It’s difficult to clean a computer, so we run our own sterile “computer” on the client’s hardware Malware is not a factor, as the hardened platform inclusion of an operating system and browser are not effected by today’s infections VPN Tunneling prevents hacking and provides two way authentication Keyboard encryption stops key logging thereby preventing Man in the Middle attacks Secure Encrypted VPN Tunnel Client Bank

Layered Security Solution 4

Additional Security Features 5 1. Systemic Boundaries Limits (size, frequency) Qualification/disqualification rules Risk Parameters for different segments Automated handling of exceptions 2. In-Session Controls Risk Scoring Knowledge based authentication (KBA) Multi-factor authentication (MFA) Feedback Alerts 3. Impact Reduction Recovery Fraud investigation Link Analysis