SlideShare a Scribd company logo
1 of 58
#ProtectionPeru2019
Greivin Viquez,
Senior Solution Engineer, LATAM
Empowering
Digital
Transformation
in Financial
Services
Topics
 What is Digital Transformation?
 Recent Cyber Security Trends
 Digital Transformation War Stories
 How Akamai Reduces Risk
 Akamai At-A-Glance
3 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
#ProtectionPeru2019
4 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential
What is Digital Transformation?
#ProtectionPeru2019
Digital Maturity - FinServ vs. Commerce
15%
2010 20172011 2012 2013 2014 2015 2016
CommerceFinancial Services
AkamaiAdoption
50%5 Years Behind Commerce
(Now growing faster)
Akamai Adoption over Time
5 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Digital Engagement User Experience
Digital Transformation
Technology
Transformation
What Does Digital Transformation Mean?
• % of Transactions
• Self-Service
• Bot Management
• Aggregator Strategy
• Non-Human and
FinTech Engagement
• Instant Web
• Instant Mobile
• Anytime
• Anywhere
• Measurement and
Analytics
• Always Available
• Always Secure
• Protect the Customer
• Protect the Enterprise
• Protect the Company
Business
Transformation
• Rebranding
• Restructuring
• “Go Digital or Die”
Attitude
• Digitally Savvy Senior
Management
• “Digital” titles and
reorganization
• Follow eCommerce
• Investment in Core
Systems and APIs
• Re-think Capacity and
Scale
• Intense Dev-Ops
Effort
• “50 releases per day”
• Digital “re-imaging”,
Replatforming
• Cloud First Strategy
Cyber-Security Risk
6 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
7 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential
Client Intelligence PERU - Cyber Security Trends
#ProtectionPeru2019
8 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Ataques dirigidos a Perú organizados por tipo ataque
9 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Comparación por Industria – Todos los actores
Ataques dirigidos a Perú organizados por industria
#ProtectionPeru2019
10 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Ataques específicos hacia Perú: DDoS
Consumer Goods ManufacturingRetails
11 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Ataques específicos hacia Perú: sector financiero
12 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Ataques específicos hacia Perú: sector público
#ProtectionPeru2019
13 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Ataques específicos hacia Perú: Sector Retail
#ProtectionPeru2019
14 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Ataques específicos hacia Perú: sector líneas aereas
#ProtectionPeru2019
15 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Ataques específicos hacia Perú – ataques específicos
16 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Redes origenes de ataques HACIA Perú
Scraper Web
DDoS
Scanning
17 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Redes origenes de ataques DESDE Perú
18 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Redes origenes de ataques DESDE Perú
Scraper Web
DDoS
Scraper
19 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential
Recent Cyber Security Trends
#ProtectionPeru2019
DDoS in The Netherlands
Target profile: Dutch financial institutions. (Also one bank outside the Netherlands.)
Akamai Product: Prolexic Routed, Kona
Attack Vectors: UDP, DNS, NTP, SNMP, SYN Flood, SQL Server Reflection, more...
Mutli-vector attacks:
• NTP flood
• UDP fragments
• SNMP flood
• DNS flood
• SYN flood
• SQL server reflection
• CLDPA reflection
• DNS reflection
• SQL Server Reflection
Noteworthy:
• Sustained attack for multiple days
• Peak attack size of 39.45 Gbps, 3.85 Mpps
• Multiple IPs targeted.
• Up to entire /24 network targeted. 255 IPs.
• “Vertical” attack. We don’t see that often.
• One bank had 50 /24s attacked.
• Very quick changes during the attack. About
every 30 seconds we saw:
• Attack vectors change
• IP targets change
• Attack cascading between /24 subnets
• 32k unique reflection IPs.
• DNSSEC and other amplification sources.
20 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
DDoS in The Netherlands
21 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
00:00 06:00 12:00 18:00 00:00 06:00 12:00 18:00 00:00 06:00 12:00 18:00 00:00 06:00 12:00 18:00
Size: up to 18.5 Gbps
Vectors:
UDP Flood
UDP Fragment
DNS Flood
NTP Flood
SNMP Flood, SQL Server
Reflection
CLDAP Reflection
Comments:
Long lasting campaign,
mitigated by all SOCC
locations, all vectors
stopped within the SLAs.
Over 140 entries added to
the ACLs
No downtime reported for
the services we protected
Size: up to 39.45 Gbps
Vectors:
UDP Flood
UDP Fragment
DNS Flood
Comments:
Two attacks launched on
the Jan 29th.
Same vectors used as in
the attack against Bank 1
No downtime reported for
the services we protected
Size: 2.10 Gbps
Vectors:
UDP Flood
Comments:
One vector attack,
relatively small quickly
blocked.
No downtime reported for
the services we protected
30th Jan28th Jan 29th Jan 31st Jan
Bank 1
Bank 2
Bank 3
New Emergency Akamai
Service
No downtime reported for
the services we protected
Bank 5Size: 2 Gbps
Vectors:
Similar to other banks
Comments:
Brazilian Bank
Vertical attack vector
No downtime reported for
the services we protected
Bank 4
©2019 AKAMAI | FASTER FORWARDTM
100 MB response
210 byte request
Memcached UDP reflection
500K AMPLIFICATION
Country Total
China 20,327
United States 17,320
France 3,283
Hong Kong 3,005
Russia 1,758
Japan 1,652
Germany 1,567
Canada 1,532
Vietnam 1,346
UK 1,112
Singapore 1,063
Netherlands 1,054
Turkey 1,044
Indonesia 748
Brazil 679
Poland 543
India 522
Ukraine 504
Romania 458
Lithuania 451
Memcached UDP reflection: an attacker queries an unsecured memcached server using a spoofed IP address to trigger a flood of UDP
packets against its target. With a 210 byte request capable of triggering a 100 MB response, this attack vector has the potential for over
500,000x amplification. The Shadowserver Foundation has identified over 50,000 memcached servers operating on the public Internet.
22 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
What’s it look like?
23 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Memcached DDoS timeline: the first DDoS attack attributed to memcached UDP reflection was observed on February 26, 2018. Within
the next few days, this attack vector was responsible for 22 attacks against Akamai customers, including a 1.3 Tbps attack, and attacks
against 3 banks.
Mar 12
Memcached UDP reflection
FIRST TWO WEEKS
Feb 26 Feb 27 Feb 28 Mar 1 Mar 2 Mar 3 Mar 4 Mar 5 Mar 6 Mar 7 Mar 8 Mar 9 Mar 10 Mar 11
• 38.6 Gbps
• 9.0 Gbps
• 3.5 Gbps
• 191.6 Gbps
• 13.9 Gbps
• 5.6 Gbps
• 18.4 Gbps
• 1.3 Tbps
• 0.8 Gbps
• 229.4 Gbps
• 6.0 Tbps
• 1.1 Gbps
• 3.4 Gbps
• 160.5 Gbps
• 4.2 Gbps
• 2.3 Gbps
• 44.6 Gbps • 6.0 Gbps
• 6.7 Gbps
Two U.S. banks. 2nd bank was
attacked 6 minutes after the first.
Europe bank
• 1.7 Gbps • 2.1 Gbps
• 20.1 Gbps
Data through 3/12/2018. Aditional attacks are still coming in.
24 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
25 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential
Operation Brobot 2012- Cyber Security Trends
#ProtectionPeru2019
26
DDoS campaign day 1 – large financial customer JAN
2012
6:15 am ATTACK BEGINS
The campaign starts as a DNS Flood. On-site mitigation is deployed. Two tier
1 telecom providers are engaged to provide upstream blocking of attack traffic.
7:30 am APPLIANCE FAILURE
On-site mitigation appliance fails. Local mitigation team gives up on
appliance.
10:45 am TELECOM FAILURE
Both telecom DDoS service providers are proving to be ineffective against a multi-vectored UDP and
DNS attack. Attack size approximately 8-10 Gbps. Response time is approaching critical levels.
11:30 am CUSTOMER ACTIVATES PROLEXIC
Customer flips the BGP switch and all traffic from 2 out of 3 data centers is routed to Prolexic. The SOC
immediately starts the mitigation process and within 20 min the response times are down to a few seconds.
Three telecom bridges are opened with the customer; an attack line, a trouble shooting line, and a SERT
line to the FBI and Secret Service which includes the customers SERT team.
8:00 pm CUSTOMER PREPARATION
Preparing to route the 3rd and final data center over to Prolexic.
27
DDoS campaign day 2 – large financial customer
8:30 am ATTACK VECTOR MORPHS TO DNS
Another major attack was initiated. It was a multi-
vectored attack which included a DNS Flood and a UDP
Flood. The attack peaked out at 13.4 Gbps and 600,000
pps.
10:00 am 100% PROLEXIC MITIGATION
The 3rd and final data center is routed over to Prolexic.
All back channels to Web, DNS, VPN’s, Custom Apps protected.
#ProtectionPeru2019
28
DDoS campaign day 3 – large financial customer
9:00 am ATTACK COMPLEXITY INCREASES
Another major attack was initiated. It was a multi-vectored
attack which was comprised of a DNS Flood of 6.3 Gbps
and 4.1 Mpps, a UDP Flood of 301 Mbps and 400K pps, a
GET Flood, UDP Fragment, and ICMP Flood that peaked
at 7.1 Gbps and 11.3 Mpps.
10:00 am PROLEXIC BOTNET TAKEDOWN WITH FBI
The GET Flood attack finally provided some non spoofed
IP addresses. Our SERT team using information from
several sources triangulated several Command and
Control PC’s or CNC’s . These addresses were then
turned over to law enforcement. The FBI proceeded to
monitor them to get more information.
8:00 pm BOTNET TAKEDOWN SUCCESSFUL
Several CNC’s were taken down.
29
DDoS campaign day 4 – large financial customer
11:00 am ATTACKER UNLEASHES EVERYTHING THEY HAVE
Another attack begins around 11 am. It started out small but by noon it had
morphed into a VERY LARGE and COMPLEX attack. The attack vectors
included: GET Flood, UDP Fragment, DNS Flood, ICMP Flood. This
campaign peaked at a very impressive 54.30 Gbps and 4.90 Mpps..
Note: Prolexic is the only company in the world able to mitigate this size of attack. It should be
noted that we were mitigating another 12 attacks for other clients at the same time as this 54
Gbps attack. That should give you some idea how big our network is, the effectiveness of our
services, and the skill level of our technicians. Many providers would have been so focused on
the huge attack that they would have missed the smaller, more deadly Layer 7 attack that was
also launched.
30
DDoS campaign day 5 – large financial customer
9:30 am ALL QUIET ON THE BANKING FRONT
No large attacks were recorded on Day 5. The customer
directed additional traffic to Prolexic from some of its
smaller, regional data centers.
#ProtectionPeru2019
31
DDoS campaign day 6 – large financial customer
12:00 pm HOME COUNTRY OF ATTACKER IDENTIFIED
Law enforcement narrows down the country origin of the attacker and starts to
zero in.
Attacker unsuccessful in impacting customer over several days.
Many attacker C&C’s taken down.
32
DDoS campaign day 7 – large financial customer
Note: ATTACKS END
Attacks end on Day 7. Throughout the campaign the
customers perimeter assets remained functional and
responsive despite the best efforts of a very skilled
attacker.
The attack never became public and there was no lack
of continuity in the day-to-day business. If the
company did not have Prolexic in place the outcome of
the campaign would have been dramatically different.
Note: FORENSICS
After several months of detailed forensics, it was evident
the attackers had done extensive analysis of the target
prior to the attack.
#ProtectionPeru2019
33 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential
Operation Ababil 2012- Cyber Security Trends
#ProtectionPeru2019
Operation Ababil
Phase 1
Sep 12 – Early Nov 2012
• DNS Packets with
“A” payload
• Limited Layer 7
attacks
• Began use of
HTTP dynamic
content to
circumvent static
caching defenses
Phase 2
Dec 12, 2012 – Jan 29
• Incorporate
random query
strings and values
• Additions to bot
army
• Burst probes to
bypass rate-limiting
controls
• Addition of valid
argument names,
random values
Phase 3
• Increased focus on
Layer 7 attacks
• Larger botnet
• Highly distributed
• Target banks
where attacks work
• Fraudsters take
advantage
Late Feb 2013 – May 2013
“none of the U.S banks will be safe from our attacks”
Phase 4
• Updated attack
scripts, harder to
understand
• Requests look
more like normal
browsers
July 2013 – Now
#ProtectionPeru2019
• Top 5 Global Bank customer experienced a Denial of Service attack which
attempted to bring down their retail banking web site.
• Peak attack traffic was 1.46 Gbps, 73x normal.
• Page Views peaked at over 6,600 per second, 220x normal.
DDoS Attack – Banking Web Site (1 of 3)
DDoS Attack – Banking Web Site (2 of 3)
• Akamai Offloaded over 95% of bandwidth during the attack, protecting the site.
• Origin bandwidth peaked at only 38 Mbps.
DDoS Attack – Banking Web Site (3 of 3)
• Anniversary of Sept. 18, 1931 “Mukden Incident” and Sept. 19 invasion of
Manchuria.
• #1 – DDoS attack on Sept. 18, 2010.
• #2 – DDoS attack on Sept. 18, 2011.
• #3 – DDoS attack on Sept. 18, 2012.
Operation Ababil / 2nd Phase / 4th Week
“none of the U.S banks will be safe from our attacks.”
January 3, 2013 – Massive Banking DDoS Attack
Always-on Protection
• Top financial services firm with nearly 10M customers.
• Peak attack traffic was 30 Gbps, 30x normal daily high traffic.
• Attackers gave up after 15 minutes, and moved attack to another bank.
• 100% of the attack was on SSL.
Bank #1
Massive Banking DDoS Attack
• Akamai offloaded 100% of the attack.
• “A bug impacting our windshield”.
Bank #1
15 Minutes
Total Origin
Bandwidth
(Attack ended at
11:25)
Massive Banking DDoS Attack
• “Probe” attack was then
seen at another bank 25
minutes later.
• Akamai Kona in place, and
rate controls automatically
activated.
Bank #2
Massive Banking DDoS Attack
• 60 minutes later, 8 Gbps attack seen on a 3rd customer.
• 100% of the attack was on SSL.
• Akamai offload was over 99%
Bank #3
Non-Akamai bank hit at 12:03 PM
• Compuware benchmark of bank home page, measured from 12 cities 1x per
hour.
• First performance hit recorded at 12:03 PM.
• Performance and availability problems continued to 9:00 AM the following
morning.
12:03 PM
9:00 AM
Bank #4
Non-Akamai bank attacked at 12:44 PM
• First outage recorded at 12:44 PM.
• Attack continued to 6:21 PM.
• Bank attacked numerous times after January 3.
Bank #5
12:44 PM 6:21 PM
SITE UNAVAILABLE
Prolexic Routed – DDoS
Data center/infrastructure
20-40 attacks per day
Kona WAF – CDN
Web Application Attacks
Machine Generated
80M WAF rules triggered per hour
Akamai
SOURCES OF INTEL
55 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
56 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
43% of all logins transactions are malicious
50 day period in Nov – Dec 2017
57 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
#ProtectionPeru2019
Why is Credential Abuse so hard?
It breaks the security controls already in place:
• Low and Slow – 25% of the bots are used once
• Volumetric – Millions of request
• Layer 7 (application layer), not Network Layer (L3/4)
• The most sensitive traffic – Usernames and passwords
• Encrypted traffic – If you can’t see it, you can’t block it
• APIs are hit – 3.7x more often than login pages
Why is Credential Abuse so hard?
58 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
#ProtectionPeru2019
59 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential
Digital Transformation War Stories
#ProtectionPeru2019
60 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Are you ready for Digital Transformation?
61 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Investment Website Traffic
1/29/18
0:00
1/29/18
16:40
1/30/18
9:20
1/31/18
2:00
1/31/18
18:40
2/1/18
11:20
2/2/18
4:00
2/2/18
20:40
2/3/18
13:20
2/4/18
6:00
2/4/18
22:40
2/5/18
15:20
2/6/18
8:00
2/7/18
0:40
2/7/18
17:20
2/8/18
10:00
Traffic
Example Investment WebSite Traffic Spikes
4x Traffic
Spike
• Social Media
• “The convenience of mobile banking”
• 15 minutes of downtime, and you need to
report to your regulator
L E S S O N S L E A R N E D
T H E S T O R Y
• Card skimmer leads to to $1M in theft in 2 hours
• Word gets out on social media
• Panicked customer check their accounts
• 3 months worth of traffic in 1 hour
• Datacenter overwhelmed
• The bank goes down
• Big national news
F A C T O R S
• Be prepared for flash crowds
• Develop and exercise run books
• Understand the risk to your business
• Better call Akamai
How an ATM can bring down your datacenter
62 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
63 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential
How Akamai Reduces Risk
#ProtectionPeru2019
Data Loss Prevention – Kona as a virtual patch
machine
66 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Struts CVE-2017-5638:
• March 6th, the Apache team patched a vulnerability in Struts2 framework
• Akamai engaged [unnamed customer] on March 9th
• Rule deployed on March 10th covering all [customer] applications on Akamai
• Rule in Monitor for visibility into any attacks/probes
• Bake to ensure no adverse impact to applications/customers
• Rule moved to Deny on March 12th
Review – Industry Objections
67 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
Objection Description Objection Handling
TLS Termination Akamai sees all PII and financial data ”in the clear”. - Education
- Residual Risk
- Data center visit
- SXL
- Limited ESSL maps
- Contractual language
- References
TLS Certificates Akamai holds customer certs on all ESSL servers.
Data Sovereignty Regulators require data to stay within country or region. Law
enforcement could compel Akamai to disclose PII.
Regulatory Challenges Customer believes that their regulator only allows end-to-end
encryption. Both internal and external regulators.
68 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential
Akamai At-A-Glance
#ProtectionPeru2019
V I S I O N
M I S S I O N
To deliver a fast, reliable, and secure Internet to enable our
financial services customers:
• to grow their business
• to deliver world class products and services
• to give them a competitive edge
Akamai is the business Internet for Financial Services
The standard for performance, security, and mobile internet
architectures across the Financial Services industry
69 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
THANK YOU!
Greivin Viquez
Senior Solution Engineer

More Related Content

What's hot

Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?michaelbasoah
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoCristian Garcia G.
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsIBM Security
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version externalZscaler
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...IBM Security
 
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS Cristian Garcia G.
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityCristian Garcia G.
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...Abhishek Goel
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioShah Sheikh
 
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceShah Sheikh
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Cristian Garcia G.
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Cristian Garcia G.
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security IntelligenceAnna Landolfi
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksImperva
 

What's hot (20)

Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
Are Your Appliance Security Solutions Ready For 2048-bit SSL Certificates ?
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
Ransomware webinar may 2016 final version external
Ransomware webinar   may 2016 final version externalRansomware webinar   may 2016 final version external
Ransomware webinar may 2016 final version external
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber Security
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber ResilienceISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
 
IBM Security Intelligence
IBM Security IntelligenceIBM Security Intelligence
IBM Security Intelligence
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
 

Similar to Empowering Digital Transformation in Financial Services

DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseNETSCOUT
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceCloudflare
 
Solace Singapore User Group: Sumeet Puri
Solace Singapore User Group: Sumeet PuriSolace Singapore User Group: Sumeet Puri
Solace Singapore User Group: Sumeet PuriSolace
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataCristian Garcia G.
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaCloudflare
 
IDC Insights Awards 2018 - What is an Event Mesh?
IDC Insights Awards 2018 - What is an Event Mesh?IDC Insights Awards 2018 - What is an Event Mesh?
IDC Insights Awards 2018 - What is an Event Mesh?Solace
 
Economics of the Cloud: Don't Aim for the Sky on Everything
Economics of the Cloud: Don't Aim for the Sky on EverythingEconomics of the Cloud: Don't Aim for the Sky on Everything
Economics of the Cloud: Don't Aim for the Sky on EverythingHostway|HOSTING
 
Confluent & GSI Webinars series - Session 3
Confluent & GSI Webinars series - Session 3Confluent & GSI Webinars series - Session 3
Confluent & GSI Webinars series - Session 3confluent
 
Who Broke My Cloud? SaaS Monitoring Best Practices
Who Broke My Cloud? SaaS Monitoring Best PracticesWho Broke My Cloud? SaaS Monitoring Best Practices
Who Broke My Cloud? SaaS Monitoring Best PracticesThousandEyes
 
The Future of Service Mesh
The Future of Service MeshThe Future of Service Mesh
The Future of Service MeshAll Things Open
 
Keynote for the IBM Avnet Indonesia MSP Day
Keynote for the IBM Avnet Indonesia MSP DayKeynote for the IBM Avnet Indonesia MSP Day
Keynote for the IBM Avnet Indonesia MSP DayPandu W Sastrowardoyo
 
Next Generation of Treasury Technology Cash Adventure- Brad Teaver.pptx
Next Generation of Treasury Technology Cash Adventure- Brad Teaver.pptxNext Generation of Treasury Technology Cash Adventure- Brad Teaver.pptx
Next Generation of Treasury Technology Cash Adventure- Brad Teaver.pptxNitin790564
 
akamai's [state of internet] / security
akamai's [state of internet] / securityakamai's [state of internet] / security
akamai's [state of internet] / securityThe Internet of Things
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationSagi Brody
 
Worldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report HighlightsWorldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report HighlightsAPNIC
 
CWIN17 london digital disruption embracing the future through architecture ...
CWIN17 london   digital disruption embracing the future through architecture ...CWIN17 london   digital disruption embracing the future through architecture ...
CWIN17 london digital disruption embracing the future through architecture ...Capgemini
 
In-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain TechnologiesIn-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain Technologiesdsapps
 
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpAutomate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpMitchell Pronschinske
 
4 critical criteria DDos
4 critical criteria DDos4 critical criteria DDos
4 critical criteria DDosGCC Computers
 

Similar to Empowering Digital Transformation in Financial Services (20)

DDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in DefenseDDoS Attacks in 2020 & Best Practices in Defense
DDoS Attacks in 2020 & Best Practices in Defense
 
Infosecurity - CDMX 2018
Infosecurity - CDMX 2018Infosecurity - CDMX 2018
Infosecurity - CDMX 2018
 
Scaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-serviceScaling service provider business with DDoS-mitigation-as-a-service
Scaling service provider business with DDoS-mitigation-as-a-service
 
Solace Singapore User Group: Sumeet Puri
Solace Singapore User Group: Sumeet PuriSolace Singapore User Group: Sumeet Puri
Solace Singapore User Group: Sumeet Puri
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
 
IDC Insights Awards 2018 - What is an Event Mesh?
IDC Insights Awards 2018 - What is an Event Mesh?IDC Insights Awards 2018 - What is an Event Mesh?
IDC Insights Awards 2018 - What is an Event Mesh?
 
Economics of the Cloud: Don't Aim for the Sky on Everything
Economics of the Cloud: Don't Aim for the Sky on EverythingEconomics of the Cloud: Don't Aim for the Sky on Everything
Economics of the Cloud: Don't Aim for the Sky on Everything
 
Confluent & GSI Webinars series - Session 3
Confluent & GSI Webinars series - Session 3Confluent & GSI Webinars series - Session 3
Confluent & GSI Webinars series - Session 3
 
Who Broke My Cloud? SaaS Monitoring Best Practices
Who Broke My Cloud? SaaS Monitoring Best PracticesWho Broke My Cloud? SaaS Monitoring Best Practices
Who Broke My Cloud? SaaS Monitoring Best Practices
 
The Future of Service Mesh
The Future of Service MeshThe Future of Service Mesh
The Future of Service Mesh
 
Keynote for the IBM Avnet Indonesia MSP Day
Keynote for the IBM Avnet Indonesia MSP DayKeynote for the IBM Avnet Indonesia MSP Day
Keynote for the IBM Avnet Indonesia MSP Day
 
Next Generation of Treasury Technology Cash Adventure- Brad Teaver.pptx
Next Generation of Treasury Technology Cash Adventure- Brad Teaver.pptxNext Generation of Treasury Technology Cash Adventure- Brad Teaver.pptx
Next Generation of Treasury Technology Cash Adventure- Brad Teaver.pptx
 
akamai's [state of internet] / security
akamai's [state of internet] / securityakamai's [state of internet] / security
akamai's [state of internet] / security
 
Combating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and AutomationCombating Cyberattacks through Network Agility and Automation
Combating Cyberattacks through Network Agility and Automation
 
Worldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report HighlightsWorldwide Infrastructure Security Report Highlights
Worldwide Infrastructure Security Report Highlights
 
CWIN17 london digital disruption embracing the future through architecture ...
CWIN17 london   digital disruption embracing the future through architecture ...CWIN17 london   digital disruption embracing the future through architecture ...
CWIN17 london digital disruption embracing the future through architecture ...
 
In-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain TechnologiesIn-Memory Computing Driving Edge Computing and Blockchain Technologies
In-Memory Computing Driving Edge Computing and Blockchain Technologies
 
Automate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corpAutomate and simplify multi cloud complexity with f5 and hashi corp
Automate and simplify multi cloud complexity with f5 and hashi corp
 
4 critical criteria DDos
4 critical criteria DDos4 critical criteria DDos
4 critical criteria DDos
 

More from Cristian Garcia G.

Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyCristian Garcia G.
 
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCristian Garcia G.
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadCristian Garcia G.
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Cristian Garcia G.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACristian Garcia G.
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Cristian Garcia G.
 
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterProtección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterCristian Garcia G.
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoCristian Garcia G.
 
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Cristian Garcia G.
 
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cristian Garcia G.
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoCristian Garcia G.
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecinaCristian Garcia G.
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoCristian Garcia G.
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Cristian Garcia G.
 
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCStay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCCristian Garcia G.
 
La evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteLa evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteCristian Garcia G.
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Cristian Garcia G.
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Cristian Garcia G.
 

More from Cristian Garcia G. (20)

Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
 
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Symantec Enterprise Cloud
Symantec Enterprise CloudSymantec Enterprise Cloud
Symantec Enterprise Cloud
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
 
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterProtección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-Datacenter
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
 
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
 
Gestión de la Exposición
Gestión de la ExposiciónGestión de la Exposición
Gestión de la Exposición
 
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecina
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
 
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCStay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
 
La evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteLa evolución de IBM Qradar Suite
La evolución de IBM Qradar Suite
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Empowering Digital Transformation in Financial Services

  • 2. Greivin Viquez, Senior Solution Engineer, LATAM Empowering Digital Transformation in Financial Services
  • 3. Topics  What is Digital Transformation?  Recent Cyber Security Trends  Digital Transformation War Stories  How Akamai Reduces Risk  Akamai At-A-Glance 3 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential #ProtectionPeru2019
  • 4. 4 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential What is Digital Transformation? #ProtectionPeru2019
  • 5. Digital Maturity - FinServ vs. Commerce 15% 2010 20172011 2012 2013 2014 2015 2016 CommerceFinancial Services AkamaiAdoption 50%5 Years Behind Commerce (Now growing faster) Akamai Adoption over Time 5 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
  • 6. Digital Engagement User Experience Digital Transformation Technology Transformation What Does Digital Transformation Mean? • % of Transactions • Self-Service • Bot Management • Aggregator Strategy • Non-Human and FinTech Engagement • Instant Web • Instant Mobile • Anytime • Anywhere • Measurement and Analytics • Always Available • Always Secure • Protect the Customer • Protect the Enterprise • Protect the Company Business Transformation • Rebranding • Restructuring • “Go Digital or Die” Attitude • Digitally Savvy Senior Management • “Digital” titles and reorganization • Follow eCommerce • Investment in Core Systems and APIs • Re-think Capacity and Scale • Intense Dev-Ops Effort • “50 releases per day” • Digital “re-imaging”, Replatforming • Cloud First Strategy Cyber-Security Risk 6 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
  • 7. 7 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential Client Intelligence PERU - Cyber Security Trends #ProtectionPeru2019
  • 8. 8 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Ataques dirigidos a Perú organizados por tipo ataque
  • 9. 9 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Comparación por Industria – Todos los actores Ataques dirigidos a Perú organizados por industria #ProtectionPeru2019
  • 10. 10 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Ataques específicos hacia Perú: DDoS Consumer Goods ManufacturingRetails
  • 11. 11 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Ataques específicos hacia Perú: sector financiero
  • 12. 12 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Ataques específicos hacia Perú: sector público #ProtectionPeru2019
  • 13. 13 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Ataques específicos hacia Perú: Sector Retail #ProtectionPeru2019
  • 14. 14 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Ataques específicos hacia Perú: sector líneas aereas #ProtectionPeru2019
  • 15. 15 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Ataques específicos hacia Perú – ataques específicos
  • 16. 16 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Redes origenes de ataques HACIA Perú Scraper Web DDoS Scanning
  • 17. 17 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Redes origenes de ataques DESDE Perú
  • 18. 18 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Redes origenes de ataques DESDE Perú Scraper Web DDoS Scraper
  • 19. 19 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential Recent Cyber Security Trends #ProtectionPeru2019
  • 20. DDoS in The Netherlands Target profile: Dutch financial institutions. (Also one bank outside the Netherlands.) Akamai Product: Prolexic Routed, Kona Attack Vectors: UDP, DNS, NTP, SNMP, SYN Flood, SQL Server Reflection, more... Mutli-vector attacks: • NTP flood • UDP fragments • SNMP flood • DNS flood • SYN flood • SQL server reflection • CLDPA reflection • DNS reflection • SQL Server Reflection Noteworthy: • Sustained attack for multiple days • Peak attack size of 39.45 Gbps, 3.85 Mpps • Multiple IPs targeted. • Up to entire /24 network targeted. 255 IPs. • “Vertical” attack. We don’t see that often. • One bank had 50 /24s attacked. • Very quick changes during the attack. About every 30 seconds we saw: • Attack vectors change • IP targets change • Attack cascading between /24 subnets • 32k unique reflection IPs. • DNSSEC and other amplification sources. 20 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
  • 21. DDoS in The Netherlands 21 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential 00:00 06:00 12:00 18:00 00:00 06:00 12:00 18:00 00:00 06:00 12:00 18:00 00:00 06:00 12:00 18:00 Size: up to 18.5 Gbps Vectors: UDP Flood UDP Fragment DNS Flood NTP Flood SNMP Flood, SQL Server Reflection CLDAP Reflection Comments: Long lasting campaign, mitigated by all SOCC locations, all vectors stopped within the SLAs. Over 140 entries added to the ACLs No downtime reported for the services we protected Size: up to 39.45 Gbps Vectors: UDP Flood UDP Fragment DNS Flood Comments: Two attacks launched on the Jan 29th. Same vectors used as in the attack against Bank 1 No downtime reported for the services we protected Size: 2.10 Gbps Vectors: UDP Flood Comments: One vector attack, relatively small quickly blocked. No downtime reported for the services we protected 30th Jan28th Jan 29th Jan 31st Jan Bank 1 Bank 2 Bank 3 New Emergency Akamai Service No downtime reported for the services we protected Bank 5Size: 2 Gbps Vectors: Similar to other banks Comments: Brazilian Bank Vertical attack vector No downtime reported for the services we protected Bank 4
  • 22. ©2019 AKAMAI | FASTER FORWARDTM 100 MB response 210 byte request Memcached UDP reflection 500K AMPLIFICATION Country Total China 20,327 United States 17,320 France 3,283 Hong Kong 3,005 Russia 1,758 Japan 1,652 Germany 1,567 Canada 1,532 Vietnam 1,346 UK 1,112 Singapore 1,063 Netherlands 1,054 Turkey 1,044 Indonesia 748 Brazil 679 Poland 543 India 522 Ukraine 504 Romania 458 Lithuania 451 Memcached UDP reflection: an attacker queries an unsecured memcached server using a spoofed IP address to trigger a flood of UDP packets against its target. With a 210 byte request capable of triggering a 100 MB response, this attack vector has the potential for over 500,000x amplification. The Shadowserver Foundation has identified over 50,000 memcached servers operating on the public Internet. 22 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
  • 23. What’s it look like? 23 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
  • 24. Memcached DDoS timeline: the first DDoS attack attributed to memcached UDP reflection was observed on February 26, 2018. Within the next few days, this attack vector was responsible for 22 attacks against Akamai customers, including a 1.3 Tbps attack, and attacks against 3 banks. Mar 12 Memcached UDP reflection FIRST TWO WEEKS Feb 26 Feb 27 Feb 28 Mar 1 Mar 2 Mar 3 Mar 4 Mar 5 Mar 6 Mar 7 Mar 8 Mar 9 Mar 10 Mar 11 • 38.6 Gbps • 9.0 Gbps • 3.5 Gbps • 191.6 Gbps • 13.9 Gbps • 5.6 Gbps • 18.4 Gbps • 1.3 Tbps • 0.8 Gbps • 229.4 Gbps • 6.0 Tbps • 1.1 Gbps • 3.4 Gbps • 160.5 Gbps • 4.2 Gbps • 2.3 Gbps • 44.6 Gbps • 6.0 Gbps • 6.7 Gbps Two U.S. banks. 2nd bank was attacked 6 minutes after the first. Europe bank • 1.7 Gbps • 2.1 Gbps • 20.1 Gbps Data through 3/12/2018. Aditional attacks are still coming in. 24 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
  • 25. 25 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential Operation Brobot 2012- Cyber Security Trends #ProtectionPeru2019
  • 26. 26 DDoS campaign day 1 – large financial customer JAN 2012 6:15 am ATTACK BEGINS The campaign starts as a DNS Flood. On-site mitigation is deployed. Two tier 1 telecom providers are engaged to provide upstream blocking of attack traffic. 7:30 am APPLIANCE FAILURE On-site mitigation appliance fails. Local mitigation team gives up on appliance. 10:45 am TELECOM FAILURE Both telecom DDoS service providers are proving to be ineffective against a multi-vectored UDP and DNS attack. Attack size approximately 8-10 Gbps. Response time is approaching critical levels. 11:30 am CUSTOMER ACTIVATES PROLEXIC Customer flips the BGP switch and all traffic from 2 out of 3 data centers is routed to Prolexic. The SOC immediately starts the mitigation process and within 20 min the response times are down to a few seconds. Three telecom bridges are opened with the customer; an attack line, a trouble shooting line, and a SERT line to the FBI and Secret Service which includes the customers SERT team. 8:00 pm CUSTOMER PREPARATION Preparing to route the 3rd and final data center over to Prolexic.
  • 27. 27 DDoS campaign day 2 – large financial customer 8:30 am ATTACK VECTOR MORPHS TO DNS Another major attack was initiated. It was a multi- vectored attack which included a DNS Flood and a UDP Flood. The attack peaked out at 13.4 Gbps and 600,000 pps. 10:00 am 100% PROLEXIC MITIGATION The 3rd and final data center is routed over to Prolexic. All back channels to Web, DNS, VPN’s, Custom Apps protected. #ProtectionPeru2019
  • 28. 28 DDoS campaign day 3 – large financial customer 9:00 am ATTACK COMPLEXITY INCREASES Another major attack was initiated. It was a multi-vectored attack which was comprised of a DNS Flood of 6.3 Gbps and 4.1 Mpps, a UDP Flood of 301 Mbps and 400K pps, a GET Flood, UDP Fragment, and ICMP Flood that peaked at 7.1 Gbps and 11.3 Mpps. 10:00 am PROLEXIC BOTNET TAKEDOWN WITH FBI The GET Flood attack finally provided some non spoofed IP addresses. Our SERT team using information from several sources triangulated several Command and Control PC’s or CNC’s . These addresses were then turned over to law enforcement. The FBI proceeded to monitor them to get more information. 8:00 pm BOTNET TAKEDOWN SUCCESSFUL Several CNC’s were taken down.
  • 29. 29 DDoS campaign day 4 – large financial customer 11:00 am ATTACKER UNLEASHES EVERYTHING THEY HAVE Another attack begins around 11 am. It started out small but by noon it had morphed into a VERY LARGE and COMPLEX attack. The attack vectors included: GET Flood, UDP Fragment, DNS Flood, ICMP Flood. This campaign peaked at a very impressive 54.30 Gbps and 4.90 Mpps.. Note: Prolexic is the only company in the world able to mitigate this size of attack. It should be noted that we were mitigating another 12 attacks for other clients at the same time as this 54 Gbps attack. That should give you some idea how big our network is, the effectiveness of our services, and the skill level of our technicians. Many providers would have been so focused on the huge attack that they would have missed the smaller, more deadly Layer 7 attack that was also launched.
  • 30. 30 DDoS campaign day 5 – large financial customer 9:30 am ALL QUIET ON THE BANKING FRONT No large attacks were recorded on Day 5. The customer directed additional traffic to Prolexic from some of its smaller, regional data centers. #ProtectionPeru2019
  • 31. 31 DDoS campaign day 6 – large financial customer 12:00 pm HOME COUNTRY OF ATTACKER IDENTIFIED Law enforcement narrows down the country origin of the attacker and starts to zero in. Attacker unsuccessful in impacting customer over several days. Many attacker C&C’s taken down.
  • 32. 32 DDoS campaign day 7 – large financial customer Note: ATTACKS END Attacks end on Day 7. Throughout the campaign the customers perimeter assets remained functional and responsive despite the best efforts of a very skilled attacker. The attack never became public and there was no lack of continuity in the day-to-day business. If the company did not have Prolexic in place the outcome of the campaign would have been dramatically different. Note: FORENSICS After several months of detailed forensics, it was evident the attackers had done extensive analysis of the target prior to the attack. #ProtectionPeru2019
  • 33. 33 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential Operation Ababil 2012- Cyber Security Trends #ProtectionPeru2019
  • 34. Operation Ababil Phase 1 Sep 12 – Early Nov 2012 • DNS Packets with “A” payload • Limited Layer 7 attacks • Began use of HTTP dynamic content to circumvent static caching defenses Phase 2 Dec 12, 2012 – Jan 29 • Incorporate random query strings and values • Additions to bot army • Burst probes to bypass rate-limiting controls • Addition of valid argument names, random values Phase 3 • Increased focus on Layer 7 attacks • Larger botnet • Highly distributed • Target banks where attacks work • Fraudsters take advantage Late Feb 2013 – May 2013 “none of the U.S banks will be safe from our attacks” Phase 4 • Updated attack scripts, harder to understand • Requests look more like normal browsers July 2013 – Now #ProtectionPeru2019
  • 35. • Top 5 Global Bank customer experienced a Denial of Service attack which attempted to bring down their retail banking web site. • Peak attack traffic was 1.46 Gbps, 73x normal. • Page Views peaked at over 6,600 per second, 220x normal. DDoS Attack – Banking Web Site (1 of 3)
  • 36. DDoS Attack – Banking Web Site (2 of 3) • Akamai Offloaded over 95% of bandwidth during the attack, protecting the site. • Origin bandwidth peaked at only 38 Mbps.
  • 37. DDoS Attack – Banking Web Site (3 of 3) • Anniversary of Sept. 18, 1931 “Mukden Incident” and Sept. 19 invasion of Manchuria. • #1 – DDoS attack on Sept. 18, 2010. • #2 – DDoS attack on Sept. 18, 2011. • #3 – DDoS attack on Sept. 18, 2012.
  • 38. Operation Ababil / 2nd Phase / 4th Week “none of the U.S banks will be safe from our attacks.”
  • 39. January 3, 2013 – Massive Banking DDoS Attack Always-on Protection • Top financial services firm with nearly 10M customers. • Peak attack traffic was 30 Gbps, 30x normal daily high traffic. • Attackers gave up after 15 minutes, and moved attack to another bank. • 100% of the attack was on SSL. Bank #1
  • 40. Massive Banking DDoS Attack • Akamai offloaded 100% of the attack. • “A bug impacting our windshield”. Bank #1 15 Minutes Total Origin Bandwidth (Attack ended at 11:25)
  • 41. Massive Banking DDoS Attack • “Probe” attack was then seen at another bank 25 minutes later. • Akamai Kona in place, and rate controls automatically activated. Bank #2
  • 42. Massive Banking DDoS Attack • 60 minutes later, 8 Gbps attack seen on a 3rd customer. • 100% of the attack was on SSL. • Akamai offload was over 99% Bank #3
  • 43. Non-Akamai bank hit at 12:03 PM • Compuware benchmark of bank home page, measured from 12 cities 1x per hour. • First performance hit recorded at 12:03 PM. • Performance and availability problems continued to 9:00 AM the following morning. 12:03 PM 9:00 AM Bank #4
  • 44. Non-Akamai bank attacked at 12:44 PM • First outage recorded at 12:44 PM. • Attack continued to 6:21 PM. • Bank attacked numerous times after January 3. Bank #5 12:44 PM 6:21 PM SITE UNAVAILABLE
  • 45. Prolexic Routed – DDoS Data center/infrastructure 20-40 attacks per day Kona WAF – CDN Web Application Attacks Machine Generated 80M WAF rules triggered per hour Akamai SOURCES OF INTEL 55 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
  • 46. 56 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
  • 47. 43% of all logins transactions are malicious 50 day period in Nov – Dec 2017 57 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential #ProtectionPeru2019
  • 48. Why is Credential Abuse so hard? It breaks the security controls already in place: • Low and Slow – 25% of the bots are used once • Volumetric – Millions of request • Layer 7 (application layer), not Network Layer (L3/4) • The most sensitive traffic – Usernames and passwords • Encrypted traffic – If you can’t see it, you can’t block it • APIs are hit – 3.7x more often than login pages Why is Credential Abuse so hard? 58 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential #ProtectionPeru2019
  • 49. 59 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential Digital Transformation War Stories #ProtectionPeru2019
  • 50. 60 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
  • 51. Are you ready for Digital Transformation? 61 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Investment Website Traffic 1/29/18 0:00 1/29/18 16:40 1/30/18 9:20 1/31/18 2:00 1/31/18 18:40 2/1/18 11:20 2/2/18 4:00 2/2/18 20:40 2/3/18 13:20 2/4/18 6:00 2/4/18 22:40 2/5/18 15:20 2/6/18 8:00 2/7/18 0:40 2/7/18 17:20 2/8/18 10:00 Traffic Example Investment WebSite Traffic Spikes 4x Traffic Spike
  • 52. • Social Media • “The convenience of mobile banking” • 15 minutes of downtime, and you need to report to your regulator L E S S O N S L E A R N E D T H E S T O R Y • Card skimmer leads to to $1M in theft in 2 hours • Word gets out on social media • Panicked customer check their accounts • 3 months worth of traffic in 1 hour • Datacenter overwhelmed • The bank goes down • Big national news F A C T O R S • Be prepared for flash crowds • Develop and exercise run books • Understand the risk to your business • Better call Akamai How an ATM can bring down your datacenter 62 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
  • 53. 63 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential How Akamai Reduces Risk #ProtectionPeru2019
  • 54. Data Loss Prevention – Kona as a virtual patch machine 66 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Struts CVE-2017-5638: • March 6th, the Apache team patched a vulnerability in Struts2 framework • Akamai engaged [unnamed customer] on March 9th • Rule deployed on March 10th covering all [customer] applications on Akamai • Rule in Monitor for visibility into any attacks/probes • Bake to ensure no adverse impact to applications/customers • Rule moved to Deny on March 12th
  • 55. Review – Industry Objections 67 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential Objection Description Objection Handling TLS Termination Akamai sees all PII and financial data ”in the clear”. - Education - Residual Risk - Data center visit - SXL - Limited ESSL maps - Contractual language - References TLS Certificates Akamai holds customer certs on all ESSL servers. Data Sovereignty Regulators require data to stay within country or region. Law enforcement could compel Akamai to disclose PII. Regulatory Challenges Customer believes that their regulator only allows end-to-end encryption. Both internal and external regulators.
  • 56. 68 | Empowering Digital Transformation in Financial Services | © 2019 Akamai | Confidential Akamai At-A-Glance #ProtectionPeru2019
  • 57. V I S I O N M I S S I O N To deliver a fast, reliable, and secure Internet to enable our financial services customers: • to grow their business • to deliver world class products and services • to give them a competitive edge Akamai is the business Internet for Financial Services The standard for performance, security, and mobile internet architectures across the Financial Services industry 69 | Empowering Digital Transformation in Financial Services | © 2018 Akamai | Confidential
  • 58. THANK YOU! Greivin Viquez Senior Solution Engineer