SlideShare a Scribd company logo
1H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
INNOV-ACTS, Limited
H2020 FINSEC Project
The FINSEC project is co-funded from the European Union’s Horizon 2020 programme under grant
Agreement No 786727
Blockchain Sharing of Security
Information for Critical
Infrastructures of the Finance Sector
15/04/2020
2H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Objectives
▪ Identify the different components of the security platform
architecture
▪ Learn about the approach followed for the microservices
architecture
Topic
▪ Learn abut the challenges of the digitalization of financial
institutions
▪ Identify the different types of security attacks relevant to the
financial sector
▪ Understand the reasons needing an integrating approach
▪ Learn about pre-existing solutions
▪ Understand the different components of security threads
▪ Realize how to build a knowledge base
Goal
Financial Sector & Security
Attacks
Collaborative Risk
Assessment
FINSEC Platform
3H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Impact of Digitization in FInance
Financial Organisations
•increasingly digitizing their
operations based on the
deployment of advanced ICT
e.g., BigData, Artificial
Intelligence (AI) and the
Internet of Things (IoT
•including critical
infrastructures
Benefits
•boosts intelligence
•enables provocative
operations
•optimizes resources
Drawbacks
•Vulnerability to security
attacks : cybersecurity
attacks + hybrid
cybersecurity and physical
security attacks (e.g., attacks
against smart doors,
networked cameras, locks
and alarms)
4H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Financial Sector
& Security
Attacks
5H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Financial Infrastructures as Cyber Physical Systems
Physical dimension
• E.g., Automatic Teller
Machines (ATM), IT data
centers, network
infrastructures)
• Consequences for
consumers and SMEs
Cyber dimension
• Loss of personal
information, reputational
damage, costly and
unplanned downtimes in
business operations
• Lack of confidence in the
system
6H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Implications of the dual nature
Today’s model where physical and cyber security are addressed
separately has many limitations
• E.g., controlling access to plants, protecting financial and product records
physically) and cyber (e.g., malware, Trojan horses, denial of service attacks)
security concerns are considered in isolation
Need for integrated approaches that combines cybersecurity and
physical security aspects
Integrated solution for the critical infrastructures of the financial
sector
7H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Solution Guidelines
Integrated modelling of the infrastructure
• Key to an integrated approach is a data model that captures both
cyber and physical aspects of security
Integrated data processing and implementation of
integrated security policies
• Key to a successful implementation of a system that combines
cyber and physical security aspects is an integrated architecture
8H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Types of Attacks
Attacks
Attacks with
only physical
aspects
Attacks with
only cyber
aspects
Physical-
enabled
cyberattacks
Cyber-
enabled
physical
attacks
9H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Pre-existing integrated solutions
Augmented vulnerability assessment methodology for physical security in the cyber domain,
Vulnerability Assessment (VA), proven based on simulation and cost-benefit analysis
Integrated modelling approach for cyber-physical systems for power grids and critical
infrastructures for energy
Integrated security methodologies based on various disciplines and techniques e.g., control
theory, optimization, game theory
• Do not take a holistic data-driven approach
• Data driven systems do not provide the non-functional properties (e.g., scalability, performance) needed for their
deployment at scale
• Rarely address the special requirements of the financial sector: asset modelling, event correlation and regulatory
compliance (e.g., MiFID, GDPR, PSD2)
10H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Collaborative
Risk
Assessment
11H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Collaborative Risk Assessment: Risk Calculation
▪ Metrics at different levels:
▪ Vulnerability level
▪ Impact level
▪ Threat level
▪ Vulnerability & impact levels:
▪ CVSS (Common Vulnerability Scoring System)
▪ Free and open industry standard for assessing the severity of computer system security
vulnerabilities.
▪ Assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources
according to threat.
▪ Derived from the CVSS scores of the assets’ vulnerabilities detected
▪ Threat level:
▪ Result of events occurring inside the organization and historical information
12H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Services
▪ To initialize a risk calculation suite is the creation of a
Service
▪ Services are stored in the FINSEC data-tier hence, the
communication with it is critical
▪ Data tier is protected using basic authentication
▪ Creation involves the asset selection as well as the
vulnerability definition for each asset
▪ Leveraged by the introduction of a Security Knowledge Base
13H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Threats
▪ Threats that may target the service
▪ List of events should be defined
▪ Events affect the level of the threat in real-time
▪ Threats are associated with the Service using the risk
configuration object
▪ Threat objects must be stored in the Security Knowledge
Base
14H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Events
▪ Security officer needs to define event models and
then map them to a predefined threat e.g., “invalid
login attempt” is related to a “SWIFT compromise
threat”
▪ when a probe produces an instance of this model, the
platform detects it and if the trigger value is reached
for this specific event the overall risk of the related
threat is re-calculated
15H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Triggers: What triggers risk (re)calculation?
▪ Calculation can be triggered in three ways:
▪ Manually
▪ Vulnerabilities of the assets involved have
changed
▪ Event Instances reach a specified threshold.
16H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Risk calculations
▪ Service to function properly, certain preconditions need to
apply
▪ Service definition, the threat to event mapping and the
probe to be up and running
▪ Probe produces a new event which is forwarded through
the data collector to the FINSEC data-layer
▪ the Collaboration Service is connected to the data-layer and
“listening” for event instances
17H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Collaborative Risk Assessment Inputs/Outputs
18H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY
Sample Risk Visualization in the FINSEC Dashboard
Vulnerabilities for
the SWIFT service
pilot, categorized
by their domain
(cyber/physical)

More Related Content

What's hot

Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
Ulf Mattsson
 
MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018
Match-Maker Ventures
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
Ulf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
Ulf Mattsson
 
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtPeter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Infosecurity2010
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
Ulf Mattsson
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
Infosecurity2010
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
Ulf Mattsson
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
Anton Chuvakin
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
Ulf Mattsson
 
ETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco securityETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco security
ETIS - the Global IT Association for Telecommunications
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
FinTech Belgium
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Secunoid Systems Inc
 
Verderber Rothke What’s New With PCI
Verderber   Rothke   What’s New With PCIVerderber   Rothke   What’s New With PCI
Verderber Rothke What’s New With PCI
Ben Rothke
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
 
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Shawn Tuma
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Leonardo
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
docomusa
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
Next Dimension Inc.
 

What's hot (20)

Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018MMV Webinar 2. GDPR Insights. January 2018
MMV Webinar 2. GDPR Insights. January 2018
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs UtrechtPeter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
Peter Kornelisse, Infosecurity.nl, 4 november, Jaarbeurs Utrecht
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs UtrechtDavid Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
David Burg, Infosecurity.nl, 3 november, Jaarbeurs Utrecht
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
 
ETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco securityETIS Information Security Benchmark Successful Practices in telco security
ETIS Information Security Benchmark Successful Practices in telco security
 
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
Fintech Belgium - MeetUp on The Right Tech for your FinTech - Philippe Cornet...
 
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-publicCyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
Cyber security privacy-and-blockchain-perspective-14 nov2018-v01-public
 
Verderber Rothke What’s New With PCI
Verderber   Rothke   What’s New With PCIVerderber   Rothke   What’s New With PCI
Verderber Rothke What’s New With PCI
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
Data Security and Privacy by Contract: Hacking Us All Into Business Associate...
 
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
Selex ES at Le Bourget 2013 Cyber Security Seminar-Alessandro Menna
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 

Similar to 09 blockchain-security-information-sharing

10 the-finstix-data-model
10 the-finstix-data-model10 the-finstix-data-model
10 the-finstix-data-model
innov-acts-ltd
 
05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance
innov-acts-ltd
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
IT Governance Ltd
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
Brian Matteson, CISSP CISA
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
NetEnrich, Inc.
 
Tech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharingTech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharing
Jisc
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
Cohesive Networks
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
Joseph Wynn
 
2022-security-plan-template.pptx
2022-security-plan-template.pptx2022-security-plan-template.pptx
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
Rachel Anne Carter
 
Cs cmaster
Cs cmasterCs cmaster
Cs cmaster
Hafid CHEBRAOUI
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
ControlCase
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Alireza Ghahrood
 
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Nordic APIs
 
IASA ey deck presentation
IASA ey deck presentationIASA ey deck presentation
IASA ey deck presentation
Kenneth Dorado, CISA, HCISPP
 
Cybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionCybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & Construction
Aronson LLC
 
Webinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystWebinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence Analyst
Tuan Yang
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
Splunk
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
Judith Beckhard Cardoso
 
Make things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - Sigfox
Sigfox
 

Similar to 09 blockchain-security-information-sharing (20)

10 the-finstix-data-model
10 the-finstix-data-model10 the-finstix-data-model
10 the-finstix-data-model
 
05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance05 standards and general purpose regulations - impact on finance
05 standards and general purpose regulations - impact on finance
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
SOC for Cybersecurity Overview
SOC for Cybersecurity OverviewSOC for Cybersecurity Overview
SOC for Cybersecurity Overview
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
 
Tech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharingTech 2 Tech: increasing security posture and threat intelligence sharing
Tech 2 Tech: increasing security posture and threat intelligence sharing
 
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
CircleCity Con 2017 - Dwight Koop's talk Cybersecurity for real life: Using t...
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
2022-security-plan-template.pptx
2022-security-plan-template.pptx2022-security-plan-template.pptx
2022-security-plan-template.pptx
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Cs cmaster
Cs cmasterCs cmaster
Cs cmaster
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
 
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
Getting Better at Risk Management Using Event Driven Mesh Architecture - Ragh...
 
IASA ey deck presentation
IASA ey deck presentationIASA ey deck presentation
IASA ey deck presentation
 
Cybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionCybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & Construction
 
Webinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence AnalystWebinar - How to Become a Cyber-threat Intelligence Analyst
Webinar - How to Become a Cyber-threat Intelligence Analyst
 
SOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security WebinarSOC, Amore Mio! | Security Webinar
SOC, Amore Mio! | Security Webinar
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Make things come alive in a secure way - Sigfox
Make things come alive in a secure way - SigfoxMake things come alive in a secure way - Sigfox
Make things come alive in a secure way - Sigfox
 

More from innov-acts-ltd

H2020 finsec-ibm- aidan-shribman-finsec-skydive 260820
H2020 finsec-ibm- aidan-shribman-finsec-skydive 260820H2020 finsec-ibm- aidan-shribman-finsec-skydive 260820
H2020 finsec-ibm- aidan-shribman-finsec-skydive 260820
innov-acts-ltd
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
innov-acts-ltd
 
06 digitalization-in-finance
06 digitalization-in-finance06 digitalization-in-finance
06 digitalization-in-finance
innov-acts-ltd
 
04 regulations-impact-on-finance-sector
04 regulations-impact-on-finance-sector04 regulations-impact-on-finance-sector
04 regulations-impact-on-finance-sector
innov-acts-ltd
 
03 regulatory landscape&regtech
03 regulatory landscape&regtech03 regulatory landscape&regtech
03 regulatory landscape&regtech
innov-acts-ltd
 
02 the-fin tech-revolution
02 the-fin tech-revolution02 the-fin tech-revolution
02 the-fin tech-revolution
innov-acts-ltd
 
01 introduction-to-digital-finance
01 introduction-to-digital-finance01 introduction-to-digital-finance
01 introduction-to-digital-finance
innov-acts-ltd
 
Finsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4webFinsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4web
innov-acts-ltd
 

More from innov-acts-ltd (8)

H2020 finsec-ibm- aidan-shribman-finsec-skydive 260820
H2020 finsec-ibm- aidan-shribman-finsec-skydive 260820H2020 finsec-ibm- aidan-shribman-finsec-skydive 260820
H2020 finsec-ibm- aidan-shribman-finsec-skydive 260820
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
 
06 digitalization-in-finance
06 digitalization-in-finance06 digitalization-in-finance
06 digitalization-in-finance
 
04 regulations-impact-on-finance-sector
04 regulations-impact-on-finance-sector04 regulations-impact-on-finance-sector
04 regulations-impact-on-finance-sector
 
03 regulatory landscape&regtech
03 regulatory landscape&regtech03 regulatory landscape&regtech
03 regulatory landscape&regtech
 
02 the-fin tech-revolution
02 the-fin tech-revolution02 the-fin tech-revolution
02 the-fin tech-revolution
 
01 introduction-to-digital-finance
01 introduction-to-digital-finance01 introduction-to-digital-finance
01 introduction-to-digital-finance
 
Finsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4webFinsec innov-acts-open banking-london080319-4web
Finsec innov-acts-open banking-london080319-4web
 

Recently uploaded

Using Online job postings and survey data to understand labour market trends
Using Online job postings and survey data to understand labour market trendsUsing Online job postings and survey data to understand labour market trends
Using Online job postings and survey data to understand labour market trends
Labour Market Information Council | Conseil de l’information sur le marché du travail
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
asukqco
 
Initial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.pptInitial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.ppt
ribhi87
 
Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...
Labour Market Information Council | Conseil de l’information sur le marché du travail
 
The Rise and Fall of Ponzi Schemes in America.pptx
The Rise and Fall of Ponzi Schemes in America.pptxThe Rise and Fall of Ponzi Schemes in America.pptx
The Rise and Fall of Ponzi Schemes in America.pptx
Diana Rose
 
FCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptxFCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptx
nalamynandan
 
OAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptx
OAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptxOAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptx
OAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptx
hiddenlevers
 
13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx
ILC- UK
 
Independent Study - College of Wooster Research (2023-2024)
Independent Study - College of Wooster Research (2023-2024)Independent Study - College of Wooster Research (2023-2024)
Independent Study - College of Wooster Research (2023-2024)
AntoniaOwensDetwiler
 
Does teamwork really matter? Looking beyond the job posting to understand lab...
Does teamwork really matter? Looking beyond the job posting to understand lab...Does teamwork really matter? Looking beyond the job posting to understand lab...
Does teamwork really matter? Looking beyond the job posting to understand lab...
Labour Market Information Council | Conseil de l’information sur le marché du travail
 
Importance of community participation in development projects.pdf
Importance of community participation in development projects.pdfImportance of community participation in development projects.pdf
Importance of community participation in development projects.pdf
krisretro1
 
South Dakota State University degree offer diploma Transcript
South Dakota State University degree offer diploma TranscriptSouth Dakota State University degree offer diploma Transcript
South Dakota State University degree offer diploma Transcript
ynfqplhm
 
Ending stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across ScotlandEnding stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across Scotland
ResolutionFoundation
 
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
rlo9fxi
 
KYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
KYC Compliance: A Cornerstone of Global Crypto Regulatory FrameworksKYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
KYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
Any kyc Account
 
University of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma TranscriptUniversity of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma Transcript
tscdzuip
 
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
nimaruinazawa258
 
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
bresciafarid233
 
How to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete GuideHow to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete Guide
Daniel
 
一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查
一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查
一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查
taqyea
 

Recently uploaded (20)

Using Online job postings and survey data to understand labour market trends
Using Online job postings and survey data to understand labour market trendsUsing Online job postings and survey data to understand labour market trends
Using Online job postings and survey data to understand labour market trends
 
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
一比一原版(cwu毕业证书)美国中央华盛顿大学毕业证如何办理
 
Initial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.pptInitial Public Offering (IPO) Process.ppt
Initial Public Offering (IPO) Process.ppt
 
Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...Bridging the gap: Online job postings, survey data and the assessment of job ...
Bridging the gap: Online job postings, survey data and the assessment of job ...
 
The Rise and Fall of Ponzi Schemes in America.pptx
The Rise and Fall of Ponzi Schemes in America.pptxThe Rise and Fall of Ponzi Schemes in America.pptx
The Rise and Fall of Ponzi Schemes in America.pptx
 
FCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptxFCCS Basic Accounts Outline and Hierarchy.pptx
FCCS Basic Accounts Outline and Hierarchy.pptx
 
OAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptx
OAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptxOAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptx
OAT_RI_Ep20 WeighingTheRisks_May24_Trade Wars.pptx
 
13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx13 Jun 24 ILC Retirement Income Summit - slides.pptx
13 Jun 24 ILC Retirement Income Summit - slides.pptx
 
Independent Study - College of Wooster Research (2023-2024)
Independent Study - College of Wooster Research (2023-2024)Independent Study - College of Wooster Research (2023-2024)
Independent Study - College of Wooster Research (2023-2024)
 
Does teamwork really matter? Looking beyond the job posting to understand lab...
Does teamwork really matter? Looking beyond the job posting to understand lab...Does teamwork really matter? Looking beyond the job posting to understand lab...
Does teamwork really matter? Looking beyond the job posting to understand lab...
 
Importance of community participation in development projects.pdf
Importance of community participation in development projects.pdfImportance of community participation in development projects.pdf
Importance of community participation in development projects.pdf
 
South Dakota State University degree offer diploma Transcript
South Dakota State University degree offer diploma TranscriptSouth Dakota State University degree offer diploma Transcript
South Dakota State University degree offer diploma Transcript
 
Ending stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across ScotlandEnding stagnation: How to boost prosperity across Scotland
Ending stagnation: How to boost prosperity across Scotland
 
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
快速制作美国迈阿密大学牛津分校毕业证文凭证书英文原版一模一样
 
KYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
KYC Compliance: A Cornerstone of Global Crypto Regulatory FrameworksKYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
KYC Compliance: A Cornerstone of Global Crypto Regulatory Frameworks
 
University of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma TranscriptUniversity of North Carolina at Charlotte degree offer diploma Transcript
University of North Carolina at Charlotte degree offer diploma Transcript
 
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
 
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
Tdasx: In-Depth Analysis of Cryptocurrency Giveaway Scams and Security Strate...
 
How to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete GuideHow to Invest in Cryptocurrency for Beginners: A Complete Guide
How to Invest in Cryptocurrency for Beginners: A Complete Guide
 
一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查
一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查
一比一原版美国新罕布什尔大学(unh)毕业证学历认证真实可查
 

09 blockchain-security-information-sharing

  • 1. 1H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY INNOV-ACTS, Limited H2020 FINSEC Project The FINSEC project is co-funded from the European Union’s Horizon 2020 programme under grant Agreement No 786727 Blockchain Sharing of Security Information for Critical Infrastructures of the Finance Sector 15/04/2020
  • 2. 2H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Objectives ▪ Identify the different components of the security platform architecture ▪ Learn about the approach followed for the microservices architecture Topic ▪ Learn abut the challenges of the digitalization of financial institutions ▪ Identify the different types of security attacks relevant to the financial sector ▪ Understand the reasons needing an integrating approach ▪ Learn about pre-existing solutions ▪ Understand the different components of security threads ▪ Realize how to build a knowledge base Goal Financial Sector & Security Attacks Collaborative Risk Assessment FINSEC Platform
  • 3. 3H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Impact of Digitization in FInance Financial Organisations •increasingly digitizing their operations based on the deployment of advanced ICT e.g., BigData, Artificial Intelligence (AI) and the Internet of Things (IoT •including critical infrastructures Benefits •boosts intelligence •enables provocative operations •optimizes resources Drawbacks •Vulnerability to security attacks : cybersecurity attacks + hybrid cybersecurity and physical security attacks (e.g., attacks against smart doors, networked cameras, locks and alarms)
  • 4. 4H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Financial Sector & Security Attacks
  • 5. 5H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Financial Infrastructures as Cyber Physical Systems Physical dimension • E.g., Automatic Teller Machines (ATM), IT data centers, network infrastructures) • Consequences for consumers and SMEs Cyber dimension • Loss of personal information, reputational damage, costly and unplanned downtimes in business operations • Lack of confidence in the system
  • 6. 6H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Implications of the dual nature Today’s model where physical and cyber security are addressed separately has many limitations • E.g., controlling access to plants, protecting financial and product records physically) and cyber (e.g., malware, Trojan horses, denial of service attacks) security concerns are considered in isolation Need for integrated approaches that combines cybersecurity and physical security aspects Integrated solution for the critical infrastructures of the financial sector
  • 7. 7H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Solution Guidelines Integrated modelling of the infrastructure • Key to an integrated approach is a data model that captures both cyber and physical aspects of security Integrated data processing and implementation of integrated security policies • Key to a successful implementation of a system that combines cyber and physical security aspects is an integrated architecture
  • 8. 8H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Types of Attacks Attacks Attacks with only physical aspects Attacks with only cyber aspects Physical- enabled cyberattacks Cyber- enabled physical attacks
  • 9. 9H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Pre-existing integrated solutions Augmented vulnerability assessment methodology for physical security in the cyber domain, Vulnerability Assessment (VA), proven based on simulation and cost-benefit analysis Integrated modelling approach for cyber-physical systems for power grids and critical infrastructures for energy Integrated security methodologies based on various disciplines and techniques e.g., control theory, optimization, game theory • Do not take a holistic data-driven approach • Data driven systems do not provide the non-functional properties (e.g., scalability, performance) needed for their deployment at scale • Rarely address the special requirements of the financial sector: asset modelling, event correlation and regulatory compliance (e.g., MiFID, GDPR, PSD2)
  • 10. 10H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Collaborative Risk Assessment
  • 11. 11H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Collaborative Risk Assessment: Risk Calculation ▪ Metrics at different levels: ▪ Vulnerability level ▪ Impact level ▪ Threat level ▪ Vulnerability & impact levels: ▪ CVSS (Common Vulnerability Scoring System) ▪ Free and open industry standard for assessing the severity of computer system security vulnerabilities. ▪ Assign severity scores to vulnerabilities, allowing responders to prioritize responses and resources according to threat. ▪ Derived from the CVSS scores of the assets’ vulnerabilities detected ▪ Threat level: ▪ Result of events occurring inside the organization and historical information
  • 12. 12H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Services ▪ To initialize a risk calculation suite is the creation of a Service ▪ Services are stored in the FINSEC data-tier hence, the communication with it is critical ▪ Data tier is protected using basic authentication ▪ Creation involves the asset selection as well as the vulnerability definition for each asset ▪ Leveraged by the introduction of a Security Knowledge Base
  • 13. 13H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Threats ▪ Threats that may target the service ▪ List of events should be defined ▪ Events affect the level of the threat in real-time ▪ Threats are associated with the Service using the risk configuration object ▪ Threat objects must be stored in the Security Knowledge Base
  • 14. 14H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Events ▪ Security officer needs to define event models and then map them to a predefined threat e.g., “invalid login attempt” is related to a “SWIFT compromise threat” ▪ when a probe produces an instance of this model, the platform detects it and if the trigger value is reached for this specific event the overall risk of the related threat is re-calculated
  • 15. 15H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Triggers: What triggers risk (re)calculation? ▪ Calculation can be triggered in three ways: ▪ Manually ▪ Vulnerabilities of the assets involved have changed ▪ Event Instances reach a specified threshold.
  • 16. 16H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Risk calculations ▪ Service to function properly, certain preconditions need to apply ▪ Service definition, the threat to event mapping and the probe to be up and running ▪ Probe produces a new event which is forwarded through the data collector to the FINSEC data-layer ▪ the Collaboration Service is connected to the data-layer and “listening” for event instances
  • 17. 17H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Collaborative Risk Assessment Inputs/Outputs
  • 18. 18H2020 FINSEC – DIGITAL FINANCE ACADEMY FOR SECURITY Sample Risk Visualization in the FINSEC Dashboard Vulnerabilities for the SWIFT service pilot, categorized by their domain (cyber/physical)