When money is the at the top of the mind of cybercriminals, where do they turn their heads to? The Banking Sector. With countless operations including Wealth Management, Trading, and Revenue Management, Investor Accounting, it is no light matter when we say that cybersecurity threats keep banks up at night. With data breaches rampantly hitting all types of organizations across the world, the banking sector, for obvious reasons, stays under a constant and increased pressure for safekeeping of their customer's data and more importantly, their money.
The journey from open banking to open finance+. The evolution of open banking based on API as of now and where it could go from here. Risks and opportunities for market participants.
CPAs responsibilities to detect fraud in audits, required approaches, types of financial statement frauds and specific case examples of different types of financial statement fraud
When money is the at the top of the mind of cybercriminals, where do they turn their heads to? The Banking Sector. With countless operations including Wealth Management, Trading, and Revenue Management, Investor Accounting, it is no light matter when we say that cybersecurity threats keep banks up at night. With data breaches rampantly hitting all types of organizations across the world, the banking sector, for obvious reasons, stays under a constant and increased pressure for safekeeping of their customer's data and more importantly, their money.
The journey from open banking to open finance+. The evolution of open banking based on API as of now and where it could go from here. Risks and opportunities for market participants.
CPAs responsibilities to detect fraud in audits, required approaches, types of financial statement frauds and specific case examples of different types of financial statement fraud
Use of Articificial Intelligence and technologies in providing financial services is what fintech does. Whether it is Payment gateway, insurance, banking, lending, stock trading, taxes.
How Fintech evolved over the years in the World and Indian Economy.
Indian Fintech Companies under different categories
Common Fintech practices adopted by Fintech Companies with better flexibility, convenience and accessibile financial products and services
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIsJeremy Brown
This was a fairly high level presentation I did at the APIdays Open Banking and Fintech event in London where I started to explore the main drivers for APIs, the mega trends in consumer banking and the various use cases for APIs within Financial Services.
Open Banking - Opening the door to Digital Transformation WSO2
The open data era is just beginning in Australia. While the main purpose of the Consumer Data Right is to provide consumers, better control over their data, it is also paving the way for banks and financial institutions to step into newer business models through digital transformation. This talk will detail how banks stand to benefit from an open data ecosystem with a winning strategy and the right tools to achieve it. It will discuss the following topics:
The journey from Open APIs to Open Banking - An ecosystem for digital transformation
Building an open banking strategy for long term success
Realising the digital transformation opportunities of Open Banking
Fighting Financial Crime with Artificial IntelligenceDataWorks Summit
How can we take the state of the art in deep learning and AI research, and transplant it into a large bank to deliver useful results which impact the general public? To answer this broad-reaching question, we take the viewer through a solution Think Big Analytics recently deployed at a major European bank for fraud detection, using state of the art AI techniques and a near-real time open-source architecture. We show how financial transactions can be transposed into a form where the latest AI techniques in image recognition can be leveraged, in surprisingly novel ways. We have been able to more accurately detect fraud and reduce financial crime, cutting losses and improving customer experience. We describe some architectures which can be used to do this in production, at scale, in global financial institutions.
Speaker:
Tim Seears, Director of Data Science, Think Big Analytics, a Teradata Company
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Consumers are looking for more than just banking and machine learning helps banks deliver that.
Machine learning contributes to areas such as credit decisions, risk management, personalized customer experiences, fraud detection, automation and much more.
This PDF will address the following points:
1. An overview of the banking sector and its importance in the economy
2. The top 5 banks in the US benefiting from the power of machine learning
3. The areas in banking where Machine Learning is applied
Blockchain is making revolutionary changes in various industries including, the finance sector. Using blockchain in the finance sector, many companies are already utilizing the benefits of this technology. But why should we consider using blockchain specifically?
At present, the financial industry is plagued with a lot of issues such as increasing cyber-attacks, poor IT infrastructure, complicated regulations across territories, payment frauds and identity thefts, delayed cross-border transactions, and so on. However, the finance sector is failing to tackle these problems leading to low customer satisfaction. Here, using blockchain in banking these companies can finally get rid of all of these issues for good.
So, how is Blockchain used in finance? Typically, blockchain can offer a lot of benefits such as efficient cross-border transactions, enforcing smart contracts, the establishment of central bank digital currency, increased data security, and many more. All of these advantages of using blockchain in the finance function are helping many enterprise-grade companies like HSBC, MasterCard, ING, etc. to solve their technological lacking.
We at 101 Blockchains believe blockchain is a prominent solution to secure the future of finance. That’s why we are offering premium quality blockchain courses and certification to help you be educated on the subject matter. We offer a selection of masterclasses and courses specifically for blockchain in finance.
Blockchain in Finance masterclass will focus on the practical implementation of blockchain and help you understand the effect of blockchain in the finance sector.
Learn more about the course from here ->
https://academy.101blockchains.com/courses/blockchain-in-finance
Central Bank Digital Currency (CBDC) Masterclass will focus on asset tokenization schemes and highlight the scope of creating digital assets.
Learn more about the course from here ->
https://academy.101blockchains.com/courses/central-bank-digital-currency
Enterprise Blockchains and Trade Finance Course will focus on how blockchain can improve current trade finance processes.
Learn more about the course from here ->
https://academy.101blockchains.com/courses/enterprise-blockchains-and-trade-finance
We also offer lucrative certification courses for professionals who want to learn about blockchain in order to develop blockchain-based finance applications.
Learn more about these courses from here ->
Certified Enterprise Blockchain Professional (CEBP) course https://academy.101blockchains.com/courses/blockchain-expert-certification
Certified Enterprise Blockchain Architect (CEBA) course
https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect
Certified Blockchain Security Architect (CBSE) course
https://academy.101blockchains.com/courses/certified-blockchain-security-expert
European Payment Summit presentation delivered by Nadja van der Veer of PaymentCounsel and Michael Burtscher of Minerva on 15 March 2018.
The presentation explored current issues around the regulation of cryptocurrencies, focusing on the following topics:
Cryptocleansing: how does it work?
Market concerns & regulatory responses
The road to crytpo licensing: learning from New York
Cryptoplatforms: success through compliance
To receive a copy of this presentation by email please get in touch: hello@minervapartnership.eu
For a while, I've had a vision of banking as a web service based upon widgets of functionality. This is becoming vital if banks are to fit into the semantic web. All of this is explained in my blog entry: http://thefinanser.co.uk/fsclub/2009/02/baas-banking-as-a-service-presentation.html.
Throughout the presentation there are links to the relevant entries here that explains it all too. Feel free to send me any comments or thoughts.
And, for lots more on this, have a look at my directory of social finance http://thefinanser.co.uk/fsclub/2009/04/a-directory-of-social-finance.html.
This analysis provides an overview of the top trends in the retail banking sector driven by the competition, digital transformation, and innovation led by retail banks exploring novel ways to create and retain value in evolving landscape.
COVID-19 caught banks off guard and shook legacy mindsets to the core. With 20/20 (2020) hindsight, firms are more aware, digitally resilient, and financially stable as they head into 2022. The trials of the past 18 months forced firms to shore up existing business and consider new models and revenue streams.
Customer-centricity remains at the top of most FS agendas and is a 2022 focal point. Banks will focus on achieving operational excellence as diligently as delivering superior CX. In 2022 and beyond, it will be paramount for FIs to explore and invest in new technologies to remain relevant and resilient.
Banking 4.X will arrive in full force in 2022 with platform-supported firms monetizing diverse ecosystem capabilities and aggressively harvesting data to create experiential customer journeys through intelligent and personalized engagements. The new era will compel future-focused banks to finally abandon legacy infrastructure and collaborate with third-party specialists to solidify their best-fit, long-term roles. Increasingly, open platforms will make banks invisible as banking becomes embedded into customer lifestyles. At the same time, banks will shed asset-heavy models and shift to the cloud for greater agility, speed to market, and faster innovation. The shift will act as a precursor to adopting new technologies on the horizon – 5G and Decentralized Finance.
The recent past was filled will extraordinary lessons for financial institutions. Now is the time to act on those learnings and move forward profitably.
Overview of Digital Financial Services LandscapeJohn Owens
This presentation reviews the digital financial service landscape and is a primer for regulators and policy makers wishing to better understand current market developments.
apidays London 2022 - The State of Banking APIs 2022, Mark Boyd, Platformableapidays
apidays London 2022 - The Path from Open Banking to Embedded Finance
October 26 & 27, 2022
The State of Banking APIs 2022
Mark Boyd, Director at Platformable
------
Check out our conferences at https://www.apidays.global/
Do you want to sponsor or talk at one of our conferences?
https://apidays.typeform.com/to/ILJeAaV8
Learn more on APIscene, the global media made by the community for the community:
https://www.apiscene.io
Explore the API ecosystem with the API Landscape:
https://apilandscape.apiscene.io/
Deep dive into the API industry with our reports:
https://www.apidays.global/industry-reports/
Subscribe to our global newsletter:
https://apidays.typeform.com/to/i1MPEW
Could the Attacks on the SWIFT Network Have Been Prevented?Easy Solutions Inc
Evidence is mounting that the ecosystem surrounding SWIFT transfers is vulnerable to fraud. While it uses a private network, SWIFT is still a messaging system and therefore an avenue for cybercriminals to launch a wide range of electronic attacks. With the launching of SWIFT Web access end customers become more attractive targets, which may lead to more attacks as criminals start phishing campaigns to compromise SWIFT credentials.
Use of Articificial Intelligence and technologies in providing financial services is what fintech does. Whether it is Payment gateway, insurance, banking, lending, stock trading, taxes.
How Fintech evolved over the years in the World and Indian Economy.
Indian Fintech Companies under different categories
Common Fintech practices adopted by Fintech Companies with better flexibility, convenience and accessibile financial products and services
APIdays Open Banking & Fintech: Workshop - Financial Services Use Cases for APIsJeremy Brown
This was a fairly high level presentation I did at the APIdays Open Banking and Fintech event in London where I started to explore the main drivers for APIs, the mega trends in consumer banking and the various use cases for APIs within Financial Services.
Open Banking - Opening the door to Digital Transformation WSO2
The open data era is just beginning in Australia. While the main purpose of the Consumer Data Right is to provide consumers, better control over their data, it is also paving the way for banks and financial institutions to step into newer business models through digital transformation. This talk will detail how banks stand to benefit from an open data ecosystem with a winning strategy and the right tools to achieve it. It will discuss the following topics:
The journey from Open APIs to Open Banking - An ecosystem for digital transformation
Building an open banking strategy for long term success
Realising the digital transformation opportunities of Open Banking
Fighting Financial Crime with Artificial IntelligenceDataWorks Summit
How can we take the state of the art in deep learning and AI research, and transplant it into a large bank to deliver useful results which impact the general public? To answer this broad-reaching question, we take the viewer through a solution Think Big Analytics recently deployed at a major European bank for fraud detection, using state of the art AI techniques and a near-real time open-source architecture. We show how financial transactions can be transposed into a form where the latest AI techniques in image recognition can be leveraged, in surprisingly novel ways. We have been able to more accurately detect fraud and reduce financial crime, cutting losses and improving customer experience. We describe some architectures which can be used to do this in production, at scale, in global financial institutions.
Speaker:
Tim Seears, Director of Data Science, Think Big Analytics, a Teradata Company
In recent months, many customers have been asking us the question – how to monetise Open APIs, simplify Fintech integrations and accelerate adoption of various Open Banking business models. Therefore, AWS and FinConecta would like to invite you to Open Finance marketplace presentation on October 20th.
Event Agenda :
Open banking so far (short recap)
• PSD2, OB UK, OB Australia, OB LATAM, OB Israel
Intro to Open Finance marketplace
• Scope
• Features
• Tech overview and Demo
The role of the Cloud
The Future of APIs
• Complying with regulation
• Monetizing data / APIs
• Business models
• Time to market
One platform for all: a Strategic approach
Q&A
Consumers are looking for more than just banking and machine learning helps banks deliver that.
Machine learning contributes to areas such as credit decisions, risk management, personalized customer experiences, fraud detection, automation and much more.
This PDF will address the following points:
1. An overview of the banking sector and its importance in the economy
2. The top 5 banks in the US benefiting from the power of machine learning
3. The areas in banking where Machine Learning is applied
Blockchain is making revolutionary changes in various industries including, the finance sector. Using blockchain in the finance sector, many companies are already utilizing the benefits of this technology. But why should we consider using blockchain specifically?
At present, the financial industry is plagued with a lot of issues such as increasing cyber-attacks, poor IT infrastructure, complicated regulations across territories, payment frauds and identity thefts, delayed cross-border transactions, and so on. However, the finance sector is failing to tackle these problems leading to low customer satisfaction. Here, using blockchain in banking these companies can finally get rid of all of these issues for good.
So, how is Blockchain used in finance? Typically, blockchain can offer a lot of benefits such as efficient cross-border transactions, enforcing smart contracts, the establishment of central bank digital currency, increased data security, and many more. All of these advantages of using blockchain in the finance function are helping many enterprise-grade companies like HSBC, MasterCard, ING, etc. to solve their technological lacking.
We at 101 Blockchains believe blockchain is a prominent solution to secure the future of finance. That’s why we are offering premium quality blockchain courses and certification to help you be educated on the subject matter. We offer a selection of masterclasses and courses specifically for blockchain in finance.
Blockchain in Finance masterclass will focus on the practical implementation of blockchain and help you understand the effect of blockchain in the finance sector.
Learn more about the course from here ->
https://academy.101blockchains.com/courses/blockchain-in-finance
Central Bank Digital Currency (CBDC) Masterclass will focus on asset tokenization schemes and highlight the scope of creating digital assets.
Learn more about the course from here ->
https://academy.101blockchains.com/courses/central-bank-digital-currency
Enterprise Blockchains and Trade Finance Course will focus on how blockchain can improve current trade finance processes.
Learn more about the course from here ->
https://academy.101blockchains.com/courses/enterprise-blockchains-and-trade-finance
We also offer lucrative certification courses for professionals who want to learn about blockchain in order to develop blockchain-based finance applications.
Learn more about these courses from here ->
Certified Enterprise Blockchain Professional (CEBP) course https://academy.101blockchains.com/courses/blockchain-expert-certification
Certified Enterprise Blockchain Architect (CEBA) course
https://academy.101blockchains.com/courses/certified-enterprise-blockchain-architect
Certified Blockchain Security Architect (CBSE) course
https://academy.101blockchains.com/courses/certified-blockchain-security-expert
European Payment Summit presentation delivered by Nadja van der Veer of PaymentCounsel and Michael Burtscher of Minerva on 15 March 2018.
The presentation explored current issues around the regulation of cryptocurrencies, focusing on the following topics:
Cryptocleansing: how does it work?
Market concerns & regulatory responses
The road to crytpo licensing: learning from New York
Cryptoplatforms: success through compliance
To receive a copy of this presentation by email please get in touch: hello@minervapartnership.eu
For a while, I've had a vision of banking as a web service based upon widgets of functionality. This is becoming vital if banks are to fit into the semantic web. All of this is explained in my blog entry: http://thefinanser.co.uk/fsclub/2009/02/baas-banking-as-a-service-presentation.html.
Throughout the presentation there are links to the relevant entries here that explains it all too. Feel free to send me any comments or thoughts.
And, for lots more on this, have a look at my directory of social finance http://thefinanser.co.uk/fsclub/2009/04/a-directory-of-social-finance.html.
This analysis provides an overview of the top trends in the retail banking sector driven by the competition, digital transformation, and innovation led by retail banks exploring novel ways to create and retain value in evolving landscape.
COVID-19 caught banks off guard and shook legacy mindsets to the core. With 20/20 (2020) hindsight, firms are more aware, digitally resilient, and financially stable as they head into 2022. The trials of the past 18 months forced firms to shore up existing business and consider new models and revenue streams.
Customer-centricity remains at the top of most FS agendas and is a 2022 focal point. Banks will focus on achieving operational excellence as diligently as delivering superior CX. In 2022 and beyond, it will be paramount for FIs to explore and invest in new technologies to remain relevant and resilient.
Banking 4.X will arrive in full force in 2022 with platform-supported firms monetizing diverse ecosystem capabilities and aggressively harvesting data to create experiential customer journeys through intelligent and personalized engagements. The new era will compel future-focused banks to finally abandon legacy infrastructure and collaborate with third-party specialists to solidify their best-fit, long-term roles. Increasingly, open platforms will make banks invisible as banking becomes embedded into customer lifestyles. At the same time, banks will shed asset-heavy models and shift to the cloud for greater agility, speed to market, and faster innovation. The shift will act as a precursor to adopting new technologies on the horizon – 5G and Decentralized Finance.
The recent past was filled will extraordinary lessons for financial institutions. Now is the time to act on those learnings and move forward profitably.
Overview of Digital Financial Services LandscapeJohn Owens
This presentation reviews the digital financial service landscape and is a primer for regulators and policy makers wishing to better understand current market developments.
apidays London 2022 - The State of Banking APIs 2022, Mark Boyd, Platformableapidays
apidays London 2022 - The Path from Open Banking to Embedded Finance
October 26 & 27, 2022
The State of Banking APIs 2022
Mark Boyd, Director at Platformable
------
Check out our conferences at https://www.apidays.global/
Do you want to sponsor or talk at one of our conferences?
https://apidays.typeform.com/to/ILJeAaV8
Learn more on APIscene, the global media made by the community for the community:
https://www.apiscene.io
Explore the API ecosystem with the API Landscape:
https://apilandscape.apiscene.io/
Deep dive into the API industry with our reports:
https://www.apidays.global/industry-reports/
Subscribe to our global newsletter:
https://apidays.typeform.com/to/i1MPEW
Could the Attacks on the SWIFT Network Have Been Prevented?Easy Solutions Inc
Evidence is mounting that the ecosystem surrounding SWIFT transfers is vulnerable to fraud. While it uses a private network, SWIFT is still a messaging system and therefore an avenue for cybercriminals to launch a wide range of electronic attacks. With the launching of SWIFT Web access end customers become more attractive targets, which may lead to more attacks as criminals start phishing campaigns to compromise SWIFT credentials.
Exploring DDoS Attacks: Impact to Community Financial InstitutionsJay McLaughlin
DDoS attacks have catapulted to the forefront of banking security news after the industry experienced a series of multi-phased attacks beginning back in September of 2012. Hackers launch DDoS attacks prompted by one of two common motives. Protest attacks, like OpUSA, target large, high-profile banks and are often launched for social or political purposes. Attacks on community banks are usually used to as a distraction in conjunction with account takeover attacks. This event is designed to strengthen the awareness and defenses of participants. Jay McLaughlin, this session's presenter, fights cybercrime aimed at financial institutions on a daily basis as Q2ebanking's Chief Security Officer. Jay will break down conceptual and technical aspects of DDoS attack types, clarify the differing attacker motives, and discuss how community banks can build a layered security model to prevent DDoS attacks.
Survival Guide for Million- Dollar CyberattacksPanda Security
Cybercrime is a very profitable and attractive business. This is a new phase of cyber theft that involves stealing money directly from banks, rather than from their customers, using phishing attacks to infect the computers of bank employees.
More info: http://bit.ly/2rjD6Gr
Francophoned – A Sophisticated Social Engineering AttackBy Syma.docxbudbarber38650
Francophoned – A Sophisticated Social Engineering Attack
By: Symantec Security Response ngRepeat: badge in author.badges SYMANTEC EMPLOYEE end ngRepeat: badge in author.badges
Created 28 Aug 2013 ngIf: privateContentItem ngIf: coAuthors.length
· 0 Comments ngIf: translationLinks.length Translations: ngRepeat: link in controller.listItems 日本語 end ngRepeat: link in controller.listItems end ngIf: translationLinks.length Share
ngIf: videoEmbed
In April 2013, the administrative assistant to a vice president at a French-based multinational company received an email referencing an invoice hosted on a popular file sharing service. A few minutes later, the same administrative assistant received a phone call from another vice president within the company, instructing her to examine and process the invoice. The vice president spoke with authority and used perfect French. However, the invoice was a fake and the vice president who called her was an attacker.
The supposed invoice was actually a remote access Trojan (RAT) that was configured to contact a command-and-control (C&C) server located in Ukraine. Using the RAT, the attacker immediately took control of the administrative assistant’s infected computer. They logged keystrokes, viewed the desktop, and browsed and exfiltrated files.
These tactics, using an email followed up by a phone call using perfect French, are highly unusual and are a sign of aggressive social engineering. In May 2013, Symantec Security Response published details on the first attacks of this type targeting organizations in Europe. Further investigations have revealed additional details of the attack strategy, attacks that are financially motivated and continue to this day.
Aggressive tactics
Many organizations and their banks employ defenses to prevent unauthorized money transfers. However, the attackers exercised additional aggressive social engineering tactics to defeat each of the defensive practices. For example, in one instance:
· The attacker initially compromised systems within an organization using their RAT.
· Once the systems were infected with the RAT, the attacker retrieved identifying information, including disaster recovery plans, of the organization’s bank and telecom providers, its points of contact with both providers and its bank and telecom account data.
· Using this data, the attacker was able to impersonate a company representative and called the organization’s telecom provider. They proved their authenticity to the telecom provider, claimed that a physical disaster had occurred and said that they needed all of the organization’s phone numbers to be redirected to attacker-controlled phones
· Immediately following the phone number redirection, the attacker faxed a request to the organization’s bank, requesting multiple large-sum wire transfers to numerous offshore accounts.
· As this was an unusual transaction, the bank representative called the organization’s number on record to validate the transaction. Th.
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Dr. Amarjeet Singh
Information is such a thing which if misused, leaked or breached can lead to undesirable consequences. Financial institutions have a lot of data of their customers. These data’s are regarding customers’ personal information, transactions and many more which are highly sensitive. The entire system by which financial institutions such as – banks run, are required to be secured from cyber breach. As by breaching these systems’ can lead to financial disaster. The rapid growth of IT infrastructure is not only considered a convenient way for customers in many perspectives but also it point out the lack of skilled manpower in our country. In banking sector, ATM, E-money laundering are the domain where crime occurred most of the time. So, this paper focuses on developing a conceptual framework based on secondary sources which included publications, journal, books etc. regarding the problem of cyber-threat happening in Bangladesh. It describes how a financial institute can make safe transaction using biometric based public key infrastructure with the help of digital certificate.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
3. Abstract
The Bangladeshian bank heist was a series of unauthorized
transactions made on an official computer of the central bank of
Bangladesh. The transactions were made using SWIFT system
to deliver the money in different accounts in Sri Lanka and
Philippines. The amount of money under the theft was nearly
$1 Billion, but most of the payment orders were blocked and
there have been some successful attempts to recover some
assets. Currently the origin of the attack has been connected to
the hacker group Lazarus and North Korea.
3
4. Introduction
As cyberspace has become an embedded element of contemporary
society, also banks have become vulnerable against cyber attacks.
Financial transactions all over the world are conducted digitally via
computer networks and banks are struggling with security issues in the
never-ending race against malicious hacker groups. Banks have
traditionally been perceived as trustworthy actors when it comes to
cyber security, but history knows multiple cases of successful cyber
attacks against banks. These successful and devastating attacks have
also lead to growing fear of cyber attacks amongst banks (Schuetze,
2016; Kuepper, 2017).
4
11-03-2020 CPT Case Study
6. Timeline of the attack
• The first initiatives for the Bangladeshian bank attack were made
in May 2015
• when four bank accounts were opened in Philippine bank for being
ready to future transactions. All of the accounts were not used until
the day of attack and were clearly established for attack only.
• The first problem in the audit process was made as none of these
accounts or their owners was authenticated in the process to
either check the validity of their owners or transactions.
11-03-2020
CPT Case Study 6
7. Timeline of the attack
• During the opening of a bank account this kind of procedure is not
unusual, but the bursts occurred in February 2016, should have
triggered actions in safe audit procedures.
• The breach to the Bangladesh Bank was made in January, 2016
• The access to bank’s servers made possible the breach to SWIFT
network and inject malware to it as it was not separated from other
parts.
11-03-2020
CPT Case Study 7
8. Timeline of the attack
• It is very likely that the attackers also installed a keylogger to get
the passwords for authorizing the transactions
• The target of the attack was the SWIFT Alliance Access software,
which is used widely in the banks around the world
• The attack itself was started in February, 4 in 2016 by making 35
payment instructions worth of $951M to Federal Reserve Bank
11-03-2020
CPT Case Study 8
9. Timeline of the attack
• The first five of the transactions were completed, but the
remaining were successfully blocked partly because of the
failures made by the attackers.
• The targets of the payments were in the Philippines and Sri
Lanka worth of about $100M.
• The unauthorized messages were notified in the Bangladesh
bank during the February 8
11-03-2020
CPT Case Study 9
11. Detection
• Guardian (2016b) reported that a bank heist worth almost 1
billion US dollars had been averted
• thanks to a spelling mistake in the payment transaction,
which prevented the automatic system from completing the
transaction
• As a result, Deutsche Bank had flagged the transaction as
suspect
11-03-2020 CPT Case Study 11
12. Detection
• Nevertheless, as the transaction had been approved by the
Fed, it was forwarded to Sri Lanka. There, the transaction
was caught by a banking official in the receiving bank as the
transfer was unusually large for Sri Lanka
• Before clearing the transfer, the Sri Lankan official had
contacted Deutsche Bank, which responded that the transfer
is indeed suspect.
11-03-2020 CPT Case Study 12
13. Detection
• As the recipient turned out to be a fake entity, the bank was able to
freeze the funds and ultimately return them to the originating bank
• Out of the reported total sum $870m of all transactions, the attackers
managed to transfer only $81m
• Fed alerted the central bank of Bangladesh after detecting that the
number of transfers to non-banking entities had surged. Without the
spelling mistake and the diligent work of banking officials, the attackers
could have got away with a way more substantial sum of money after
successfully inserting the forged transactions to the SWIFT network.
11-03-2020 CPT Case Study 13
15. Identity of the attacker
• the attacker did try to remove any evidence from the bank’s
systems, Kaspersky (2017a) managed to access some of the
data through backups of the systems
• The recovered files indicate, that the techniques and tools
used in the attack can be linked to a group known as
Lazarus.
11-03-2020
CPT Case Study 15
16. Identity of the attacker
• Kaspersky summarizes the activities of the Lazarus group as
follows:
“It’s malware has been found in many serious cyberattacks, such as the
massive data leak and file wiper attack on Sony Pictures Entertainment in 2014;
the cyberespionage campaign in South Korea, dubbed Operation Troy, in 2013;
and Operation DarkSeoul, which attacked South Korean media and financial
companies in 2013.”
11-03-2020
CPT Case Study 16
17. Identity of the attacker
• malware is identical to the malware used in the some of the
incidents mentioned above.
• Even though parts of the code have been modified, probably
in order change the signature of the malware and avoid
detection by automated traffic analyzing tools, the malware
samples from different incidents share some obscure
techniques
11-03-2020 CPT Case Study 17
18. Identity of the attacker
• which suggests that payload used in both attacks could come
from the same author or group.
• One of the obscure techniques found by Kaspersky (2017a)
is the complete rewrite of file contents and renaming the file
before deletion. Rewriting the file content, possibly multiple
times, is commonly used to try to remove the data from the
physical device and hinder forensic data recovery attempts.
11-03-2020
CPT Case Study 18
19. Identity of the attacker
• However, when combing through logs of a more recent
incident linked to the Lazarus group, Kaspersky (2017b)
found a link to the North Korea
• While criminals usually mask their real location and IP
addresses by using VPN services and proxies, the server
logs of a seized Command & Control server indicated, that
the server had been accessed once from a North Korean IP
address.
11-03-2020 CPT Case Study 19
20. Identity of the attacker
• While IP address is not really a solid evidence for North
Korea’s involvement in the group’s activities, it is nevertheless
compelling to consider, that the connection could indeed
originate from the operator’s real IP address
• It is entirely possible, that either human error or
misconfiguration has lead some of the operator’s network
traffic to be routed directly to the host instead of being routed
through a network of proxies and VPNs.
11-03-2020 CPT Case Study 20
22. Conclusion
• In addition to the monetary loss of $81m, the incident severely harmed
the trust in the IT systems of the global banking sector
• The SWIFT’s model seems to have failed to provide a layered security
approach, which allowed the attackers to exploit the system without
compromising the core servers of the SWIFT network
• SWIFT has taken action and warned the member banks about the
growing threat against the financial network, but the potential scale of
damage presented in the Bangladesh Central Bank case calls for more
concrete measures of system-level revision of the financial network
11-03-2020 CPT Case Study 22
23. Conclusion
• The weekend protocols also should be considered as a
vulnerability in banking sector
• The success of the heist was mostly relying on timing during
weekend: the lack of sufficient monitoring and means of
communication during weekend made it possible that the
unauthorized transactions were noticed not until four days
after the attack
11-03-2020 CPT Case Study 23
24. Conclusion
• Kaspersky however as a Russian company has also pointed
North Korea’s possible involvement in the bank heists
conducted by Lazarus. Whoever or whatever organization
was eventually behind the bank heist, the most important
thing is to focus on revisioning and enhancing the
cybersecurity of financial messaging networks and the
cybersecurity strategies of individual banks.
11-03-2020 CPT Case Study 24
25. “Unless and until our society recognizes
cyber bullying for what it is, the suffering
of thousands of silent victims will
continue”
Anna Maria Chavez
11-03-2020 CPT Case Study 25