Samvel Gevorgyan
CEO, CYBER GATES
MSc Information Systems & Cyber Security
Information Security
Management System in
the Banking Sector
COPYRIGHT 2017 © CYBER GATES
WWW.CYBERGATES.ORG
Information Security Management
System
(design)
PDCA Model applied to ISMS processes
Security measures meta-framework
Image source: www.enisa.europa.eu
Information security risks
Image source: www.enisa.europa.eu
Information security
governance approaches
(comparison)
Image source: ibimapublishing.com
Information Security Management
System
(implementation)
The biggest threats
1. Malicious software
• Infecting critical systems with ransomware
• Installing keyloggers to get sensitive data, etc.
2. IoT (Internet of Things) devices and botnets
• Hacking CCTV cameras to perform DoS/DDoS attacks, etc.
3. Phishing and social engineering
• Revealing confidential information relating to clients and employees
• Hacking corporate email accounts to alter payment bank account numbers, etc.
4. Business process compromise attacks
• Hacking processing system to redirect customers’ transactions
5. Third party services, unsecured mobile banking, unencrypted data, data
breaches, etc.
Malicious software
Infecting critical systems with malwares
IoT devices and botnets
Hacking CCTV cameras to perform DoS/DDoS attacks
Phishing and social engineering
Anomaly of phishing attack against bank employees
Business process compromise attacks
Third party services and mobile banking
Exploiting critical infrastructure weaknesses
Unencrypted data
and data breaches
The Open Banking and PSD2
The future of banking
The next generation payment system
The challenges and future of banking
Targets for hacking in the near future:
• Online / mobile banking systems
• Initial Coin Offering (ICO)
• Blockchain
• Cryptocurrency
The future of intrusion detection:
• Machine learning for preventing data leakages
• Artificial Intelligence for fighting financial fraud, malware anomalies, etc.
The future of mobile banking security:
• Biometric authentication for mobile banking (fingerprint, face and voice
recognition, etc.)
Cybersecurity solutions
for Financial Services
PinCat
PinCat is a unified threat management (UTM) solution that
combines multiple security features into a single platform to
protect your network, web, email, applications, and users
against advanced persistent threats (APT), DoS/DDoS
attacks, viruses, spyware, ransomware and spam messages.
• Protection against DDoS attack vectors up to 50 Gbit/s
• Next generation Firewall
• Data Loss Prevention
• Anti-Ransomware
• Advanced SPAM filter
FireEye
The FireEye Threat Prevention Platform
provides real-time, dynamic threat
protection without the use of signatures
to protect an organization across the
primary threat vectors and across the
different stages of an attack life cycle.
• Staying ahead of issues that could
endanger the bank’s mission
• Identifying and blocking unknown
cyber threats that are missed by
traditional defenses
• Preventing the potential compromise
of critical operations and data
Trend Micro
Coordinated threat defenses is a new approach
to enterprise security that helps address this
situation. It builds on the traditional tactic of
relying on comprehensive domain-level
countermeasures by emphasizing the additional
need for:
• Extensive, multi-way integration among
domain- and management-level components
• Overarching, cross-domain security data
analysis, correlation, and visualization
• Supplemental, global threat intelligence
• Intelligent coordination and automation of
essential threat response capabilities
MaxPatrol
MaxPatrol gives an unbiased picture of the state of
protection at the system, department, node, and
application levels. Pentesting, auditing, and compliance
verification—combined with support for diverse operating
systems, databases, and web apps—make MaxPatrol the
perfect choice for auditing security in real time, all the time,
at all levels of a corporate information system.
• All-in-one solution ensures consistent results
• Multilevel reporting tells the whole story
• Presets ease compliance

Information Security Management System in the Banking Sector

  • 1.
    Samvel Gevorgyan CEO, CYBERGATES MSc Information Systems & Cyber Security Information Security Management System in the Banking Sector COPYRIGHT 2017 © CYBER GATES WWW.CYBERGATES.ORG
  • 2.
  • 3.
    PDCA Model appliedto ISMS processes
  • 4.
    Security measures meta-framework Imagesource: www.enisa.europa.eu
  • 5.
    Information security risks Imagesource: www.enisa.europa.eu
  • 6.
  • 7.
  • 8.
    The biggest threats 1.Malicious software • Infecting critical systems with ransomware • Installing keyloggers to get sensitive data, etc. 2. IoT (Internet of Things) devices and botnets • Hacking CCTV cameras to perform DoS/DDoS attacks, etc. 3. Phishing and social engineering • Revealing confidential information relating to clients and employees • Hacking corporate email accounts to alter payment bank account numbers, etc. 4. Business process compromise attacks • Hacking processing system to redirect customers’ transactions 5. Third party services, unsecured mobile banking, unencrypted data, data breaches, etc.
  • 9.
  • 10.
    IoT devices andbotnets Hacking CCTV cameras to perform DoS/DDoS attacks
  • 11.
    Phishing and socialengineering Anomaly of phishing attack against bank employees
  • 12.
  • 13.
    Third party servicesand mobile banking Exploiting critical infrastructure weaknesses
  • 14.
  • 15.
    The Open Bankingand PSD2 The future of banking
  • 16.
    The next generationpayment system
  • 17.
    The challenges andfuture of banking Targets for hacking in the near future: • Online / mobile banking systems • Initial Coin Offering (ICO) • Blockchain • Cryptocurrency The future of intrusion detection: • Machine learning for preventing data leakages • Artificial Intelligence for fighting financial fraud, malware anomalies, etc. The future of mobile banking security: • Biometric authentication for mobile banking (fingerprint, face and voice recognition, etc.)
  • 18.
  • 19.
    PinCat PinCat is aunified threat management (UTM) solution that combines multiple security features into a single platform to protect your network, web, email, applications, and users against advanced persistent threats (APT), DoS/DDoS attacks, viruses, spyware, ransomware and spam messages. • Protection against DDoS attack vectors up to 50 Gbit/s • Next generation Firewall • Data Loss Prevention • Anti-Ransomware • Advanced SPAM filter
  • 20.
    FireEye The FireEye ThreatPrevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. • Staying ahead of issues that could endanger the bank’s mission • Identifying and blocking unknown cyber threats that are missed by traditional defenses • Preventing the potential compromise of critical operations and data
  • 21.
    Trend Micro Coordinated threatdefenses is a new approach to enterprise security that helps address this situation. It builds on the traditional tactic of relying on comprehensive domain-level countermeasures by emphasizing the additional need for: • Extensive, multi-way integration among domain- and management-level components • Overarching, cross-domain security data analysis, correlation, and visualization • Supplemental, global threat intelligence • Intelligent coordination and automation of essential threat response capabilities
  • 22.
    MaxPatrol MaxPatrol gives anunbiased picture of the state of protection at the system, department, node, and application levels. Pentesting, auditing, and compliance verification—combined with support for diverse operating systems, databases, and web apps—make MaxPatrol the perfect choice for auditing security in real time, all the time, at all levels of a corporate information system. • All-in-one solution ensures consistent results • Multilevel reporting tells the whole story • Presets ease compliance