A2
A3
A4
B
A1
 8 character BIC activated in
live environment.
 Connecting through a service
provider.
 New users joining swift .
 Extensive cyber security services experience and credentials.
 A strategic focus on cyber security services.
 A strong reputation and commitment towards the financial industry.
 Experience in Cyber security frameworks.
 Experience in SWIFT Customer Security Control Framework.
 Experience in SWIFT audit guidelines.
 Exposure in Leading international practices.
SWIFT CSP Presentations.pptx
SWIFT CSP Presentations.pptx

SWIFT CSP Presentations.pptx

  • 5.
  • 13.
     8 characterBIC activated in live environment.  Connecting through a service provider.  New users joining swift .
  • 18.
     Extensive cybersecurity services experience and credentials.  A strategic focus on cyber security services.  A strong reputation and commitment towards the financial industry.  Experience in Cyber security frameworks.  Experience in SWIFT Customer Security Control Framework.  Experience in SWIFT audit guidelines.  Exposure in Leading international practices.

Editor's Notes

  • #4 1.Secure your Environment Cyber Attacks. 2.Know and Limit access of people accessing your local swift environment. 3.Promptly detect and respond in case of cyber attack.