Education: Cybersecurity 101 - Outwitting ingenious attackers

Cyber threats to payments are evolving fast, and are increasingly focused on exploiting weak payments processes and unsuspecting people, as well as vulnerable IT systems.

This talk will give examples of some recent (anonymised) successful attacks against financial institutions and the methods used by the attackers. In describing the attacks end-to-end it will illustrate the range of controls needed to defend against them - and dispel some myths as to the effectiveness of some traditional security controls.

SWIFT Customer Security Programme

The growing threat of cyberattacks has never been more pressing. While SWIFT’s network, software and services have not been compromised, each of these incidents took place after a customer suffered security breaches within its locally managed infrastructure. SWIFT customers are individually responsible for the security of their own environments, however, the security of the industry as a whole is a shared responsibility. As an industry cooperative, SWIFT is committed to playing an important role in reinforcing and safeguarding the security of the wider ecosystem.

SWIFT Customer Security Programme

The growing threat of cyberattacks has never been more pressing. While SWIFT’s network, software and services have not been compromised, each of these incidents took place after a customer suffered security breaches within its locally managed infrastructure. SWIFT customers are individually responsible for the security of their own environments, however, the security of the industry as a whole is a shared responsibility. As an industry cooperative, SWIFT is committed to playing an important role in reinforcing and safeguarding the security of the wider ecosystem.

Education: Cyber 101 – Artificial Intelligence for Information Security

InfoSec (information security) professionals are facing cyber threats that are increasing in both volume and complexity. Over the past year many discussions have taken place with security leaders about the application of Artificial Intelligence (AI) in InfoSec. Those discussions have highlighted a level of confusion concerning AI concepts. Specifically this confusion concerns the differences between Machine Learning (ML) and AI, and also raises the question, “What is Deep Learning?”.

Cyber attacks & AI predictions

This session will explore how to build artificial intelligent systems for InfoSec. With evolving attacks, we need a system that can continuously collect analyst input, incorporate the input and learn/adapt models that can mimic analysts. We will explore what kind of input from analysts is needed, how models can be learnt and adapted, how to utilize analyst time effectively and how to measure efficacy of such systems.

The spectre of cyber threats – How can the industry fight back?

The bad guys that live in the shadows are smart, well-resourced and are more focused than ever on the banking community – simply because that’s where the money is. Every organisation is a potential target. In response, the industry is starting to embed cyber-security in all aspects of their end-to-end process – from adopting robust security controls, instilling best practice, securing all the end-points, to protecting against the weakest link – human error.