It is a fact: social networks and the way people connect and share information have played a huge role in shaping up the 21st century. People are revealing more information about their identity through social networks creating online personas as valuable as their physical lives. But what happen when you open the door to online transactions? How do you verify identity in a new paradigm where physical identity documents are not commonly used? How can you be sure that online personas is really who they appear to be? What does identity actually means in this new era?
As part of SWIFT Cyberlab programme, this session will explore how to leverage the new features of Release 7.2 such as Common Event Format (CEF) logging and other useful SIEM features to improve your Security Operations Centre (SOC) capabilities to detect cyber threats related to your SWIFT infrastructure. This session will explore those and You will also get a chance to see a live PoC showing a Splunk prototype implementation that includes dash boards and monitoring queries. Join us and discover how this could help further secure further your SWIFT Alliance infrastructure!
With all SWIFT users due to self-attest their level of compliance with SWIFT’s mandatory customer security controls by 31 December 2017, find out how your organisation can use the KYC Registry Security Attestation Application (KYC-SA) to submit your attestation. In this session we’ll demo the Application – providing you with the practical information you’ll need to manage your organisation’s self-attestation.
The SWIFT ISAC portal contains all the security-related information relevant to those dealing with cyber security in your organisation. Join this session to see its current setup, learn about future enhancements and discuss potential improvements.
See how Daily Validation Reports can help you mitigate cyber-crime threats by giving you key insight to your payment activity and risks. Learn how these capabilities are moving into real-time, in-network message monitoring with a demo of SWIFT’s new Payment Controls service.
What are people talking about at Sibos? Is cyber security still under the spotlight? What progresses have been made since last year?
Assaf Egozi from B-Hive, Jim Finkle from Reuters, and Marc Hofmann from SWIFT will discuss the main topics that are at the forefront of everyone’s mind when it comes to cyber, from the journey so far to the challenges ahead.
The world’s leading cyber security experts are proficient in the anatomy of a cyber attack because they analyse every single action of hackers. How do they gain entry to our network? How might organisations identify the right weak points in their infrastructure to prevent them?
Adi Ashkenazy from XM Cyber will drive us through a hacking exercise and demonstrate how a new approach to cyber security defence can deliver maximum return on investment by understanding where you need to invest for the biggest impact.
We are all aware that the consequences of a cyber attack can be devastating. How can many attacks be stopped in their tracks? Could implementing simple cyber hygiene measures be a solution?
Pablos Holman from Intellectual Ventures Laboratory will showcase, the type of information that can be easily collected from all of us and the various ways to stop common forms of attack.
SWIFT introduced its Customer Security Controls Framework in April 2017, creating a cyber-security baseline to reinforce security standards across the global industry. All SWIFT users must self-attest their level of compliance with SWIFT’s 16 mandatory customer security controls, and optionally with the 11 advisory controls, by latest end of December 2017 via The KYC Registry Security Attestation Application.
In May 2017, SWIFT introduced its SWIFT ISAC (Information Sharing and Analysis Centre) providing threat intelligence identified during the investigation of cyber incidents combined with information related to the SWIFT CSP programme.
The ISAC is more than an information sharing portal; it is part of SWIFT’s overall goal to assist the community in protecting itself against cyber-criminal activity.