Identity theft 3.0

It is a fact: social networks and the way people connect and share information have played a huge role in shaping up the 21st century. People are revealing more information about their identity through social networks creating online personas as valuable as their physical lives. But what happen when you open the door to online transactions? How do you verify identity in a new paradigm where physical identity documents are not commonly used? How can you be sure that online personas is really who they appear to be? What does identity actually means in this new era?

Exploring SIEM support in SWIFT Alliance with a Splunk Proof of Concept

As part of SWIFT Cyberlab programme, this session will explore how to leverage the new features of Release 7.2 such as Common Event Format (CEF) logging and other useful SIEM features to improve your Security Operations Centre (SOC) capabilities to detect cyber threats related to your SWIFT infrastructure. This session will explore those and You will also get a chance to see a live PoC showing a Splunk prototype implementation that includes dash boards and monitoring queries. Join us and discover how this could help further secure further your SWIFT Alliance infrastructure!

A practical guide to SWIFT security attestation

With all SWIFT users due to self-attest their level of compliance with SWIFT’s mandatory customer security controls by 31 December 2017, find out how your organisation can use the KYC Registry Security Attestation Application (KYC-SA) to submit your attestation. In this session we’ll demo the Application – providing you with the practical information you’ll need to manage your organisation’s self-attestation.

Cyber security: 12 months on…

What are people talking about at Sibos? Is cyber security still under the spotlight? What progresses have been made since last year?

Assaf Egozi from B-Hive, Jim Finkle from Reuters, and Marc Hofmann from SWIFT will discuss the main topics that are at the forefront of everyone’s mind when it comes to cyber, from the journey so far to the challenges ahead.

Sense maker session - Anatomy of a cyber attack (including networking cocktails)

The world’s leading cyber security experts are proficient in the anatomy of a cyber attack because they analyse every single action of hackers. How do they gain entry to our network? How might organisations identify the right weak points in their infrastructure to prevent them?

Adi Ashkenazy from XM Cyber will drive us through a hacking exercise and demonstrate how a new approach to cyber security defence can deliver maximum return on investment by understanding where you need to invest for the biggest impact.

Sense maker session - Re-thinking cyber (including networking cocktails)

We are all aware that the consequences of a cyber attack can be devastating. How can many attacks be stopped in their tracks? Could implementing simple cyber hygiene measures be a solution?

Pablos Holman from Intellectual Ventures Laboratory will showcase, the type of information that can be easily collected from all of us and the various ways to stop common forms of attack.

SWIFT Customer Security Programme – Customer security controls framework & self-attestation

SWIFT introduced its Customer Security Controls Framework in April 2017, creating a cyber-security baseline to reinforce security standards across the global industry. All SWIFT users must self-attest their level of compliance with SWIFT’s 16 mandatory customer security controls, and optionally with the 11 advisory controls, by latest end of December 2017 via The KYC Registry Security Attestation Application.

SWIFT ISAC – Cyber security information sharing

In May 2017, SWIFT introduced its SWIFT ISAC (Information Sharing and Analysis Centre) providing threat intelligence identified during the investigation of cyber incidents combined with information related to the SWIFT CSP programme.
The ISAC is more than an information sharing portal; it is part of SWIFT’s overall goal to assist the community in protecting itself against cyber-criminal activity.