Although developed to support the infamous Bitcoin, the blockchain mechanism is proving to have a multitude of use-cases, from IoT micropayments to capital-market trading, retail banking and even voting.
The blockchain, in effect, is a distributed ledger, shared with hundreds of thousands of automated auditors that...
Cyber extortion has reached new proportions, including six-figure ransomware payments. Considering the payoff, cybersecurity experts expect these attacks to only increase. But stories made public provide limited knowledge of initial attack vector or details. This session presents real cases of cyber extortion on...
Although zero-day malware is relatively uncommon, most attacks do employ some form of purpose-built software to establish residency and "act" within our networks. By deconstructing and analyzing this code, we can gain great clarity into exactly how our adversaries operate. We can use such clues as hard-coded,...
All industries are adversely affected by the growing number of cyberattacks. But for the healthcare sector, with its large volume of structured patient information and patient care's increasing reliance on the use of electronic data - the growing sophistication of the attacks has forced it to focus on cybersecurity as...
Cybercriminals have had a successful and profitable year, increasing their revenue as well as their capabilities. In the last 12 months, these cybercriminals have become tremendously versatile. They have added to their arsenal of digital bank robbery such intrusions as ransomware and targeted attacks. Now, they are...
Always highly profitable but generally opportunistic in reaching its individual victims, digital hostage-taking, especially of the cryptographic variety, is now rapidly developing into a favorite technique of the more strategic, enterprise-focused attacker. You can have your business back, but for a fee in this new...
Advanced attackers always use advanced malware, right? Zero-day exploits, targeted malware, powerful modular frameworks- these are the stock and trade of your adversary.
So we've tuned our detection and hunting capability to ferret out the indicators left behind by this malware. Advances in memory forensics,...
When an organization suffers a data breach, a number of challenges, impacts, and business decisions contribute to the total of all the associated costs. The scope extends beyond a fixed dollar-per-stolen-record calculation, as it invariably includes expenditures for new security measures, legal fees, third-party...
Enterprises are pouring billions of dollars into preventing threat actors from infiltrating the organization. Yet, the rising level of breaches shows that dedicated threat actors will penetrate the organization. Perhaps then the problem is not a technological one, but is rather one of strategy in dealing with...
Malware continues to be an extremely effective tool in the cybercrime arsenal. In this session, we'll discuss how and why - and we'll also examine the connection between fraud and malicious code. We'll investigate how malware is designed to enrich cybercrime gangs and how to prevent intrusions, including:
How...
Mobile devices are expected to become the dominant banking and payment channel in the near future. This puts them directly in the cross-hairs of threat actors around the world as a prime vector to gain access to your information, network and money. In this session, we'll see exactly how rogue apps, malware and...
In a security landscape where the frenetic pace of technology has changed paradigms in ways organizations are struggling to cope with, Blue Coat's Hugh Thompson advises adopting a 'Degrees of Freedom' approach.
Real-time fraud detection isn't new to financial services but new products, channels and faster payments initiatives are accelerating the need for speed when it comes to meeting customer expectations. Consumers need to feel confident that effective risk management is in place, even as they demand convenience and...
Mobile devices are expected to become the dominant banking and payment channel in the near future. This puts them directly in the cross-hairs of threat actors around the world as a prime vector to gain access to your information, network and money. In this session we'll see exactly how rogue apps, malware and...
As various batches of stolen credit card "dumps" are offered for sale with discount structures and money-back guarantees, it is clear just how sophisticated the Fraud Ecosystem has become. The fraudsters and their support teams have created well-organized forums offering a broad variety of products that constitute a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.