Although zero-day malware is relatively uncommon, most attacks do employ some form of purpose-built software to establish residency and "act" within our networks. By deconstructing and analyzing this code, we can gain great clarity into exactly how our adversaries operate. We can use such clues as hard-coded,...
All industries are adversely affected by the growing number of cyberattacks. But for the healthcare sector, with its large volume of structured patient information and patient care's increasing reliance on the use of electronic data - the growing sophistication of the attacks has forced it to focus on cybersecurity as...
Cybercriminals have had a successful and profitable year, increasing their revenue as well as their capabilities. In the last 12 months, these cybercriminals have become tremendously versatile. They have added to their arsenal of digital bank robbery such intrusions as ransomware and targeted attacks. Now, they are...
Always highly profitable but generally opportunistic in reaching its individual victims, digital hostage-taking, especially of the cryptographic variety, is now rapidly developing into a favorite technique of the more strategic, enterprise-focused attacker. You can have your business back, but for a fee in this new...
Advanced attackers always use advanced malware, right? Zero-day exploits, targeted malware, powerful modular frameworks- these are the stock and trade of your adversary.
So we've tuned our detection and hunting capability to ferret out the indicators left behind by this malware. Advances in memory forensics,...
When an organization suffers a data breach, a number of challenges, impacts, and business decisions contribute to the total of all the associated costs. The scope extends beyond a fixed dollar-per-stolen-record calculation, as it invariably includes expenditures for new security measures, legal fees, third-party...
Enterprises are pouring billions of dollars into preventing threat actors from infiltrating the organization. Yet, the rising level of breaches shows that dedicated threat actors will penetrate the organization. Perhaps then the problem is not a technological one, but is rather one of strategy in dealing with...
Malware continues to be an extremely effective tool in the cybercrime arsenal. In this session, we'll discuss how and why - and we'll also examine the connection between fraud and malicious code. We'll investigate how malware is designed to enrich cybercrime gangs and how to prevent intrusions, including:
How...
Mobile devices are expected to become the dominant banking and payment channel in the near future. This puts them directly in the cross-hairs of threat actors around the world as a prime vector to gain access to your information, network and money. In this session, we'll see exactly how rogue apps, malware and...
In a security landscape where the frenetic pace of technology has changed paradigms in ways organizations are struggling to cope with, Blue Coat's Hugh Thompson advises adopting a 'Degrees of Freedom' approach.
Real-time fraud detection isn't new to financial services but new products, channels and faster payments initiatives are accelerating the need for speed when it comes to meeting customer expectations. Consumers need to feel confident that effective risk management is in place, even as they demand convenience and...
Mobile devices are expected to become the dominant banking and payment channel in the near future. This puts them directly in the cross-hairs of threat actors around the world as a prime vector to gain access to your information, network and money. In this session we'll see exactly how rogue apps, malware and...
As various batches of stolen credit card "dumps" are offered for sale with discount structures and money-back guarantees, it is clear just how sophisticated the Fraud Ecosystem has become. The fraudsters and their support teams have created well-organized forums offering a broad variety of products that constitute a...
As various batches of stolen credit card "dumps" are offered for sale with discount structures and money-back guarantees, it is clear just how sophisticated the Fraud Ecosystem has become. The fraudsters and their support teams have created well-organized forums offering a broad variety of products that constitute a...
Intelligence is critical in mounting an effective defense and, equally as important, is an effective offense. This session will look at intelligence gathering from both sides of the DMZ. There is a great deal of critical information available about your adversaries and a startling amount about you, your organization,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.