SlideShare a Scribd company logo
1 of 10
10.45-11.15 Combating Constantly Evolving Advanced Threats –
Solution Architecture
Mats Aronsson, Nordic Technical Leader Trusteer,
IBM Security
© 2014 IBM Corporation
IBM Security
2
IBM Trusteer Pinpoint Services
Making advanced research work for you
Online/Mobile Banking
Trusteer Cloud
Snippets forwards
data to IBM cloud
3
IBM Cloud returns
actionable
information via:
-API
-Email
-Other
5
User connects to
Online Banking
Application
1
Application returns
page, with IBM
snippets
2
INTERNET
IBM Fraud ExpertsIBM Fraud Experts
IBM Fraud Experts
Analyze Access
4
© 2014 IBM Corporation
IBM Security
3
IBM Counter Fraud Management
Detect Respond Investigate Discover
GeoSpatial
Analytics
Context Analytics
Content Analytics
Entity Analytics Predictive
Analytics
Behavioral
Analytics
Content
Management
Business
Intelligence
Forensic Analysis
Social Network
Analysis
Decision
Management
Case
Management
GeoSpatial
Analytics
GeoSpatial
Analytics
Context AnalyticsContext Analytics
Content AnalyticsContent Analytics
Entity Analytics Predictive
Analytics
Predictive
Analytics
Behavioral
Analytics
Behavioral
Analytics
Content
Management
Business
Intelligence
Business
Intelligence
Forensic AnalysisForensic AnalysisForensic Analysis
Social Network
Analysis
Social Network
Analysis
Decision
Management
Decision
Management
Case
Management
Case
Management
Adapt with Agility
- Integrated platform capabilities in one product line
- Different fraud typologies need different analytical techniques
- Ingest more data to find threats (cyber, aml, fraud, identiity)
- Best-in-class capabilities blended together for strong defense
- Supported with Integrated Implementation Services
IBM Counter Fraud Management
An unparalleled arsenal of capabilities to combat today’s fraud and
compliance threats … and anticipate tomorrow’s schemes
© 2014 IBM Corporation
IBM Security
4
WWW
Phishing and
Malware Fraud
Advanced Threats
(Employees)
Online Banking
Enterprise Apps
Account Takeover,
New Account Fraud
Mobile Fraud Risk
Trusteer
Rapport
Trusteer
Rapport
Trusteer Pinpoint
Malware
Detection
Trusteer Pinpoint
Malware
Detection
Counter Fraud
Management
Counter Fraud
Management
Transactional
Fraud
Fraud Risk Indicators
• Compromised Device (Malware)
• Compromised Account/Credentials (Phishing)
• Criminal Account Takeover
• Device Risk (Fingerprint/Location/Reputation)
• Compromise History (Malware + Phishing)
Confirmed
Fraud
Trusteer
Mobile
SDK/APP
Trusteer
Mobile
SDK/APP
Trusteer Mobile Risk
Engine
Trusteer Mobile Risk
Engine
IBM Trusteer and CFM: Combine Cyber Fraud Risk with
Cross-Channel Customer and Payments Txn Risk
© 2014 IBM Corporation
IBM Security
5
IBM Trusteer and CFM: Combine Cyber Fraud
Risk with Cross-Channel Customer
and Payments Txn Risk
Online Banking
Counter Fraud Management
Trx Review
Counter Fraud Management
Trx Review
21 43+ + +
Together: High risk!
OR
Cyber Risk Moderate risk
Device Risk
New Device ID
Remote Access Tool
Proxy Device
New Location/Time
Mobile Risk factors
Cyber Fraud
Indicators
Phished Credentials
Malware Infection
1 2
Cross Channel Txn
Anomalies
ATM
Wire
Check
ACH
Customer Lifecycle
Anomalies
Profile changes
New Payees
New Beneficiaries
New Account
3 4
Cross
Channel, Trx
Anomalies
Moderate risk
Card
Online
IVR
etc
© 2014 IBM Corporation
IBM Security
6
Use Case: Fraud via Mobile Banking
App (with SDK) New device and/or unusual device location + new
acct + mobile deposit
Online Banking
Counter Fraud Management
Trx Review
Counter Fraud Management
Trx Review
21 43+ + +
Together: High risk!
OR
Cyber Risk Moderate risk
Device Risk
New Device ID
Remote Access Tool
Proxy Device
Location/Time
Jailbroken
Cyber Fraud
Indicators
Phished Credentials
Malware Infection
1 2
Cross Channel Txn
Anomalies
ATM
Wire
Check
Customer Lifecycle
Anomalies
Profile Changes
New Payees
New Beneficiaries
New Account
3 4
Cross
Channel, Trx
Anomalies
Low risk
Card
Online
IVR
etc
© 2014 IBM Corporation
IBM Security
7
Use Case: Malware Indicator Used to Limit Activity Credential
Theft (malware), New Payees
Online Banking
Counter Fraud Management
Txn Review
Counter Fraud Management
Txn Review
21 43+ + +
Together: Monitor txns (esp higher risk customers)
OR
Cyber Risk High risk
Device Risk
New Device ID
Remote Access Tool
Proxy Device
Location/Time
Jailbroken
Cyber Fraud
Indicators
Phished Credentials
Malware Infection
1 2
Cross Channel Txn
Anomalies
ATM
Wire
Check
ACH
Customer Lifecycle
Anomalies
Profile Changes
New Payees
New Beneficiaries
New Account
3 4
Cross
Channel, Trx
Anomalies
Low risk
Card
Online
IVR
etc
© 2014 IBM Corporation
IBM Security
8
Use Case: Account Takeover (Phishing)
Credential Theft via phishing, possible ATO, password change
Online Banking
Counter Fraud Management
Txn Review
Counter Fraud Management
Txn Review
21 43+ + +
Together: Monitor high risk activities
OR
Cyber Risk High risk
Device Risk
New Device ID
Remote Access Tool
Proxy Device
Location/Time
Jailbroken
Cyber Fraud
Indicators
Phished Credentials
Malware Infection
1 2 Cross Channel Txn
Anomalies
ATM
Wire
Check
ACH
Customer Lifecycle
Anomalies
Profile Changes
New Payees
New Beneficiaries
New Account
3 4
Cross
Channel, Trx
Anomalies
Low risk
Card
Online
IVR
etc
© 2014 IBM Corporation
IBM Security
9
Use Case: New Account Fraud
Credentials purchased in underground (no malware/phishing), new account setup
Online Banking
Counter Fraud Management
Txn Review
Counter Fraud Management
Txn Review
21 43+ + +
Together: Moderate Risk. Double check.
OR
Cyber Risk High risk
Device Risk
New Device ID
Known Fraud Device
Proxy Device
Location/Time
Jailbroken
Cyber Fraud
Indicators
Phished Credentials
Malware Infection
1 2
Cross Channel Txn
Anomalies
ATM
Wire
Check
ACH
Customer Lifecycle
Anomalies
Profile Changes
New Payees
New Beneficiaries
New Account
3 4
Cross
Channel, Trx
Anomalies
Low risk
Card
Online
IVR
etc
© 2014 IBM Corporation
IBM Security
9
Use Case: New Account Fraud
Credentials purchased in underground (no malware/phishing), new account setup
Online Banking
Counter Fraud Management
Txn Review
Counter Fraud Management
Txn Review
21 43+ + +
Together: Moderate Risk. Double check.
OR
Cyber Risk High risk
Device Risk
New Device ID
Known Fraud Device
Proxy Device
Location/Time
Jailbroken
Cyber Fraud
Indicators
Phished Credentials
Malware Infection
1 2
Cross Channel Txn
Anomalies
ATM
Wire
Check
ACH
Customer Lifecycle
Anomalies
Profile Changes
New Payees
New Beneficiaries
New Account
3 4
Cross
Channel, Trx
Anomalies
Low risk
Card
Online
IVR
etc

More Related Content

What's hot

Compliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesCompliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesAmazon Web Services
 
AWS Summit Singapore - Opening Keynote by Dr. Werner Vogels
AWS Summit Singapore - Opening Keynote by Dr. Werner VogelsAWS Summit Singapore - Opening Keynote by Dr. Werner Vogels
AWS Summit Singapore - Opening Keynote by Dr. Werner VogelsAmazon Web Services
 
Successful Cloud Adoption in Financial Services
Successful Cloud Adoption in Financial ServicesSuccessful Cloud Adoption in Financial Services
Successful Cloud Adoption in Financial ServicesAmazon Web Services
 
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptxTrack 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptxAmazon Web Services
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Amazon Web Services
 
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summits
 
Mining Intelligent Insights: AI/ML for Financial Services
Mining Intelligent Insights: AI/ML for Financial ServicesMining Intelligent Insights: AI/ML for Financial Services
Mining Intelligent Insights: AI/ML for Financial ServicesAmazon Web Services LATAM
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Amazon Web Services
 
Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...
Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...
Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...Amazon Web Services
 
Next Generation Education: Technology in the Classroom and Beyond
Next Generation Education: Technology in the Classroom and BeyondNext Generation Education: Technology in the Classroom and Beyond
Next Generation Education: Technology in the Classroom and BeyondAmazon Web Services
 
Bringing the Internet of Things “IoT” to Government: Enabling Smart Nations
Bringing the Internet of Things “IoT” to Government: Enabling Smart NationsBringing the Internet of Things “IoT” to Government: Enabling Smart Nations
Bringing the Internet of Things “IoT” to Government: Enabling Smart NationsAmazon Web Services
 
Track 1 Session 5_數位創新 市場資料雲端分析與應用(new).pptx
Track 1 Session 5_數位創新  市場資料雲端分析與應用(new).pptxTrack 1 Session 5_數位創新  市場資料雲端分析與應用(new).pptx
Track 1 Session 5_數位創新 市場資料雲端分析與應用(new).pptxAmazon Web Services
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Amazon Web Services
 
Build Mobile Apps using AWS SDKs and AWS Mobile Hub
Build Mobile Apps using AWS SDKs and AWS Mobile HubBuild Mobile Apps using AWS SDKs and AWS Mobile Hub
Build Mobile Apps using AWS SDKs and AWS Mobile HubAmazon Web Services
 
運用AWS無伺服器架構建立車聯網平台
運用AWS無伺服器架構建立車聯網平台運用AWS無伺服器架構建立車聯網平台
運用AWS無伺服器架構建立車聯網平台Amazon Web Services
 
The Modern Day Pressures and Trends Driving Cloud Access Requirements
The Modern Day Pressures and Trends Driving Cloud Access RequirementsThe Modern Day Pressures and Trends Driving Cloud Access Requirements
The Modern Day Pressures and Trends Driving Cloud Access RequirementsAmazon Web Services
 

What's hot (20)

AWS in FSI 2019
AWS in FSI 2019AWS in FSI 2019
AWS in FSI 2019
 
Compliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesCompliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” Principles
 
AWS Summit Singapore - Opening Keynote by Dr. Werner Vogels
AWS Summit Singapore - Opening Keynote by Dr. Werner VogelsAWS Summit Singapore - Opening Keynote by Dr. Werner Vogels
AWS Summit Singapore - Opening Keynote by Dr. Werner Vogels
 
Successful Cloud Adoption in Financial Services
Successful Cloud Adoption in Financial ServicesSuccessful Cloud Adoption in Financial Services
Successful Cloud Adoption in Financial Services
 
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptxTrack 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
 
AWS in Financial Services
AWS in Financial ServicesAWS in Financial Services
AWS in Financial Services
 
Mining Intelligent Insights: AI/ML for Financial Services
Mining Intelligent Insights: AI/ML for Financial ServicesMining Intelligent Insights: AI/ML for Financial Services
Mining Intelligent Insights: AI/ML for Financial Services
 
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
Session Sponsored by Intel: Smart Cities, Infrastructure and Health powered b...
 
Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...
Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...
Transforming Consumer Banking with a 100% Cloud-Based Bank (FSV204) - AWS re:...
 
Next Generation Education: Technology in the Classroom and Beyond
Next Generation Education: Technology in the Classroom and BeyondNext Generation Education: Technology in the Classroom and Beyond
Next Generation Education: Technology in the Classroom and Beyond
 
Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
Bringing the Internet of Things “IoT” to Government: Enabling Smart Nations
Bringing the Internet of Things “IoT” to Government: Enabling Smart NationsBringing the Internet of Things “IoT” to Government: Enabling Smart Nations
Bringing the Internet of Things “IoT” to Government: Enabling Smart Nations
 
AWS Adoption in FSI
AWS Adoption in FSIAWS Adoption in FSI
AWS Adoption in FSI
 
Track 1 Session 5_數位創新 市場資料雲端分析與應用(new).pptx
Track 1 Session 5_數位創新  市場資料雲端分析與應用(new).pptxTrack 1 Session 5_數位創新  市場資料雲端分析與應用(new).pptx
Track 1 Session 5_數位創新 市場資料雲端分析與應用(new).pptx
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
Build Mobile Apps using AWS SDKs and AWS Mobile Hub
Build Mobile Apps using AWS SDKs and AWS Mobile HubBuild Mobile Apps using AWS SDKs and AWS Mobile Hub
Build Mobile Apps using AWS SDKs and AWS Mobile Hub
 
運用AWS無伺服器架構建立車聯網平台
運用AWS無伺服器架構建立車聯網平台運用AWS無伺服器架構建立車聯網平台
運用AWS無伺服器架構建立車聯網平台
 
The Modern Day Pressures and Trends Driving Cloud Access Requirements
The Modern Day Pressures and Trends Driving Cloud Access RequirementsThe Modern Day Pressures and Trends Driving Cloud Access Requirements
The Modern Day Pressures and Trends Driving Cloud Access Requirements
 

Viewers also liked

Cloud Foundry Summit 2015: Building a Robust Cloud Foundry (HA, Security and DR)
Cloud Foundry Summit 2015: Building a Robust Cloud Foundry (HA, Security and DR)Cloud Foundry Summit 2015: Building a Robust Cloud Foundry (HA, Security and DR)
Cloud Foundry Summit 2015: Building a Robust Cloud Foundry (HA, Security and DR)VMware Tanzu
 
Big Data in Financial Services
Big Data in Financial ServicesBig Data in Financial Services
Big Data in Financial ServicesEikos Partners
 
IBM Banking videocast - 3/20/2013
IBM Banking videocast - 3/20/2013 IBM Banking videocast - 3/20/2013
IBM Banking videocast - 3/20/2013 Casey Lucas
 
FircoSoft Company Overview
FircoSoft Company OverviewFircoSoft Company Overview
FircoSoft Company OverviewFircoSoft
 
Banking application architecture mishra
Banking application architecture mishraBanking application architecture mishra
Banking application architecture mishraAjay Mishra
 
IBM Industry Models and Data Lake
IBM Industry Models and Data Lake IBM Industry Models and Data Lake
IBM Industry Models and Data Lake Pat O'Sullivan
 
R.özgür akbaş ödev 4 girişimcilik
R.özgür akbaş ödev 4 girişimcilikR.özgür akbaş ödev 4 girişimcilik
R.özgür akbaş ödev 4 girişimcilikÖzgür Akbaş
 
Informe_Donaciones_11-12_ing_3
Informe_Donaciones_11-12_ing_3Informe_Donaciones_11-12_ing_3
Informe_Donaciones_11-12_ing_3Jorge Chial
 
Beneficios económicos del Dividendo Digital para América Latina
Beneficios económicos del Dividendo Digital para América LatinaBeneficios económicos del Dividendo Digital para América Latina
Beneficios económicos del Dividendo Digital para América LatinaTelecomCIDE
 
Campus Lycee - Printemps 2011
Campus Lycee - Printemps 2011Campus Lycee - Printemps 2011
Campus Lycee - Printemps 2011Laetitia Naon
 
Electronic records of undesirable driving events
Electronic records of undesirable driving eventsElectronic records of undesirable driving events
Electronic records of undesirable driving eventsOren_Musicant
 
Nevel Consultores en Castilla y León Económica
Nevel Consultores en Castilla y León EconómicaNevel Consultores en Castilla y León Económica
Nevel Consultores en Castilla y León EconómicaCastilla y León Económica
 
Profiting from customer profitability + big data fitzgerald analytics
Profiting from customer profitability + big data fitzgerald analyticsProfiting from customer profitability + big data fitzgerald analytics
Profiting from customer profitability + big data fitzgerald analyticsFitzgerald Analytics, Inc.
 
Unidad 1 PAI introd Wer ist das? Wie heisst das?
Unidad 1 PAI introd  Wer ist das? Wie heisst das?Unidad 1 PAI introd  Wer ist das? Wie heisst das?
Unidad 1 PAI introd Wer ist das? Wie heisst das?amesstorff
 
Holistic Solutions for Key Challenges of the Wealth Management Industry
Holistic Solutions for Key Challenges of the Wealth Management Industry Holistic Solutions for Key Challenges of the Wealth Management Industry
Holistic Solutions for Key Challenges of the Wealth Management Industry Infosys
 
In the Hands of God: A Study of Risk & Savings in Afghanistan
In the Hands of God: A Study of Risk & Savings in AfghanistanIn the Hands of God: A Study of Risk & Savings in Afghanistan
In the Hands of God: A Study of Risk & Savings in AfghanistanJan Chipchase
 

Viewers also liked (20)

Cloud Foundry Summit 2015: Building a Robust Cloud Foundry (HA, Security and DR)
Cloud Foundry Summit 2015: Building a Robust Cloud Foundry (HA, Security and DR)Cloud Foundry Summit 2015: Building a Robust Cloud Foundry (HA, Security and DR)
Cloud Foundry Summit 2015: Building a Robust Cloud Foundry (HA, Security and DR)
 
Big Data in Financial Services
Big Data in Financial ServicesBig Data in Financial Services
Big Data in Financial Services
 
IBM Banking videocast - 3/20/2013
IBM Banking videocast - 3/20/2013 IBM Banking videocast - 3/20/2013
IBM Banking videocast - 3/20/2013
 
FircoSoft Company Overview
FircoSoft Company OverviewFircoSoft Company Overview
FircoSoft Company Overview
 
Banking application architecture mishra
Banking application architecture mishraBanking application architecture mishra
Banking application architecture mishra
 
IBM Industry Models and Data Lake
IBM Industry Models and Data Lake IBM Industry Models and Data Lake
IBM Industry Models and Data Lake
 
R.özgür akbaş ödev 4 girişimcilik
R.özgür akbaş ödev 4 girişimcilikR.özgür akbaş ödev 4 girişimcilik
R.özgür akbaş ödev 4 girişimcilik
 
Informe_Donaciones_11-12_ing_3
Informe_Donaciones_11-12_ing_3Informe_Donaciones_11-12_ing_3
Informe_Donaciones_11-12_ing_3
 
Tesis mareomotriz
Tesis mareomotrizTesis mareomotriz
Tesis mareomotriz
 
Beneficios económicos del Dividendo Digital para América Latina
Beneficios económicos del Dividendo Digital para América LatinaBeneficios económicos del Dividendo Digital para América Latina
Beneficios económicos del Dividendo Digital para América Latina
 
Campus Lycee - Printemps 2011
Campus Lycee - Printemps 2011Campus Lycee - Printemps 2011
Campus Lycee - Printemps 2011
 
VI TORNEO DE FUTBOL DE NAVIDAD -DIPUTACION DE ZAMORA-
VI TORNEO DE FUTBOL DE NAVIDAD -DIPUTACION DE ZAMORA-VI TORNEO DE FUTBOL DE NAVIDAD -DIPUTACION DE ZAMORA-
VI TORNEO DE FUTBOL DE NAVIDAD -DIPUTACION DE ZAMORA-
 
Futbol café. selección colombiana de fútbol.
Futbol café. selección colombiana de fútbol.  Futbol café. selección colombiana de fútbol.
Futbol café. selección colombiana de fútbol.
 
Electronic records of undesirable driving events
Electronic records of undesirable driving eventsElectronic records of undesirable driving events
Electronic records of undesirable driving events
 
Nevel Consultores en Castilla y León Económica
Nevel Consultores en Castilla y León EconómicaNevel Consultores en Castilla y León Económica
Nevel Consultores en Castilla y León Económica
 
Profiting from customer profitability + big data fitzgerald analytics
Profiting from customer profitability + big data fitzgerald analyticsProfiting from customer profitability + big data fitzgerald analytics
Profiting from customer profitability + big data fitzgerald analytics
 
Unidad 1 PAI introd Wer ist das? Wie heisst das?
Unidad 1 PAI introd  Wer ist das? Wie heisst das?Unidad 1 PAI introd  Wer ist das? Wie heisst das?
Unidad 1 PAI introd Wer ist das? Wie heisst das?
 
Holistic Solutions for Key Challenges of the Wealth Management Industry
Holistic Solutions for Key Challenges of the Wealth Management Industry Holistic Solutions for Key Challenges of the Wealth Management Industry
Holistic Solutions for Key Challenges of the Wealth Management Industry
 
RODOLINS 08
RODOLINS 08RODOLINS 08
RODOLINS 08
 
In the Hands of God: A Study of Risk & Savings in Afghanistan
In the Hands of God: A Study of Risk & Savings in AfghanistanIn the Hands of God: A Study of Risk & Savings in Afghanistan
In the Hands of God: A Study of Risk & Savings in Afghanistan
 

Similar to Combating Constantly Evolving Advanced Threats – Solution Architecture

Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemMarketingArrowECS_CZ
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareIBM Security
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...ForgeRock
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepIBM Security
 
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14IBM Sverige
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsIBM Security
 
Nuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainNuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainIBM Security
 
CSI2008 Gunter Ollmann Man-in-the-browser
CSI2008 Gunter Ollmann Man-in-the-browserCSI2008 Gunter Ollmann Man-in-the-browser
CSI2008 Gunter Ollmann Man-in-the-browserguestb1956e
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYForgeRock
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention CMR WORLD TECH
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling finalMARIUS EUGEN OPRAN
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunk
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...Criminal IP
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account securityRaleigh ISSA
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkIBM Security
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...Luigi Delgrosso
 

Similar to Combating Constantly Evolving Advanced Threats – Solution Architecture (20)

Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
 
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...Using Network Security and Identity Management to Empower CISOs Today: The Ca...
Using Network Security and Identity Management to Empower CISOs Today: The Ca...
 
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never SleepCybercrime Threat Landscape: Cyber Criminals Never Sleep
Cybercrime Threat Landscape: Cyber Criminals Never Sleep
 
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Nuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack ChainNuts & Bolts of the Dynamic Attack Chain
Nuts & Bolts of the Dynamic Attack Chain
 
CSI2008 Gunter Ollmann Man-in-the-browser
CSI2008 Gunter Ollmann Man-in-the-browserCSI2008 Gunter Ollmann Man-in-the-browser
CSI2008 Gunter Ollmann Man-in-the-browser
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
 
Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention Winning the war on cybercrime keys to holistic fraud prevention
Winning the war on cybercrime keys to holistic fraud prevention
 
2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final2. Cyber Intelligence in online gambling final
2. Cyber Intelligence in online gambling final
 
SplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral AnalyticsSplunkSummit 2015 - Splunk User Behavioral Analytics
SplunkSummit 2015 - Splunk User Behavioral Analytics
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
 

More from IBM Sverige

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18IBM Sverige
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18IBM Sverige
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
IBM Sverige
 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, InterexionIBM Sverige
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBMIBM Sverige
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetIBM Sverige
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'IBM Sverige
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored IBM Sverige
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architectedIBM Sverige
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explainedIBM Sverige
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1IBM Sverige
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalIBM Sverige
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcmIBM Sverige
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18IBM Sverige
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_aiIBM Sverige
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1IBM Sverige
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box IBM Sverige
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människornaIBM Sverige
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2IBM Sverige
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIBM Sverige
 

More from IBM Sverige (20)

Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
Trender, inspirationer och visioner - Mikael Haglund #ibmbpsse18
 
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
AI – hur långt har vi kommit? – Oskar Malmström, IBM #ibmbpsse18
 
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar
#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

#ibmbpsse18 - The journey to AI - Mikko Hörkkö, Elinar

 
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
#ibmbpsse18 - Koppla säkert & redundant till IBM Cloud - Magnus Huss, Interexion
 
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
#ibmbpsse18 - Den svenska marknaden, Andreas Lundgren, CMO, IBM
 
Multiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska UniversitetssjukhusetMultiresursplanering - Karolinska Universitetssjukhuset
Multiresursplanering - Karolinska Universitetssjukhuset
 
Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'Solving Challenges With 'Huge Data'
Solving Challenges With 'Huge Data'
 
Blockchain explored
Blockchain explored Blockchain explored
Blockchain explored
 
Blockchain architected
Blockchain architectedBlockchain architected
Blockchain architected
 
Blockchain explained
Blockchain explainedBlockchain explained
Blockchain explained
 
Grow smarter project kista watson summit 2018_tommy auoja-1
Grow smarter project  kista watson summit 2018_tommy auoja-1Grow smarter project  kista watson summit 2018_tommy auoja-1
Grow smarter project kista watson summit 2018_tommy auoja-1
 
Bemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston finalBemanningsplanering axfood och houston final
Bemanningsplanering axfood och houston final
 
Power ai nordics dcm
Power ai nordics dcmPower ai nordics dcm
Power ai nordics dcm
 
Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18Nvidia and ibm presentation feb18
Nvidia and ibm presentation feb18
 
Hwx introduction to_ibm_ai
Hwx introduction to_ibm_aiHwx introduction to_ibm_ai
Hwx introduction to_ibm_ai
 
Ac922 watson 180208 v1
Ac922 watson 180208 v1Ac922 watson 180208 v1
Ac922 watson 180208 v1
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Watson kista summit 2018 en bättre arbetsdag för de många människorna
Watson kista summit 2018   en bättre arbetsdag för de många människornaWatson kista summit 2018   en bättre arbetsdag för de många människorna
Watson kista summit 2018 en bättre arbetsdag för de många människorna
 
Iwcs and cisco watson kista summit 2018 v2
Iwcs and cisco   watson kista summit 2018 v2Iwcs and cisco   watson kista summit 2018 v2
Iwcs and cisco watson kista summit 2018 v2
 
Ibm intro (watson summit) bkacke
Ibm intro (watson summit) bkackeIbm intro (watson summit) bkacke
Ibm intro (watson summit) bkacke
 

Recently uploaded

Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档208367051
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一fhwihughh
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 

Recently uploaded (20)

Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
原版1:1定制南十字星大学毕业证(SCU毕业证)#文凭成绩单#真实留信学历认证永久存档
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
办理学位证纽约大学毕业证(NYU毕业证书)原版一比一
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 

Combating Constantly Evolving Advanced Threats – Solution Architecture

  • 1. 10.45-11.15 Combating Constantly Evolving Advanced Threats – Solution Architecture Mats Aronsson, Nordic Technical Leader Trusteer, IBM Security
  • 2. © 2014 IBM Corporation IBM Security 2 IBM Trusteer Pinpoint Services Making advanced research work for you Online/Mobile Banking Trusteer Cloud Snippets forwards data to IBM cloud 3 IBM Cloud returns actionable information via: -API -Email -Other 5 User connects to Online Banking Application 1 Application returns page, with IBM snippets 2 INTERNET IBM Fraud ExpertsIBM Fraud Experts IBM Fraud Experts Analyze Access 4
  • 3. © 2014 IBM Corporation IBM Security 3 IBM Counter Fraud Management Detect Respond Investigate Discover GeoSpatial Analytics Context Analytics Content Analytics Entity Analytics Predictive Analytics Behavioral Analytics Content Management Business Intelligence Forensic Analysis Social Network Analysis Decision Management Case Management GeoSpatial Analytics GeoSpatial Analytics Context AnalyticsContext Analytics Content AnalyticsContent Analytics Entity Analytics Predictive Analytics Predictive Analytics Behavioral Analytics Behavioral Analytics Content Management Business Intelligence Business Intelligence Forensic AnalysisForensic AnalysisForensic Analysis Social Network Analysis Social Network Analysis Decision Management Decision Management Case Management Case Management Adapt with Agility - Integrated platform capabilities in one product line - Different fraud typologies need different analytical techniques - Ingest more data to find threats (cyber, aml, fraud, identiity) - Best-in-class capabilities blended together for strong defense - Supported with Integrated Implementation Services IBM Counter Fraud Management An unparalleled arsenal of capabilities to combat today’s fraud and compliance threats … and anticipate tomorrow’s schemes
  • 4. © 2014 IBM Corporation IBM Security 4 WWW Phishing and Malware Fraud Advanced Threats (Employees) Online Banking Enterprise Apps Account Takeover, New Account Fraud Mobile Fraud Risk Trusteer Rapport Trusteer Rapport Trusteer Pinpoint Malware Detection Trusteer Pinpoint Malware Detection Counter Fraud Management Counter Fraud Management Transactional Fraud Fraud Risk Indicators • Compromised Device (Malware) • Compromised Account/Credentials (Phishing) • Criminal Account Takeover • Device Risk (Fingerprint/Location/Reputation) • Compromise History (Malware + Phishing) Confirmed Fraud Trusteer Mobile SDK/APP Trusteer Mobile SDK/APP Trusteer Mobile Risk Engine Trusteer Mobile Risk Engine IBM Trusteer and CFM: Combine Cyber Fraud Risk with Cross-Channel Customer and Payments Txn Risk
  • 5. © 2014 IBM Corporation IBM Security 5 IBM Trusteer and CFM: Combine Cyber Fraud Risk with Cross-Channel Customer and Payments Txn Risk Online Banking Counter Fraud Management Trx Review Counter Fraud Management Trx Review 21 43+ + + Together: High risk! OR Cyber Risk Moderate risk Device Risk New Device ID Remote Access Tool Proxy Device New Location/Time Mobile Risk factors Cyber Fraud Indicators Phished Credentials Malware Infection 1 2 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile changes New Payees New Beneficiaries New Account 3 4 Cross Channel, Trx Anomalies Moderate risk Card Online IVR etc
  • 6. © 2014 IBM Corporation IBM Security 6 Use Case: Fraud via Mobile Banking App (with SDK) New device and/or unusual device location + new acct + mobile deposit Online Banking Counter Fraud Management Trx Review Counter Fraud Management Trx Review 21 43+ + + Together: High risk! OR Cyber Risk Moderate risk Device Risk New Device ID Remote Access Tool Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 1 2 Cross Channel Txn Anomalies ATM Wire Check Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 3 4 Cross Channel, Trx Anomalies Low risk Card Online IVR etc
  • 7. © 2014 IBM Corporation IBM Security 7 Use Case: Malware Indicator Used to Limit Activity Credential Theft (malware), New Payees Online Banking Counter Fraud Management Txn Review Counter Fraud Management Txn Review 21 43+ + + Together: Monitor txns (esp higher risk customers) OR Cyber Risk High risk Device Risk New Device ID Remote Access Tool Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 1 2 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 3 4 Cross Channel, Trx Anomalies Low risk Card Online IVR etc
  • 8. © 2014 IBM Corporation IBM Security 8 Use Case: Account Takeover (Phishing) Credential Theft via phishing, possible ATO, password change Online Banking Counter Fraud Management Txn Review Counter Fraud Management Txn Review 21 43+ + + Together: Monitor high risk activities OR Cyber Risk High risk Device Risk New Device ID Remote Access Tool Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 1 2 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 3 4 Cross Channel, Trx Anomalies Low risk Card Online IVR etc
  • 9. © 2014 IBM Corporation IBM Security 9 Use Case: New Account Fraud Credentials purchased in underground (no malware/phishing), new account setup Online Banking Counter Fraud Management Txn Review Counter Fraud Management Txn Review 21 43+ + + Together: Moderate Risk. Double check. OR Cyber Risk High risk Device Risk New Device ID Known Fraud Device Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 1 2 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 3 4 Cross Channel, Trx Anomalies Low risk Card Online IVR etc
  • 10. © 2014 IBM Corporation IBM Security 9 Use Case: New Account Fraud Credentials purchased in underground (no malware/phishing), new account setup Online Banking Counter Fraud Management Txn Review Counter Fraud Management Txn Review 21 43+ + + Together: Moderate Risk. Double check. OR Cyber Risk High risk Device Risk New Device ID Known Fraud Device Proxy Device Location/Time Jailbroken Cyber Fraud Indicators Phished Credentials Malware Infection 1 2 Cross Channel Txn Anomalies ATM Wire Check ACH Customer Lifecycle Anomalies Profile Changes New Payees New Beneficiaries New Account 3 4 Cross Channel, Trx Anomalies Low risk Card Online IVR etc

Editor's Notes

  1. Counter Fraud Management provides a tightly integrated package of the advanced analytics and investigative capabilities needed for optimal fraud management. It’s an unprecedented richness of capabilities, all packaged in a single, integrated solution. We believe that modern fraud and compliance challenges require the flexibility to apply the right blend of capabilities to each problem, and to adapt easily, without being constrained to a specific use case, payment type, or analytical technique. With Counter Fraud Management, you get an vast array of analytical and investigative tools [ shown in slide ], working together in a common framework and data model, and can mix-and-match them to apply to any fraud or compliance (financial crime) use case. Start with one use case or fraud typology (AML, wire, ach, check, debit, internal, claims, etc) and expand to others. Extend across multiple use cases, users, transactions, data, or servers. Reduce implementation risk by deploying operational benchmarks, use cases and templates harvested from across the vast IBM ecosystem. Leverage our professional services fraud practice as a partner to evolve your roadmap, align with your strategies, and apply their expertise to implement and tailor solutions to your business. Notably: -- Single SKU for the entire counter fraud offering, priced based on the size of the business they are protecting from fraud . It will be unique to each industry. So for each industry, you get all you need in terms of capacity, to implement the protection you want to put in place for that industry; all of the analytics, all of the case management, all of the analysis tools in one offering. Let me emphasize, this is not a loose collection of capabilities and offerings. This is a single INTEGRATED solution, with a single price point. Currently we have Four value priced, industry-specific offerings for Banking/Financial Crimes, Insurance, Healthcare and Government (*) Prevent/Cyber components are sold separately, but designed to work together with CFM. Some Big Data exploratory tools are also sold separately, but work together with CFM when required to handle very large volumes or varieties of data.
  2. We talked about the different layers of defense provided by Trusteer to prevent cyber-attacks and credential theft. Trusteer is extremely effective in preventing malware attacks, spotting phishing attempts, and proactively eliminating sources of fraudulent activity. [ CLICK to get green box] And the next line of defense is to counter any threats that get through the front door by looking at multiple types of payment transactions and customer behavior. [ CLICK to connect them ] When we connect the two, we make both of them more effective. Trusteer sends accurate fraud risk indicators to Counter Fraud Management to further strengthen accuracy of detection and investigation. [ CLICK to show feedback loop] CFM can then send confirmed fraud indicators back to Trusteer to inform future decisions about that customer or device. Summary: Both solutions are effective on their own, but IBM believes that a smarter approach is to connect the cyber and transactional fraud dimensions.
  3. Lets discuss some examples where combining cyber and fraud tools helps increase effectiveness and lower false positives When looking at the full range of data and capabilities, each solution contributes insight and data towards a better decision. Trusteer can flag fraud risk (which may or may not result in actual fraud, but does increase the likelihood), and CFM can look at the actual transactions and highlight anomalous transactions as truly higher risk. Smarter Counter fraud combines Account compromise history (malware/phishing) Device risk (device ID, locations, proxy usage, remote access tools, mobile fraud risk like Jailbreak) All from Trusteer With: 3. user/account activity information (e.g. change of password, address, or beneficiary) 4. Anomalous transactions across all channels. To create a higher quality risk assessment that flags truly high risk transactions. Layering in security intelligence from QRadar, Guardium, ISAM…as well as web session information from Tealeaf can provided added benefit.
  4. Another mobile scenario: Credentials stolen or purchased in underground Fraudster goes to mobile app (where Trusteer SDK may be embedded) Fraudster logs in with stolen credentials using phone (if SDK in place, we have a unique device ID for this phone), Trusteer can see its a new device and/or unusual location, including mobile intelligence like if the device is jailbroken Fraudster accesses check images via phone and submits new large deposit a check via mobile banking app with cash out We know there’s a risk, so can trigger a check fraud alert and investigate appropriately. Solution Trusteer Mobile Risk Engine is really powerful as a way to see at the device level if someone has taken over the device, but it is a *probability* not a certainty, which means there are false positives. Combining the information from Trusteer (e.g. jailbroken or rooted device, rogue app, new device ID, geo-location, etc) with the payments and user/account information in CounterFraud allows us to make smarter decisions.
  5. A Basic Scenario: Trusteer PinPoint Malware Detection Sees Malware on the Device Trusteer detects malware on the device. Credentials may or may not have been compromised, but… This is a definitive risk, so client can choose to block immediate high risk transactions (e.g. large int’l wire on business acct) This information can also be passed to Counter Fraud so that other activity on the account can be seen in context For instance, several days or weeks later, unusual activity for that account may receive a higher risk score/scrutiny The cyber information helps inform risk models It also helps inform investigations into fraud that is triggered/suspected from other channels. Seeing the potential nexus of fraud and cyber intelligence gives investigators additional insight into what happened, and allows them to identify patterns that can be built into rules and models for future. Set SLAs to manage account activity and/or trigger alerts accordingly Solution Trusteer Pinpoint monitors for malware. But how should we treat transactions that happen downstream? Combining the information from Trusteer with the payments and user/account information in CounterFraud allows us to make smarter decisions.
  6. Another ATO scenario (Phishing): Credentials phished (not stolen via malware) Fraudster goes to online banking website Fraudster logs in with stolen credentials and looks like good customer…but… Trusteer knows credentials were phished, some some risk, Fraudster transacts (e.g. change password) Depending how much time has passed since the phishing attack, its not clear yet if we should block the transaction based on the device data or transaction data alone But when we look at the cyber and payment data together, it’s clear there is a risk Set SLAs to manage account activity and/or trigger alerts accordingly Solution Trusteer Rapport monitors for phishing. But how should we treat transactions that happen downstream? Combining the information from Trusteer with the payments and user/account information in CounterFraud allows us to make smarter decisions.
  7. How Cyber Data + Counter Fraud Together Help Stop New Account Fraud: Credentials purchased in underground Fraudster goes to online banking website Fraudster uses stolen credentials to set up a new account Trusteer Pinpoint ATO knows the device is new, proxy has some risk, location/time is unusual By itself this information isn’t definitive, so its passed to Counter Fraud Fraudster transacts (e.g. set up new account) Look at anomalous patterns of activity directly after setting up the new account (e.g. ACH, line of credit immediately after) Helps in investigation too (and in discovering new patterns) because in i2 you can see relationships/patterns. Counter Fraud can use the information from Trusteer in evaluating the risk Cyber + other information together = better visibility into risk