Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved...

52
1 iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidential www.ispacyberpro.com Cybersecurity Landscape Threats to Banking Sector Fortifying Financial Services: From the Cyber Threats October 25, 2019 Hotel Aloft, Chhaya Devi Complex, Thamel, Kathmandu Sujit Christy CISA, CRISC, CISSP, Dip in Cyber Law, ISO 27001:2013 Lead Auditor Director – Professional Services Information Security Professional Associates Private Limited Board Member, ISACA Sri Lanka Chapter, Sri Lanka Founder, (ISC) 2 Chennai Chapter, India Director – Layers-7 Seguro Consultoria Private Limited Volunteer, Safe & Secure Online, (ISC) 2 Foundation, USA Panel Member, (ISC) 2 Scholarships, (ISC) 2 Foundation, USA Past President, (ISC) 2 Chennai Chapter, India Past Secretary, (ISC) 2 Chennai Chapter, India Past Board Member, (ISC) 2 Colombo Chapter, Sri Lanka

Transcript of Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved...

Page 1: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

1iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Cybersecurity Landscape – Threats to Banking SectorFortifying Financial Services: From the Cyber Threats October 25, 2019 Hotel Aloft, Chhaya Devi Complex, Thamel, Kathmandu

Sujit Christy CISA, CRISC, CISSP, Dip in Cyber Law, ISO 27001:2013 Lead Auditor

Director – Professional ServicesInformation Security Professional Associates Private Limited

Board Member, ISACA Sri Lanka Chapter, Sri LankaFounder, (ISC)2 Chennai Chapter, IndiaDirector – Layers-7 Seguro Consultoria Private LimitedVolunteer, Safe & Secure Online, (ISC)2 Foundation, USAPanel Member, (ISC)2 Scholarships, (ISC)2 Foundation, USAPast President, (ISC)2 Chennai Chapter, IndiaPast Secretary, (ISC)2 Chennai Chapter, IndiaPast Board Member, (ISC)2 Colombo Chapter, Sri Lanka

Page 2: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

2iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Computer Security

Network Security

Information Security

Cybersecurity

Security

Describe P

rote

ction o

f In

form

ation A

ssets

Confidentiality

Integrity

Availability

“the protection of

information assets by

addressing threats to

information processed,

stored and

transported by

internetworked

information systems’’

Page 3: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

3iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

The current wave of

cybercrime largely unseen,

but the chances of being

successfully investigated

and prosecuted for a cyber

attack in the US are now

estimated at 0.05%. This

mirrors similar reports from

around the world. This is for

a crime type that is predicted

to be costing the global

economy $6 trillion by 2021

Page 4: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

4iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Cyberattacks Rank

Source: Executive Opinion Survey 2015, World Economic Forum.

Note: The darker colour, the higher the concern.

Current Status: Target Countries

Latin America

Africa: Congo, Ghana, Ivory Coast, Cameroon and Equatorial Guinea, South Africa

South Asia

Page 5: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

5iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

The Global Risks Landscape 2016

Source: Global Risks Perception Survey 2015

World Economic Forum..

Critical Information

Infrastructure Breakdown

Adverse consequences of

technological advances

Cyberattacks

Data fraud or theft

Page 6: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

6iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

The Global Risks Landscape 2016

Source: Global Risks Perception Survey 2015

World Economic Forum..

Critical Information

Infrastructure Breakdown

Adverse consequences of

technological advances

Cyberattacks

Data fraud or theft

Page 7: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

7iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Nation StatesCorporations Cyber Terrorists

Cyber Criminals

Threat Actors

“Destructive Attacks” and “Attacks focused on theft & espionage”

Page 8: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

8iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Bad Actors Not Constrained by

• Jurisdictions

• Laws & Regulations

• Limits on sharing data

• Working inside or outside of an organization

• Priorities

• Legacy technology

• Skill sets and or training

• Lack of resources

Page 9: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

9iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Cybercrime Ecosystem: Everything Is for Sale

Page 10: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

10iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

How the Underground Economy Works

Page 11: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

11iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Page 12: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

12iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Wire Fraud Tactics

Page 13: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

13iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Top 5 in Numbers

Leaked Credentials Leaked Documents Leaked Credit Cards

Malicious Apps Black Market

Page 14: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

14iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Most Common Attacks

Vulnerabilities in SS7 Malware ATM Attacks

Ransomware

Mobile BankingDDoSInsiders

Phishing

Page 15: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

15iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Malware

Trojan.AdLoad

• Open a backdoor

• Install Adware & Potentially Unwanted Programs

• Gather information about the affected system and send them to a

remote location e.g.: username and computer name

ATRPAS

Emotet

• Worm like capabilities

• Dropper of other banking Trojans or install additional malware

such as other banking Trojans,

• Act as a dumping ground for stolen information such as financial

credentials, usernames and passwords, and email addresses.

Page 16: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

16iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

• Maersk ship docks somewhere in the world every 15 minutes

• Unloading between 10,000 to 20,000 containers

• 20% of World trade

• Only “a 20 per cent drop in volumes”

Attack it endured, cost it between $250m and $300m

Staff managed to revert to manual systems with

- "human resilience"

Page 17: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

17iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Hacking the Worldwide Banking System

Page 18: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

18iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

ATM Attack Vectors

BRUTE FORCEREQUIRES SOMEHOW

GETTING PHYSICAL ACCESS TO THE VAULT. THE MOST

POPULAR METHODS BEING EXPLOSIVES.

OS LEVELOPERATING LEVEL ATTACKS

TAKE ADVANTAGE OF OS LEVEL CONFIG. SOFTWARE

VULNERABILITIES AND BYPASSING KIOSK MODE.

HARDWAREACCESS VIA SERVICE AREA OR DRILLING, BYPASSING OS AND

CONNECTING BLACKBOXDIRECTLY TO THE DISPENSER.

NETWORKMAKING THE USE OF

NETWORK. UNAUTHORIZED VPN CONNECTION, MALWARE,

VULNERABILITIES IN PROTOCOLS.

Page 19: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

19iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

ATM Network based Attacks

Taiwan

US $2.5 Million

Cosmos Bank

US$ 13.5 million

Page 20: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

20iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

ATM Skimming

Page 21: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

21iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Jackpotting

Page 22: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

22iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

People Make Mistakes

Cybersecurity Threat #1:

The Inside Man (Or Woman)

Page 23: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

23iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

• Simple mistakes

Falling for phishing attempts

Visiting malware - laden websites

Bringing compromised USB drives to work

Bringing compromised personal devices to work

Sharing User credentials with someone else

4% of people will click on any given phishing campaign

Source: 2018 Data Breach Investigations Report

Page 24: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

24iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Phishing Email

Page 25: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

25iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Investigation

• The pdf file was detected containing Stream Objects.

• The PDF contained injection malcode.

Page 26: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

26iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Attachment in Sandbox Environment:

Page 27: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

27iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

vzturl.com/boy15

Password Compromising URL

Page 28: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

28iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Page 29: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

29iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Ransomware is the top variety of malicious software

Cybersecurity Threat #2:

Ransomware

Page 30: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

30iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

All because ONE asset in a network lacks some key security measure used

to protect everything else

Cybersecurity Threat #3:

Uneven Cybersecurity Protections

Page 31: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

31iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Who Accepted the Risk?ISSUE #1

POS Upgrade

• Credit Card Data in the

clear between POS and

Register

ISSUE #2

Default Password

• User Account with

Global Administrative

Rights in System

Management Server

ISSUE #3

Notifications

• 3rd Party Security

Monitoring Team

Page 32: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

32iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Data Privacy

Cybersecurity Threat #4:

Uneven Cybersecurity Protections

Page 33: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

33iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Personal Data

Page 34: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

34iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Excessive Calls

Valid User Misuse & Abuse

Stolen Credentials

Bot Attacks

API Probing

API Specific DDOS

Irregular API Traffic

Web Application Vulnerabilities

Volumetric DDOS

BOT DETECT

WAF

API GATEWAY

CDN

Is you API Protected Adequately?

Page 35: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

35iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Page 36: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

36iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Image Source: www.dailynews.lk

DEFENSE

Failing

Page 37: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

37iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

It’s time to act

Source: 2018 Data Breach Investigations Report

Page 38: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

38iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Where do we start?

Source: rtrsports.co.uk

Page 39: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

39iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

The Three Lines of Defense

Ma

na

ge

me

nt C

on

tro

ls

Inte

rnal C

ontr

ol

Me

asu

res

Financial Control

Cybersecurity

Risk Management

Quality

Inspection

Compliance

Inte

rnal A

ud

it

Exte

rna

l Au

dit

Re

gu

lato

r

1st Line of Defense 2nd Line of Defense 3rd Line of Defense

Senior Management

Governing Body/Board/Audit Committee

Page 40: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

40iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

THE

ADVERSARY

Terrorist

Foreign Intelligence Services

Lone Wolf

Organized Criminal Groups

Image Source: www.dailynews.lk

Page 41: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

41iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Image Source: www.dailynews.lk

MITIGATE

Vulnerability

Threat

Worm

Page 42: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

42iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Cybersecurity Framework

Page 43: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

43iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Cybersecurity Framework

Identify cybersecurity risks and vulnerabilities

Protect critical infrastructure asset

Detect the occurrence of a cyber event

Respond to a detected event

Recover from a cyber event

Page 44: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

44iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Key Functions of Compliance

Identify the risks that an organisation faces and advise on them

Design and implement controls to protect an organisation from

those risks

Monitor and report on the effectiveness of those controls in

the management of an organisations exposure to risks

Resolve compliance difficulties as they occur

Advise the business on rules and controls

Page 45: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

45iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Page 46: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

46iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Crisis/Incident Management

What to do if you suspect a breach?

Page 47: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

47iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Crisis/Incident Management

Page 48: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

48iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Communication

Page 49: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

49iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Page 50: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

50iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

Page 51: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

51iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

See Everything

Protect What Matters

And Find Risk

Before It Finds You!

Perceive that which cannot be seen with the eye

- Miyamoto Mushashi

51

Page 52: Cybersecurity Landscape Threats to Banking Sector · iSPA Copyright © 2019. All Rights Reserved Governance ІRisk Compliance Proprietary & Confidential 1 Cybersecurity Landscape

52iSPA Copyright © 2019. All Rights Reserved Governance І Risk І Compliance Proprietary & Confidentialwww.ispacyberpro.com

…..until will meet again

Are you scrambling to meet a deadline?

Sujit Christy CISA, CRISC, CISSP, Dip in Cyber Law, ISO 27001:2013 Lead Auditor

Director – Professional ServicesInformation Security Professional Associates Private Limited

Board Member, ISACA Sri Lanka Chapter, Sri LankaFounder, (ISC)2 Chennai Chapter, IndiaDirector – Layers-7 Seguro Consultoria Private LimitedVolunteer, Safe & Secure Online, (ISC)2 Foundation, USAPanel Member, (ISC)2 Scholarships, (ISC)2 Foundation, USAPast President, (ISC)2 Chennai Chapter, IndiaPast Secretary, (ISC)2 Chennai Chapter, IndiaPast Board Member, (ISC)2 Colombo Chapter, Sri Lanka

Mobile: +94714808663e-mail: [email protected]: sujitchristyWeb: www.layers-7.com