SWIFT Security: Monitoring Cyber Threats with Behavior Analytics

Logo
Presented by

Thomas Harrington, CISO Citi (ret.), Oleg Kolesnikov, VP, Securonix, Aditya Sundararam, Sr. Director Securonix

About this talk

Cyberattacks are on the rise, and financial institutions using SWIFT and other payment mechanisms are increasingly becoming targets of sophisticated attackers. Effectively detecting and identifying these advanced cyberattack activities in a complex SWIFT environment requires a big data analytics platform that can collect, enrich, analyze, and correlate/connect billions of disparate data points in real-time, as well as incorporate historical information to identify behavioral anomalies. This approach allows fraud and security analyst teams to concentrate on the most critical events. Thomas Harrington, Securonix Board of Advisors, CISO Citi (ret.), Associate Deputy Director FBI (ret.), will moderate an interactive session with Securonix Threat Experts, Oleg Kolesnikov, VP of Threat Research, and Aditya Sundararam, Senior Director of Cyber Threat Analytics. Join our panelists to learn about: - The latest attack techniques used in financial services/SWIFT organizations' cyberattacks, such as Lazarus/BeagleBoyz/FASTCash v1/2, TA505, Carbanak, and others. - Current trends observed in the wild to help better prepare for the "next generation" of financial services/SWIFT cyberattacks. - Examples of some of the most effective detection behaviors your blue teams can look for to increase the chances of detecting some of the latest variants of these cyberattacks. - How the Securonix behavior analytics approach can assist with detection and meeting compliance requirements.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (80)
Subscribers (16870)
Securonix Next-Gen SIEM delivers threat detection and response powered by flexible, cloud-native advanced analytics. Follow this channel to learn from our security experts. They will discuss threat trends, detection techniques, and SecOps topics such as cloud security, insider threat, SIEM, UEBA, and SOAR.