elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern...
-
Upload
elets-technomedia -
Category
Technology
-
view
270 -
download
0
Transcript of elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern...
![Page 1: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/1.jpg)
Enterprise Security Solutions by
Modern Banking, Technology Trends,
and Cybersecurity
Speaker : Mr. Jyotish Werulkar
Date: 05-Oct-2016
![Page 2: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/2.jpg)
Enterprise Security Solutions by
A large volume of financial
information are distributed digitally
today and has been growing
exponentially every year.
Banking technology is evolving to
serve the digitized consumers.
Digital transfers are becoming the
norm and replacing traditional
methods of payments / negotiations.
As banking technology becomes
more sophisticated, so does the
CYBERSECURITY
RISKS.2
![Page 3: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/3.jpg)
Enterprise Security Solutions by
It is essential to manage
CYBERSECURITY of the legacy banking
infrastructure to achieve:
• SECURITY against known threats by
adopting a resilient and flexible
cybersecurity model
• VIGILANCE by improving the improving
the existing security infrastructure
• RESELIENCE by enabling the
organization to quickly recover from cyber-
attacks and minimize losses
• COMPLIANCE by adopting good
security policies and preventive control
measures
3
![Page 4: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/4.jpg)
Enterprise Security Solutions by
Evolution of Modern Banking and Technology Trends
CONSUMER BANKING AND BEHAVIOUR
Banking At Branch
Face-to-face Transaction & automated services at
branch
Cheques & DD
Cash & other negotiable
instruments issuance.
Banking outside Branch
Debit / Credit Cards &
Automated Teller
Machines
Online Banking
Electronic Financial
Transactions
Mobile Banking
Use of mobile devices banking
transactions
Virtual
Wallets
Store money & then use it
across channels to
pay merchants viz. Paytm,
PayPal, Mobikwik etc.
Social Media
Banking
Banking via popular
social media sites.
What’s
Next?
Voice Recognition,
Iris Recognition, Biometrics, Nearfield
Communications (NFC).
4
![Page 5: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/5.jpg)
Enterprise Security Solutions by
117% growth in mobile transactions in Feb 2016 over March 2015
108% growth in value of transactions through digital wallets in Feb 2016 over March 2015
70% banks will move to private cloud by 2019
72% consumers in the age group 18-34 likely to bank with atleast one non-bank player
75% global banks will increase tech expenditure on
Security and Compliance
$ 480 billion: Financial Services IT Spending worldwide in 2016.(IDC)
Evolution of Modern Banking and Technology Trends
DISRUPTIONS AND INNOVATIONS
Sourcs: Capgemini RBI5
![Page 6: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/6.jpg)
Enterprise Security Solutions by
Globally, cybercriminals launch attacks on
banks, consumers, & other financial
services for DATA & MONEY
• 3 times more cyber-attacks on banks than any other sector
• The Biggest Online Bank Robbery: Hackers stole $1 billion+ from
Bangladesh Central Bank(February-March 2016)
• Targeted attacks on Cooperative Banks in Mumbai. 75 lakhs and
Financial Information stolen. Attack Origins: Turkey
• 70 bank customers duped of 10.67 lakhs. 373 fraudulent
transactions
• 135% rise in financial losses for banks in 2015
• Estimated $4 billion losses in the Indian banking sector annually
Sources: Capgemini timesofindia mid-day6
![Page 7: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/7.jpg)
Enterprise Security Solutions by
TOP 5
BANKING
INDUSTRY
SECURITY
THREATSIN
7
![Page 8: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/8.jpg)
Enterprise Security Solutions by
#1RANSOMWAR
EA malicious program that
locks an infected computer or
encrypts data stored in it, and
then demands a ransom to
unlock the system or decrypt
the data.
93%of phishing emails
contain ransomware.
India is 5th largest target
of ransomware in the world.
State-wise, Maharashtra
is in the top 3 states that
has most ransomware infection.
Source: windowsclub8
![Page 9: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/9.jpg)
Enterprise Security Solutions by
#2INSIDER
Insider Risks from
current & former
employees, managers,
contractors & other
internal personnel.
Exposure to available
and sensitive company
data and information is
the biggest driving factor
for Insider Threats.
THREATS
Insider Threats responsible for 90% for security incidents.
A Financial Advisor with a leading Wealth Management firm
stole data from 350,000 clients i.e.10% of its
customer base.
25% of employees have used email to exfiltrate
sensitive data from an organization.
Source: The New York
Times9
![Page 10: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/10.jpg)
Enterprise Security Solutions by
Target:
A Leading Cooperative
Bank in Mumbai.
Malware Campaigns:
ZEUS and ZBOT malware.
Loss:
75 lakhs and Financial
Information
Origin of Attack:
Turkey.
Likelihood of an APT Attack
Source: ISACA
52%
22%
1%
25%
Likely
Very likelyNot very
likely
Not at all likely
#3ADVANCE
DPERSISTE
NTTHREATS
(APT)A malicious campaign where the attacker breaches a network, stays there, and keeps gathering intelligence about the target. Such campaigns sometimes can go
undetected for months or years.
Source: mid-day 10
![Page 11: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/11.jpg)
Enterprise Security Solutions by
#4MOBILEPAYMENTSSMiShing (SMS phishing)
campaigns and Telebanking
fraudsters continue to be the
biggest security problems for
mobile and digital payments.
The Rise of Mobile
Malware:
In 2016-17,
cybercriminals have
focused their time and
resources for
developing malicious
financial programs for
mobile devices.
Cop falls prey to call-from-bank fraud:
An inspector-general rank officer
posted with the state police was duped
of at least INR 25,000 by a group of
men involved in banking fraud.
Sources: economictimes11
![Page 12: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/12.jpg)
Enterprise Security Solutions by
Negligent employees have a
major role to play in several
security incidents that occur.
EMPLOYEE
NEGLIGENCE
Responding to phishing emails
Using infected USB drives
Clicking on malicious ads
#5 COMMON
EMPLOYEE
MISTAKES THAT
CAUSE DATA
BREACHES
Visitinginfected websites
91%of data breaches
star t w i th a
phish ing a t tack . “
12
![Page 13: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/13.jpg)
Enterprise Security Solutions by
Helps mitigate all such security threats in healthcare with its range of
Dynamic, Scalable, and Future Ready solutions:
SEQRITE Endpoint Security
SEQRITE Unified Threat Management Solution (TERMINATOR)
SEQRITE Mobile Device Management
SEQRITE Data Loss Prevention
13
![Page 14: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/14.jpg)
Enterprise Security Solutions by
Endpoint Security FEATURES
PATCH MANAGEMENT
Enables IT administrators to check and
install missing security patches for Microsoft
applications installed on enterprise endpoints
from a centrally managed console.
WEB SECURITY
Automatically blocks websites infected with
malware or designed for phishing attacks.
APPLICATION CONTROL
Categories of applications can be authorized
or unauthorized from being executed within
the network.
DATA BACKUP AND RESTORE TOOL
Automatically and periodically (multiple times
a day), takes a backup of all important and
well-known file formats like PDF and
Microsoft Office files that are present on a
computer.
RISKS MITIGATED
RANSOMWARE ATTACKS
INSIDER THREATS
CORE PROTECTION (IDS/IPS & FIREWALL)
IDS/IPS blocks threats that exploit software
vulnerabilities and Firewall thwarts malicious
attempts to access the corporate network.
BEHAVIOR DETECTION
Detects and blocks unknown viruses and
malware in real-time.
INFECTED WEBSITES
PHISHING ATTACKSINFECTED EXTERNAL DEVICES
SECURITY VULNERABILITIES
14
![Page 15: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/15.jpg)
Enterprise Security Solutions by
Data Loss Prevention
ADVANCED DEVICE CONTROL
- Configure access policies for more than 25 device
types.
- Blocks unverified devices.
- Prevents autorun infections.
ENHANCED PRIVACY PROTECTION & COMPLIANCE
- Identifies Office documents based on their origin.
- Prevents data leakage propagated by worms,
Trojans, and other malware threats.
- Issues regular notifications to reinforce user behavior
on data security.
LOWER COMPLEXITY & COST OF DEPLOYMENT
- Easy integration with existing Seqrite EPS.
- Defines DLP security polices and reports across multiple
endpoints in scattered locations.
- Centralized management and monitoring of crucial business
data.
CONTENT AWARE PROTECTION
- Monitors all actions on confidential files.
- Instantly notifies admins about unauthorized data leakage.
- Ensures that no confidential data leaves the organization.
• Targeted Attacks
• Human Error
• Bluetooth
• - USB Drives
• - Web Email
• - Cloud Storage
DATA LEAKAGE caused by:
RISKS MITIGATED
FEATURES
15
![Page 16: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/16.jpg)
Enterprise Security Solutions by
TERMINATOR
GATEWAY ANTIVIRUS
Scans all incoming and outgoing network
traffic at the gateway level. Augments existing
virus solutions by reducing the window of
vulnerability (WoV).
FIREWALL
Admins can permit or block access for traffic
between internal and external networks
based on enterprise compliance policies.
VIRTUAL PRIVATE NETWORK
Provides IT administrators with a means for
secure communications between the
company's remote users and for building site-
to-site connections.
IDS / IPS
Scrutinizes network traffic in real-time and
prevents a broad range of DoS and DDoS
attacks before they penetrate the network.
DoS & DDoS ATTACKS
INTERNET DOWNTIME
GATEWAY MAIL PROTECTION
Scans incoming/outgoing emails or attachments
at the gateway level to block spam and phishing
emails before they enter the network.
CONTENT FILTERING
Allows blocking of non-business related websites
including streaming media sites, downloads,
instant messaging, etc., in order to reduce
unnecessary load on enterprise bandwidth.
MALICIOUS INTERNET TRAFFIC
MALICIOUS EMAILSMAN-in-the-MIDDLE ATTACKS
ADVANCED PERSISTENT THREATS
FEATURES
RISKS MITIGATED
16
![Page 17: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/17.jpg)
Enterprise Security Solutions by
MDM
APPLICATION CONTROL
Apps can be remotely managed/ installed/
blocked in order to maintain policy
compliance and productivity within the
network.
VIRTUAL FENCING
Preset virtual boundaries that restrict device
usage and functionality. These boundaries
can be triggered by geolocation-based, time-
based or Wi-Fi network-based data.
UNIFIED MANAGEMENT CONSOLE
Manage and synchronize all connected devices
through a centralized graphical interface.
NETWORK DATA MONITORING
Admins can view details of Internet data used
over mobile networks or Wi-Fi. They can also
monitor all incoming and outgoing calls and
SMSs on enterprise mobile devices.
DATA THEFT FROM LOST/
STOLEN MOBILE PHONES
ANTI-THEFT
Prevents misuse of lost/stolen mobile phones by
remotely tracking and locking them. Also prevents
data breach by remotely erasing the phone’s data.
INTERNET THREATS
JAILBREAKING/ ROOTING
OF MOBILE DEVICES
MALICIOUS MOBILE APPS
SECURITY MANAGEMENT
Features such as browsing protection, web
filtering, anti-theft, and geolocation tracking
ensure the safety of enterprise devices.
MOBILE MALWARE
BAD SECURITY HYGIENE
FEATURES
RISKS MITIGATED
17
![Page 18: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/18.jpg)
Enterprise Security Solutions by18
![Page 19: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/19.jpg)
Enterprise Security Solutions by19
Real-time Detection of
KNOWN AND UNKNOWN THREATS
Seqrite detects a
suspicious sample on
the customer’s
endpoint.
Sample is
collected.
Sample goes
through
Automated
Analysis.
Sample gets
categorized as
clean or
malicious.
Detection is
generated for
malicious file.
Virus Definition
Update (solution) is
released to the
customer.
Operational 24/7; releases 3 updates per day.
Keeps watch on latest threats; collaborates with global AV vendors for sample sharing.
Developed a lot of indigenous technologies including the latest anti-ransomware feature
![Page 20: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/20.jpg)
Enterprise Security Solutions by20
Company Overview
OUR JOURNEY
![Page 21: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/21.jpg)
Enterprise Security Solutions by21
Head Office & R&D CenterPune
Quick Heal –
64 offices &
warehouses across
36 cities in India
INDIA (HO)Quick Heal Technologies
Ltd.
JAPANQuick Heal Japan KK.
UAEQuick Heal Technologies
(MENA) FZE
KENYAQuick Heal Technologies
Africa Ltd.
USAQuick Heal Technologies
America Inc
Company Overview
EXTENSIVE REACH & PRESENCE
![Page 22: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/22.jpg)
Enterprise Security Solutions by22
25.1 mProduct Licenses Installed
7.6 mActive Licenses across
more than 80 countries
2.0x GrowthActive Licenses over
last 5 years
30% +Retail Market Share in
India
Preferred Choice of
IT technicians for PC
Virus Cleaning
Company Overview
STRONG BRAND RECOGNITION and RECALL
![Page 23: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/23.jpg)
Enterprise Security Solutions by
THANK
YOU
Protecting your business from
today’s attacks and
tomorrow’s threats.
23
![Page 24: elets 2nd Maharashtra Cooperative Summit 2016 - Technology Presentation: Cybersecurity in Modern Banking Technology and Management - Jyotish Werulkar, Country Manager - Enterprise](https://reader031.fdocuments.in/reader031/viewer/2022030318/58f0c8811a28ab3b178b458f/html5/thumbnails/24.jpg)
Enterprise Security Solutions by
THANK
YOU
24