Information Security and Practice in Finance Industry. Xingxiong Zhu



Similar documents
The Current State of Cyber Security

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

Cloud Security. Vaughan Harper IBM Security Architect

IBM & Security Gov. Point Of Views

and Security in the Era of Cloud

Securing Your Business s Bank Account

Security Intelligence

Transaction Anomaly Protection Stopping Malware At The Door. White Paper


Web Threat Detection 5.0, the second major release under RSA for the former Silver Tail

Do not forget the basics!!!!!

IBM Security Systems Trends and IBM Framework

TrustDefender Mobile Technical Brief

Security Intelligence Services.

IBM Security Framework

Best Practices in Mobile Device Management (MDM) Assoc. Prof. Dr. Thanachart Numnonda Executive Director IMC Institute

IBM Endpoint Manager Product Introduction and Overview

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

Sophos Mobile Control

ios Security The Never-Ending Story of Malicious Profiles Adi Sharabani Yair Amit CEO & Co-Founder Skycure CTO & Co-Founder

Kaspersky Security for Mobile

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Selecting the right cybercrime-prevention solution

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

EndUser Protection. Peter Skondro. Sophos

How To Get A Cloud Service For A Small Business

Fraud Threat Intelligence

Cyber Security Metrics Dashboards & Analytics

WHITE PAPER Fighting Mobile Fraud

Cyber Security. John Leek Chief Strategist

5 things to consider when designing a security strategy for the Cloud William Crank, MEDHOST, Blake Sutherland, VP, Enterprise Business, Trend Micro

Internet threats: steps to security for your small business

Best Practices for a BYOD World

Cybersecurity. Are you prepared?

What is Cloud-Based Security? Cloud-based Security = Security Management + Cloud Computing.

Modular Network Security. Tyler Carter, McAfee Network Security

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

How to Choose the Right Security Information and Event Management (SIEM) Solution

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC.

Total Enterprise Mobility

How To Protect Your Mobile Device From Attack

Codeproof Mobile Security & SaaS MDM Platform

Overall, which types of fraud has your organisation experienced in the past year?

Trusteer Rapport Virtual Implementation Scenarios

Peter Zhang, Ph.D. Principal consultant, ZHTECH Corporation Adjunct Professor, Cal State University, Fullerton

GSA Cloud Security Case Study

Zero Downtime In Multi tenant Software as a Service Systems

Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Driving Success in 2013: Enabling a Smart Protection Strategy in the age of Consumerization, Cloud and new Cyber Threats. Eva Chen CEO and Co-Founder

Top Fraud Trends Facing Financial Institutions

Move over, TMG! Replacing TMG with Sophos UTM

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Chapter 11 Cloud Application Development

Intelligent End User Compute Strategy. Ted Smith Nigel Brown

MANAGEMENT SUMMARY INTRODUCTION KEY MESSAGES. Written by: Michael Azoff. Published June 2015, Ovum

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

CYBERCRIMINAL IN BRAZIL SHARES MOBILE CREDIT CARD STORE APP

Copyright 2013, 3CX Ltd.

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

IBM Security re-defines enterprise endpoint protection against advanced malware

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Web Application Hosting Cloud Solution Architecture.

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

The Cyber Threat Landscape

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Marble & MobileIron Mobile App Risk Mitigation

KASPERSKY FRAUD PREVENTION PLATFORM COVERING ONLINE AND MOBILE BANKING RISKS

Certified Cyber Security Analyst VS-1160

APP DEV. We build your ideas into web and mobile applications. steicho. Technological Solutions

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Cloud Computing. What is it? Presented by Prof. Dr.Prabhas CHONGSTITVATANA Asst. Prof. Dr.Chaiyachet SAIVICHIT. Source : Montana State Library Archive

managing SSO with shared credentials

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

Transcription:

Information Security and Practice in Finance Industry Xingxiong Zhu 1

Information Security in Finance Industry Cloud computing, big data, internet finance and mobile internet finance is the profound revolution taking place in the finance industry. 2

Information Security in Finance Industry Information Security Framework in Finance Industry Information Security Solutions of Financial Data Center Information Security Solutions of Financial Cloud Computing Information Security Solutions of Internet Finance Information Security Solutions of Mobile Internet Finance Information Security Solutions of Financial Business Continuity Management 3

Information Security Solutions of Financial Data Center High-grade financial data center of Centrin Data Systems 4

Information Security Solutions of Financial Data Center System monitoring center, facilities environment monitoring center and video monitoring systems 5

Information Security Solutions of Financial Cloud Computing Business operation and management system of cloud computing 6

Information Security Solutions of Financial Cloud Computing Cloud computing virtualization resources management platform is preloaded on IBM power serial server. 虚 机 管 理 生 命 周 期 管 理 动 态 迁 移 服 务 镜 像 管 理 创 建 虚 拟 机 修 改 配 置 配 置 迁 移 策 略 虚 拟 机 迁 移 创 建 模 板 镜 像 创 建 虚 拟 机 镜 像 展 云 平 台 虚 拟 化 管 理 虚 机 监 控 服 务 逻 辑 卷 管 理 监 控 配 置 创 建 逻 辑 卷 挂 载 逻 辑 卷 存 储 管 理 快 照 服 务 配 额 管 理 存 储 监 控 服 务 卸 载 逻 辑 卷 创 建 快 照 创 建 快 照 卷 配 置 监 控 策 7 查 看 存 储 状 略 态

Information Security Solutions of Financial Cloud Computing Cloud computing system monitoring, application monitoring and service management system 8

Information Security Solutions of Internet Finance Protection against financial malware and phishing attacks 9

Information Security Solutions of Internet & Mobile Finance Information security solutions of Centrin & Trusteer

Information Security Solutions of Internet & Mobile Finance Multilevel and cross-channel protection 中 金 数 据 &IBM Trusteer SaaS 金 融 机 构 欺 诈 报 警 分 析 及 管 理 犯 罪 逻 辑 风 险 评 估 犯 罪 逻 辑 Trusteer 情 报 中 心 Web 应 用 端 防 护 层 2: 欺 诈 活 动 防 范 Trusteer Pinpoint Trusteer Pinpoint 恶 意 软 件 检 测 帐 户 盗 用 (ATO) 检 测 客 户 端 防 护 层 1: 威 胁 防 范 Trusteer Rapport PC/Mac Trusteer Mobile ios 安 卓 11

Information Security Solutions of Internet & Mobile Finance Trusteer Pinpoint Malware Detection Trusteer Mobile Risk Engine Trusteer Pinpoint Account Takeover (ATO) Detection 在 线 银 行 网 络 钓 鱼 和 恶 意 软 件 欺 诈 Trusteer Rapport Trusteer Mobile SDK/APP 手 机 欺 诈 风 险 账 户 绑 架, 新 开 账 户 欺 诈 客 户 攻 击 WWW 凭 证 数 据 不 法 分 子 攻 击 跨 渠 道 欺 诈 Trusteer Apex 银 行 员 工 高 级 威 胁 ( 银 行 员 工 ) Centrin & Trusteer Solutions 内 部 应 用 12

Information Security Solutions of Mobile Internet Finance Mobile Banking Protection 电 子 银 行 银 行 策 略 引 擎 全 球 欺 诈 数 据 库 登 录 交 易 客 户 Mobile Device 应 用 访 问 银 行 手 机 应 用 App Trusteer 手 机 接 口 SDK Trusteer 手 机 接 口 SDK 越 狱 /Root 获 得 超 级 权 限 永 久 性 设 备 身 份 ID 恶 意 软 件 感 染 地 理 位 置 设 备 漏 洞 系 统 未 打 补 丁 不 安 全 的 无 线 Wi-Fi 连 接 手 机 流 氓 应 用 13

Information Security Solutions of Internet & Mobile Finance Advantages of Centrin & Trusteer solutions Centrin & Trusteer Security Vendor Financial fraud prevention solutions Multilevel and cross-channel financial information security Professional finance industry data center Financial-level data security The finance industry specific business knowledge Intrusion detection and analysis of information security technology Operational support capabilities Infrastructure and network environment 14

Information Security Solutions of Financial Business Continuity Management Business continuity management system 15

Information Security Solutions of Financial Business Continuity Management Business continuity management surveillance 16

Information Security and Practice in Finance Industry Ahead of finance industry, there are great challenges and opportunities in financial information security field in the coming years. 17

Xingxiong Zhu zhuxx@pku.org.cn zhuxingxiong@centrin.com.cn