Steven D Alfonso Financial Crimes Intelligence Specialist IBM RedCell
|
|
- Rose Virginia Montgomery
- 6 years ago
- Views:
Transcription
1
2 Agenda Steven D Alfonso Financial Crimes Intelligence Specialist IBM RedCell Agenda: Current Financial Crime Environment Data Breaches Current Security Environment Dark Web ATM Attacks & Point of Sale Attacks Call Spoofing Social Engineering Attacks Trends from the West - Synthetic Identity Fraud & Car Shipping Schemes 2
3 Financial Crimes Environment Convergence Schemes and groups converging make it a potent environment for organizations and their customers 3
4 Data Breaches The Year of the Breach The World s Biggest Data Breaches since breach events confirmed since January 2015 Financial institutions are blind to which of their customers are being breached elsewhere address spoofing or account takeover to send wire transfer requests Source: 4
5 Cyber Attack Sophistication Attack Sophistication Current Security Environment Organizational Security Organizational Security 5
6 Current Security Environment - How do they get in? Tactics: Social engineering Phishing Spear phishing Smishing Vishing Targets: Employees Executives Vendors 6
7 Current Security Environment - Where to Focus Organizational Resources If Organizational Security Decreased Data Breaches Organizational Security Then: Focus resources on rapid detection 7
8 8
9 Dark Web What is it? TOR Developed for US Naval Intelligence Operations Open and free Provides anonymity while traversing the Internet Protects against traffic analysis Needed for access to sites selling illicit goods and services GRAMS Darknet search engine Darknet Google 9
10 Dark Web What is it? GRAMS search resultsprovide a mix of legitimate sites with those promoting illicit goods, services and how to guides 10
11 Dark Web What is it? Hundreds of illicit marketplaces Sell everything from counterfeit clothing to drugs Difficult for law enforcement to locate and shut down Most popular was Silk Road 11
12 Darknet Carding site example 12
13 Darknet Carding Site Example 13
14 Darknet Carding Site Example 14
15 Darknet Carding Site Example 15
16 Darknet Forums Example of a service offering from an underground forum Example from a forum advertising login IDs, credit cards, and FULLZ, likely from and adult pay site like Ashley Madison 16
17 Darknet Fullz for sale Complete name, address, phone numbers, date of birth Government issued ID numbers and driver s license Complete banking and credit card information Example of a data breach victim s information for sale Known as a FULLZ A Fullz is the complete or full information of a data breach victim More banking information including mother s maiden name 17
18 Darknet UK Fullz Complete name, address, phone numbers, date of birth Government issued ID numbers and driver s license Complete banking and credit card information More banking information including mother s maiden name 18
19 Darknet Specific Targets No one is Safe 19
20 Darknet Cyber Services 20
21 Financial Crime Tactics 21
22 Financial Crime Tactics Skimming 22
23 ATM Attacks New Malware Suceful ATM Malware Targets the consumer and multiple vendors, which is unlike past ATM malware Can capture: o Track 1 & 2 data from magstripe o Chip data o Can force retention of cards (Trapping) o Malware control via ATM pin pad control Very new - implemented August 25, 2015 Detected and reported by FireEye September 11 23
24 Financial Crime Tactics 24
25 Financial Crime Tactics Skimming Major Data Breaches Q to Present Restaurants Taverns / Pubs / Bars Small Retail Stores Family Businesses Massive Data Breaches to Small Distributed Breaches 25
26 Financial Crime Tactics 26
27 Financial Crime Tactics Spoofing URL for website: This is the telephone number that will actually be placing the call. Changing voice pitch could defeat voice biometric counter-measures The next step is to enter the number that will be called. This will add background noise to the call or help disguise voice. This is the number that the caller wants to show up on the caller id display. 27
28 Financial Crime Tactics 28
29 Financial Crime Tactics Phishing and Vishing attacks Less technology (malware) involved Focus on deceiving unaware consumers o Phishing s may encourage victims to call a number purporting to be that of their bank o Victim s call and are to provide credit card number to activate or unblock the account o Up to 45% that call will give out their numbers Current Trends Spear-phishing targeting businesses and organizations Business compromise o Estimated $1 billion USD business in 2015 Wire transfer fraud 29
30 Financial Crime Tactics Phishing attacks 30
31 Financial Crime Tactics Phishing attacks that morph into Vishing attacks Dyre Wolf o Combines technology with social engineering tactics o Eastern European cyber gang o Advanced social engineering scheme o Used the scheme to steal more than $1 billion so far Shifu o Newest identified banking malware o Similar characteristics to Dyre o Targeting banks in Japan and some Europe banking platforms 31
32 Financial Crime Tactics Trends from the West 32
33 Financial Crime Tactics Synthetic ID Fraud With whom are you or your customers doing business? Synthetic Identity fraud (SIF) is a fraud that involves the creation of a fictitious identity. New identities are manufactured with a combination of real and fabricated information. New Name Valid & Issued SSN Different Address Synthetic Identity Synthetic ID Fraud Implications Financial Losses Hiding in plain sight Money laundering facilitation National security Growing globally 33
34 Financial Crime Tactics Synthetic Identity Fraud Synthetic ID Ring stole over $200MM Scope 7,000 Synthetic Identities 25,000 Credit Cards 169 Bank Accounts* 1,800 Mailing Addresses 80 Fraudulent Merchants 28 States AL, AZ, CA, CT, FL, GA, ID, IL, IN, IA, KS, KY, ME, MD, MI, MS, MO, NJ, NY, NC, OH, PA, TX, UT, VT, VA, WA, and WI 8 Countries The United States, Canada, Romania, Pakistan, India, United Arab Emirates, China, and Japan Source: Turnkey Risk Solutions 34
35 Financial Crime Tactics Current Car Buying/Shipment Scheme Organized Crime Group Synthetic Identities Automobile Dealerships Bank / Finance Co. Bad actors purchase and apply for financing via Internet and telephone using an established synthetic ID and call spoofing services Dealership delivers vehicle to a container port per customer instructions Vehicle is shipped overseas and paid for with a credit card under the synthetic identity Winners, Losers and Implications Winners: o Organized Crime o Massive profits and virtually no risk Losers: o Auto finance companies o Credit card issuers Implications: o Money laundering o Strategies shared in deep web chat forums will be duplicated o Leveraging customer convenience and current technologies 35
36 Financial Crime Solutions What can an organization do to proactively defend itself and its stakeholders? IBM i2 Enterprise Insight Analysis (EIA) and other IBM solutions Provides your organization advanced intelligence analysis capabilities Analyze diverse data sets in near real-time Multidimensional data analysis (e.g., social networks and geo-spatial) Unstructured data analysis Uncover hidden or unknown relationships and networks EIA is backed by 25 years of success in catching bad guys and collaborating with 4,000 organizations worldwide, including major law enforcement and defense agencies 36
37 37
A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services
A Layered Approach to Fraud Mitigation Nick White Product Manager, FIS Payments Integrated Financial Services Session Agenda Growing Fraud Concerns Old Habits Die Hard Maneuvering through the Barriers
More informationFrauds & Scams. Why is the Internet so attractive to scam artists? 2006 Internet Fraud Trends. Fake Checks. Nigerian Scam
Frauds & Scams Why is the Internet so attractive to scam artists? Anonymity Low cost Rapid growth Easy to adapt Be Cyber Savvy with C-SAFE 118 2006 Internet Fraud Trends Average Loss Online Auctions 34%
More informationState IT in Tough Times: Strategies and Trends for Cost Control and Efficiency
State IT in Tough Times: Strategies and Trends for Cost Control and Efficiency NCSL Communications, Financial Services and Interstate Commerce Committee December 10, 2010 Doug Robinson, Executive Director
More informationSTEVE GOODING JUNE 15, 2018
ARMOR: THE STATE OF THE INDUSTRY STEVE GOODING JUNE 15, 2018 Agenda 1. Welcome 2. Introduction to Armor 3. Honeypot Report 4. Black Market Report 2 ARMOR IN THE CYBERSECURITY SPACE 3 About Armor DATA CENTERS:
More informationSecurity & Phishing
Email Security & Phishing Best Practices In Cybersecurity Presenters Bill Shieh Guest Speaker Staff Engineer Information Security Ellie Mae Supervisory Special Agent Cyber Crime FBI 2 What Is Phishing?
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationTarget Breach Overview
Target Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more specifics? A: Yes, Target has confirmed that it experienced unauthorized access to its systems
More informationPhishing Activity Trends
Phishing Activity Trends Report for the Month of, 27 Summarization of Report Findings The number of phishing reports received rose to 24,853 in, an increase of over 1, from February but still more than
More informationTelecommunications and Internet Access By Schools & School Districts
Universal Service Funding for Schools and Libraries FY2014 E-rate Funding Requests Telecommunications and Internet Access By Schools & School Districts Submitted to the Federal Communications Commission,
More informationA to Z of the Darknet
A to Z of the Darknet Professional acknowledgements The Investigator conferences Thomas Olofson Intelliagg author of Shining a Light on the Dark Web Colin Tansley Intelect Solutions Limited A is for Anonymity
More informationPhishing Activity Trends Report August, 2006
Phishing Activity Trends Report, 26 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account
More informationFTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.
FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who
More informationPhishing Activity Trends
Phishing Activity Trends Report for the Month of September, 2007 Summarization of September Report Findings The total number of unique phishing reports submitted to APWG in September 2007 was 38,514, an
More informationSecure access to your enterprise. Enforce risk-based conditional access in real time
Secure access to your enterprise Enforce risk-based conditional access in real time FOREWORD The intelligent cloud has created an opportunity to do security better Traditional security perimeters no longer
More informationPanelists. Patrick Michael. Darryl M. Bloodworth. Michael J. Zylstra. James C. Green
Panelists Darryl M. Bloodworth Dean, Mead, Egerton, Bloodworth, Capouano & Bozarth Orlando, FL dbloodworth@deanmead James C. Green VP, General Counsel & Corporate Secretary MANITOU AMERICAS, INC. West
More informationCE Advanced Network Security Phishing I
CE 817 - Advanced Network Security Phishing I Lecture 15 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially obtained
More informationAccount Takeover: Why Payment Fraud Protection is Not Enough
Cybercrime Protection Account Takeover: Why Payment Fraud Protection is Not Enough Mustafa Rassiwala, ThreatMetrix, Inc. April 2014 1 Agenda 1. Customer Accounts Blessing or Curse? 2. Passwords Weakest
More informationBuilding an Effective Threat Intelligence Capability. Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO
Building an Effective Threat Intelligence Capability Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO The Race To Digitize Automotive Telematics In-vehicle entertainment
More informationSecurity Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment
Security Awareness & Best Practices Best Practices for Maintaining Data Security in Your Business Environment Ray Colado, Information Security Analyst Raise awareness around information security to help
More informationwith Advanced Protection
with Advanced Email Protection OVERVIEW Today s sophisticated threats are changing. They re multiplying. They re morphing into new variants. And they re targeting people, not just technology. As organizations
More informationPersonal Cybersecurity
Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions
More informationPreempting Cyber Fraud: SWIFT Threat Indicator Sharing Tool. Cyber Security 3.0 Better Together August 18, 2017
Preempting Cyber Fraud: SWIFT Threat Indicator Sharing Tool Cyber Security 3.0 Better Together August 18, 2017 Research Overview Problem Statement Research Goals & Methodology Defining Insider Cashout
More informationAction Fraud & the NFIB. DS Martina MCGRILLEN
Action Fraud & the NFIB DS Martina MCGRILLEN 2006 - The Attorney General and Chief Secretary to the Treasury s Fraud Review 2009 - The development of Action Fraud and the NFIB 2014 - The transition of
More informationBotnets: major players in the shadows. Author Sébastien GOUTAL Chief Science Officer
Botnets: major players in the shadows Author Sébastien GOUTAL Chief Science Officer Table of contents Introduction... 3 Birth of a botnet... 4 Life of a botnet... 5 Death of a botnet... 8 Introduction
More informationELECTRONIC BANKING & ONLINE AUTHENTICATION
ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY
More informationGlobal Forum 2007 Venice
Global Forum 2007 Venice Broadband Infrastructure for Innovative Applications In Established & Emerging Markets November 5, 2007 Jacquelynn Ruff VP, International Public Policy Verizon Verizon Corporate
More information10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS
10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS WHITE PAPER INTRODUCTION BANKS ARE A COMMON TARGET FOR CYBER CRIMINALS AND OVER THE LAST YEAR, FIREEYE HAS BEEN HELPING CUSTOMERS RESPOND
More informationPhishing Activity Trends Report August, 2005
Phishing Activity Trends Report August, 25 Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial
More informationThe Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
More informationPhishing Activity Trends
Phishing Activity Trends Report for the Month of June, 2007 Summarization of June Report Findings In the June 2007 report the APWG introduces a brand-domain pairs measurement (page 4) which combines the
More informationWho We Are! Natalie Timpone
Who We Are! Natalie Timpone Manager of Security Business Management Office Enterprise Security Awareness Manager Carmelo Walsh Security, Risk, and Compliance Security Awareness Subject Matter Expert Who
More informationMobile Banking and Payments Emerging Trends and Opportunities
Mobile Banking and Payments Emerging Trends and Opportunities VIDEO 2 Introductions Barry O Connell Banking and Payments Strategy Barry focuses on customer, product and channel strategy for banks and payments
More informationDEPARTMENT OF HOUSING AND URBAN DEVELOPMENT. [Docket No. FR-6090-N-01]
Billing Code 4210-67 This document is scheduled to be published in the Federal Register on 04/05/2018 and available online at https://federalregister.gov/d/2018-06984, and on FDsys.gov DEPARTMENT OF HOUSING
More informationAccommodating Broadband Infrastructure on Highway Rights-of-Way. Broadband Technology Opportunities Program (BTOP)
Accommodating Broadband Infrastructure on Highway Rights-of-Way Broadband Technology Opportunities Program (BTOP) Introduction Andy Spurgeon Director of Special Projects Denver, CO Key Responsibilities
More informationAmy Schick NHTSA, Occupant Protection Division April 7, 2011
Amy Schick NHTSA, Occupant Protection Division April 7, 2011 In 2009, nearly 5,550 people were killed and an additional 448,000 were injured in crashes involving distraction, accounting for 16% of fatal
More informationFraud Mobility: Exploitation Patterns and Insights
WHITEPAPER Fraud Mobility: Exploitation Patterns and Insights September 2015 2 Table of Contents Introduction 3 Study Methodology 4 Once a SSN has been Compromised, it Remains at Risk 4 Victims Remain
More informationHow Cyber-Criminals Steal and Profit from your Data
How Cyber-Criminals Steal and Profit from your Data Presented by: Nick Podhradsky, SVP Operations SBS CyberSecurity www.sbscyber.com Consulting Network Security IT Audit Education 1 Agenda Why cybersecurity
More informationPhishing Activity Trends
Phishing Activity Trends Report for the Month of July, 2007 Summarization of July Report Findings For the first time recorded by the APWG, China has surpassed the United States as the country hosting the
More informationID Theft and Data Breach Mitigation
ID Theft and Data Breach Mitigation Jeremy Gilbert, GCFE, GASF, EnCE, CPA 1 Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk 2 Consumer Identity
More informationSamu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED
Samu Konttinen, CEO Q3 / 2017 CORPORATE SECURITY REVENUE UP BY 11% - GOOD GROWTH CONTINUED 1 AGENDA Key takeaways from Q3 Key figures Business updates Outlook Financials FAQ All figures refer to continuing
More informationWHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?
WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.
More informationIT Modernization in State Government Drivers, Challenges and Successes. Bo Reese State Chief Information Officer, Oklahoma NASCIO President
IT Modernization in State Government Drivers, Challenges and Successes Bo Reese State Chief Information Officer, Oklahoma NASCIO President Top 10: State CIO Priorities for 2018 1. Security 2. Cloud Services
More information2014 TRANSIT CEOs SEMINAR. Cybersecurity What Every CEO Should Know to Help Secure the System
2014 TRANSIT CEOs SEMINAR Cybersecurity What Every CEO Should Know to Help Secure the System APTA Enterprise Cyber Security WG update Vulnerable Systems Cyber attacks may be targeted toward one or more
More informationWHITEPAPER. Protecting Against Account Takeover Based Attacks
WHITEPAPER Protecting Against Account Takeover Based Email Attacks Executive Summary The onslaught of targeted email attacks such as business email compromise, spear phishing, and ransomware continues
More informationWith certain types of prepaid account, you can do just about everything a traditional bank account allows you to do, including using your prepaid
With certain types of prepaid account, you can do just about everything a traditional bank account allows you to do, including using your prepaid card to shop in store and online. But the key is you cannot
More informationLarge-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity
Computer Crime and Intellectual Property Section Large-Scale Internet Crimes Global Reach, Vast Numbers, and Anonymity Anthony V. Teelucksingh Computer Crime and Intellectual Property Section (CCIPS) Criminal
More informationEvolution of Spear Phishing. White Paper
Evolution of Spear Phishing White Paper Executive Summary Phishing is a well-known security threat, but few people understand the difference between phishing and spear phishing. Spear phishing is the latest
More informationDistracted Driving- A Review of Relevant Research and Latest Findings
Distracted Driving- A Review of Relevant Research and Latest Findings National Conference of State Legislatures Louisville, KY July 27, 2010 Stephen Oesch The sad fact is that in the coming weeks in particular,
More informationCross-site request forgery Cross-site scripting Man-in-the-browser Session hijacking Malware Man-in-the-middle DNS cache poisoning DNS spoofing DNS hijacking Dictionary attacks DDoS DDoS Eavesdropping
More informationBuilding a Business Case for Cyber Threat Intelligence. 5Reasons Your. Organization Needs a Risk-Based 5Approach to Cybersecurity
Building a Business Case for Cyber Threat Intelligence 5Reasons Your Organization Needs a Risk-Based 5Approach to Cybersecurity 5 Reasons for a Risk-Based Approach to Cybersecurity The Bad Guys are Winning
More informationProtect Yourself From. Identify Theft
Protect Yourself From Identify Theft What is Identity Theft? Identity theft occurs when someone uses another person identifying information without their permission in order to access resources, obtain
More informationPEOPLE CENTRIC SECURITY THE NEW
PEOPLE CENTRIC SECURITY THE NEW PARADIGM IN CYBERSECURITY David Karlsson SE Nordics March 2018 1 2018 Proofpoint, Inc. Proofpoint at a Glance LEADING CUSTOMERS DEEP SECURITY DNA UNIQUE VISIBILITY PARTNERS
More informationSilicosis Prevalence Among Medicare Beneficiaries,
Silicosis Prevalence Among Medicare Beneficiaries, 1999 2014 Megan Casey, RN, BSN, MPH Nurse Epidemiologist Expanding Research Partnerships: State of the Science June 21, 2017 National Institute for Occupational
More informationSecuring Digital Transformation
September 4, 2017 Securing Digital Transformation DXC Security Andreas Wuchner, CTO Security Innovation Risk surface is evolving and increasingly complex The adversary is highly innovative and sophisticated
More informationTHE DARK WEB AND HOW IT AFFECTS YOUR INDUSTRY
SESSION ID: TV-T05 THE DARK WEB AND HOW IT AFFECTS YOUR INDUSTRY Jason H. Rivera Manager Cyber Threat Intelligence Deloitte & Touche LLP Twitter Handle: @Jason_JHR How well do we understand the Dark Web?
More informationAre we breached? Deloitte's Cyber Threat Hunting
Are we breached? Deloitte's Cyber Threat Hunting Brochure / report title goes here Section title goes here Have we been breached? Are we exposed? How do we proactively detect an attack and minimize the
More information9/11/ FALL CONFERENCE & TRAINING SEMINAR 2014 FALL CONFERENCE & TRAINING SEMINAR
1 2 1 Agenda: Types of Fraud Things you can do internally Things that companies can do Services Provided by the Bank 3 Because that is where the money is. 4 2 Checks Credit Cards ACH (Debits / Credits)
More informationFraud Risks Facing Credit Unions. ALLIED SOLUTIONS LLC SERVICE CENTER 210 East Main Street, Suite 200, Niles, MI Fax:
Fraud Risks Facing Credit Unions Today s Session Global risks Share how the bad guys are getting in Focus on Cyber and Card Risk Discuss what the credit union can do to prevent the risk Open discussion
More informationCLICK TO EDIT MASTER TITLE STYLE Fraud Overview and Mitigation Strategies
Fraud Overview and Mitigation Strategies SUNTRUST TEAM: DOUG HICKMAN SENIOR VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS SPECIALTY PRACTICE JAMES BERNAL ASSISTANT VICE PRESIDENT FOUNDATIONS AND ENDOWMENTS
More informationState HIE Strategic and Operational Plan Emerging Models. February 16, 2011
State HIE Strategic and Operational Plan Emerging Models February 16, 2011 Goals and Objectives The State HIE emerging models can be useful in a wide variety of ways, both within the ONC state-level HIE
More informationIT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager
IT Audit and Risk Trends for Credit Union Internal Auditors Blair Bautista, Director Bob Grill, Manager David Dyk, Manager 1 AGENDA Internet Banking Authentication ATM Security and PIN Compliance Social
More informationToday s Presentation. Define phishing Explain phishing techniques Examples of phishing Statistics about phishing Defense against Dark Arts Resources
Welcome. Pamela King Professor, Digital Forensics Chestnut Hill College, Philadelphia, PA 17 years law enforcement digital forensics 10 years private industry digital forensics and e-discovery. Academics
More informationCybercrime Riding Tax Season Tides. Trending Spam and Dark Web Findings
Cybercrime Riding Tax Season Tides Trending Spam and Dark Web Findings Released April, 2017 Table of Contents 1. Tax Season is Tax Fraud Time... 2 1.1. Combo Scam: W-2 and Wire Fraud... 3 1.2. Malware
More informationPhishing Read Behind The Lines
Phishing Read Behind The Lines Veljko Pejović veljko@cs.ucsb.edu What is Phishing? "Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and
More informationDMARC Continuing to enable trust between brand owners and receivers
DMARC Continuing to enable trust between brand owners and receivers February 2014 1 DMARC Defined DMARC stands for: Domain-based Message Authentication, Reporting & Conformance (pronounced dee-mark ) 2
More informationImportant Information
Important Information Important Information Effective from 13 January 2018 1. Your information 1.1 Who we are We are Coutts & Co, of 440 Strand, London WC2R OQS. We are a member of The Royal Bank of Scotland
More informationOnline Brand Enforcement Protecting Your Trademarks in the Electronic Environment. The Deep Web, darknets, Bitcoin and brand protection
The Deep Web, darknets, Bitcoin and brand protection MarkMonitor Inc Akino Chikada Online Brand Enforcement 2016 Protecting Your Trademarks in the Electronic Environment This article first appeared in
More informationLegal Aspects of Cybersecurity
Legal Aspects of Cybersecurity John W. Mashni Taylor A. Gast (517) 371-8257 (517) 371-8238 jmashni@fosterswift.com tgast@fosterswift.com Alexander A. Ayar (248) 538-6326 AAyar@FosterSwift.com Risks Data
More informationDark Web. Ronald Bishof, MS Cybersecurity. This Photo by Unknown Author is licensed under CC BY-SA
Dark Web Ronald Bishof, MS Cybersecurity This Photo by Unknown Author is licensed under CC BY-SA Surface, Deep Web and Dark Web Differences of the Surface Web, Deep Web and Dark Web Surface Web - Web
More informationAUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response
AUTHENTICATION Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response Who we are Eric Scales Mandiant Director IR, Red Team, Strategic Services Scott Koller
More informationCOMMON WAYS IDENTITY THEFT CAN HAPPEN:
COMMON WAYS IDENTITY THEFT CAN HAPPEN: OLD FASHIONED STEALING / DUMPSTER DIVING Thieves typically steal wallets and purses. They also steal mail such as credit card and bank statements, pre-approved credit
More information2018 Supply Cheat Sheet MA/PDP/MAPD
2018 Supply Cheat Sheet MA/PDP/MAPD Please Note: All agents must be contracted, appointed and certified to order supplies and write business. AETNA/COVENTRY Website: www.aetnamedicare.com A. Click For
More informationDefending Our Digital Density.
New Jersey Cybersecurity & Communications Integration Cell Defending Our Digital Density. @NJCybersecurity www.cyber.nj.gov NJCCIC@cyber.nj.gov The New Jersey Cybersecurity & Communications Integration
More informationTABLE OF CONTENTS Introduction: IS A TOP THREAT VECTOR... 3 THE PROBLEM: ATTACKS ARE EVOLVING FASTER THAN DEFENSES...
The Guide TABLE OF CONTENTS Introduction: EMAIL IS A TOP THREAT VECTOR... 3 THE PROBLEM: ATTACKS ARE EVOLVING FASTER THAN EMAIL DEFENSES... 4 Today s Top Email Fraud Tactics...5 Advanced Malware...8 Outbound
More informationTHE ACCENTURE CYBER DEFENSE SOLUTION
THE ACCENTURE CYBER DEFENSE SOLUTION A MANAGED SERVICE FOR CYBER DEFENSE FROM ACCENTURE AND SPLUNK. YOUR CURRENT APPROACHES TO CYBER DEFENSE COULD BE PUTTING YOU AT RISK Cyber-attacks are increasingly
More informationCyber Crime Update. Mark Brett Programme Director February 2016
Cyber Crime Update Mark Brett Programme Director February 2016 What is Cyber Crime? What are the current threats? What is the capability of local and regional Cyber Crime Investigations? What support is
More informationBest Practices Guide to Electronic Banking
Best Practices Guide to Electronic Banking City Bank & Trust Company offers a variety of services to our customers. As these services have evolved over time, a much higher percentage of customers have
More informationFRAUDULENT TRAVEL SCAMS
FINANCIAL INTELLIGENCE CENTRE (FIC) REPUBLIC OF NAMIBIA P.O.BOX 2882, Windhoek Tel: + 264 61 2835100, Fax +264 61 2835259 Web address: www.fic.na E-mail address: helpdesk@fic.na FRAUDULENT TRAVEL SCAMS
More informationThe UK s National Cyber Security Strategy
The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016
More informationJune 2 nd, 2016 Security Awareness
June 2 nd, 2016 Security Awareness Security is the degree of resistance to, or protection from, harm. if security breaks down, technology breaks down Protecting People, Property and Business Assets Goal
More informationSTAYING SAFE FROM SOCIAL ENGINEERING SCHEMES
STAYING SAFE FROM SOCIAL ENGINEERING SCHEMES Dr. Catherine J. Ullman Senior Information Security Analyst Information Security Office cende@buffalo.edu 1 Who Am I? 2 But seriously Senior Information Security
More informationLegal Considerations and Case Studies
Cybersecurity for Small & Mid-Size Businesses Phil Schenkenberg, J.D., CIPP/US Cyrus Malek, J.D., Certification in Cybersecurity and Privacy Law Legal Considerations and Case Studies Copyright, Briggs
More informationElectronic payments in the Netherlands
Electronic payments in the Netherlands The Dutch approach on Cybersecurity Gijs Boudewijn Deputy General Manager Vienna May 19 th 2015 Agenda Facts and figures Fraud developments in the Netherlands - Situation
More informationHot Topics in Privacy
Hot Topics in Privacy Gretchen S. Herault Monster Worldwide SCCE Conference April 12, 2013 Agenda Privacy Landscape current state of regulatory coverage > Global > Industry Sector > Technology Hot Topics
More informationHot Topics in Privacy
Hot Topics in Privacy Gretchen S. Herault Monster Worldwide SCCE Conference April 12, 2013 Agenda Privacy Landscape current state of regulatory coverage > Global > Industry Sector > Technology Hot Topics
More informationVoIP Theft of Service Protecting Your Network. Introduction to VoIP Theft of Service. Meet our Expert Phone Power
VoIP Theft of Service Protecting Your Network Introduction to VoIP Theft of Service The truth is you just aren t a phone company until you ve had a run-in with telecom fraud. VoIP fraud is a significant
More informationMarkMonitor Dark Web and Cyber Intelligence TM Dark Web Threat Intelligence to Protect Against Cyberattacks
SOLUTION SHEET MarkMonitor Dark Web and Cyber Intelligence TM Dark Web Threat Intelligence to Protect Against Cyberattacks OVERVIEW Cyberattacks targeting corporate infrastructures are surging, and a growing
More informationCaribbean Cyber Security: Not Only Government s Responsibility
Caribbean Cyber Security: Not Only Government s Responsibility AWARENESS AND VIGILANCE IS EVERYBODY S RESPONSIBILITY Preseted at: ICT Symposium Antigua and Barbuda March 2017 Caribbean Cyber Security Events
More information2018 NSP Student Leader Contact Form
2018 NSP Student Leader Contact Form Welcome to the Office of New Student Programs! We are extremely excited to have you on our team. Please complete the below form to confirm your acceptance. Student
More informationMobile Security / Mobile Payments
Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY
More informationCredit Card Frauds Sept.08, 2016
Credit Card Frauds Sept.08, 2016 Definitions Credit Card A card allowing the holder to purchasing goods or services on credit Debit Card A card allowing transfer of money from a bank a/c electronically
More information2015 DISTRACTED DRIVING ENFORCEMENT APRIL 10-15, 2015
2015 DISTRACTED DRIVING ENFORCEMENT APRIL 10-15, 2015 DISTRACTED DRIVING ENFORCEMENT CAMPAIGN COMMUNICATIONS DISTRACTED DRIVING ENFORCEMENT CAMPAIGN Campaign Information Enforcement Dates: April 10-15,
More informationContact Center Compliance Webinar Bringing you the ANSWERS you need about compliance in your call center.
Contact Center Compliance Webinar Bringing you the ANSWERS you need about compliance in your call center. Welcome Mitch Roth Business to Business Compliance Protocols ATA General Counsel Partner Williams
More informationUnderstanding the Changing Cybersecurity Problem
Understanding the Changing Cybersecurity Problem Keith Price BBus, MSc, CGEIT, CISM, CISSP Founder & Principal Consultant 1 About About me - Specialise in information security strategy, architecture, and
More informationPhishing Activity Trends Report October, 2004
Phishing Activity Trends Report October, 2004 Phishing is a form of online identity theft that uses spoofed emails designed to lure recipients to fraudulent websites which attempt to trick them into divulging
More informationFraud Update: Why Fraudsters Love Wires and How to Stop Them. Luis Rojas, Director, Product Management WesPay 2014
Fraud Update: Why Fraudsters Love Wires and How to Stop Them Luis Rojas, Director, Product Management WesPay 2014 Competitive Pressures Drive Fraud and Operational Risk Availability Of Information Creates
More informationTeradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
More informationFederal Deposit Insurance Corporation. National Credit Union Administration. Office of the Comptroller of the Currency. Office of Thrift Supervision
YOU HAVE THE POWER TO STOP IDENTITY THEFT A message from the federal bank, credit union and thrift regulatory agencies Board of Governors of the Federal Reserve System Federal Deposit Insurance Corporation
More informationWHITE PAPER. How You Can Use the Dark Web for Threat Intelligence
WHITE PAPER How You Can Use the Dark Web for Threat Intelligence Table of Contents The Dark Web: A Definition... The Deep Web Is Different... The Value of Dark Web Sources for Threat Intelligence... Information
More informationCybersecurity The Evolving Landscape
Cybersecurity The Evolving Landscape 1 Presenter Zach Shelton, CISA Principal DHG IT Advisory Zach.Shelton@DHG.com Raleigh, NC 14+ years of experience in IT Consulting 11+ years of experience with DHG
More information