Moderator: Geetha Nandikotkur, Managing Editor-Asia & Middle East, ISMG
The Reserve Bank of India has mandated that all scheduled commercial banks, urban and state cooperative banks, payment banks, ATM operations and authorized card payment networks migrate to Aadhaar-based biometric authentication for electronic...
A DDoS attack is sometimes a smokescreen to cover up much more damaging activity such as theft or fraud. While you're working frantically to mitigate the DDoS attack and get critical applications back online, cybercriminals could be working under the radar to break into your systems and conduct more malevolent...
The criminal underground harbors marketplaces where criminals coordinate sales of illicit merchandise and stolen data such a leaked credit cards, intellectual property, information, malware samples, exploit kits, etc. which professional cybercriminals use to target and compromise organizations around the globe. This...
The estimated size of the black market for data in India is pegged at around $1 billion by an industry report. So what does this black market look like? How is the data procured, collated, validated and sold? And most importantly, what effect is this pilferage of data having on Indian enterprises?
This session will...
The cyber threat landscape has become increasingly sophisticated and heterogeneous. The new threat environment requires a new defensive approach that will apply speed, agility, precision and scale to the problem. Security leaders are beginning to acknowledge that cybersecurity must evolve. Striving to ward off attacks...
Detective Chief Inspector Jason Tunn with the Metropolitan Police Service in London, who is the department's lead anti-fraud and cybercrime investigator, walks us through a high-profile case involving the arrest, and recent conviction leading to jail time, of two cybercriminals with connections to a Russian crime...
As payments instruments evolve and change, so, too, will the way we secure payments. While cards aren't likely to ever completely disappear, they are expected to be overtaken by emerging payments instruments, such as mobile devices and wearables. Contactless payments are fueling a lot of this change, and open new...
With new technologies appearing almost daily, attackers have a constant stream of potential new tools, tactics and practices to evaluate as offensive weapons. This constantly expanding attack surface forces defenders to assess new technologies, all while protecting themselves amid an ever-escalating arms race. The...
Consumer-serving industries are under continual attack, as cybercriminals find that the interface between the customer and the retail outlet is where the money is. The assault is occurring on all fronts, be it through the physical point-of-sale or ecommerce gateway, the enterprise and its supply chain, or the customer...
The landscape of corporate and retail payments across channels such as mobile and online, and across emerging products such as Apple Pay, provide customer convenience and satisfaction. But these new channels and technologies also create opportunities for fraudsters. This session offers lessons learned for creating a...
Cyber-extortion has reached new proportions, with a wide variety of methods, such as distributed-denial-of-service attacks and ransomware variants being used to extort individuals and organizations. Recently uncovered ransomware-DDoS hybrid attacks, like Cerber, showcased how attackers have added DDoS capabilities to...
This session will review a cyber-attack and subsequent data breach from beginning to end. What happens during an attack and how does it result in fraud? This session will dissect an attack, looking at real-world incidents, such as the attack waged against Bangladesh Bank that resulted in the theft of $81 million, and...
This session will review ransomware, exploring why it continues, how to battle it and what the future portends. Using real-world examples, Ralph Smith of the Financial Services Information Sharing and Analysis Center will walk through some recent ransomware campaigns that have been waged against FS-ISAC members, and...
Insider threats are fast becoming one of the greatest concerns to organizations. Whether it be a malicious insider wanting to cause harm, or unintentional insider making an error or being unknowingly coerced by an outsider, mitigating insider threats must be a priority for organizations of all shape and size.
This...
Data breaches feed the market for fraudsters to steal identities, which challenges traditional approaches to identifying the genuine from the fraudster. We hear that knowledge-based authentication is dead. But trust in any single defense is flawed. No single route to "trust" should be applied. We should never lose...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.