Preparedness for cybersecurity threats - PowerPoint PPT Presentation

Loading...

PPT – Preparedness for cybersecurity threats PowerPoint presentation | free to download - id: 75c1ca-YjczY



Loading


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation
Title:

Preparedness for cybersecurity threats

Description:

Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu Topics Hansabank in general Baltic e-crime notes Electronic payments ... – PowerPoint PPT presentation

Number of Views:14
Avg rating:3.0/5.0
Slides: 9
Provided by: Hansa2
Learn more at: http://vm.ee
Category:

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Preparedness for cybersecurity threats


1
Preparedness for cybersecurity threats
  • domestic aspects of cyber security
  • Jaan Priisalu

2
Topics
  • Hansabank in general
  • Baltic e-crime notes
  • Electronic payments importance
  • Message to my managers
  • Local cooperation

3
Our target market is the Baltics and Russia. As a
universal bank our business model is based on a
large customer base. Acquisition and retention of
new customers is a key goal for us. Our main
focus is on medium-sized companies and private
individuals with above average purchasing power,
however, we serve all customer groups. With
close to 2 million active customers, 300 branches
and 9,112 employees, Hansabank is a leading
financial institution in all three Baltic
countries.
St. Petersburg
Moscow
Kaliningrad
Estonia Latvia Lithuania Baltic
Population, mil 1.34 2.28 3.4 7.0
Active customers, mil 0.69 0.49 0.74 1.9
Internet customers, mil 0.77 0.62 0.83 2.2
Cards, mil 1.13 0.87 1.28 3.3
Branches 96 76 128 300
ATMs 552 284 370 1,206
Employees 3,227 2,501 3,384 9,112
Russia Russia
Customers 4,200
Corporate 700
Retail 3,500
Branches 3
Employees 325
data as of September 2007
4
Baltic e-crime
  • Criminal communication language is Russian
  • E-channels make up to 98 of transactions
  • Before phishing went to Australia, it was called
    Ligupidamisega
  • In DDoS organizers were here (although industry
    started from Israel)
  • Before dropper attacks were published in England,
    we saw it in Baltic's
  • Biggest Internet card payment gateway hacker was
    living in North-East Estonia, studing in Tartu
    University and working for Webmedia
  • We are living in the criminal gateway and test
    bed
  • Money laundering pressure is still rising

5
(No Transcript)
6
General Trends for Management
  • Security explosion continues
  • It will slow growth of net economy
  • In our transit countries money laundering will
    grow
  • Security services will develop in IT markets
  • Attacks will be further automated
  • Criminals are internationally specialising,
    industry formed 2003
  • Police will be forced to enhance international
    cooperation and private sector involvement
  • Governments have to rethink privacy, introduce
    hardware ID-s
  • Even more internet banks will be temporarily
    closed
  • Mobiles will be attacked for profit
  • Most of internal networks will be penetrated
    through web surfing
  • Servers are attacked for profit
  • Political motivation is already affecting us,
    trend will grow
  • Hansabank dirct loss trend was, it can turn only
    up.

7
Local cooperation
  • Local banks Internet security is not for
    competing
  • Telcos good partners
  • Government
  • Police is competent
  • Partners in educating citizens
  • Joint identification infrastructures
  • Commercial organisations are unable to fight
    political risks
  • Early warning by using customers as part of
    detection
  • CERT-s
  • Estonian CERT works
  • Lithuania Litnet works, national in process
  • Latvia established
  • Customer personalised data is not exchanged,
    usually IP-s

8
Needs for successful networking
  • Responsibility of network participants
  • Starts from timely response of computing device
    owner
  • Road traffic behaviour is agreed, including
    incident resolution
  • Authority of incident resolvers
  • Who has authority to take down illegal systems
    (like bot command centers) defender, police or
    military
  • When consumer rights will be sacrificed to rule
    enforcement
  • Who has right to develop and use weapons
  • Privacy
  • Hiding identities (car registration number
    plates) creates priviledges for persons with
    more ressources
  • Persons should have tools to defend themselves
    more information, not less
  • IP address is like phone number, it should be
    legal to correlate insult calls
  • Governanace in the networks
  • Border routers enforcing interconnect policies do
    exist
  • Visual identification document cross-use does
    exist
  • Money laundering prevention should cover all
    e-funds transfer methods
  • Policing needs right measurement standard
    reporting should work
About PowerShow.com