Four years ago, Aetna Global Security hired a chief data scientist for security - a former NSA data scientist who did an outstanding job building over 100 models and a big data infrastructure dedicated to security. The purpose of hiring this data scientist: to take multiple sources of log files from newly deployed...
Many companies today design their cyber security strategy around an incident centric approach - how & when did the hack occur? But this approach leaves out a critical component that can be the difference between a reactive and proactive strategy, the threat actor behind the hack. Join us to learn how a cyber strategy...
The financial sector continues to be a prime target for highly sophisticated, customized attacks. The SWIFT money transfer system recently came under attack resulting in an $81 million heist of the Bangladesh Bank. This number pales in comparison to an estimated $1 billion stolen from over 100 banks worldwide by the...
Early Detection and rapid response are amongst the most critical capabilities for targeted attack remediation. Media reports indicate that well resources adversaries consistently bypass sophisticated organisational defenses. The issue is less about being able to keep the bad guys out - It's more about detecting them...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.