SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
Working together with banks from a
     CERT perspective + CIIP



                    Ferenc Suba LLM, MA
                       Chairman of the Board,
            CERT-Hungary, Theodore Puskás Foundation
                  Vice-Chair of the Management Board,
        European Network and Information Security Agency
PTA CERT-Hungary
WHO WE ARE? PTA CERT-Hungary =
Government network security center
Within Theodore Puskás Foundation funded and supervised by the
government
CO-OPERATION AGREEMENT WITH FINANCIAL SUPERVISORY
AUTHORITY:
Scope:
awareness raising (website, school class),
recommendation (safe e-banking),
ISAC (information sharing and analysis center)
FINANCIAL ISAC HU:
In co-op with FSA, BAH, Police
SERVICE AGREEMENTS WIHT BANKS:
- 5 concluded, 3 underway
Financial ISAC HU
- History: joint comexes with banks since early 2006
- Great leap forward: large phising attacks in Dec 2006
- Constituents: CERT-HU, Law Enforcement, Banking Assoc.
of HU, Financial Supervisory Authority
- Activity: information sharing, exercises, recommendations,
coordination
- Results: TLP, Advisory, simulated DDos attack exercise
- Future: prep for FSA recomm. on the security of internet
banking, coop. with similar ISACs (GOVCERT.NL, AUSCERT,
DHS)
COMEX07
                     The exercises
-Goal:

-to test the communication between the participants and the

internal procedures of the banks in case of a Ddos attack
-Tasks:

-Two banks acting as victims,

-Banking Association coordinating the exercise and

representing the banks towards CERT-Hungary,
-CERT-Hungary providing technical infrastructure, playing the

attacker, ISP and server operator for one of the banks and
itself
- FSA, GIRO, Police: observers and evaluators
The exercises
COMEX08:
Goal: to test communication and internal procedures in case of an
international malicious code collecting client’s data, password
Tasks: 6 banks to eliminate the malicious code and changing
passwords, requesting log-analysis form CERT-Hungary,
identification of data leakage and malicious activity based on log-
analysis, reporting to the police
CERT-Hungary: reporting the malicious code to banks, log-
analysis, identification and shutting down of collecting servers with
the involvemen of the police
FSA, Police: observers and evaluators
The exercises
COMEX09:
Goal: to test the protective reactions of the banks in case of a
penetration

Tasks:

2 banks to protect a simulated banking environment

CERT-Hungary: provision of the simulated banking
environment, serving as attacker

Banking Association, FSA, Police: interactive players and
evaluators
CIIP in Energy Sector
USA: ISAC Model (branch specific co-op. under DHS)
Europe: EU-SCSIE (Shell, Electrabell, Swissgrid, EDF, CERN,
SEEMA, Melanie, CERT-Hungary)
Global: Meridian Process Control WG
Hungary: CIIP WG (MOL, Paks, MAVIR, Telco, CERT-Hungary)

First exercise in May, 2009 (NHH, MOL, MAVIR, MEH, NFGM,
PTA CHK) electricity outage having a spillover effect in oil,
gas, and communications
Thank you for your attention!
 ferenc.suba@cert-hungary.hu
 PTA CERT-Hungary
 www.cert-hungary.hu
 Theodore Puskás Foundation
 www.neti.hu
 ENISA
 www.enisa.europa.eu

Mais conteúdo relacionado

Semelhante a Day 1 Coop Banks

Information Security (Management) at Stake In Belgium v1.1
Information Security (Management) at Stake In Belgium v1.1Information Security (Management) at Stake In Belgium v1.1
Information Security (Management) at Stake In Belgium v1.1
Dominique Volon
 
Information Security (Management) at Stake In Belgium
Information Security (Management) at Stake In BelgiumInformation Security (Management) at Stake In Belgium
Information Security (Management) at Stake In Belgium
Dominique Volon
 
E-group's pitch
E-group's pitchE-group's pitch
E-group's pitch
i7
 
North Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodsNorth Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoods
localinsight
 
Janusz Oczyp CV ENG Oct 2015
Janusz Oczyp CV ENG Oct 2015Janusz Oczyp CV ENG Oct 2015
Janusz Oczyp CV ENG Oct 2015
Janusz Oczyp
 

Semelhante a Day 1 Coop Banks (20)

Day 1 Large Scale Attacks
Day 1   Large Scale AttacksDay 1   Large Scale Attacks
Day 1 Large Scale Attacks
 
2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter2016 02-14-nis directive-overview isc2 chapter
2016 02-14-nis directive-overview isc2 chapter
 
Information Security (Management) at Stake In Belgium v1.1
Information Security (Management) at Stake In Belgium v1.1Information Security (Management) at Stake In Belgium v1.1
Information Security (Management) at Stake In Belgium v1.1
 
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...
B12: AMLO | FinTech Situation in Thailand and Offshore and Money Laundering R...
 
EDF2014: Talk of Ioannis Kotsiopoulos, European Dynamics: Semantics – Interop...
EDF2014: Talk of Ioannis Kotsiopoulos, European Dynamics: Semantics – Interop...EDF2014: Talk of Ioannis Kotsiopoulos, European Dynamics: Semantics – Interop...
EDF2014: Talk of Ioannis Kotsiopoulos, European Dynamics: Semantics – Interop...
 
CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)CCIS Brochure English (Nov 2014)
CCIS Brochure English (Nov 2014)
 
Information security (management) at stake in belgium 2017 v1.2
Information security (management) at stake in belgium 2017 v1.2Information security (management) at stake in belgium 2017 v1.2
Information security (management) at stake in belgium 2017 v1.2
 
SC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in CybersecuritySC7 Workshop 2: Big Data Challenges in Cybersecurity
SC7 Workshop 2: Big Data Challenges in Cybersecurity
 
Information Security (Management) at Stake In Belgium
Information Security (Management) at Stake In BelgiumInformation Security (Management) at Stake In Belgium
Information Security (Management) at Stake In Belgium
 
E-group's pitch
E-group's pitchE-group's pitch
E-group's pitch
 
European Cyber Crime Centre EC3
European Cyber Crime Centre EC3European Cyber Crime Centre EC3
European Cyber Crime Centre EC3
 
A new approach to International Judicial Cooperation through secure ICT platf...
A new approach to International Judicial Cooperation through secure ICT platf...A new approach to International Judicial Cooperation through secure ICT platf...
A new approach to International Judicial Cooperation through secure ICT platf...
 
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
Addressing Cybersecurity and Cybercrime via a co-evolutionary approach to red...
 
Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225Electronic Surveillance of Communications 100225
Electronic Surveillance of Communications 100225
 
Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225Electronic Surveillance Of Communications 100225
Electronic Surveillance Of Communications 100225
 
North Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoodsNorth Lincolnshire and safer neighbourhoods
North Lincolnshire and safer neighbourhoods
 
Cyber security
Cyber securityCyber security
Cyber security
 
Janusz Oczyp CV ENG Oct 2015
Janusz Oczyp CV ENG Oct 2015Janusz Oczyp CV ENG Oct 2015
Janusz Oczyp CV ENG Oct 2015
 
Cyber_Risk_in_Switzerland_February_2022.pdf
Cyber_Risk_in_Switzerland_February_2022.pdfCyber_Risk_in_Switzerland_February_2022.pdf
Cyber_Risk_in_Switzerland_February_2022.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 

Mais de vngundi (8)

Anatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, SymantecAnatomy of a CERT - Gordon Love, Symantec
Anatomy of a CERT - Gordon Love, Symantec
 
Dealing With Security Threats
Dealing With Security ThreatsDealing With Security Threats
Dealing With Security Threats
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Day 2 Dns Cert 4 Scenarios
Day 2   Dns Cert 4 ScenariosDay 2   Dns Cert 4 Scenarios
Day 2 Dns Cert 4 Scenarios
 
Day 2 Dns Cert 4c Malicious Use
Day 2   Dns Cert 4c Malicious UseDay 2   Dns Cert 4c Malicious Use
Day 2 Dns Cert 4c Malicious Use
 
Day 2 Dns Cert 4b Name Server Redirection
Day 2   Dns Cert 4b Name Server RedirectionDay 2   Dns Cert 4b Name Server Redirection
Day 2 Dns Cert 4b Name Server Redirection
 
Day 2 Dns Cert 4a Cache Poisoning
Day 2   Dns Cert 4a Cache PoisoningDay 2   Dns Cert 4a Cache Poisoning
Day 2 Dns Cert 4a Cache Poisoning
 
Day 2 Dns Cert 3 Dns Organizations
Day 2   Dns Cert 3 Dns OrganizationsDay 2   Dns Cert 3 Dns Organizations
Day 2 Dns Cert 3 Dns Organizations
 

Último

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Day 1 Coop Banks

  • 1. Working together with banks from a CERT perspective + CIIP Ferenc Suba LLM, MA Chairman of the Board, CERT-Hungary, Theodore Puskás Foundation Vice-Chair of the Management Board, European Network and Information Security Agency
  • 2. PTA CERT-Hungary WHO WE ARE? PTA CERT-Hungary = Government network security center Within Theodore Puskás Foundation funded and supervised by the government CO-OPERATION AGREEMENT WITH FINANCIAL SUPERVISORY AUTHORITY: Scope: awareness raising (website, school class), recommendation (safe e-banking), ISAC (information sharing and analysis center) FINANCIAL ISAC HU: In co-op with FSA, BAH, Police SERVICE AGREEMENTS WIHT BANKS: - 5 concluded, 3 underway
  • 3. Financial ISAC HU - History: joint comexes with banks since early 2006 - Great leap forward: large phising attacks in Dec 2006 - Constituents: CERT-HU, Law Enforcement, Banking Assoc. of HU, Financial Supervisory Authority - Activity: information sharing, exercises, recommendations, coordination - Results: TLP, Advisory, simulated DDos attack exercise - Future: prep for FSA recomm. on the security of internet banking, coop. with similar ISACs (GOVCERT.NL, AUSCERT, DHS)
  • 4. COMEX07 The exercises -Goal: -to test the communication between the participants and the internal procedures of the banks in case of a Ddos attack -Tasks: -Two banks acting as victims, -Banking Association coordinating the exercise and representing the banks towards CERT-Hungary, -CERT-Hungary providing technical infrastructure, playing the attacker, ISP and server operator for one of the banks and itself - FSA, GIRO, Police: observers and evaluators
  • 5. The exercises COMEX08: Goal: to test communication and internal procedures in case of an international malicious code collecting client’s data, password Tasks: 6 banks to eliminate the malicious code and changing passwords, requesting log-analysis form CERT-Hungary, identification of data leakage and malicious activity based on log- analysis, reporting to the police CERT-Hungary: reporting the malicious code to banks, log- analysis, identification and shutting down of collecting servers with the involvemen of the police FSA, Police: observers and evaluators
  • 6. The exercises COMEX09: Goal: to test the protective reactions of the banks in case of a penetration Tasks: 2 banks to protect a simulated banking environment CERT-Hungary: provision of the simulated banking environment, serving as attacker Banking Association, FSA, Police: interactive players and evaluators
  • 7. CIIP in Energy Sector USA: ISAC Model (branch specific co-op. under DHS) Europe: EU-SCSIE (Shell, Electrabell, Swissgrid, EDF, CERN, SEEMA, Melanie, CERT-Hungary) Global: Meridian Process Control WG Hungary: CIIP WG (MOL, Paks, MAVIR, Telco, CERT-Hungary) First exercise in May, 2009 (NHH, MOL, MAVIR, MEH, NFGM, PTA CHK) electricity outage having a spillover effect in oil, gas, and communications
  • 8. Thank you for your attention! ferenc.suba@cert-hungary.hu PTA CERT-Hungary www.cert-hungary.hu Theodore Puskás Foundation www.neti.hu ENISA www.enisa.europa.eu