FINSEC Forum will address the unique threats faced by the financial industry, sharing best practices in financial cybersecurity to assist financial institutions in establishing a robust cybersecurity framework.
While financial technology (fintech) has significantly improved convenience in people’s lives, it has also given rise to various new forms of fraud. These emerging fraudulent practices have led to an increase in scam cases. In response to this, Fubon Financial Holdings announced the activation of its financial group and subsidiary anti-counterfeiting task force in April 2023. This proactive team is dedicated to combating various types of fraudulent activities.
Between June and December 2023, the task force took down a total of 223 reported cases related to counterfeiting. These cases included phishing websites, fake apps, social media platforms, and communication software. By actively addressing these incidents, Fubon aims to protect customer information and assets, contributing to a positive cycle within society.
Cyberattack governance is discussed and analyzed from incident identification and investigation viewpoints. The RGFE cybersecurity governance is presented from the fusion model of NIST CSF and ISO/IEC 27043:2015. That day-to-day business activity model has demonstrated due diligence and good corporate governance. It also can promote the evidence of court acceptance and reduce the expenses and time of an internal investigation. That will enhance the financial CISO mindset capacity of incident response trade-off from the following benefits :
Sharing how to to illustrate the common type of cyberthreats, includung DDoS、Ransomware、APT etc., by taking daily examples for the exectives. And present how to speak plain english to illustrate NIST CSF core functions, which there are "Identify"、"Protect"、"Detect"、"Response" and "Recovery".
Summary:
The Red Team exercise is a highly realistic simulated cybersecurity exercise, that has been widely adopted in recent years. However, the spotlight often falls on those white-hat hackers, while the information department in the organization is usually extreamly blackened. How can Red Team exercises be effectively utilized to enhance the response capabilities of the defense team? Directly organizing a real-world cybersecurity offensive and defensive exercise is a good approach. Therefore, we have designed an internal real-world offensive and defensive exercise within the enterprise, allowing both sides to face each other in a competition-like manner to improve the response capabilities of the organization's defense team. This enables the defense team to have the opportunity and capability to keep intruders at a distance in future cybersecurity incidents.
Topic Content:
CYBERSEC 2024 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy 。