LogRhythm for SWIFT Customer Security Controls Framework

Thumb original uk swift white paper

Society for Worldwide Interbank Financial Telecommunication (SWIFT) facilitates a huge number of financial transactions every day via the secure messaging system it provides to its members. In addition to banks, the system is also used by other major financial players. SWIFT does not maintain accounts or handle funds, but its network moves huge sums every day. Member institutions, if compromised, can be used to send fake messages that other members act upon in good faith. Such activity has resulted in both attempted and successful transfers of funds by cybercriminals.

The Customer Security Controls Framework is a security standard implemented by SWIFT to which members must adhere. Members must attest to their level of compliance with the security controls, and this information will be available to other members. Achieving the kind of network-wide access required to both comply and document that compliance requires an integrated, multi-pronged approach to security.

View whitepaper
Date: 9 October 2019, 15:03 pm   |   Provider: LogRhythm EMEA   |   Size: 1.44 MB   |   Language: English
This may interest you too:
Thumb original definitive guide to soar ebook  1

Definitive guide to SOAR

Cybersecurity organizations have their work cut out for them. As the last line of defense in the fight against cyberthreats, they stand between their corporations’ valuable IT assets and cyberattackers. But these attackers aren’t social outcasts emailing viruses from their parents’ basement.

Today’s cyberattackers are more formidable and more sophisticated than ever before. Attackers are resourceful and ruthless in their efforts to steal data, commit fraud, abuse resources, and disrupt services. They’re also patient and have the power of nu ...

To the download
Thumb original uk networking and information systems directive nisd white paper

NISD: Networking and Information Systems (NIS) Directive

The NIS Directive provides legal measures that will boost the overall level of cybersecurity in the EU, particularly for industries and organisations that provide services essential to everyday life and the security of a nation. These organisations will be required to report incidents to a regulatory authority and will face fines of up to £17m if breaches are down to failures in cybersecurity defences.

This whitepaper gives an in depth look into NIS Directive, and the 14 NISD security principles you must know. ...

To the download
Thumb original forrestertei cylanceprotectandcylanceoptics

The Total Economic Impact™ Of CylancePROTECT® And CylanceOPTICS™

Employee endpoints are the interfaces between employees and the corporate data and applications they need to do their jobs. Attackers understand this — and actively target employee endpoints as well as the server endpoints hosting corporate data. More than 50% of companies experience a significant data breach each year, and endpoints, as a critical conduit for valuable corporate data, are the top targets for attack. Endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats. ...

To the download
Thumb original new edr capes sb d

AI-Driven Threat and Incident Prevention, Detection, and Response

Traditional cybersecurity approaches suffer from two glaring weaknesses. First, they rely on the digital signatures of known malware in order to identify threats. This approach leaves systems vulnerable to new and non-catalogued malware. Second, they are reactive in nature, ascribing to the “it’s not a matter of if, but when” mentality and often responding to the damage caused by zero-day threats only after they execute. Guarding against known threats is important but in the modern threat, landscape organizations must also address the over 350, ...

To the download
Thumb original nextgenantivirusexecutivebrief

Executive Brief: Why It’s Time for Your Organization to Explore Next-Generation Antivirus

In this Paper:

• SMBs face the same security and compliance requirements as enterprises, without the same level of resources.

• Legacy AV has significant shortcomings, including reliance on detect-respond instead of a prevent-first approach to security.

• BlackBerry Cylance is an AI platform that helps small businesses prevent, detect, and respond to threats

...

To the download