Soumettre la recherche
Mettre en ligne
The21stcenturybankjob 101014152255-phpapp02
•
2 j'aime
•
379 vues
idsecconf
Suivre
Keynote Speech By Jim Geovedi - The 21st Century Bank Job
Lire moins
Lire la suite
Technologie
Économie & finance
Affichage du diaporama
Signaler
Partager
Affichage du diaporama
Signaler
Partager
1 sur 35
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
The 21st Century Bank Job
The 21st Century Bank Job
Jim Geovedi
Artificial intelligence in financial sector converted (1)
Artificial intelligence in financial sector converted (1)
emmaelice
Money2020 2015 Day One Highlights
Money2020 2015 Day One Highlights
Sam Maule
Money2020 2015 Day Three Highlights
Money2020 2015 Day Three Highlights
Sam Maule
Money2020 2015 Day Two Highlights
Money2020 2015 Day Two Highlights
Sam Maule
From Online To Digital
From Online To Digital
The Bank Channel
Spying The Wire
Spying The Wire
Don Anto
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
idsecconf
Recommandé
The 21st Century Bank Job
The 21st Century Bank Job
Jim Geovedi
Artificial intelligence in financial sector converted (1)
Artificial intelligence in financial sector converted (1)
emmaelice
Money2020 2015 Day One Highlights
Money2020 2015 Day One Highlights
Sam Maule
Money2020 2015 Day Three Highlights
Money2020 2015 Day Three Highlights
Sam Maule
Money2020 2015 Day Two Highlights
Money2020 2015 Day Two Highlights
Sam Maule
From Online To Digital
From Online To Digital
The Bank Channel
Spying The Wire
Spying The Wire
Don Anto
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
idsecconf
How i hack_hacker_facebook - el_rumi
How i hack_hacker_facebook - el_rumi
idsecconf
How to train your ninja
How to train your ninja
idsecconf
Turning tl mr 3020 into automate wireless attacker
Turning tl mr 3020 into automate wireless attacker
idsecconf
Desain skema rn4 s1
Desain skema rn4 s1
idsecconf
Micro control idsecconf2010
Micro control idsecconf2010
idsecconf
Turning tl mr 3020 into automate wireless attacker
Turning tl mr 3020 into automate wireless attacker
idsecconf
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
idsecconf
MrX - ADT: It's not about Faking the Approval
MrX - ADT: It's not about Faking the Approval
idsecconf
Mobile security-an-introduction - za
Mobile security-an-introduction - za
idsecconf
indounderground, Carding, carder and why you should avoid it!
indounderground, Carding, carder and why you should avoid it!
idsecconf
Reksoprodjo cyber warfare stmik bali 2010
Reksoprodjo cyber warfare stmik bali 2010
idsecconf
A million little tracking devices - Don Bailey
A million little tracking devices - Don Bailey
idsecconf
y3dips, mastering the network hackingFU
y3dips, mastering the network hackingFU
idsecconf
Generating the responses
Generating the responses
idsecconf
Analisa kejahatan menggunakan jaringan gsm
Analisa kejahatan menggunakan jaringan gsm
idsecconf
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-
idsecconf
Keynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackers
idsecconf
Linux kernel-rootkit-dev - Wonokaerun
Linux kernel-rootkit-dev - Wonokaerun
idsecconf
Ctf online idsecconf2012 walkthrough
Ctf online idsecconf2012 walkthrough
idsecconf
theday, windows hacking with commandline
theday, windows hacking with commandline
idsecconf
Tc Bank Technology Innovation Indiana
Tc Bank Technology Innovation Indiana
rajpatelplantemoran
12 neobanks for SMEs and GIGs
12 neobanks for SMEs and GIGs
Vladislav Solodkiy
Contenu connexe
En vedette
How i hack_hacker_facebook - el_rumi
How i hack_hacker_facebook - el_rumi
idsecconf
How to train your ninja
How to train your ninja
idsecconf
Turning tl mr 3020 into automate wireless attacker
Turning tl mr 3020 into automate wireless attacker
idsecconf
Desain skema rn4 s1
Desain skema rn4 s1
idsecconf
Micro control idsecconf2010
Micro control idsecconf2010
idsecconf
Turning tl mr 3020 into automate wireless attacker
Turning tl mr 3020 into automate wireless attacker
idsecconf
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
idsecconf
MrX - ADT: It's not about Faking the Approval
MrX - ADT: It's not about Faking the Approval
idsecconf
Mobile security-an-introduction - za
Mobile security-an-introduction - za
idsecconf
indounderground, Carding, carder and why you should avoid it!
indounderground, Carding, carder and why you should avoid it!
idsecconf
Reksoprodjo cyber warfare stmik bali 2010
Reksoprodjo cyber warfare stmik bali 2010
idsecconf
A million little tracking devices - Don Bailey
A million little tracking devices - Don Bailey
idsecconf
y3dips, mastering the network hackingFU
y3dips, mastering the network hackingFU
idsecconf
Generating the responses
Generating the responses
idsecconf
Analisa kejahatan menggunakan jaringan gsm
Analisa kejahatan menggunakan jaringan gsm
idsecconf
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-
idsecconf
Keynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackers
idsecconf
Linux kernel-rootkit-dev - Wonokaerun
Linux kernel-rootkit-dev - Wonokaerun
idsecconf
Ctf online idsecconf2012 walkthrough
Ctf online idsecconf2012 walkthrough
idsecconf
theday, windows hacking with commandline
theday, windows hacking with commandline
idsecconf
En vedette
(20)
How i hack_hacker_facebook - el_rumi
How i hack_hacker_facebook - el_rumi
How to train your ninja
How to train your ninja
Turning tl mr 3020 into automate wireless attacker
Turning tl mr 3020 into automate wireless attacker
Desain skema rn4 s1
Desain skema rn4 s1
Micro control idsecconf2010
Micro control idsecconf2010
Turning tl mr 3020 into automate wireless attacker
Turning tl mr 3020 into automate wireless attacker
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
MrX - ADT: It's not about Faking the Approval
MrX - ADT: It's not about Faking the Approval
Mobile security-an-introduction - za
Mobile security-an-introduction - za
indounderground, Carding, carder and why you should avoid it!
indounderground, Carding, carder and why you should avoid it!
Reksoprodjo cyber warfare stmik bali 2010
Reksoprodjo cyber warfare stmik bali 2010
A million little tracking devices - Don Bailey
A million little tracking devices - Don Bailey
y3dips, mastering the network hackingFU
y3dips, mastering the network hackingFU
Generating the responses
Generating the responses
Analisa kejahatan menggunakan jaringan gsm
Analisa kejahatan menggunakan jaringan gsm
Reversing blue coat proxysg - wa-
Reversing blue coat proxysg - wa-
Keynote - Jim Geovedi - professional-hackers
Keynote - Jim Geovedi - professional-hackers
Linux kernel-rootkit-dev - Wonokaerun
Linux kernel-rootkit-dev - Wonokaerun
Ctf online idsecconf2012 walkthrough
Ctf online idsecconf2012 walkthrough
theday, windows hacking with commandline
theday, windows hacking with commandline
Similaire à The21stcenturybankjob 101014152255-phpapp02
Tc Bank Technology Innovation Indiana
Tc Bank Technology Innovation Indiana
rajpatelplantemoran
12 neobanks for SMEs and GIGs
12 neobanks for SMEs and GIGs
Vladislav Solodkiy
FT White Paper for Yvan - John Donovan V2
FT White Paper for Yvan - John Donovan V2
John Donovan
Online Banking
Online Banking
Allen Thi
Online Banking
Online Banking
Allen Thi
Mit digital manifesto
Mit digital manifesto
Bankir_Ru
Mit digital banking manifesto - the end of banks
Mit digital banking manifesto - the end of banks
Ian Beckett
Technology Disruption 2022 (ISOAG)
Technology Disruption 2022 (ISOAG)
Barry Condrey
Financial propagandamodelsolomo nov2012
Financial propagandamodelsolomo nov2012
Thomas Hu
Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?
Uniphore
Tech in indonesia 2014 presented at startup asia 2014 jakarta
Tech in indonesia 2014 presented at startup asia 2014 jakarta
Andy Zain
ppt
ppt
PratimaP1
Similaire à The21stcenturybankjob 101014152255-phpapp02
(12)
Tc Bank Technology Innovation Indiana
Tc Bank Technology Innovation Indiana
12 neobanks for SMEs and GIGs
12 neobanks for SMEs and GIGs
FT White Paper for Yvan - John Donovan V2
FT White Paper for Yvan - John Donovan V2
Online Banking
Online Banking
Online Banking
Online Banking
Mit digital manifesto
Mit digital manifesto
Mit digital banking manifesto - the end of banks
Mit digital banking manifesto - the end of banks
Technology Disruption 2022 (ISOAG)
Technology Disruption 2022 (ISOAG)
Financial propagandamodelsolomo nov2012
Financial propagandamodelsolomo nov2012
Webcast - how can banks defend against fraud?
Webcast - how can banks defend against fraud?
Tech in indonesia 2014 presented at startup asia 2014 jakarta
Tech in indonesia 2014 presented at startup asia 2014 jakarta
ppt
ppt
Plus de idsecconf
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
idsecconf
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
idsecconf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
idsecconf
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
idsecconf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
idsecconf
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
idsecconf
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
idsecconf
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
idsecconf
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
idsecconf
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
idsecconf
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
idsecconf
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
idsecconf
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
idsecconf
Plus de idsecconf
(20)
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Nosa Shandy - Clickjacking That Worthy-Google Bug Hunting Story.pdf
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Baskoro Adi Pratomo - Evaluasi Perlindungan Privasi Pengguna pada Aplikasi-Ap...
Utian Ayuba - Profiling The Cloud Crime.pdf
Utian Ayuba - Profiling The Cloud Crime.pdf
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Perkembangan infrastruktur kunci publik di indonesia - Andika Triwidada
Pentesting react native application for fun and profit - Abdullah
Pentesting react native application for fun and profit - Abdullah
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Hacking oximeter untuk membantu pasien covid19 di indonesia - Ryan fabella
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Vm escape: case study virtualbox bug hunting and exploitation - Muhammad Alif...
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Devsecops: membangun kemampuan soc di dalam devsecops pipeline - Dedi Dwianto
Dernier
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Zilliz
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Juan lago vázquez
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
apidays
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Zilliz
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
Samir Dash
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
Remote DBA Services
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
AnitaRaj43
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
danishmna97
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Dernier
(20)
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
Architecting Cloud Native Applications
Architecting Cloud Native Applications
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The21stcenturybankjob 101014152255-phpapp02
1.
THE 21ST CENTURY BANK JOB@GEOVEDI
2.
EVERTHOUGHT ABOUT ROBBING A
BANK?
3.
JOHN DILLINGER KUSNI
KASDUT OLD SCHOOL
4.
HACKING A BANK IS
EASY ..OR MAYBE NOT!!
5.
MODERN BANK JOBS CASE
STUDIES
6.
CREDIT CARD FRAUD
7.
ATM SKIMMING
8.
SOCIAL ENGINEERING
9.
&IT’S EASIER THEY
ARE CLUELESS WHYTARGETINGTHE USERS? [MOST OFTHETIME]
10.
HOW ABOUT HACKING?
11.
Swordfish(2001)
12.
INSIDE THEBANK’S ITSYSTEM
13.
CORE TRADEFINANCE TREASURY DATAWAREHOUSING ANTIMONEYLAUNDRINGREMITTANCE CRM COLLECTIONSYSTEM ATMSWITCH INTERNETBANKING ISLAMICBANKING MOBILEBANKING CARDMANAGEMENT
14.
NETWORKOFTRUST EMPLOYEES MANAGEMENT GOVERNMENT VENDORS CUSTOMERS
15.
STORYTELLINGSESSION HOWWECOMPROMISEDBANKS ONSOMEPENTESTENGAGEMENT
16.
COMMONPROBLEMS PEOPLE PROBLEMS WEAK PASSWORDS LACK
OF AWARENESS LACK OF SKILLS SYSTEM PROBLEMS OUTDATED SYSTEMS INSECURE CONFIGURATIONS INSECURE PROTOCOLS
17.
MANAGEMENTPROBLEMS
18.
19.
MERCHANTS
20.
ATM COMPROMISE
21.
WTFKTHXBYE
22.
23.
WHO’SRESPONSIBLE?
24.
BANK CUSTOMER AccordingtoCustomer BANK CUSTOMER AccordingtoBank RESPONSIBLE RESPONSIBLE RESPONSIBLE SECURITYRESPONSIBILITY
25.
BANKS’EFFORTS TO INCREASE
THE SECURITY LEVEL
26.
ENCRYPTION
27.
TWO-FACTOR AUTHENTICATIONS
28.
TWO-FACTOR AUTHENTICATIONS
29.
REGULATION COMPLIANCE
30.
REGULAR SECURITY ASSESSMENT
31.
WHAT’S NEXT?
32.
WHAT’S NEXT?
33.
THANKS!
34.
CREDITS: Photos: • [Page 01]
http://www.flickr.com/photos/reddogfever/4580710899/ • [Page 02] http://www.flickr.com/photos/lanuiop/226760877/ • [Page 04] http://www.flickr.com/photos/deepblue66/132439533/ • [Page 05] http://www.flickr.com/photos/marcelnicolai/4600107436/ • [Page 09] http://www.flickr.com/photos/paulwatson/411792788/ • [Page 10] http://www.flickr.com/photos/jliba/3696592874/ • [Page 11] Swordfish Hack — http://www.youtube.com/watch?v=zfy5dFhw3ik • [Page 12] http://www.flickr.com/photos/skreuzer/354316778/ • [Page 13] http://www.flickr.com/photos/tim_d/184018928/ • [Page 14] http://www.flickr.com/photos/eskimoblood/2111672366/ • [Page 15] http://www.flickr.com/photos/beneathourfeet/2502755729/ • [Page 16] http://www.flickr.com/photos/formalfallacy/2057169454/ • [Page 16] http://www.flickr.com/photos/dolor_ipsum/3262262008/ • [Page 17] http://www.flickr.com/photos/24443965@N08/3460357646/ • [Page 23] http://www.flickr.com/photos/kk/4191131924/ • [Page 25] http://www.flickr.com/photos/ari/2347593532/ • [Page 27] http://www.infosurhoy.com/cocoon/saii/images/2010/03/01/photo4.jpg • [Page 28] http://en.wikipedia.org/wiki/File:CryptoCard_two_factor.jpg • [Page 29] http://blogs.ft.com/gapperblog/files/2008/03/bank-regulation.jpg • [Page 30] http://www.flickr.com/photos/dfarrell07/5013882149/ • [Page 31] http://www.flickr.com/photos/joshmt/2526552173/
35.
@GEOVEDI CHECKOUT: http://slideshare.net/geovedi
Télécharger maintenant