Securing bank assets

Publish date:

People and technology coming together to spot, predict, and correlate relevant data will help to deliver one of our client’s highest value business benefits—customer trust.

Everyone needs to trust their bank. They want to know that both their investments and their personal data are secure. But banks are also high-profile targets for today’s increasingly savvy cyber-criminal. In investing in the digital capabilities that their customers now expect to enable a frictionless banking experience, banks are making themselves more vulnerable to attack.

That’s why a leading bank worked with us to strengthen its incident prevention, detection, and response capabilities. Our client recognized that maintaining the trust of its customers demanded a proactive response to controlling and securing its assets.

Round-the-clock monitoring

The bank opted to set up a Security Operation Center (SOC) to monitor events that could jeopardize its system security and to define correlation rules to help it identify and avert these events. Working closely with the bank’s own people, we helped to establish a third generation SOC to monitor up to several hundred thousand events per second, and to set up hundreds of correlation rules. The SOC has been designed to provide services to any of the bank’s subsidiaries intending to have a SOC, and thus benefit from our expertise.

Smart cyber security

So, what do I mean by a third generation SOC? While SOCs have been around for some time now, the evolving digital landscape, and corresponding growth in cyber-crime activity, has meant today’s SOC has had to become smarter and more analytical than ever before. To that end, our SOC solution for the bank combines both human-led and machine-driven intelligence.

This combination of people and technology coming together to spot, predict, and correlate relevant data will help to deliver one of our client’s highest value business benefits—customer trust.

Related Posts

Cybersecurity

Insider Threats: Getting to the left of Boom!

Dan Leyman
Date icon February 15, 2021

Mature, effective insider risk programs take the necessary next step to prevent insider...

Cybersecurity

IAM’s role within your enterprise cyber framework

Chris Williams
Date icon February 10, 2021

A strong IAM infrastructure can help the organization effectively apply its policies and...

Cybersecurity

Cybersecurity in 2021: Four predictions

Geert van der Linden
Date icon February 10, 2021

COVID-19 has heightened the importance of cybersecurity as a business enabler, giving...