Securing bank assets

Publish date:

People and technology coming together to spot, predict, and correlate relevant data will help to deliver one of our client’s highest value business benefits—customer trust.

Everyone needs to trust their bank. They want to know that both their investments and their personal data are secure. But banks are also high-profile targets for today’s increasingly savvy cyber-criminal. In investing in the digital capabilities that their customers now expect to enable a frictionless banking experience, banks are making themselves more vulnerable to attack.

That’s why a leading bank worked with us to strengthen its incident prevention, detection, and response capabilities. Our client recognized that maintaining the trust of its customers demanded a proactive response to controlling and securing its assets.

Round-the-clock monitoring

The bank opted to set up a Security Operation Center (SOC) to monitor events that could jeopardize its system security and to define correlation rules to help it identify and avert these events. Working closely with the bank’s own people, we helped to establish a third generation SOC to monitor up to several hundred thousand events per second, and to set up hundreds of correlation rules. The SOC has been designed to provide services to any of the bank’s subsidiaries intending to have a SOC, and thus benefit from our expertise.

Smart cyber security

So, what do I mean by a third generation SOC? While SOCs have been around for some time now, the evolving digital landscape, and corresponding growth in cyber-crime activity, has meant today’s SOC has had to become smarter and more analytical than ever before. To that end, our SOC solution for the bank combines both human-led and machine-driven intelligence.

This combination of people and technology coming together to spot, predict, and correlate relevant data will help to deliver one of our client’s highest value business benefits—customer trust.

Related Posts

Cybersecurity

Is your Operational Technology (OT) environment insider safe?

Dan Leyman
Date icon September 8, 2020

Organizations need to exercise due diligence and care to ensure their vendors, contractors,...

Cybersecurity

Unlocking the power of AI and SOAR for end-to-end cybersecurity

Geert van der Linden
Date icon September 3, 2020

For AI to work effectively, organizations need to build a roadmap that addresses...

Cybersecurity

Identity access management (IAM) – the new normal

Dino Karanikas
Date icon August 27, 2020

Having an upgraded IAM plan in place will not only let you sleep better at night; it will...