Financial Institutions are making increasing use of digital technologies, internet of things, AI, cloud technologies, application programming interfaces, and rapid software development all of which has heightened the cyber security risk as the threat landscape has evolved with increased complexity. Recent attacks on supply chains targeting multiple IT service providers through the exploitation of widely-used […]
Author Archives: admin
A new FINSEC Webinar on “Lost in TLS (Transport Layer Security): the importance of mitigating vulnerabilities in the FINSEC platform” is now available at the finsecurity portal at: Webinars
“Big Data and Artificial Intelligence for Potfolio Risk Assessment” – How AI and BigData Enables Novel Approaches to Portfolio Risk Assessment and Asset Management? Tuesday, March 16th 2021 Register Free : On-line event
On March 4th, it has successfully organized and present to workshop: Blockchain Applications for Digital Finance” Innovative Blockchain Applications for Finance beyond Cryptocurrencies: Thursday, March 4th 2021 Learn more : here
FINSEC Project, is glad to invite you to the new training session online: “Lost in TLS: the importance of mitigating vulnerabilities in the FINSEC platform” by S. Manfredi. Tuesday, 23rd of February 2021 at 11 AM (CET) Learn more
The FINSEC Course on “Securing Critical Infrastructures in the Financial Sector” is now listed in the Security Courses Catalogue of the Concordia project. You can access: 1. the Concordia Catalogue here: https://www.concordia-h2020.eu/map-courses-cyber-professionals/ and 2. the FINSEC Course here: https://finsecurity.eu/moodle/ (You must be registered in the Finsecurity.eu platform). INNOV-ACTS has coordinated the development of the course, […]
The next free Online Workshop by the EU Horizon2020 project fintech-ho2020.eu is organized by the University of Paris I: Panthéon-Sorbonne and our colleagues Christophe HENOT and Dominique Guégan and will focus on the technical risks of blockchains. Save the date: November 5th, 2020. Registration, Flyer, and Agenda: https://lnkd.in/ezAdXrx
Introducing Wearables Wearables are small electronic devices, which comprise one or more sensors and are associated with clothing or worn accessories such as watches, wristbands, glasses and jewelry. Wearables come also with some sort of computational capability, which enables them to capture and process data about the physical world. In several cases they provide the […]
The security of critical financial infrastructure and services must be tracked and maintained through the collection and analysis of security-related data in an intelligent, resilient, efficient, secure and timely manner. Making security data collection and analysis intelligent and capable of quickly spotting, learning from, and addressing zero-day threats is essential to economizing of resources and […]
Anomaly detection is a family of analytic techniques that learns typical properties of a system and reports significant deviations from the typical system’s properties as outliers. Anomaly detection is frequently used in state-of-the-art Intrusion Detection Systems (IDSs) because it can provide protection from new zero-day attacks whenever these attacks lead to deviations from typical behaviours […]
- 1
- 2