Cyber Security Technology - Journey - Where Banking Meets Life

AngelaChief Security Officer

About Angela
  • Age: 52
  • Location: Phoenix, AZ.
  • Job: Chief Information Security Officer, South Bank
  • Assets: $9B
Angela's Challenges
  • Keeping South Bank's systems and data safe and secure from cyber-security attacks
FIS Solutions
  • FISTM Security Plus: helps financial institutions protect their clients, stay up-to-date with emerging threats and have contingency plans in the event of an attack.
  • FISTM Endpoint Threat Detection: Monitor your entire network of endpoint devices 24/7 to detect and neutralize threats other prevention tools miss.

AngelaChief Security Officer

Learn More
X About Angela
  • Age: 52
  • Location: Phoenix, AZ.
  • Job: Chief Information Security Officer, South Bank
  • Assets: $9B
Angela's Challenges
  • Keeping South Bank's systems and data safe and secure from cyber-security attacks
FIS Solutions
  • FISTM Security Plus: helps financial institutions protect their clients, stay up-to-date with emerging threats and have contingency plans in the event of an attack.
  • FISTM Endpoint Threat Detection: Monitor your entire network of endpoint devices 24/7 to detect and neutralize threats other prevention tools miss.

Angela meets with the bank's regulators. They are pleased the bank has Sheltered Harbor measures in place in case of a cybersecurity data destruction event.

Angela is notified of an attempted DDoS attack. Fortunately, it was blocked – with no downtime for customers.

At a conference, Angela hears about difficulties other banks face when protecting their networks. Angela has peace of mind because of the bank's multilayered security protocols.

A bank executive's contact information appears in a darknet forum. Angela is notified and works with her team to ensure there have been no intrusions and issue new system credentials.

Angela reviews a regular report from her security team on threats detected on bank's network, their origins and severity, how they were resolved and outcomes.

       
       
       
   
;
Scroll right or use
your arrow keys
to view journey
Record Extraction and Encryption
Records are extracted, validated, encrypted and sent offline at the end of each day. Learn More >
Data Vault
The vault is detached from the network and able to restore and decrypt the offline media . Learn More >
Post-event Restoration
In the event of an attack, data is retrieved for restoration or sent to the authorized pocessor. Learn More >
DDoS Protection
An extra layer of security distributes and absorbs malicious web traffic to prevent downtime or site lag. Learn More >
Web Application Firewall
Defend against emerging threats to web security while keeping application performance high. Learn More >
Deep and Dark Web Scanning
Monitor the deep and dark web for keywords and other data that may put your institution at risk. Learn More >
Endpoint Threat Detection
Monitor your entire network of endpoint devices 24/7 to detect and neutralize threats other prevention tools miss. Learn More >
DOWNLOAD THE PLAYBOOK
SHARE THE EXPERIENCE

DOWNLOAD PLAYBOOK