SlideShare a Scribd company logo
2
Most read
3
Most read
10
Most read
INTERNAL
19/07/2022
Threat Intelligence using
Knowledge Graphs
Hemanth Prabakaran
Head Data Analytics & Insights
INTERNAL
2
Trust
Resilience
Client Experience
Cybersecurity
Challenge as a Global Bank
4
0
Differen
t
Markets
120
0
Branche
s
25,00
0
Group/Countr
y
Operations
85,00
0
Employee
s
5
Line of
Busines
s
Retail
Banking
Corporate
Banking
Private
Banking
Wealth
Management
Commercial
Banking
Operations
Protect bank assets from
external & internal threats
Critical Operational Continuity
Support Client needs
Protect Privacy
INTERNAL
3
Data in the heart of Operations
Client data
IT Assets
Channels
Application Logs
Third Party
Process
Security data
Transactions
Data Management Platform
Client Experience
Client Analytics
Financial Crime
Compliance
Cyber Defence &
Threat Intelligence
Business Continuity
Monitoring
Privacy Compliance
Traditional technologies not helping with context
Key Challenges
Lack of Context Lack of Intelligence
Lot of unstructured data Lack of Insights
INTERNAL
SCyphe
r
Graph Powered Insights
Engine
SCypher is no-code knowledge graph ecosystem empowered with graph analytics that brings business and analysts the full power of the graph data. Its most scalable, and
highly plug and play to generate insights and actions from your data.
Features :
Knowledge Graph Lifecycle :
Knowledge Graph Based Graph Insights & Analytics
Flexible Data Orchestration Self Service
Seamless Integration &
Security at Scale
• Schema Based
• Perspectives
• Virtual Relationships
• Index Management
• Node Level Security
• Workflow Editing UI
(Data IKU)
• Data Wrangling
• Data Enrichment
• Scheduled Execution
• Real Time
• Onboard Perspectives
• Dictionary based
Taxonomy
• Plug & Play
• Intelligent Search
• User Defined Action
• User Defined Insights
• Shortest Path
• Nearest Neighbor
• Focal point Analysis
• Graph Exploration
• Open Architecture
• Embedded Insights
• REST API
• Single Sign-on
• Role Base Access
Control
COO DATA
LAKE
SCypher
Knowledge Graph Orchestration Graph Database
No Code Knowledge Graph
Insight Engine
Semantic
Graph
REST API
INTERNAL
5
Graph Analytics
SCypher
<Document title - footer text>
Build Perspectives on top of
enterprise knowledge graph
using self-service
capabilities
INTERNAL
6
Use Cases
SCypher
✔ Threat Intelliegnce
✔ Cyber Risk Identification
✔ Operation Continuity in
Resolution
✔ Vulnerability Assessment
✔ Patch Management
✔ Identity & Access Management
✔ Data Privacy Risk & Control
INTERNAL
7
Use Case
Threat Intelligence
90-100
80-90
70-80
60-70
50-60
40-50
30-40
20-30
10-20
0-10
High Risk
Medium Risk
Low Risk
Threat Score
e.g.,
Feature 1: URL inside the email contributed
45% to the predicted output
Feature 2: Illegitimate domains used in
previous attacks contributed 20%
Feature 3: Covid theme classified as top
intent contributed 20%
Contextual Intelligence
INTERNAL
8
Insider Threat Prevention
<Document title - footer text>
Contextual risk analysis
to prevent potential cyber
risk incident
INTERNAL
9
Intelligent Insights through SCypher in applications
<Document title - footer text>
High Risk
Explore in SCypher
Ingested Intelligent Insights
into bank application
ecosystem
INTERNAL
10
Tangible Business Benefits with Graphs
With help of knowledge graphs , Standard Chartered was able to accelerate and strengthen ecosystem to identify
a cyber security event even before impact. Some of materialized benefits are :
More security threats
identified before
impact
Faster resolution of
security threats
Potential breaches
avoided
More internal threats
were identified and
managed
More critical assets
became Cybersafe
and Cyber resilient
Less staff time spent
in compiling security
reports
✔ Knowledge based Data Discovery
✔ Persona based Recommendation
✔ Improved access to information
✔ Exploratory & path investigation
✔ Contextualized Search
✔ Automated Insights
Secondary Benefits
INTERNAL
11 <Document title - footer text>
Thank You for attending this session ,
Looking forward to share more

More Related Content

PDF
generative-ai-fundamentals and Large language models
PDF
𝐆𝐞𝐧𝐞𝐫𝐚𝐭𝐢𝐯𝐞 𝐀𝐈: 𝐂𝐡𝐚𝐧𝐠𝐢𝐧𝐠 𝐇𝐨𝐰 𝐁𝐮𝐬𝐢𝐧𝐞𝐬𝐬 𝐈𝐧𝐧𝐨𝐯𝐚𝐭𝐞𝐬 𝐚𝐧𝐝 𝐎𝐩𝐞𝐫𝐚𝐭𝐞𝐬
PPTX
Building, Evaluating, and Optimizing your RAG App for Production
PDF
Chunking, Embeddings, and Vector Databases
PDF
LLMOps for Your Data: Best Practices to Ensure Safety, Quality, and Cost
PDF
GraphRAG is All You need? LLM & Knowledge Graph
PPTX
GraphTour 2020 - BT: Use of Graph Database in P2P / P2MP Connectivity for Vid...
PDF
Retrieval Augmented Generation in Practice: Scalable GenAI platforms with k8s...
generative-ai-fundamentals and Large language models
𝐆𝐞𝐧𝐞𝐫𝐚𝐭𝐢𝐯𝐞 𝐀𝐈: 𝐂𝐡𝐚𝐧𝐠𝐢𝐧𝐠 𝐇𝐨𝐰 𝐁𝐮𝐬𝐢𝐧𝐞𝐬𝐬 𝐈𝐧𝐧𝐨𝐯𝐚𝐭𝐞𝐬 𝐚𝐧𝐝 𝐎𝐩𝐞𝐫𝐚𝐭𝐞𝐬
Building, Evaluating, and Optimizing your RAG App for Production
Chunking, Embeddings, and Vector Databases
LLMOps for Your Data: Best Practices to Ensure Safety, Quality, and Cost
GraphRAG is All You need? LLM & Knowledge Graph
GraphTour 2020 - BT: Use of Graph Database in P2P / P2MP Connectivity for Vid...
Retrieval Augmented Generation in Practice: Scalable GenAI platforms with k8s...

What's hot (20)

PDF
Generative-AI-in-enterprise-20230615.pdf
PPTX
The future of AIOps
PDF
AI and ML Series - Introduction to Generative AI and LLMs - Session 1
PDF
The-CxO-Guide-to.pdf
PDF
Use Case Patterns for LLM Applications (1).pdf
PDF
UTILITY OF AI
PPTX
Big Data Case study - caixa bank
PDF
Iron Mountain: The Essential Guide To Understanding Digital Transformation
PDF
Introdution to Dataops and AIOps (or MLOps)
PDF
Bryan Mattimore - AI Ideation and TIE.pdf
PDF
AIOps, IT Analytics, and Business Performance: What’s Needed and What Works
PPTX
Open Source h2oGPT with Retrieval Augmented Generation (RAG), Web Search, and...
PDF
SERVIER Pegasus - Graphe de connaissances pour les phases primaires de recher...
PDF
Generative AI con Amazon Bedrock.pdf
PDF
Responsible AI
PPTX
Rahat Yasir: Enterprise Data & AI Strategy & Platform Designing
PPTX
Creating an Enterprise AI Strategy
PDF
Careers in analytics
PDF
AI and ML Series - Leveraging Generative AI and LLMs Using the UiPath Platfor...
PPTX
Introduction to RAG (Retrieval Augmented Generation) and its application
Generative-AI-in-enterprise-20230615.pdf
The future of AIOps
AI and ML Series - Introduction to Generative AI and LLMs - Session 1
The-CxO-Guide-to.pdf
Use Case Patterns for LLM Applications (1).pdf
UTILITY OF AI
Big Data Case study - caixa bank
Iron Mountain: The Essential Guide To Understanding Digital Transformation
Introdution to Dataops and AIOps (or MLOps)
Bryan Mattimore - AI Ideation and TIE.pdf
AIOps, IT Analytics, and Business Performance: What’s Needed and What Works
Open Source h2oGPT with Retrieval Augmented Generation (RAG), Web Search, and...
SERVIER Pegasus - Graphe de connaissances pour les phases primaires de recher...
Generative AI con Amazon Bedrock.pdf
Responsible AI
Rahat Yasir: Enterprise Data & AI Strategy & Platform Designing
Creating an Enterprise AI Strategy
Careers in analytics
AI and ML Series - Leveraging Generative AI and LLMs Using the UiPath Platfor...
Introduction to RAG (Retrieval Augmented Generation) and its application
Ad

Similar to Standard Chartered- Threat Intelligence using Knowledge Graphs.pdf (20)

PDF
Insights Driven Intelligence through Knowledge Graphs
PDF
Graph Gurus Episode 22: Cybersecurity
PPTX
Security Operations, Engineering, and Intelligence Integration through the po...
PDF
Creating Your Own Threat Intel Through Hunting & Visualization
PDF
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
PDF
Building an enterprise security knowledge graph to fuel better decisions, fas...
PDF
Cyber security and attack analysis : how Cisco uses graph analytics
PDF
Hacked: Threats, Trends and the Power of Connected Data
PPT
Thin Slicing a Black Swan: When Less Is More
PDF
Thinking in graphs v1.0
PDF
Thinking in Graphs
PDF
Visualization in the Age of Big Data
PDF
SplunkLive Wellington 2015 - Splunk for Security
PDF
SplunkLive Auckland 2015 - Splunk for Security
PDF
Splunk for Security
PPTX
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
PPTX
Splunk for Security Breakout Session
PDF
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
PDF
Advanced Analytics: Graph Database Use Cases
DOCX
Hot Cyber Security Technologies
Insights Driven Intelligence through Knowledge Graphs
Graph Gurus Episode 22: Cybersecurity
Security Operations, Engineering, and Intelligence Integration through the po...
Creating Your Own Threat Intel Through Hunting & Visualization
Graph Gurus Episode 22: Guarding Against Cyber Security Threats with a Graph ...
Building an enterprise security knowledge graph to fuel better decisions, fas...
Cyber security and attack analysis : how Cisco uses graph analytics
Hacked: Threats, Trends and the Power of Connected Data
Thin Slicing a Black Swan: When Less Is More
Thinking in graphs v1.0
Thinking in Graphs
Visualization in the Age of Big Data
SplunkLive Wellington 2015 - Splunk for Security
SplunkLive Auckland 2015 - Splunk for Security
Splunk for Security
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Splunk for Security Breakout Session
Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network
Advanced Analytics: Graph Database Use Cases
Hot Cyber Security Technologies
Ad

More from Neo4j (20)

PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
PDF
Jin Foo - Prospa GraphSummit Sydney Presentation.pdf
PDF
GraphSummit Singapore Master Deck - May 20, 2025
PPTX
Graphs & GraphRAG - Essential Ingredients for GenAI
PPTX
Neo4j Knowledge for Customer Experience.pptx
PPTX
GraphTalk New Zealand - The Art of The Possible.pptx
PDF
Neo4j: The Art of the Possible with Graph
PDF
Smarter Knowledge Graphs For Public Sector
PDF
GraphRAG and Knowledge Graphs Exploring AI's Future
PDF
Matinée GenAI & GraphRAG Paris - Décembre 24
PDF
ANZ Presentation: GraphSummit Melbourne 2024
PDF
Google Cloud Presentation GraphSummit Melbourne 2024: Building Generative AI ...
PDF
Telstra Presentation GraphSummit Melbourne: Optimising Business Outcomes with...
PDF
Hands-On GraphRAG Workshop: GraphSummit Melbourne 2024
PDF
Démonstration Digital Twin Building Wire Management
PDF
Swiss Life - Les graphes au service de la détection de fraude dans le domaine...
PDF
Démonstration Supply Chain - GraphTalk Paris
PDF
The Art of Possible - GraphTalk Paris Opening Session
PPTX
How Siemens bolstered supply chain resilience with graph-powered AI insights ...
PDF
Knowledge Graphs for AI-Ready Data and Enterprise Deployment - Gartner IT Sym...
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Jin Foo - Prospa GraphSummit Sydney Presentation.pdf
GraphSummit Singapore Master Deck - May 20, 2025
Graphs & GraphRAG - Essential Ingredients for GenAI
Neo4j Knowledge for Customer Experience.pptx
GraphTalk New Zealand - The Art of The Possible.pptx
Neo4j: The Art of the Possible with Graph
Smarter Knowledge Graphs For Public Sector
GraphRAG and Knowledge Graphs Exploring AI's Future
Matinée GenAI & GraphRAG Paris - Décembre 24
ANZ Presentation: GraphSummit Melbourne 2024
Google Cloud Presentation GraphSummit Melbourne 2024: Building Generative AI ...
Telstra Presentation GraphSummit Melbourne: Optimising Business Outcomes with...
Hands-On GraphRAG Workshop: GraphSummit Melbourne 2024
Démonstration Digital Twin Building Wire Management
Swiss Life - Les graphes au service de la détection de fraude dans le domaine...
Démonstration Supply Chain - GraphTalk Paris
The Art of Possible - GraphTalk Paris Opening Session
How Siemens bolstered supply chain resilience with graph-powered AI insights ...
Knowledge Graphs for AI-Ready Data and Enterprise Deployment - Gartner IT Sym...

Recently uploaded (20)

PDF
Digital Systems & Binary Numbers (comprehensive )
PDF
How to Choose the Right IT Partner for Your Business in Malaysia
PPTX
Computer Software and OS of computer science of grade 11.pptx
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
top salesforce developer skills in 2025.pdf
PDF
System and Network Administration Chapter 2
PPTX
history of c programming in notes for students .pptx
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
Introduction to Artificial Intelligence
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Nekopoi APK 2025 free lastest update
PDF
iTop VPN Free 5.6.0.5262 Crack latest version 2025
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PPTX
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Digital Systems & Binary Numbers (comprehensive )
How to Choose the Right IT Partner for Your Business in Malaysia
Computer Software and OS of computer science of grade 11.pptx
Odoo POS Development Services by CandidRoot Solutions
top salesforce developer skills in 2025.pdf
System and Network Administration Chapter 2
history of c programming in notes for students .pptx
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Introduction to Artificial Intelligence
CHAPTER 2 - PM Management and IT Context
Nekopoi APK 2025 free lastest update
iTop VPN Free 5.6.0.5262 Crack latest version 2025
L1 - Introduction to python Backend.pptx
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Design an Analysis of Algorithms I-SECS-1021-03
Wondershare Filmora 15 Crack With Activation Key [2025
Embracing Complexity in Serverless! GOTO Serverless Bengaluru
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool

Standard Chartered- Threat Intelligence using Knowledge Graphs.pdf

  • 1. INTERNAL 19/07/2022 Threat Intelligence using Knowledge Graphs Hemanth Prabakaran Head Data Analytics & Insights
  • 2. INTERNAL 2 Trust Resilience Client Experience Cybersecurity Challenge as a Global Bank 4 0 Differen t Markets 120 0 Branche s 25,00 0 Group/Countr y Operations 85,00 0 Employee s 5 Line of Busines s Retail Banking Corporate Banking Private Banking Wealth Management Commercial Banking Operations Protect bank assets from external & internal threats Critical Operational Continuity Support Client needs Protect Privacy
  • 3. INTERNAL 3 Data in the heart of Operations Client data IT Assets Channels Application Logs Third Party Process Security data Transactions Data Management Platform Client Experience Client Analytics Financial Crime Compliance Cyber Defence & Threat Intelligence Business Continuity Monitoring Privacy Compliance Traditional technologies not helping with context Key Challenges Lack of Context Lack of Intelligence Lot of unstructured data Lack of Insights
  • 4. INTERNAL SCyphe r Graph Powered Insights Engine SCypher is no-code knowledge graph ecosystem empowered with graph analytics that brings business and analysts the full power of the graph data. Its most scalable, and highly plug and play to generate insights and actions from your data. Features : Knowledge Graph Lifecycle : Knowledge Graph Based Graph Insights & Analytics Flexible Data Orchestration Self Service Seamless Integration & Security at Scale • Schema Based • Perspectives • Virtual Relationships • Index Management • Node Level Security • Workflow Editing UI (Data IKU) • Data Wrangling • Data Enrichment • Scheduled Execution • Real Time • Onboard Perspectives • Dictionary based Taxonomy • Plug & Play • Intelligent Search • User Defined Action • User Defined Insights • Shortest Path • Nearest Neighbor • Focal point Analysis • Graph Exploration • Open Architecture • Embedded Insights • REST API • Single Sign-on • Role Base Access Control COO DATA LAKE SCypher Knowledge Graph Orchestration Graph Database No Code Knowledge Graph Insight Engine Semantic Graph REST API
  • 5. INTERNAL 5 Graph Analytics SCypher <Document title - footer text> Build Perspectives on top of enterprise knowledge graph using self-service capabilities
  • 6. INTERNAL 6 Use Cases SCypher ✔ Threat Intelliegnce ✔ Cyber Risk Identification ✔ Operation Continuity in Resolution ✔ Vulnerability Assessment ✔ Patch Management ✔ Identity & Access Management ✔ Data Privacy Risk & Control
  • 7. INTERNAL 7 Use Case Threat Intelligence 90-100 80-90 70-80 60-70 50-60 40-50 30-40 20-30 10-20 0-10 High Risk Medium Risk Low Risk Threat Score e.g., Feature 1: URL inside the email contributed 45% to the predicted output Feature 2: Illegitimate domains used in previous attacks contributed 20% Feature 3: Covid theme classified as top intent contributed 20% Contextual Intelligence
  • 8. INTERNAL 8 Insider Threat Prevention <Document title - footer text> Contextual risk analysis to prevent potential cyber risk incident
  • 9. INTERNAL 9 Intelligent Insights through SCypher in applications <Document title - footer text> High Risk Explore in SCypher Ingested Intelligent Insights into bank application ecosystem
  • 10. INTERNAL 10 Tangible Business Benefits with Graphs With help of knowledge graphs , Standard Chartered was able to accelerate and strengthen ecosystem to identify a cyber security event even before impact. Some of materialized benefits are : More security threats identified before impact Faster resolution of security threats Potential breaches avoided More internal threats were identified and managed More critical assets became Cybersafe and Cyber resilient Less staff time spent in compiling security reports ✔ Knowledge based Data Discovery ✔ Persona based Recommendation ✔ Improved access to information ✔ Exploratory & path investigation ✔ Contextualized Search ✔ Automated Insights Secondary Benefits
  • 11. INTERNAL 11 <Document title - footer text> Thank You for attending this session , Looking forward to share more