Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Malvertising campaign targets Android users with advanced crypto-steal...
How are people in 15 countries leveraging AI for travel planning?
Insider threats cited alongside external attacks in terms of severity:...
How are people in 15 countries leveraging AI for travel planning?
North America financial institutions lead surge in financial regulator...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Resilience the true benchmark for smart infrastructure

      Resilience the true benchmark for smart infrastructure

      Wednesday, August 27, 2025, 8:21 PM Asia/Singapore | Features, IoT Security
    • Featured

      Deepfake a crisis of trust, not just technology

      Deepfake a crisis of trust, not just technology

      Tuesday, August 19, 2025, 10:06 AM Asia/Singapore | Features
    • Featured

      When talking sense into AI power mongers fails, talk $$$: A message from AI

      When talking sense into AI power mongers fails, talk $$$: A message from AI

      Thursday, August 14, 2025, 12:26 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

Features

Fighting AI with AI in banking and finance

By Victor Ng | Tuesday, August 27, 2024, 4:21 PM Asia/Singapore

Fighting AI with AI in banking and finance

JK: LLMs can learn from historical cases to differentiate between normal and suspicious patterns, improving accuracy compared to traditional methods. 

The FSI sector is beset by large numbers of transactions, intricate networks, and heightened regulatory oversight. Leveraging LLMs to automate significant portions of the Anti-Money Laundering (AML) and Know Your Customer (KYC) procedures can help banks reduce false positive alerts and enhance automated decision-making alongside traditional security controls and measures.

LLMs offer promising advancements for AI-driven AML compliance and threat analysis. These capabilities are incorporated into transaction monitoring, alert triage, and continuous customer due diligence processes within AML frameworks.

For example, Elastic’s Attack Discovery capabilities utilize the Search AI platform to filter and determine which alert details the LLM should assess. By querying the detailed context available in Elastic Security alerts using Elastic’s search AI capabilities, the system extracts the most pertinent data for the LLM. It then instructs the LLM to identify and prioritize potential attacks based on variables such as host and user risk scores, asset criticality scores, alert severities, descriptions, and reasons for the alerts.

The integration of LLM capabilities into existing AML frameworks and their ability to work with current systems like SIEM (Security Information and Event Management) ensure that they enhance current security operations without the need for complete system overhauls. As with any AI system, the effectiveness of LLMs hinges on the quality and fairness of their training data to avoid missing genuine threats or generating false positives, and this must be closely monitored and managed by those who need to trust model outputs.

How should banks ensure the secure integration of LLMs with existing security information and event management (SIEM) systems within their SOC?

JK: Since LLMs rely heavily on data, banks must prioritize data security during their integration. Data segregation is crucial to minimize the risk of compromise and the potential misuse of data. Having robust access controls in place also helps protect the data used for training LLMs. Furthermore, anonymization techniques should be employed to shield sensitive customer information while still facilitating effective training. This should be layered on with continuous performance monitoring to ensure the outputs of the LLM are functioning.

Elastic’s approach differentiates itself by leveraging Retrieval-Augmented Generation (RAG) instead of traditional fine-tuning techniques. RAG offers several advantages that address the limitations regarding bias and explainability.

Firstly, RAG utilizes pre-trained datasets and retrieves information relevant to the prompt from a vast knowledge base that can contain organization-specific data sources. This reduces reliance on potentially biased training data, making the generated responses less susceptible to inheriting biases.

Secondly, RAG’s retrieval process allows for greater transparency into the rationale behind its outputs. By surfacing the most relevant passages from the knowledge base, analysts can understand the reasoning behind the LLM’s response and make more informed decisions.

For instance, imagine an analyst investigating a suspicious login attempt. With RAG-powered Attack Discovery, the analyst could not only see the flagged event but also retrieve relevant internal security advisories and information from the knowledge base. This transparency will empower defenders to understand the context behind the alert, make more informed decisions about its severity, and respond accordingly. This is especially crucial as Security Operations Centers transition to a more fast-paced operational mode.

Given the dynamic nature of the security landscape, regular security assessments of both the SIEM systems and the integrated LLMs are essential. These assessments are crucial for identifying and addressing any vulnerabilities that could potentially be exploited.

By adhering to these practices, banks can ensure a secure integration of LLMs within their existing SIEM frameworks, thereby enhancing the overall security posture of their SOC and bolstering their ability to detect and respond to financial threats.

What would the future of LLMs be in FSI cybersecurity?

JK: With the safety, compliance and transparency requirements in place, LLMs can significantly enhance banking operations securely. This alignment is critical because financial institutions operate under strict regulatory standards that demand predictable, transparent, and reliable AI outputs.

Banks can unlock the full potential of LLMs for security investigations and automated remediation for data-driven decision support. LLMs can ingest vast amounts of data, uncovering patterns and relationships that might be missed by traditional methods. This enhanced understanding will inform security decisions and potential automated remediation actions. LLMs can be trained to explain their reasoning, ensuring transparency and compliance with regulations like the GDPR, which demands clear accountability for automated decisions. They can also leverage capabilities such as RAG to provide context-specific information in decision-making.

Collaboration among financial services professionals, regulators, and policymakers will also play a pivotal role in shaping the integration of LLMs into banking security. Through collective efforts, the industry can establish best practices and standards that ensure the safe and effective use of this technology for widespread adoption.

Pages: 1 2

Share:

PreviousDeveloper of new info/crypto-stealer malware commits a security lapse
NextOvercoming the ‘identity crisis’ in digital banking

Related Posts

Scareware tactics in malvertising app target cybersecurity-wary users

Scareware tactics in malvertising app target cybersecurity-wary users

Wednesday, August 4, 2021

Organizations in APAC are concerned with cybersecurity skills gaps: report

Organizations in APAC are concerned with cybersecurity skills gaps: report

Thursday, March 5, 2020

What 900 APJ respondents thought of their large organizations’ cybersecurity posture

What 900 APJ respondents thought of their large organizations’ cybersecurity posture

Wednesday, April 6, 2022

Staying safe at the year-end massive e-sales, starting with Prime Day

Staying safe at the year-end massive e-sales, starting with Prime Day

Tuesday, October 13, 2020

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • CISOs can navigate emerging risks from autonomous AI with a new security framework

    CISOs can navigate emerging risks from autonomous AI with a new security framework

    See how security leaders can adopt layered strategies addressing intent, governance, and oversight to manage …Read more
  • MoneyMe strengthens fraud prevention and credit decisioning

    MoneyMe strengthens fraud prevention and credit decisioning

    Australian fintech strengthens risk management with SEON to scale lending operations securely and efficiently.Read more
  • PT Kereta Api Indonesia announces nationwide email and communication overhaul

    PT Kereta Api Indonesia announces nationwide email and communication overhaul

    The state railway operator’s upgraded email system improves privacy, operational reliability, and regulatory alignment for …Read more
  • Operationalizing sustainability in cybersecurity: Group-IB’s approach

    Operationalizing sustainability in cybersecurity: Group-IB’s approach

    See how the firm turned malware-group takedowns into measurements of sustainability and resilience gains: by …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.