Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Closing the gap in Zero Trust implementation: What you need to conside...
Solving data protection challenges in an era of cloud and AI
42Gears Launches SureIdP — Zero Trust Identity and Access Manage...
42Gears Launches SureIdP — Zero Trust Identity and Access Manage...
Will robocall fraud start to decline in 2026 with stronger regulations...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Solving data protection challenges in an era of cloud and AI

      Solving data protection challenges in an era of cloud and AI

      Wednesday, June 18, 2025, 11:12 AM Asia/Singapore | Data Protection, Features
    • Featured

      Will your organization’s defenses be breached due to your suppliers’ weak cybersecurity?

      Will your organization’s defenses be breached due to your suppliers’ weak cybersecurity?

      Thursday, May 29, 2025, 5:04 PM Asia/Singapore | Features
    • Featured

      How the UAE proactively protects its digital economy

      How the UAE proactively protects its digital economy

      Monday, May 19, 2025, 2:16 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Features
    • Featured

      Solving data protection challenges in an era of cloud and AI

      Solving data protection challenges in an era of cloud and AI

      Wednesday, June 18, 2025, 11:12 AM Asia/Singapore | Data Protection, Features
    • Featured

      Will your organization’s defenses be breached due to your suppliers’ weak cybersecurity?

      Will your organization’s defenses be breached due to your suppliers’ weak cybersecurity?

      Thursday, May 29, 2025, 5:04 PM Asia/Singapore | Features
    • Featured

      How the UAE proactively protects its digital economy

      How the UAE proactively protects its digital economy

      Monday, May 19, 2025, 2:16 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning
Features

Fighting AI with AI in banking and finance

By Victor Ng | Tuesday, August 27, 2024, 4:21 PM Asia/Singapore

Fighting AI with AI in banking and finance

JK: LLMs can learn from historical cases to differentiate between normal and suspicious patterns, improving accuracy compared to traditional methods. 

The FSI sector is beset by large numbers of transactions, intricate networks, and heightened regulatory oversight. Leveraging LLMs to automate significant portions of the Anti-Money Laundering (AML) and Know Your Customer (KYC) procedures can help banks reduce false positive alerts and enhance automated decision-making alongside traditional security controls and measures.

LLMs offer promising advancements for AI-driven AML compliance and threat analysis. These capabilities are incorporated into transaction monitoring, alert triage, and continuous customer due diligence processes within AML frameworks.

For example, Elastic’s Attack Discovery capabilities utilize the Search AI platform to filter and determine which alert details the LLM should assess. By querying the detailed context available in Elastic Security alerts using Elastic’s search AI capabilities, the system extracts the most pertinent data for the LLM. It then instructs the LLM to identify and prioritize potential attacks based on variables such as host and user risk scores, asset criticality scores, alert severities, descriptions, and reasons for the alerts.

The integration of LLM capabilities into existing AML frameworks and their ability to work with current systems like SIEM (Security Information and Event Management) ensure that they enhance current security operations without the need for complete system overhauls. As with any AI system, the effectiveness of LLMs hinges on the quality and fairness of their training data to avoid missing genuine threats or generating false positives, and this must be closely monitored and managed by those who need to trust model outputs.

How should banks ensure the secure integration of LLMs with existing security information and event management (SIEM) systems within their SOC?

JK: Since LLMs rely heavily on data, banks must prioritize data security during their integration. Data segregation is crucial to minimize the risk of compromise and the potential misuse of data. Having robust access controls in place also helps protect the data used for training LLMs. Furthermore, anonymization techniques should be employed to shield sensitive customer information while still facilitating effective training. This should be layered on with continuous performance monitoring to ensure the outputs of the LLM are functioning.

Elastic’s approach differentiates itself by leveraging Retrieval-Augmented Generation (RAG) instead of traditional fine-tuning techniques. RAG offers several advantages that address the limitations regarding bias and explainability.

Firstly, RAG utilizes pre-trained datasets and retrieves information relevant to the prompt from a vast knowledge base that can contain organization-specific data sources. This reduces reliance on potentially biased training data, making the generated responses less susceptible to inheriting biases.

Secondly, RAG’s retrieval process allows for greater transparency into the rationale behind its outputs. By surfacing the most relevant passages from the knowledge base, analysts can understand the reasoning behind the LLM’s response and make more informed decisions.

For instance, imagine an analyst investigating a suspicious login attempt. With RAG-powered Attack Discovery, the analyst could not only see the flagged event but also retrieve relevant internal security advisories and information from the knowledge base. This transparency will empower defenders to understand the context behind the alert, make more informed decisions about its severity, and respond accordingly. This is especially crucial as Security Operations Centers transition to a more fast-paced operational mode.

Given the dynamic nature of the security landscape, regular security assessments of both the SIEM systems and the integrated LLMs are essential. These assessments are crucial for identifying and addressing any vulnerabilities that could potentially be exploited.

By adhering to these practices, banks can ensure a secure integration of LLMs within their existing SIEM frameworks, thereby enhancing the overall security posture of their SOC and bolstering their ability to detect and respond to financial threats.

What would the future of LLMs be in FSI cybersecurity?

JK: With the safety, compliance and transparency requirements in place, LLMs can significantly enhance banking operations securely. This alignment is critical because financial institutions operate under strict regulatory standards that demand predictable, transparent, and reliable AI outputs.

Banks can unlock the full potential of LLMs for security investigations and automated remediation for data-driven decision support. LLMs can ingest vast amounts of data, uncovering patterns and relationships that might be missed by traditional methods. This enhanced understanding will inform security decisions and potential automated remediation actions. LLMs can be trained to explain their reasoning, ensuring transparency and compliance with regulations like the GDPR, which demands clear accountability for automated decisions. They can also leverage capabilities such as RAG to provide context-specific information in decision-making.

Collaboration among financial services professionals, regulators, and policymakers will also play a pivotal role in shaping the integration of LLMs into banking security. Through collective efforts, the industry can establish best practices and standards that ensure the safe and effective use of this technology for widespread adoption.

Pages: 1 2

Share:

PreviousDeveloper of new info/crypto-stealer malware commits a security lapse
NextOvercoming the ‘identity crisis’ in digital banking

Related Posts

A black cat on the prowl: new ransomware making its rounds globally

A black cat on the prowl: new ransomware making its rounds globally

Wednesday, February 9, 2022

Your 9-point ransomware prevention checklist

Your 9-point ransomware prevention checklist

Thursday, November 11, 2021

Passkeys make deeper inroads in 2023

Passkeys make deeper inroads in 2023

Monday, February 5, 2024

Lazarus’ ThreatNeedle backdoor can pierce through network segmentation

Lazarus’ ThreatNeedle backdoor can pierce through network segmentation

Wednesday, March 10, 2021

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    With only a small IT team, the digital transformation has united operations across 30 locations, …Read more
  • Automating border control and security with facial recognition technology

    Automating border control and security with facial recognition technology

    Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam …Read more
  • Securing wealth advisory services without unnecessary friction: Endowus

    Securing wealth advisory services without unnecessary friction: Endowus

    The wealth advisory platform demonstrates its non-negotiable commitment to a robust security posture through partnering …Read more
  • LifeTech group sets up next-gen security operations center in Malaysia

    LifeTech group sets up next-gen security operations center in Malaysia

    By partnering with a unified cybersecurity platform, the firm will be offering cost-effective advanced SOC …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.