User Guide - AAB Information Security Forum

Download Report

Transcript User Guide - AAB Information Security Forum

Security and Digital Transition
in Banking
Tirana, October, 2016
1
THE BIG
PICTURE
The Driving Forces of FinTech: E and R
ICT is GPT
What is holding
FinTech back?
Writing
3500 BC
REGULATORY
PATCHWORK
Printing
1500 AD
COMPLIANCE
Steam Engine
1790 AD
DIGITAL FINITY
Electricity
1890 AD
TECH: GAFA
2
THE
WINNING
GAME
CATEGORIZE
COMMUNICATE
CONVINCE
CREATE
30 AREAS OF FINTECH IN
COMPETITIVE/COOPERATIVE VIEW
COMPETITION
Wallets
Card Substitutes
Crowdfunding
Neo-Banks
Social Trading
Remittances
Micropayments
APIs
Big Data
Wearables
P2P Lending
Roboadvisors
Personal Finance Dashboards
Phone-Related-Solutions
Digital Currencies
Interbank Blockchain
15 000 Companies
USD 150 bn Invested
InsureTech
ATM Innovation
IoT
Augmented Reality
Back-Office Artificial Intelligence
Biometric Identification
RiskTech
Compliance
RegTech
Virtual Reality
Others
Back-Office Blockchain
Digital Identity
Video Banking
COOPERATION
COMPLEXITY: FIVE DIFFERENT, REFINED GAMES
TO BE PLAYED BY BANKS
COMPETITION
Social Trading
Remittances
TO COMMUNICATE
Neo-Banks
TO PROVIDE
Micropayments
SUPERIOR
P2P Lending
INFORMATION
Roboadvisors
SECURITY
Wearables
THEBigSECURITY
Data
VALUE-CHAIN
Digital Currencies
Interbank Blockchain
FINTECH
COMPANIES
SPECIALIZED IN
INFORMATION
SECURITY
TO FOLLOW
TRENDS
Virtual Reality
APIs
Personal Finance Dashboards
Phone-Related-Solutions
IoT
Wallets
Card Substitutes
Crowdfunding
ATM Innovation
Augmented Reality
TO ENSURE
Back-Office Artificial Intelligence
BANK-LEVEL
SECURITY
Compliance
InsureTech
Biometric Identification
Back-Office-Blockchain
RiskTech
Others
Digital Identity
Video Banking
RegTech
COOPERATION
Follow Tami and friends on their journey to improving their online security. You
can pick up some security tips, or learn what to do if you are the victim of identity
theft or fraud.
Oversharers Anonymous Session One by US Bank
Oversharers Anonymous
- Session Two by US
Bank
Tami Dating
Metcalfe’s Law:
EXPONENTIAL IS THE NEW LINEAR?
• Metcalfe's law states that the value of a
telecommunications network is proportional to
the square of the number of connected users of
the system (n x n).
• P2P Lending, Crowdfunding
• Social Trading
• Remittances Clearing
BANKING REPORTS
Why Old People Buy / Not Buy Digital Services
BANKING REPORTS
BUT WHO ARE THEY? From PSD2 XS2A Perspective
•
•
•
•
•
•
•
MNOs
GAFA
Chinese Tech
Moven/PayPal/TransferWise
ForEx
Social Trading
Gaming
•
THE SMART BANKS
Moven from New York: Success x Risks = ?
BANKING REPORTS
3
EXAMPLES
FROM
AROUND
THE WORLD
BEHAVIOSEC
Continuous Authentication
Continuous Authentication
BehavioSec analyzes activity from login to logout, looking at behaviors like keystroke
dynamics, touch and mouse motion, and compares it to previous interactions from
the same user. It creates a session ticket and a score, using the full score from the
session. That score is fed into your risk engine, so you can automatically step up
security if you need to. You can also use BehavioView dashboard to see the score
breakdown, and identify behaviors or anomalies BehavioSec has flagged.
Adaptive Security
The algorithm stays up to date with user behaviors and skills, so that as they change
and improve, so does the security layer — reducing false positives. The core
algorithm is continually improved for session-based intelligence and enhanced rolebased management. Machine learning algorithm to spot individual anomalies in real
time.
HALIFAX BANK
Heartbeat Bracelet Login
LLOYDS BANK
Voice Intelligence
+ USA, UK, India
Lloyds Banking Group has collaborated with security firm, Pindrop, to roll out the
latest telephone fraud prevention technology, which creates an ‘audio footprint’ of
each call by analysing 147 unique call features such as location, background
noise, number history and call type.
The Phoneprinting technology highlights any unusual activity, identifies potential
fraud cases and flags up any potential criminal activity – without the need for
customers to provide any additional information.
BANK GUARD
• man in the middle attacks
• two-factor authentication
Anti-Phishing Card
• rather than numeric one-time passwords
• resistant against phishing sites
ID NOW
Digital Onboarding via
Smartphone
ID Now Explained
Secure & legal personal identification and electronic signatures for the digital age.
Video-Ident: Verify customers online - reliable and optimized for conversion
Integrate IDnow into your offering within a few hours: IDnow verifies your customers
via web browser or smart phone EU-wide. Fast and reliable. IDnow eSign: Bring
your customer acquisition into the digital age with legally binding, digital
contract signing.
The final element for your digital customer experience: Digital signatures in your
customer acquisition channels cut process costs and optimize your customer
experience.
https://www.miteksystems.com/mobile-verify
THANK YOU FOR
YOUR ATTENTION!