SlideShare a Scribd company logo
1 of 22
Download to read offline
Mobile Monday
                           Mobile Payments




Brussels, June 4th, 2012
Over
           •     Mobiele Betalingen Ecosysteem
           •     Project van LSEC met Agoria ICT, Agoria Banking Club en Mobile Monday
                 Brussels
           •     Samenwerkingsverband voor de ontwikkeling van een haalbaarheidsstudie
                 voor de ontwikkeling en ondersteuning van een eco-systeem voor mobiele
                 betalingen
           •     verder
                   •     onderzoeken wat de voorwaarden en moeilijkheden zijn voor een mobiel betalingsysteem in
                         België
                   •     in kaart brengen welke bedrijven hierin actief zijn,
                   •     onderzoek verrichten naar de kritische succesfactoren op basis van internationale ervaringen,
                   •     relaties met internationale partners ontwikkelen
                   •     internationale markt voor de Vlaamse bedrijven exploreren en innovatiemogelijkheden
                         identificeren.
           •     evalueren of het haalbaar is een aantal van die factoren te faciliteren en een
                 aantal mogelijke beperkingen te verminderen of weg te nemen.
           •     zinvol is om verschillende evoluties te ondersteunen en mekaar te laten
                 versterken.
           •     op termijn : innovatiesamenwerking en platform voor internationale
                 samenwerking
© Leaders in Security – LSEC, 2012, Private & Confidential? p 2
About                                  : objectives?
       European Mobile Payment Ecosystem

       Objectives are diverse, but finally to support the widespread deployment of mobile
          payment systems in Europe.
           1. Identify the providers, facilitators and market, their types of services,
               channels, technologies, business models, and other relevant information
           2. Promote mobile transaction activities amongst the participants and the
               market, facilitate the take-up by consumers, merchants and policy makers
           3. Identify common challenges of the market such as security, user interfaces,
               trust, …
           4. Align interests or facilitate activities that allow to overcome these
               challenges
           5. Identify market developments, market needs and facilitate innovation
           6. Become an interface to other interest groups and public authorities,
               representing the industry
           7. Promote the European excellence in Mobile transactions business in other
               markets


© Leaders in Security – LSEC, 2012, Private & Confidential? p 3
Mobiele Betalingen
   1. Marktevolutie

   2. Transactieverwerking en technologiemodellen :
      het ecosysteem

   3. Uitdagingen

   4. Opportuniteit en Innovatie in België

   5. Over LSEC


© Leaders in Security – LSEC, 2012, Private & Confidential
                                                             4
© Leaders in Security – LSEC, 2012, Private & Confidential? p 5
Buitenlandse initiatieven: samenwerkingsmodel




© Leaders in Security – LSEC, 2012, Private & Confidential
                                                             6
Perspectives on mobile payment developments
   1. Motivators (Drivers)
           1.      Offering added value for consumers, merchants mobile operators,
                   financial institutions and other participants in the ecosystem
           2.      User experience/easy to use

   2. Inhibitors - Barriers (to entry for mobile payment):
           1.      Complex value chain with lack of co-operation
           2.      Financial regulation
           3.      Security/risk (perception of security/risk)
           4.      Cost (transaction costs, learning costs, obsolescence cost, …)
           5.      Unavailability of a broad range of mobile payment
           6.      capable handset
           7.      Lack of interoperability/lack of technology standards



© Leaders in Security – LSEC, 2012, Private & Confidential
                                                                               7
Perspectives on mobile payment developments
   Secrets of success :
           1.      Security :
                   1. Risk is the key driver for transactional behaviour
                   2. Determined by transactional context (buyer/seller)
           2.      Availability of ubiquitous and interactive phones
           3.      Behavioural aspects of adoptation to innovation
           4.      Taking into account Regional differences
           5.      Cooperation :
                   1.      Need for cooperation on standards, security features and business
                           models across industries (banks, telcos etc) *
                   2.      Collaboration with Telecom/mobile operators necessary and key !! *
                           Mobile operators dominates today the mobile distribution
                           (both handset and services)
                   3.      For both industries to succeed, business models needs to encompass
                           both banks and mobile operators *

 * Norwegian Bank in a discussion with the European Counsel, 2010
© Leaders in Security – LSEC, 2012, Private & Confidential
                                                                                    8
Security on mobile




     •     Attacks against the device itself
     •     Attacks against data in transit (from/to the device)
     •     Attacks against data in storage (in the device)
     •     Attacks against the owner of the device
© Leaders in Security – LSEC, 2011, Private & Confidential, p 9   Source : LSEC Mobile Security, 2010
Security on mobile




© Leaders in Security – LSEC, 2012, Private & Confidential, p 10   Source : LSEC Infosecurity Theatre, 2011
What : build your own




© Leaders in Security – LSEC, 2012, Private & Confidential, p 11   Source : LSEC Infosecurity Theatre, 2011
What : mobile




© Leaders in Security – LSEC, 2011, Private & Confidential, p 12   Source : LSEC Mobile Security, 2010
Road Map




                         Now          Now       Now            Now   2013   2014   2015


© Leaders in Security – LSEC, 2012, Private & Confidential? p 13
Meer weten?




© Leaders in Security – LSEC, 2012, Private & Confidential? p 14
Over LSEC




© Leaders in Security – LSEC, 2012, Private & Confidential? p 15
Security Innovation




© Leaders in Security – LSEC, 2012, Private & Confidential, p 16
Security Seminars
   1. Beschikbaar :                                                2. Binnenkort :
           1.    BYOD                                                  1.   07.06 : Security Hardening
           2.    Biometrics                                            2.   27 – 29.06 : Privacy By Design
           3.    Security Hardening                                    3.   11.09 : Big Data
           4.    Vulnerabliity Management &                            4.   13.09 : Datacenter Security
                 Intrusion Detection                                   5.   10-11.10 : Mobile Payment
           5.    Cloud Security                                        6.   23-24.10 : ISSE 2012 Brussel
           6.    Online Social Networking & Security                   7.   14-15.11 : IDentityNext
           7.    Mobile Data
           8.    Identity Management - Authentication
           9.    Data Protection & Privacy
           10.   Cybersecurity
           11.   Virtualization
           12.   Web Application Security
           13.   Fraud
           14.   Security Management
           15.   ....




© Leaders in Security – LSEC, 2012, Private & Confidential, p 17
Strategic Security Innovations
   1. Industrial Automation, Building Automation & Process Systems

   2. Financial Services

   3. Healthcare

   4. Cloud Systems

   5. Security Hardening

   6. Automotive

   7. Healthcare

   8. Utilities – Energy

   9. ...

© Leaders in Security – LSEC, 2012, Private & Confidential, p 18
European Security Marketplace




© Leaders in Security – LSEC, 2012, Private & Confidential, p 19
© Leaders in Security – LSEC, 2011, Private & Confidential   20
21
Questions ?




                                                      THANK YOU

                                                          Q or C
                                                   Ulrich Seldeslachts
                                                     ulrich@lsec.be
                                                    +32 475 71 3602


© Leaders in Security – LSEC, 2012, Private & Confidential? p 22

More Related Content

Viewers also liked

Press Releases 1 Q05 En
Press Releases 1 Q05 EnPress Releases 1 Q05 En
Press Releases 1 Q05 EnTIM RI
 
Second Quarter 2004 Results En
Second Quarter 2004 Results EnSecond Quarter 2004 Results En
Second Quarter 2004 Results EnTIM RI
 
ApresentaçãO ConferêNcia Santander
ApresentaçãO ConferêNcia SantanderApresentaçãO ConferêNcia Santander
ApresentaçãO ConferêNcia SantanderTIM RI
 
Press Releases 4 Q05 En
Press Releases 4 Q05 EnPress Releases 4 Q05 En
Press Releases 4 Q05 EnTIM RI
 
Press Release 4 Q98 Tele Nordeste Celular En
Press Release   4 Q98   Tele Nordeste Celular EnPress Release   4 Q98   Tele Nordeste Celular En
Press Release 4 Q98 Tele Nordeste Celular EnTIM RI
 
Incite solution paper on lean communications
Incite solution paper on lean communicationsIncite solution paper on lean communications
Incite solution paper on lean communicationsReid Walker
 
The PowerCoreUSA Opportunity Presentation
The PowerCoreUSA Opportunity PresentationThe PowerCoreUSA Opportunity Presentation
The PowerCoreUSA Opportunity PresentationRobert Proctor
 

Viewers also liked (7)

Press Releases 1 Q05 En
Press Releases 1 Q05 EnPress Releases 1 Q05 En
Press Releases 1 Q05 En
 
Second Quarter 2004 Results En
Second Quarter 2004 Results EnSecond Quarter 2004 Results En
Second Quarter 2004 Results En
 
ApresentaçãO ConferêNcia Santander
ApresentaçãO ConferêNcia SantanderApresentaçãO ConferêNcia Santander
ApresentaçãO ConferêNcia Santander
 
Press Releases 4 Q05 En
Press Releases 4 Q05 EnPress Releases 4 Q05 En
Press Releases 4 Q05 En
 
Press Release 4 Q98 Tele Nordeste Celular En
Press Release   4 Q98   Tele Nordeste Celular EnPress Release   4 Q98   Tele Nordeste Celular En
Press Release 4 Q98 Tele Nordeste Celular En
 
Incite solution paper on lean communications
Incite solution paper on lean communicationsIncite solution paper on lean communications
Incite solution paper on lean communications
 
The PowerCoreUSA Opportunity Presentation
The PowerCoreUSA Opportunity PresentationThe PowerCoreUSA Opportunity Presentation
The PowerCoreUSA Opportunity Presentation
 

Similar to MOBES project

Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Livingstone Advisory
 
DMS Expo: Workplace 2025 -- The Reality TV Show
DMS Expo: Workplace 2025 -- The Reality TV ShowDMS Expo: Workplace 2025 -- The Reality TV Show
DMS Expo: Workplace 2025 -- The Reality TV ShowRich Medina
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile SecuritySantosh Satam
 
GCC Social Security Conference - Ryiadh April 10th 2014
GCC Social Security Conference - Ryiadh April 10th 2014GCC Social Security Conference - Ryiadh April 10th 2014
GCC Social Security Conference - Ryiadh April 10th 2014Christian Wernberg-Tougaard
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 
"Smart Government" - Stimulating Economic Growth and Innovation
"Smart Government" - Stimulating Economic Growth and Innovation"Smart Government" - Stimulating Economic Growth and Innovation
"Smart Government" - Stimulating Economic Growth and InnovationDr David Probert
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Ulrich Seldeslachts
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Top 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdfTop 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdfFuGenx Technologies
 
Cambridge Consultants Innovation Day 2012: Connected machines in a digital ec...
Cambridge Consultants Innovation Day 2012: Connected machines in a digital ec...Cambridge Consultants Innovation Day 2012: Connected machines in a digital ec...
Cambridge Consultants Innovation Day 2012: Connected machines in a digital ec...Cambridge Consultants
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
ENCORE-DEFI Sets New Standard and Creates New Era of DEFI.pdf
ENCORE-DEFI Sets New Standard and Creates New Era of DEFI.pdfENCORE-DEFI Sets New Standard and Creates New Era of DEFI.pdf
ENCORE-DEFI Sets New Standard and Creates New Era of DEFI.pdfcoingabbar
 
Seserv concertation-01
Seserv concertation-01Seserv concertation-01
Seserv concertation-01ictseserv
 
Iot tunisia forum 2017 the journey of making things happen stories of success
Iot tunisia forum 2017  the journey of making things happen stories of successIot tunisia forum 2017  the journey of making things happen stories of success
Iot tunisia forum 2017 the journey of making things happen stories of successIoT Tunisia
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsJulien Ott
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapPomeroy
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 

Similar to MOBES project (20)

Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012Aniketos trust bus_sept_2012
Aniketos trust bus_sept_2012
 
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
 
DMS Expo: Workplace 2025 -- The Reality TV Show
DMS Expo: Workplace 2025 -- The Reality TV ShowDMS Expo: Workplace 2025 -- The Reality TV Show
DMS Expo: Workplace 2025 -- The Reality TV Show
 
Session 4 Enterprise Mobile Security
Session 4  Enterprise Mobile SecuritySession 4  Enterprise Mobile Security
Session 4 Enterprise Mobile Security
 
GCC Social Security Conference - Ryiadh April 10th 2014
GCC Social Security Conference - Ryiadh April 10th 2014GCC Social Security Conference - Ryiadh April 10th 2014
GCC Social Security Conference - Ryiadh April 10th 2014
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
"Smart Government" - Stimulating Economic Growth and Innovation
"Smart Government" - Stimulating Economic Growth and Innovation"Smart Government" - Stimulating Economic Growth and Innovation
"Smart Government" - Stimulating Economic Growth and Innovation
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Top 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdfTop 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdf
 
Cambridge Consultants Innovation Day 2012: Connected machines in a digital ec...
Cambridge Consultants Innovation Day 2012: Connected machines in a digital ec...Cambridge Consultants Innovation Day 2012: Connected machines in a digital ec...
Cambridge Consultants Innovation Day 2012: Connected machines in a digital ec...
 
3rd Annual CISO Round Table
3rd Annual CISO Round Table3rd Annual CISO Round Table
3rd Annual CISO Round Table
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
ENCORE-DEFI Sets New Standard and Creates New Era of DEFI.pdf
ENCORE-DEFI Sets New Standard and Creates New Era of DEFI.pdfENCORE-DEFI Sets New Standard and Creates New Era of DEFI.pdf
ENCORE-DEFI Sets New Standard and Creates New Era of DEFI.pdf
 
Seserv concertation-01
Seserv concertation-01Seserv concertation-01
Seserv concertation-01
 
Iot tunisia forum 2017 the journey of making things happen stories of success
Iot tunisia forum 2017  the journey of making things happen stories of successIot tunisia forum 2017  the journey of making things happen stories of success
Iot tunisia forum 2017 the journey of making things happen stories of success
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Building a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmapBuilding a successful enterprise mobility roadmap
Building a successful enterprise mobility roadmap
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 

More from Mobile Monday Brussels

Privacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumPrivacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumMobile Monday Brussels
 
GARI - mobile accessibility for mobile apps
GARI - mobile accessibility for mobile appsGARI - mobile accessibility for mobile apps
GARI - mobile accessibility for mobile appsMobile Monday Brussels
 
Uxperts mobi 2013 Ux for the future @ EhB
Uxperts mobi 2013  Ux for the future @ EhBUxperts mobi 2013  Ux for the future @ EhB
Uxperts mobi 2013 Ux for the future @ EhBMobile Monday Brussels
 
Mobile gaming app promotion- mark brill
Mobile gaming   app promotion- mark brillMobile gaming   app promotion- mark brill
Mobile gaming app promotion- mark brillMobile Monday Brussels
 
Uxperts mobi 2013 how the f -_ do i start
Uxperts mobi 2013   how the f -_ do i startUxperts mobi 2013   how the f -_ do i start
Uxperts mobi 2013 how the f -_ do i startMobile Monday Brussels
 
Appsforgeonostalgia20130426 appsforgeo
Appsforgeonostalgia20130426 appsforgeoAppsforgeonostalgia20130426 appsforgeo
Appsforgeonostalgia20130426 appsforgeoMobile Monday Brussels
 
Mobile monday intro to social media on mobile
Mobile monday intro to social media on mobileMobile monday intro to social media on mobile
Mobile monday intro to social media on mobileMobile Monday Brussels
 

More from Mobile Monday Brussels (20)

Privacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 BelgiumPrivacy and mobile apps - status 2013 Belgium
Privacy and mobile apps - status 2013 Belgium
 
GARI - mobile accessibility for mobile apps
GARI - mobile accessibility for mobile appsGARI - mobile accessibility for mobile apps
GARI - mobile accessibility for mobile apps
 
Djump
DjumpDjump
Djump
 
Appsmarathon 2013
Appsmarathon 2013Appsmarathon 2013
Appsmarathon 2013
 
Uxperts mobi 2013 Ux for the future @ EhB
Uxperts mobi 2013  Ux for the future @ EhBUxperts mobi 2013  Ux for the future @ EhB
Uxperts mobi 2013 Ux for the future @ EhB
 
Uxperts mobi 2013 soa & challenges
Uxperts mobi 2013   soa & challengesUxperts mobi 2013   soa & challenges
Uxperts mobi 2013 soa & challenges
 
Mobile gaming app promotion- mark brill
Mobile gaming   app promotion- mark brillMobile gaming   app promotion- mark brill
Mobile gaming app promotion- mark brill
 
Uxperts mobi 2013 what about testing
Uxperts mobi 2013   what about testing Uxperts mobi 2013   what about testing
Uxperts mobi 2013 what about testing
 
Uxperts mobi 2013 introduction
Uxperts mobi 2013   introductionUxperts mobi 2013   introduction
Uxperts mobi 2013 introduction
 
Uxperts mobi 2013 ux for windows 8
Uxperts mobi 2013   ux for windows 8Uxperts mobi 2013   ux for windows 8
Uxperts mobi 2013 ux for windows 8
 
Uxperts mobi 2013 ux for android
Uxperts mobi 2013   ux for androidUxperts mobi 2013   ux for android
Uxperts mobi 2013 ux for android
 
Uxperts mobi 2013 how the f -_ do i start
Uxperts mobi 2013   how the f -_ do i startUxperts mobi 2013   how the f -_ do i start
Uxperts mobi 2013 how the f -_ do i start
 
Uxperts mobi 2013 ux for i os
Uxperts mobi 2013   ux for i osUxperts mobi 2013   ux for i os
Uxperts mobi 2013 ux for i os
 
Apps4 geo geosolutions
Apps4 geo geosolutionsApps4 geo geosolutions
Apps4 geo geosolutions
 
Appsforgeonostalgia20130426 appsforgeo
Appsforgeonostalgia20130426 appsforgeoAppsforgeonostalgia20130426 appsforgeo
Appsforgeonostalgia20130426 appsforgeo
 
Momojan21012013
Momojan21012013Momojan21012013
Momojan21012013
 
Mv use of social media Dorien Aerts
Mv use of social media   Dorien AertsMv use of social media   Dorien Aerts
Mv use of social media Dorien Aerts
 
Mobilemonday Slovakia
Mobilemonday SlovakiaMobilemonday Slovakia
Mobilemonday Slovakia
 
Mobile monday intro to social media on mobile
Mobile monday intro to social media on mobileMobile monday intro to social media on mobile
Mobile monday intro to social media on mobile
 
Survey anyplace apps marathon
Survey anyplace apps marathonSurvey anyplace apps marathon
Survey anyplace apps marathon
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

MOBES project

  • 1. Mobile Monday Mobile Payments Brussels, June 4th, 2012
  • 2. Over • Mobiele Betalingen Ecosysteem • Project van LSEC met Agoria ICT, Agoria Banking Club en Mobile Monday Brussels • Samenwerkingsverband voor de ontwikkeling van een haalbaarheidsstudie voor de ontwikkeling en ondersteuning van een eco-systeem voor mobiele betalingen • verder • onderzoeken wat de voorwaarden en moeilijkheden zijn voor een mobiel betalingsysteem in België • in kaart brengen welke bedrijven hierin actief zijn, • onderzoek verrichten naar de kritische succesfactoren op basis van internationale ervaringen, • relaties met internationale partners ontwikkelen • internationale markt voor de Vlaamse bedrijven exploreren en innovatiemogelijkheden identificeren. • evalueren of het haalbaar is een aantal van die factoren te faciliteren en een aantal mogelijke beperkingen te verminderen of weg te nemen. • zinvol is om verschillende evoluties te ondersteunen en mekaar te laten versterken. • op termijn : innovatiesamenwerking en platform voor internationale samenwerking © Leaders in Security – LSEC, 2012, Private & Confidential? p 2
  • 3. About : objectives? European Mobile Payment Ecosystem Objectives are diverse, but finally to support the widespread deployment of mobile payment systems in Europe. 1. Identify the providers, facilitators and market, their types of services, channels, technologies, business models, and other relevant information 2. Promote mobile transaction activities amongst the participants and the market, facilitate the take-up by consumers, merchants and policy makers 3. Identify common challenges of the market such as security, user interfaces, trust, … 4. Align interests or facilitate activities that allow to overcome these challenges 5. Identify market developments, market needs and facilitate innovation 6. Become an interface to other interest groups and public authorities, representing the industry 7. Promote the European excellence in Mobile transactions business in other markets © Leaders in Security – LSEC, 2012, Private & Confidential? p 3
  • 4. Mobiele Betalingen 1. Marktevolutie 2. Transactieverwerking en technologiemodellen : het ecosysteem 3. Uitdagingen 4. Opportuniteit en Innovatie in België 5. Over LSEC © Leaders in Security – LSEC, 2012, Private & Confidential 4
  • 5. © Leaders in Security – LSEC, 2012, Private & Confidential? p 5
  • 6. Buitenlandse initiatieven: samenwerkingsmodel © Leaders in Security – LSEC, 2012, Private & Confidential 6
  • 7. Perspectives on mobile payment developments 1. Motivators (Drivers) 1. Offering added value for consumers, merchants mobile operators, financial institutions and other participants in the ecosystem 2. User experience/easy to use 2. Inhibitors - Barriers (to entry for mobile payment): 1. Complex value chain with lack of co-operation 2. Financial regulation 3. Security/risk (perception of security/risk) 4. Cost (transaction costs, learning costs, obsolescence cost, …) 5. Unavailability of a broad range of mobile payment 6. capable handset 7. Lack of interoperability/lack of technology standards © Leaders in Security – LSEC, 2012, Private & Confidential 7
  • 8. Perspectives on mobile payment developments Secrets of success : 1. Security : 1. Risk is the key driver for transactional behaviour 2. Determined by transactional context (buyer/seller) 2. Availability of ubiquitous and interactive phones 3. Behavioural aspects of adoptation to innovation 4. Taking into account Regional differences 5. Cooperation : 1. Need for cooperation on standards, security features and business models across industries (banks, telcos etc) * 2. Collaboration with Telecom/mobile operators necessary and key !! * Mobile operators dominates today the mobile distribution (both handset and services) 3. For both industries to succeed, business models needs to encompass both banks and mobile operators * * Norwegian Bank in a discussion with the European Counsel, 2010 © Leaders in Security – LSEC, 2012, Private & Confidential 8
  • 9. Security on mobile • Attacks against the device itself • Attacks against data in transit (from/to the device) • Attacks against data in storage (in the device) • Attacks against the owner of the device © Leaders in Security – LSEC, 2011, Private & Confidential, p 9 Source : LSEC Mobile Security, 2010
  • 10. Security on mobile © Leaders in Security – LSEC, 2012, Private & Confidential, p 10 Source : LSEC Infosecurity Theatre, 2011
  • 11. What : build your own © Leaders in Security – LSEC, 2012, Private & Confidential, p 11 Source : LSEC Infosecurity Theatre, 2011
  • 12. What : mobile © Leaders in Security – LSEC, 2011, Private & Confidential, p 12 Source : LSEC Mobile Security, 2010
  • 13. Road Map Now Now Now Now 2013 2014 2015 © Leaders in Security – LSEC, 2012, Private & Confidential? p 13
  • 14. Meer weten? © Leaders in Security – LSEC, 2012, Private & Confidential? p 14
  • 15. Over LSEC © Leaders in Security – LSEC, 2012, Private & Confidential? p 15
  • 16. Security Innovation © Leaders in Security – LSEC, 2012, Private & Confidential, p 16
  • 17. Security Seminars 1. Beschikbaar : 2. Binnenkort : 1. BYOD 1. 07.06 : Security Hardening 2. Biometrics 2. 27 – 29.06 : Privacy By Design 3. Security Hardening 3. 11.09 : Big Data 4. Vulnerabliity Management & 4. 13.09 : Datacenter Security Intrusion Detection 5. 10-11.10 : Mobile Payment 5. Cloud Security 6. 23-24.10 : ISSE 2012 Brussel 6. Online Social Networking & Security 7. 14-15.11 : IDentityNext 7. Mobile Data 8. Identity Management - Authentication 9. Data Protection & Privacy 10. Cybersecurity 11. Virtualization 12. Web Application Security 13. Fraud 14. Security Management 15. .... © Leaders in Security – LSEC, 2012, Private & Confidential, p 17
  • 18. Strategic Security Innovations 1. Industrial Automation, Building Automation & Process Systems 2. Financial Services 3. Healthcare 4. Cloud Systems 5. Security Hardening 6. Automotive 7. Healthcare 8. Utilities – Energy 9. ... © Leaders in Security – LSEC, 2012, Private & Confidential, p 18
  • 19. European Security Marketplace © Leaders in Security – LSEC, 2012, Private & Confidential, p 19
  • 20. © Leaders in Security – LSEC, 2011, Private & Confidential 20
  • 21. 21
  • 22. Questions ? THANK YOU Q or C Ulrich Seldeslachts ulrich@lsec.be +32 475 71 3602 © Leaders in Security – LSEC, 2012, Private & Confidential? p 22