SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Information Security and Digital Payments;
thoughts about current trends
Dr. John ILIADIS
CMgr MCMI, CISSP-ISSMP, CISM
(ISC)2 Hellenic Chapter, Board Member
3
» (ISC)2 = International Information Systems Security
Certification Consortium, established in 1989
» Non-profit consortium of information security industry
leaders
» Supports security professionals throughout their careers
» Global Standard for information security: (ISC)2 CBK®
» Over 150,000 certified professionals; over 170 countries
» 260 members in Greece, established in 2015
4
» A state of constant flux; even our home will change [1]
» Supply chain attacks ballooned by 78% [2]
» 52% of compliance leaders concerned about third-party risk [3]
» New regulations to comply with [4], [5], [6], while risk fluctuates
» Cloud market share over OnPrem ↑ [7], [8], emerging threats [9]
» Organisations nudge IT personnel towards Cloud certifications
like (ISC)2 CCSP [10] to confront with emerging threats [11]
COVID-19; security status quo
…here to stay for a long time
5
» “Cyber risks surpass … risks that led to the Great Recession
in 2008”, US Federal Reserve Chairman Jerome Powell [12]
» Scientific journals on COVID-19 impact to e-payments [13]
» “…banks still rely on large co-locations of people …
processing checks … wire transfer operations”; opportunity
to invest in new technologies, processes to make financial
institutions more resilient [14]
» Reluctancy of public to go cashless due to personal data
sensitivity [15] diminished after Covid-19 [16]
COVID-19, Security and Payments (1)
6
» New vulnerabilities due to COVID-19 [17]:
• Relaxed measures, e.g. increased contactless limit
• Increased need for goods lowers consumer diligence
• Anxiety levels and susceptibility to social engineering
• Circumstances reduce suspicion of contact from
official bodies
» Digital payment adoption went sky-high, along with
pertinent risk; biometrics, tokenization and behavioral
analytics expected to counter increased risk [18]
COVID-19, Security and Payments (2)
7
» e-payments customer acquisition/churn rates can be
maintained at desired levels [19], depending on:
• Perceived Usefulness (incl. Security and Convenience) [20], [21]
• Social Influence (incl. Social Media) [22], [23]
• Mobility and reachability
» Risk-averse customers could be nudged into using
privacy-intrusive e-payment schemes; type and amount
of nudging required: already estimated [24]
Customer acquisition/churn (1)
8
Balancing act between:
» Social Media, Behavioral Economics
» Information Security, Data Privacy
wrt customer acquisition/churn efforts?
Customer acquisition/churn (2)
9
» FinTech stems from the traditional financial
world
• Payments’ profit margins still relevant (somewhat?)
• Entry barrier for banks: cost of legacy systems [25]?
» TechFin (e.g. GAFA)
• They are not after payment margins; mostly after:
- Customer data [26]
- Customer retention; "Amazon wants payments in-house so
users never leave its app“ [27]
• Not very regulated, yet
FinTech vs TechFin?
10
» TechFins in need of personal data for business development
» Recent regulatory privacy concerns emerged [4], [5], [6]
» Increased non-regulatory concerns for privacy
• Privacy as a comparative advantage towards disrupting payment
schemes [28]
• 60% of InfoSec professionals believe a “strong privacy posture” is
important to achieving cyber resilience [29]
» TechFins lobbying to change regulation [30]
TechFins: Is Regulation Ready?
11
» COVID-19 technological side-effects on Biometrics
• Use of contactless biometrics increased [31]
• G2P digitilisation using biometrics accelerated, e.g. proof of
life to keep the digital payment of a beneficiary going [32]
» Biometrics begins with a (B)ut…
• Convenience? √ [33]
• Privacy risks? (stolen data [34], abuse of collected
information [35], [36])
• Security risks? (detective controls for Deep fakes? [37])
G2P Payments and Biometrics
12
Thank you !
j.iliadis {at} isc2-chapter.gr
13
References (1/4)
1. This is what coronavirus will do to our offices and homes, BBC News,2020
2. Internet Security Threat Report, Symantec, 2019
3. Responding to COVID-19: What We are Hearing From Legal and Compliance Leaders, Gartner, 2020
4. Transforming compliance into competitive advantage, Oliver Wyman, 2018
5. New Laws on Data Privacy and Security Are Coming. Is Your Company Ready?, HBR, 2019
6. CSO's ultimate guide to security and privacy laws, regulations, and compliance, CSO Online, 2021
7. The Year that Cloud Service Revenues Finally Dwarfed Enterprise Spending on Data Centers, Synergy
Research, 2021
8. The Security and Compliance Benefits of IaaS for Financial Services, IDC, April 2021
9. Cloud (Mis)Configuration: What Do You Need to Consider? ,(ISC)2 Blog, 2021
10. (ISC)2 Annual Report 2020
11. Cybersecurity Career Pursuers Study, (ISC)2, 2021
14
References (2/4)
12. Cyber threats: The Financial Systems’ Top Risk, (ISC)2 Blog, 2021
13. The Impact of COVID-19 Pandemic on Mobile Payment, International Journal of Bank Marketing,
Emerald Publishing, 2021
14. COVID-19 putting a spotlight on banks’ payment operations, KPMG Insights, May 2020
15. Why Germany is so slow on the global road toward a cashless society, Handelsblatt, 2019
16. Digital payments deepen the threat of online fraud in Covid era, Financial Times, November 2020
17. 10 ways COVID-19 is impacting Payments, Accenture, 2020
18. How is the COVID-19 pandemic influencing payments innovation? Ernst & Young, October 2020
19. Purva Grover, Arpan Kumar Kar, User engagement for mobile payment service providers – introducing
the social media engagement model, Journal of Retailing and Consumer Services, Vol 53, 2020
20. Amoroso, Donald and Pajaree Ackaradejruangsri. "How Consumer Attitudes Improve Repurchase
Intention." IJESMA vol.9, no.3 2017
15
References (3/4)
21. Xiaogang Chen & Shaorui Li, Understanding Continuance Intention of Mobile Payment Services: An
Empirical Study, Journal of Computer Information Systems, 57:4, 2017
22. Qasim, H., Abu-Shanab, E. Drivers of mobile payment acceptance: The impact of network
externalities. Inf Syst Front 18, 2016
23. Conrad Murendo, Meike Wollni, Alan De Brauw & Nicholas Mugabi Social Network Effects on Mobile
Money Adoption in Uganda, The Journal of Development Studies, 2017
24. Kevin K. W. Ho, Eric W. K. See-To & Dickson K. W. Chiu, “Price Tag” of Risk of Using E-Payment Service,
Journal of Internet Commerce, 19:3, 2020
25. COVID-19 Increases Urgency for Banks to Transform Payment, Accenture, 2020
26. David G.W. Birch, Bye Fintech. Hello Techfin, Forbes, June 2021
27. Big Tech takes aim at the low-profit retail-banking industry, The Economist, Nov 23rd, 2019
28. David G.W. Birch, Anonymity In Payments? It’s Complicated, Forbes, May 2021
16
References (4/4)
29. Cyber Resilient Organization Report, IBM, 2020
30. Helene Panzarino, FinTech, TechFin and the challenge from BigTech, Executive Education Block,
Imperial College Business School
31. Biometrics-backed mobile money and facial recognition markets to grow as everything goes
contactless, June 2020
32. Digital finance and inclusion in the time of COVID-19, Food and Agriculture Organisation of the United
Nations, 2021
33. COVID, cashless, and convenience: The rise of biometrics, FinTech Magazine, May 2021
34. US government hack stole fingerprints of 5.6 million federal employees, The Guardian, 2015
35. Biometric Data: Increased Security and Risks, Security Magazine, May 2020
36. Biometrics, surveillance and privacy, ERNCIP Thematic Group Applied Biometrics for the Security of
Critical Infrastructure, 2016
37. Deepfake and Fake Videos - How to Protect Yourself?, Kaspersky

Contenu connexe

Tendances

Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lrFuture Agenda
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agendaFuture Agenda
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublishedAlain Ducass
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19Ahmed Banafa
 
World Economic Forum Tipping Points Report
World Economic Forum Tipping Points ReportWorld Economic Forum Tipping Points Report
World Economic Forum Tipping Points ReportSergey Nazarov
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaRaaj Khanna
 
Veber FinTech Vs Banking consumer report
Veber FinTech Vs Banking consumer reportVeber FinTech Vs Banking consumer report
Veber FinTech Vs Banking consumer reportMarie Johnson
 
Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021
Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021
Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021Nicholas Tancredi
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
World Economic Forum Tipping Point Blockchain
World Economic Forum Tipping Point BlockchainWorld Economic Forum Tipping Point Blockchain
World Economic Forum Tipping Point BlockchainSergey Nazarov
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain managementAhmed Banafa
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ahmed Banafa
 

Tendances (20)

Future of digital identity programme summary - 19 mar 2019 lr
Future of digital identity   programme summary - 19 mar 2019 lrFuture of digital identity   programme summary - 19 mar 2019 lr
Future of digital identity programme summary - 19 mar 2019 lr
 
Sharing best practices for success
Sharing best practices for successSharing best practices for success
Sharing best practices for success
 
The future of digital identity 2019 future agenda
The future of digital identity 2019   future agendaThe future of digital identity 2019   future agenda
The future of digital identity 2019 future agenda
 
IoT & Insurance
IoT & InsuranceIoT & Insurance
IoT & Insurance
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Regulatory Considerations for Digital Insurance Business Models
Regulatory Considerations for Digital Insurance Business ModelsRegulatory Considerations for Digital Insurance Business Models
Regulatory Considerations for Digital Insurance Business Models
 
141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished141013 e id-budapest_sia_tobepublished
141013 e id-budapest_sia_tobepublished
 
IoT Ins Obs '19
IoT Ins Obs '19IoT Ins Obs '19
IoT Ins Obs '19
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
World Economic Forum Tipping Points Report
World Economic Forum Tipping Points ReportWorld Economic Forum Tipping Points Report
World Economic Forum Tipping Points Report
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
 
Veber FinTech Vs Banking consumer report
Veber FinTech Vs Banking consumer reportVeber FinTech Vs Banking consumer report
Veber FinTech Vs Banking consumer report
 
Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021
Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021
Preview of Top 3 AI Use Cases for Financial Crimes and Fraud in 2021
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Blockchain Factors for Consumer Acceptance
Blockchain Factors for Consumer AcceptanceBlockchain Factors for Consumer Acceptance
Blockchain Factors for Consumer Acceptance
 
World Economic Forum Tipping Point Blockchain
World Economic Forum Tipping Point BlockchainWorld Economic Forum Tipping Point Blockchain
World Economic Forum Tipping Point Blockchain
 
Blockchain technology and supply chain management
Blockchain technology and supply chain managementBlockchain technology and supply chain management
Blockchain technology and supply chain management
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 
Ten trends of blockchain in 2020
Ten trends of blockchain in 2020Ten trends of blockchain in 2020
Ten trends of blockchain in 2020
 

Similaire à Information security and digital payments; thoughts about current trends

Security in RegTech's Playground
Security in RegTech's PlaygroundSecurity in RegTech's Playground
Security in RegTech's PlaygroundJohn ILIADIS
 
The cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risksThe cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risksDaxue Consulting
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cAanchal579958
 
The adoption of bitcoins technology: The difference between perceived future ...
The adoption of bitcoins technology: The difference between perceived future ...The adoption of bitcoins technology: The difference between perceived future ...
The adoption of bitcoins technology: The difference between perceived future ...IJECEIAES
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Dr. Amarjeet Singh
 
Pavankumar bolisetty is the Winner of BFSI Tech Maestro Award
Pavankumar bolisetty is the Winner of BFSI Tech Maestro AwardPavankumar bolisetty is the Winner of BFSI Tech Maestro Award
Pavankumar bolisetty is the Winner of BFSI Tech Maestro AwardDolly Juhu
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaRahul Neel Mani
 
Study on The Impact And Social Implications of Fintech
Study on The Impact And Social Implications of FintechStudy on The Impact And Social Implications of Fintech
Study on The Impact And Social Implications of FintechIRJET Journal
 
Order 15 (FINTECH).pptx
Order 15 (FINTECH).pptxOrder 15 (FINTECH).pptx
Order 15 (FINTECH).pptxNishithSingh14
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data securityAshish Jhalani
 
Saunders 8e ppt_chapter19
Saunders 8e ppt_chapter19Saunders 8e ppt_chapter19
Saunders 8e ppt_chapter19Dr. Muath Asmar
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Global Cyber Security Market: Insights & Forecast (2022-2026)
Global Cyber Security Market: Insights & Forecast (2022-2026)Global Cyber Security Market: Insights & Forecast (2022-2026)
Global Cyber Security Market: Insights & Forecast (2022-2026)Koncept Analytics
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data SecurityeTailing India
 
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...Sarin Yuok
 
Tech scouting in Banking & Insurance Project.pptx
Tech scouting in Banking & Insurance Project.pptxTech scouting in Banking & Insurance Project.pptx
Tech scouting in Banking & Insurance Project.pptxGiorgia Zunino
 

Similaire à Information security and digital payments; thoughts about current trends (20)

Security in RegTech's Playground
Security in RegTech's PlaygroundSecurity in RegTech's Playground
Security in RegTech's Playground
 
The cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risksThe cyber insurance market in china report by daxue consulting asian risks
The cyber insurance market in china report by daxue consulting asian risks
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Cyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 cCyfirma cybersecurity-predictions-2022-v1.0 c
Cyfirma cybersecurity-predictions-2022-v1.0 c
 
The adoption of bitcoins technology: The difference between perceived future ...
The adoption of bitcoins technology: The difference between perceived future ...The adoption of bitcoins technology: The difference between perceived future ...
The adoption of bitcoins technology: The difference between perceived future ...
 
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
Mitigating Cyber-Threat in the Financial Industry of Bangladesh using Biometr...
 
Pavankumar bolisetty is the Winner of BFSI Tech Maestro Award
Pavankumar bolisetty is the Winner of BFSI Tech Maestro AwardPavankumar bolisetty is the Winner of BFSI Tech Maestro Award
Pavankumar bolisetty is the Winner of BFSI Tech Maestro Award
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Study on The Impact And Social Implications of Fintech
Study on The Impact And Social Implications of FintechStudy on The Impact And Social Implications of Fintech
Study on The Impact And Social Implications of Fintech
 
Order 15 (FINTECH).pptx
Order 15 (FINTECH).pptxOrder 15 (FINTECH).pptx
Order 15 (FINTECH).pptx
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
 
Saunders 8e ppt_chapter19
Saunders 8e ppt_chapter19Saunders 8e ppt_chapter19
Saunders 8e ppt_chapter19
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Global Cyber Security Market: Insights & Forecast (2022-2026)
Global Cyber Security Market: Insights & Forecast (2022-2026)Global Cyber Security Market: Insights & Forecast (2022-2026)
Global Cyber Security Market: Insights & Forecast (2022-2026)
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data Security
 
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
Hid finextra-digital-transformation-in-the-data-economy-to-improve-threat-det...
 
Tech scouting in Banking & Insurance Project.pptx
Tech scouting in Banking & Insurance Project.pptxTech scouting in Banking & Insurance Project.pptx
Tech scouting in Banking & Insurance Project.pptx
 
Fintech post COVID World 2021
Fintech post COVID World 2021Fintech post COVID World 2021
Fintech post COVID World 2021
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 

Plus de John ILIADIS

Malicious Software. In Greek.
Malicious Software. In Greek.Malicious Software. In Greek.
Malicious Software. In Greek.John ILIADIS
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsJohn ILIADIS
 
Reshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two DecadesReshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two DecadesJohn ILIADIS
 
PKI: Is it worth something, or what?
PKI: Is it worth something, or what?PKI: Is it worth something, or what?
PKI: Is it worth something, or what?John ILIADIS
 
Certificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It BeCertificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It BeJohn ILIADIS
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security SoftwareJohn ILIADIS
 
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...John ILIADIS
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A PrimerJohn ILIADIS
 
PKI: Overpromising and Underdelivering
PKI: Overpromising and UnderdeliveringPKI: Overpromising and Underdelivering
PKI: Overpromising and UnderdeliveringJohn ILIADIS
 
What is (not) Network Security
What is (not) Network SecurityWhat is (not) Network Security
What is (not) Network SecurityJohn ILIADIS
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayJohn ILIADIS
 
Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...John ILIADIS
 

Plus de John ILIADIS (12)

Malicious Software. In Greek.
Malicious Software. In Greek.Malicious Software. In Greek.
Malicious Software. In Greek.
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction Systems
 
Reshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two DecadesReshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two Decades
 
PKI: Is it worth something, or what?
PKI: Is it worth something, or what?PKI: Is it worth something, or what?
PKI: Is it worth something, or what?
 
Certificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It BeCertificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It Be
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security Software
 
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
 
E-Commerce Security: A Primer
E-Commerce Security: A PrimerE-Commerce Security: A Primer
E-Commerce Security: A Primer
 
PKI: Overpromising and Underdelivering
PKI: Overpromising and UnderdeliveringPKI: Overpromising and Underdelivering
PKI: Overpromising and Underdelivering
 
What is (not) Network Security
What is (not) Network SecurityWhat is (not) Network Security
What is (not) Network Security
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong Way
 
Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...
 

Dernier

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 

Dernier (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 

Information security and digital payments; thoughts about current trends

  • 1. Information Security and Digital Payments; thoughts about current trends Dr. John ILIADIS CMgr MCMI, CISSP-ISSMP, CISM (ISC)2 Hellenic Chapter, Board Member
  • 2. 3 » (ISC)2 = International Information Systems Security Certification Consortium, established in 1989 » Non-profit consortium of information security industry leaders » Supports security professionals throughout their careers » Global Standard for information security: (ISC)2 CBK® » Over 150,000 certified professionals; over 170 countries » 260 members in Greece, established in 2015
  • 3. 4 » A state of constant flux; even our home will change [1] » Supply chain attacks ballooned by 78% [2] » 52% of compliance leaders concerned about third-party risk [3] » New regulations to comply with [4], [5], [6], while risk fluctuates » Cloud market share over OnPrem ↑ [7], [8], emerging threats [9] » Organisations nudge IT personnel towards Cloud certifications like (ISC)2 CCSP [10] to confront with emerging threats [11] COVID-19; security status quo …here to stay for a long time
  • 4. 5 » “Cyber risks surpass … risks that led to the Great Recession in 2008”, US Federal Reserve Chairman Jerome Powell [12] » Scientific journals on COVID-19 impact to e-payments [13] » “…banks still rely on large co-locations of people … processing checks … wire transfer operations”; opportunity to invest in new technologies, processes to make financial institutions more resilient [14] » Reluctancy of public to go cashless due to personal data sensitivity [15] diminished after Covid-19 [16] COVID-19, Security and Payments (1)
  • 5. 6 » New vulnerabilities due to COVID-19 [17]: • Relaxed measures, e.g. increased contactless limit • Increased need for goods lowers consumer diligence • Anxiety levels and susceptibility to social engineering • Circumstances reduce suspicion of contact from official bodies » Digital payment adoption went sky-high, along with pertinent risk; biometrics, tokenization and behavioral analytics expected to counter increased risk [18] COVID-19, Security and Payments (2)
  • 6. 7 » e-payments customer acquisition/churn rates can be maintained at desired levels [19], depending on: • Perceived Usefulness (incl. Security and Convenience) [20], [21] • Social Influence (incl. Social Media) [22], [23] • Mobility and reachability » Risk-averse customers could be nudged into using privacy-intrusive e-payment schemes; type and amount of nudging required: already estimated [24] Customer acquisition/churn (1)
  • 7. 8 Balancing act between: » Social Media, Behavioral Economics » Information Security, Data Privacy wrt customer acquisition/churn efforts? Customer acquisition/churn (2)
  • 8. 9 » FinTech stems from the traditional financial world • Payments’ profit margins still relevant (somewhat?) • Entry barrier for banks: cost of legacy systems [25]? » TechFin (e.g. GAFA) • They are not after payment margins; mostly after: - Customer data [26] - Customer retention; "Amazon wants payments in-house so users never leave its app“ [27] • Not very regulated, yet FinTech vs TechFin?
  • 9. 10 » TechFins in need of personal data for business development » Recent regulatory privacy concerns emerged [4], [5], [6] » Increased non-regulatory concerns for privacy • Privacy as a comparative advantage towards disrupting payment schemes [28] • 60% of InfoSec professionals believe a “strong privacy posture” is important to achieving cyber resilience [29] » TechFins lobbying to change regulation [30] TechFins: Is Regulation Ready?
  • 10. 11 » COVID-19 technological side-effects on Biometrics • Use of contactless biometrics increased [31] • G2P digitilisation using biometrics accelerated, e.g. proof of life to keep the digital payment of a beneficiary going [32] » Biometrics begins with a (B)ut… • Convenience? √ [33] • Privacy risks? (stolen data [34], abuse of collected information [35], [36]) • Security risks? (detective controls for Deep fakes? [37]) G2P Payments and Biometrics
  • 11. 12 Thank you ! j.iliadis {at} isc2-chapter.gr
  • 12. 13 References (1/4) 1. This is what coronavirus will do to our offices and homes, BBC News,2020 2. Internet Security Threat Report, Symantec, 2019 3. Responding to COVID-19: What We are Hearing From Legal and Compliance Leaders, Gartner, 2020 4. Transforming compliance into competitive advantage, Oliver Wyman, 2018 5. New Laws on Data Privacy and Security Are Coming. Is Your Company Ready?, HBR, 2019 6. CSO's ultimate guide to security and privacy laws, regulations, and compliance, CSO Online, 2021 7. The Year that Cloud Service Revenues Finally Dwarfed Enterprise Spending on Data Centers, Synergy Research, 2021 8. The Security and Compliance Benefits of IaaS for Financial Services, IDC, April 2021 9. Cloud (Mis)Configuration: What Do You Need to Consider? ,(ISC)2 Blog, 2021 10. (ISC)2 Annual Report 2020 11. Cybersecurity Career Pursuers Study, (ISC)2, 2021
  • 13. 14 References (2/4) 12. Cyber threats: The Financial Systems’ Top Risk, (ISC)2 Blog, 2021 13. The Impact of COVID-19 Pandemic on Mobile Payment, International Journal of Bank Marketing, Emerald Publishing, 2021 14. COVID-19 putting a spotlight on banks’ payment operations, KPMG Insights, May 2020 15. Why Germany is so slow on the global road toward a cashless society, Handelsblatt, 2019 16. Digital payments deepen the threat of online fraud in Covid era, Financial Times, November 2020 17. 10 ways COVID-19 is impacting Payments, Accenture, 2020 18. How is the COVID-19 pandemic influencing payments innovation? Ernst & Young, October 2020 19. Purva Grover, Arpan Kumar Kar, User engagement for mobile payment service providers – introducing the social media engagement model, Journal of Retailing and Consumer Services, Vol 53, 2020 20. Amoroso, Donald and Pajaree Ackaradejruangsri. "How Consumer Attitudes Improve Repurchase Intention." IJESMA vol.9, no.3 2017
  • 14. 15 References (3/4) 21. Xiaogang Chen & Shaorui Li, Understanding Continuance Intention of Mobile Payment Services: An Empirical Study, Journal of Computer Information Systems, 57:4, 2017 22. Qasim, H., Abu-Shanab, E. Drivers of mobile payment acceptance: The impact of network externalities. Inf Syst Front 18, 2016 23. Conrad Murendo, Meike Wollni, Alan De Brauw & Nicholas Mugabi Social Network Effects on Mobile Money Adoption in Uganda, The Journal of Development Studies, 2017 24. Kevin K. W. Ho, Eric W. K. See-To & Dickson K. W. Chiu, “Price Tag” of Risk of Using E-Payment Service, Journal of Internet Commerce, 19:3, 2020 25. COVID-19 Increases Urgency for Banks to Transform Payment, Accenture, 2020 26. David G.W. Birch, Bye Fintech. Hello Techfin, Forbes, June 2021 27. Big Tech takes aim at the low-profit retail-banking industry, The Economist, Nov 23rd, 2019 28. David G.W. Birch, Anonymity In Payments? It’s Complicated, Forbes, May 2021
  • 15. 16 References (4/4) 29. Cyber Resilient Organization Report, IBM, 2020 30. Helene Panzarino, FinTech, TechFin and the challenge from BigTech, Executive Education Block, Imperial College Business School 31. Biometrics-backed mobile money and facial recognition markets to grow as everything goes contactless, June 2020 32. Digital finance and inclusion in the time of COVID-19, Food and Agriculture Organisation of the United Nations, 2021 33. COVID, cashless, and convenience: The rise of biometrics, FinTech Magazine, May 2021 34. US government hack stole fingerprints of 5.6 million federal employees, The Guardian, 2015 35. Biometric Data: Increased Security and Risks, Security Magazine, May 2020 36. Biometrics, surveillance and privacy, ERNCIP Thematic Group Applied Biometrics for the Security of Critical Infrastructure, 2016 37. Deepfake and Fake Videos - How to Protect Yourself?, Kaspersky