THE ROLE OF ADVANCED AUTHENTICATION IN CYBERSECURITY FOR CREDIT UNIONS AND BANKS

Size: px
Start display at page:

Download "THE ROLE OF ADVANCED AUTHENTICATION IN CYBERSECURITY FOR CREDIT UNIONS AND BANKS"

Transcription

1 THE ROLE OF ADVANCED AUTHENTICATION IN CYBERSECURITY FOR CREDIT UNIONS AND BANKS Crossmatch s Michel Nerrant on Improving Security Without Adding Friction

2 Michel Nerrant Nerrant is responsible for business development with Crossmatch in the financial services market. He brings over 25 years of experience in driving identity management solutions within the government and enterprise sectors. Prior to Crossmatch, he held business development and sales leadership roles at identity management and IT security companies including Schlumberger, ActivIdentity, IdentiPHI and WinMagic. He has managed numerous international deployments in physical access and security. Nerrant was responsible for the deployment of the largest North American automated parking point of sale (POS) system and managed the development of the first unattended Light Rail POS incorporating online credit card payment in the United States. Credit unions offer unique services to a unique member base and they face unique challenges when rolling out multifactor authentication across all of their banking channels. Michel Nerrant of Crossmatch a longstanding industry leader in authentication and identity management solutions discusses how new biometric solutions can meet credit union needs. Nerrant, a financial services cybersecurity expert, says credit unions walk an especially fine line when improving cybersecurity, between staying in compliance with regulatory requirements, without adding friction and complexity to the member experience. This is the industry where security is very important, but a frictionless experience for users is probably even more important, Nerrant says. It s all about providing the right level of security for every channel, every user, at the right moment. In an interview about deploying multifactor authentication at credit unions, Nerrant discusses: What s unique about the credit union employee and member base; How new biometric authentication solutions can improve security; How Crossmatch is helping its customers overcome challenges and deploy multifactor authentication. Crossmatch is a world leader in risk-based composite authentication and biometric identity management solutions. Crossmatch DigitalPersona solutions address a range of concerns in today s rapidly changing security climate from preventing data breaches by eliminating passwords, to ensuring the safety of citizens. Crossmatch helps enterprises and government around the world strengthen security through composite authentication. The Role of Biometrics in Multifactor Authentication 2

3 Credit unions have a very complex ecosystem of internal and external customers. TOM FIELD: To start with, let s talk about credit unions. What do you find to be unique about these institutions and how they approach cybersecurity for their members and employees? MICHEL NERRANT: Well, Tom, credit unions, much like any financial institutions, are prone to cyberattacks and fraud. But what makes credit unions unique are a couple of things. Usually small institutions tend to focus more on customer service. Therefore, enhancing security in a frictionless manner is very important to them. Credit unions customer base tends to also be an older population than average retail banks. That makes for a unique challenge. We are talking about a population that may not always be technology-savvy and may be prone to phishing or account takeover attacks. So, being able to protect those customers, internal and external, is quite a unique challenge for them. Multifactor Authentication FIELD: Well, that s great context. Given what you ve told us, what are the unique factors that need to be considered when institutions roll out a multifactor authentication solution to these unique constituents? NEERANT: Multifactor authentication, also known in the industry as MFA, is a great technology and it has been known for many, many years but has yet to become a common practice due to its complexity and friction. Credit unions have a very complex ecosystem of internal and external customers. In addition, they have numerous channels branches, ATMs, internet banking, mobile banking, and on and on. Therefore, they have to look into a solution that has not only provided multifactor authentication, but it also integrates across all those channels and platforms at every moment. Stepping Up Security FIELD: Michel, how do you find that credit unions are approaching the quandary of stepping up security, but at the same time, not adding any friction to that customer experience? The Role of Biometrics in Multifactor Authentication 3

4 It s all about using the right technology at the right time and at the right moment. NEERANT: This is an industry where security is very important, but frictionless is probably more important. So, it s all about providing the right level of security for every channel, every user, at the right moment. Let s take the example of a teller, sitting at the branch using twofactor authentication methods as they work in the morning for the first time. And as the day goes on, going to use biometrics to authenticate. It s a good example of how multifactor authentication can be used in a context where you control the environment and still bring the convenience of biometrics. Now if you take the same experience for a customer who might not be that versed in technology, or [might not be able] to use a technology such as biometrics or a physical token to authenticate, [you must] keep in mind that frictionless is all about using machine learning technology to look into the behavior of that customer and apply the right level of security at the right moment. For example, we look into the way a customer transacts, or even how they type their information, their account numbers and password and so on. If something is amiss, then and only then we can step up the authentications and ask for a second factor. In other words, using friction only when necessary. It is not to be said the behavior is only to be used for external customers; it can also usually be used for internal customers as well. But the conjunction of those two technologies allows for a very unique experience that is very suited for credit unions. Biometric-Based Solutions FIELD: Well I m glad you brought up biometrics solutions. Talk to me a bit about some of the new biometric-based solutions. I m thinking fingerprint, palm print, keyboard behavioral authentication. How do these factor into credit union plans going forward? NEERANT: Biometrics is very important for many reasons and should be part of the credit union s security features moving forward. Biometrics may not be used in the same context every channel, as was just discussed. Imagine using a physical device, on a mobile phone, for example. It s not practical; it s not usable even though it would be great from a security standpoint. Again, it may not be usable and feasible. So it s all about using the right technology at the right time and at the right moment. From an employee standpoint, using biometrics is going to speed up the log-in process by removing the headache of forgetting passwords right after a long weekend, or holidays, or even when those have to be reset. It is fast, it is easy to use and it adds security. It s a great technology. Behavioral biometrics brings a second dimension to security by providing a frictionless, risk-based analysis and subsequently, asking the users, internal or external, for additional authentications only when needed. So, biometrics can be used by a customer to unlock their phone or unlock their applications, but then something s wrong in the way they re typing their account numbers or typing their pin numbers. So in that case, the account can be locked; the account or the customer can be asked a second question something only they know. So there are many ways to handle that step of authentication depending on the banks own policies. In my opinion, machine learning biometrics in conjunction with traditional biometrics, such as fingerprints or palm prints definitely should be part of the future of the security implementations for credit unions. Crossmatch s Role FIELD: Well, talk to me a bit about Crossmatch now. How are you helping credit unions to deploy some of the multifactor authentication solutions we have talked about here today? NERRANT: With over 20 years in the security and biometric industry, and with hundreds of credit unions as customers, it s all about listening to our customers and building together a solution that meets their needs. DPCA, or digital persona composite authentication platform, is easy to deploy and is designed to sit on Microsoft infrastructure, making it easy for the bank s IT staff to learn and to use. It s a platform; that s what you have to keep in mind. And therefore, it s built by design to be scalable and adaptable to bring the best technologies or modalities under one authentication engine. All multipoint integration technologies truly allow the authentication of users, internal or external, right from PC log-in to legacy applications, all the way to green screen or using API to connect with third-party solutions. For example, we provide an authentication platform to banking software using APIs and other technology for those banks using cloud-based applications, such as Microsoft Office 365, for example. So once again, the goal of a platform is truly to cover all the digital channels those banks have with one platform. Listen to the full interview: interviews/role-biometrics-in-multifactor-authentication-i-3786 The Role of Biometrics in Multifactor Authentication 4

5 About ISMG Information Security Media Group (ISMG) is the world s largest media organization devoted solely to information security and risk management. Each of our 28 media properties provides education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Our annual global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges. Contact (800) sales@ismg.io 902 Carnegie Center Princeton, NJ

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection IBM Security s Brooke Satti Charles on the Power of These New Capabilities SPONSORED BY As fraudsters continually refine their techniques

More information

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity How NSFOCUS Protected the G20 Summit Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity SPONSORED BY Rosefelt is responsible for developing NSFOCUS threat intelligence and web

More information

Cybersecurity for the SMB. CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale

Cybersecurity for the SMB. CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale Cybersecurity for the SMB CrowdStrike s Murphy on Steps to Improve Defenses on a Smaller Scale The high-profile breaches of Fortune 100 companies are the ones that get the headlines, but small and midsized

More information

Solution. Imagine... a New World of Authentication.

Solution. Imagine... a New World of Authentication. A Solution Imagine... a New World of Authentication. Imagine a World Where Passwords can t be hacked People can t share credentials Users can t pretend to be someone else Where authentication is more Secure

More information

DigitalPersona for Healthcare Organizations

DigitalPersona for Healthcare Organizations DigitalPersona for Healthcare Organizations RAPID, SECURE AUTHENTICATION FOR MEDICAL PROVIDERS AND STAFF Secure Access to Electronic Health Records Streamline Clinical Workflow Reduce Cybersecurity Costs

More information

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT DigitalPersona Premium Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond traditional two-factor

More information

INTERVIEW TRANSCRIPT Barriers to Adopting Multifactor Authentication

INTERVIEW TRANSCRIPT Barriers to Adopting Multifactor Authentication INTERVIEW TRANSCRIPT Barriers to Adopting Multifactor Authentication Crossmatch s Trytten on the Latest MFA Trends for Financial Institutions Chris Trytten, Director of Product Marketing at Crossmatch

More information

Overview. DigitalPersona Logon for Windows Data Sheet. DigitalPersona s Composite Authentication transforms

Overview. DigitalPersona Logon for Windows Data Sheet. DigitalPersona s Composite Authentication transforms DigitalPersona Logon for Windows Data Sheet Overview DigitalPersona s Composite Authentication transforms the way IT executives protect the integrity of the digital organization by going beyond two-factor

More information

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS HOW SECURE IS YOUR VPN ACCESS? Remote access gateways such as VPNs and firewalls provide critical anywhere-anytime connections to the networks

More information

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK KEY BENEFITS AT A GLANCE Ensure your journey to the cloud is secure and convenient, without compromising either. Drive business agility

More information

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security

Smart Cards and Authentication. Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Smart Cards and Authentication Jose Diaz Director, Technical and Strategic Business Development Thales Information Systems Security Payment Landscape Contactless payment technology being deployed Speeds

More information

DDoS: Evolving Threats, Solutions FEATURING: Carlos Morales of Arbor Networks Offers New Strategies INTERVIEW TRANSCRIPT

DDoS: Evolving Threats, Solutions FEATURING: Carlos Morales of Arbor Networks Offers New Strategies INTERVIEW TRANSCRIPT INTERVIEW TRANSCRIPT DDoS: Evolving Threats, Solutions Carlos Morales of Arbor Networks Offers New Strategies FEATURING: Characteristics of recent attacks; Gaps in organizations defenses; How to best prepare

More information

Authentication and Fraud Detection Buyer s Guide

Authentication and Fraud Detection Buyer s Guide Entrust, Inc. North America Sales: 1-888-690-2424 entrust@entrust.com EMEA Sales: +44 (0) 118 953 3000 emea.sales@entrust.com November 2008 Copyright 2008 Entrust. All rights reserved. Entrust is a registered

More information

Biometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way

Biometrics in Banking. How to Integrate Touch ID into your Mobile Banking Application the Right Way Biometrics in Banking How to Integrate Touch ID into your Mobile Banking Application the Right Way Table of Contents Introduction 1 Adoption of Touch ID as a banking authentication tool 2 Touch ID: Benefits

More information

Choosing the right two-factor authentication solution for healthcare

Choosing the right two-factor authentication solution for healthcare Choosing the right two-factor authentication solution for healthcare The healthcare industry s transition from paper to electronic records has introduced significant security risk from hackers around the

More information

Behavioral Biometrics. Improve Security and the Customer Experience

Behavioral Biometrics. Improve Security and the Customer Experience Behavioral Biometrics Improve Security and the Customer Experience Table of Contents Reader ROI & Introduction 1 The challenges of authenticating mobile customers 2 The need for transparent customer authentication

More information

The security challenge in a mobile world

The security challenge in a mobile world The security challenge in a mobile world Contents Executive summary 2 Executive summary 3 Controlling devices and data from the cloud 4 Managing mobile devices - Overview - How it works with MDM - Scenario

More information

EMERGING TRENDS AROUND AUTHENTICATION

EMERGING TRENDS AROUND AUTHENTICATION EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE Small business cybersecurity survival guide By Stephen Cobb, ESET Senior Security Researcher Computers and the internet bring many benefits to small businesses,

More information

How Next Generation Trusted Identities Can Help Transform Your Business

How Next Generation Trusted Identities Can Help Transform Your Business SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2

More information

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry At a Glance With offices across the country, this gaming company has been in operation for decades.

More information

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES: (Solutions Brief) An integrated cybersecurity Administration solution for securing any Large Enterprise. The Industry s most complete protection for the Large Enterprise and Cloud Deployments. KEY SERVICES:

More information

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com

BULLETPROOF365 SECURING YOUR IT. Bulletproof365.com BULLETPROOF365 SECURING YOUR IT Bulletproof365.com INTRODUCING BULLETPROOF365 The world s leading productivity platform wrapped with industry-leading security, unmatched employee education and 24x7 IT

More information

Tim Heagarty, CISA CISSP - (859) Lexington, KY

Tim Heagarty, CISA CISSP - (859) Lexington, KY Tim Heagarty, CISA CISSP Tim@Heagarty.com - (859) 285-9050 Lexington, KY Summary I ve come from microcomputer sales in the early 80 s to Manager of IT Security in the mid 90 s and now Security Services

More information

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE Small business cybersecurity survival guide By Stephen Cobb, ESET Senior Security Researcher Computers and the internet bring many benefits to small businesses,

More information

USE CASES. See how Polygon s Biometrid can be used in different usage settings

USE CASES. See how Polygon s Biometrid can be used in different usage settings USE CASES See how Polygon s Biometrid can be used in different usage settings Web/Mobile Authentication Digital user authentication using biometrics Password management is increasingly harder for the user.

More information

Mobile: Purely a Powerful Platform; Or Panacea?

Mobile: Purely a Powerful Platform; Or Panacea? EBT: The Next Generation 2017 Mobile: Purely a Powerful Platform; Or Panacea? Evan O Regan, Director of Product Management Authentication & Fraud Solutions Entrust Datacard POWERFUL PLATFORM OR PANACEA

More information

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security

White Paper. The Impact of Payment Services Directive II (PSD2) on Authentication & Security White Paper The Impact of Payment Services Directive II (PSD2) on Authentication & Security First Edition June 2016 Goode Intelligence All Rights Reserved Published by: Goode Intelligence Sponsored by:

More information

4 Ways to Protect Your Organization from a Data Breach

4 Ways to Protect Your Organization from a Data Breach BEST PRACTICES GUIDE Patient Data Security 4 Ways to Protect Your Organization from a Data Breach Patient Data Security 2 It s a treasure trove of personal data. The proverbial pot of data gold. For every

More information

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs) Florida Hospital Association Welcome! John Wilgis Director, Emergency Management Services Florida Hospital Association

More information

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication

FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication FIDO Alliance: Standards-based Solutions for Simpler, Strong Authentication Jeremy Grant Managing Director, Technology Business Strategy Venable LLP jeremy.grant@venable.com @jgrantindc Digital: The Opportunity

More information

Keep the Door Open for Users and Closed to Hackers

Keep the Door Open for Users and Closed to Hackers Keep the Door Open for Users and Closed to Hackers A Shift in Criminal Your Web site serves as the front door to your enterprise for many customers, but it has also become a back door for fraudsters. According

More information

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS SESSION ID: AST3-R02 THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS Jon Oltsik Senior Principal Analyst Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International Board Director ISSA

More information

EDITORIAL CALENDARS. Key topics that will shape our discussions

EDITORIAL CALENDARS. Key topics that will shape our discussions 2018 EDITORIAL CALENDARS Key topics that will shape our discussions 1 Editor s Note s Our Guide to Global Coverage of Critical Issues I m pleased to present Information Security Media Group s s. This document

More information

The Problem with Privileged Users

The Problem with Privileged Users Flash Point Paper Enforce Access Control The Problem with Privileged Users Four Steps to Reducing Breach Risk: What You Don t Know CAN Hurt You Today s users need easy anytime, anywhere access to information

More information

MDM is Calling: Does Your Business Have an Answer? arrival. Here To Go. Lunch Dinner. continue. Riiinnggg. Dec. 12

MDM is Calling: Does Your Business Have an Answer? arrival. Here To Go. Lunch Dinner. continue. Riiinnggg. Dec. 12 MDM is Calling: Does Your Business Riiinnggg arrival flight itinerary PLACE ORDER Here To Go Lunch Dinner continue Dec. 12 Riiinnggg Office answer MDM is Calling: Does your Business MDM is Calling: Does

More information

DATA SHEET. VANGUARD ez/tokentm KEY FEATURES:

DATA SHEET. VANGUARD ez/tokentm KEY FEATURES: VANGUARD ez/tokentm VANGUARD ez/token is a multi-factor authentication solution that allows users to authenticate through common token technologies including but not limited to RSA SecurID, YUBiKEY, OAUTH

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

BRING SPEAR PHISHING PROTECTION TO THE MASSES

BRING SPEAR PHISHING PROTECTION TO THE MASSES E-Guide BRING SPEAR PHISHING PROTECTION TO THE MASSES SearchSecurity phishing. I n this expert tip, David Sherry describes how a combination of technical controls and user awareness training can help put

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

A Guide to Ensuring Security and Resiliency

A Guide to Ensuring Security and Resiliency Protecting Your Business Network: A Guide to Ensuring Security and Resiliency Even as major news outlets continue to report new stories about massive security breaches at the world s largest companies,

More information

Cyber Insurance: What is your bank doing to manage risk? presented by

Cyber Insurance: What is your bank doing to manage risk? presented by Cyber Insurance: What is your bank doing to manage risk? David Kitchen presented by Lisa Micciche Today s Agenda Claims Statistics Common Types of Cyber Attacks Typical Costs Incurred to Respond to an

More information

Phishing is Yesterday s News Get Ready for Pharming

Phishing is Yesterday s News Get Ready for Pharming April 2005 Copyright 2005 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust

More information

Sales Presentation Case 2018 Dell EMC

Sales Presentation Case 2018 Dell EMC Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations

More information

The Case for Office 365 Backup. Uncovering critical reasons why organizations need to backup Office 365 data

The Case for Office 365 Backup. Uncovering critical reasons why organizations need to backup Office 365 data The Case for Office 365 Backup Uncovering critical reasons why organizations need to backup Office 365 data 2 Introduction Do you have control of your Office 365 data? Do you have access to all the items

More information

BRING EXPERT TRAINING TO YOUR WORKPLACE.

BRING EXPERT TRAINING TO YOUR WORKPLACE. BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique

More information

How. Biometrics. Expand the Reach of Mobile Banking ENTER

How. Biometrics. Expand the Reach of Mobile Banking ENTER How Biometrics Expand the Reach of Mobile Banking ENTER Table of Contents 01 The Mobile Banking Opportunity 02 What s Suppressing Mobile Adoption? 03 Onboarding Challenges: Proving One s Identity 04 Authentication

More information

SecureDoc: Making BitLocker simple, smart and secure for you. Your guide to encryption success

SecureDoc: Making BitLocker simple, smart and secure for you. Your guide to encryption success SecureDoc: Making BitLocker simple, smart and secure for you Your guide to encryption success 1 It s time to unlock unbelievable new BitLocker advantages There is an encryption management solution out

More information

Remote Key Loading Spread security. Unlock efficiency

Remote Key Loading Spread security. Unlock efficiency Remote Key Loading Spread security. Unlock efficiency Cut costs increase security A smarter way to do business The hacker community is growing increasingly sophisticated which means the financial community

More information

Kickstart. Overview. Oct 2017

Kickstart. Overview. Oct 2017 Kickstart Overview Oct 2017 Passwords are broken 75% of users leave themselves open to fraud & identity theft through insecure passwords 68% 40% of users say forgetting passwords is a significant problem

More information

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print

More information

White Paper. The North American Electric Reliability Corporation Standards for Critical Infrastructure Protection

White Paper. The North American Electric Reliability Corporation Standards for Critical Infrastructure Protection White Paper The North American Electric Reliability Corporation Standards for Critical Infrastructure Protection February, 2017 Introduction The North American Electric Reliability Corporation (NERC) maintains

More information

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso The CISO s Guide to Deploying True Password-less Security by Bojan Simic and Ed Amoroso TRUST ANYONE HYPR Deployment Overview for Managers HYPR is designed to eliminate credential stuffing, phishing and

More information

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

Fujitsu World Tour 2016

Fujitsu World Tour 2016 Fujitsu World Tour 2016 Human Centric Innovation in Action Utrecht 13 June 2016 0 Copyright 2016 FUJITSU Mobilizing the Enterprise One size does not fit all powered by 1 Copyright 2016 FUJITSU Speaker

More information

6 Critical Reasons for Office 365 Backup. The case for why organizations need to protect Office 365 data

6 Critical Reasons for Office 365 Backup. The case for why organizations need to protect Office 365 data 6 Critical Reasons for Office 365 Backup The case for why organizations need to protect Office 365 data 2 Introduction Do you have control of your Office 365 data? Do you have access to all the items you

More information

PCI compliance the what and the why Executing through excellence

PCI compliance the what and the why Executing through excellence PCI compliance the what and the why Executing through excellence Tejinder Basi, Partner Tarlok Birdi, Senior Manager May 27, 2009 Agenda 1. Introduction 2. Background 3. What problem are we trying to solve?

More information

About MagTek. PIN Entry & Management

About MagTek. PIN Entry & Management About MagTek Since 1972, MagTek has been a leading manufacturer of electronic devices and systems for the reliable issuance, reading, transmission and security of cards, checks, PINs and other identification

More information

Cyber Attack: Is Your Business at Risk?

Cyber Attack: Is Your Business at Risk? 15 July 2017 Cyber Attack: Is Your Business at Risk? Stanley Wong Regional Head of Financial Lines, Asia Pacific Agenda Some common misconceptions by SMEs around cyber protection Cyber Claims and Industry

More information

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved. FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who

More information

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses The reality for your business today, and the importance of proactive security Cyberthreats are becoming more of a reality each day.

More information

IT Modernization In Brief

IT Modernization In Brief IT Modernization In Brief WHAT YOU NEED TO KNOW Quick tips & facts about IT modernization from GovLoop Executive Summary Today, IT modernization the continuous updating of IT and technology infrastructure

More information

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

COSTS, THREATS AND ACCESS

COSTS, THREATS AND ACCESS w h i t e pa p e r COSTS, THREATS AND ACCESS The Balancing Act for Credit Unions The Balancing Act: Costs, Threats and Access For credit unions, security is a never-ending balancing act. Today, the desktop

More information

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION

EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 1 EXPERIENCE SIMPLER, STRONGER AUTHENTICATION 2 Data Breaches are out of control 3 IN 2014... 783 data breaches >1 billion records stolen since 2012 $3.5 million average cost per breach 4 We have a PASSWORD

More information

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout

More information

Executive Insights. Protecting data, securing systems

Executive Insights. Protecting data, securing systems Executive Insights Protecting data, securing systems February 2018 Protecting data, securing systems Product and information security is a combination of education, policies and procedures, physical security

More information

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Making hybrid IT simple with Capgemini and Microsoft Azure Stack Making hybrid IT simple with Capgemini and Microsoft Azure Stack The significant evolution of cloud computing in the last few years has encouraged IT leaders to rethink their enterprise cloud strategy.

More information

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface

A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface ORGANIZATION SNAPSHOT The level of visibility Tenable.io provides is phenomenal, something we just

More information

white paper SMS Authentication: 10 Things to Know Before You Buy

white paper SMS Authentication: 10 Things to Know Before You Buy white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling

More information

MD-HQ Utilizes Atlantic.Net s Private Cloud Solutions to Realize Tremendous Growth

MD-HQ Utilizes Atlantic.Net s Private Cloud Solutions to Realize Tremendous Growth Success Story: MD-HQ Utilizes Atlantic.Net s Private Cloud Solutions to Realize Tremendous Growth Atlantic.Net specializes in providing security and compliance hosting solutions, most specifically in the

More information

Security-as-a-Service: The Future of Security Management

Security-as-a-Service: The Future of Security Management Security-as-a-Service: The Future of Security Management EVERY SINGLE ATTACK THAT AN ORGANISATION EXPERIENCES IS EITHER ON AN ENDPOINT OR HEADING THERE 65% of CEOs say their risk management approach is

More information

FIDO Alliance Response to the European Banking Authority (EBA)

FIDO Alliance Response to the European Banking Authority (EBA) FIDO Alliance Response to the European Banking Authority (EBA) Consultation on the Guidelines on the conditions to be met to benefit from an exemption from contingency measures under Article 33(6) of Regulation

More information

Security Program Guide Security is designed from the outside in.

Security Program Guide Security is designed from the outside in. Program Guide is designed from the outside in. Make security a competitive advantage with CA solutions that protect and propel your business. At this year s conference we will cover how to: Control risk

More information

How Secure is Blockchain? June 6 th, 2017

How Secure is Blockchain? June 6 th, 2017 How Secure is Blockchain? June 6 th, 2017 Before we get started... This is a 60 minute webcast For better viewing experience, close all other applications For better sound quality, please use headphones

More information

ELECTRONIC BANKING & ONLINE AUTHENTICATION

ELECTRONIC BANKING & ONLINE AUTHENTICATION ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY

More information

Q&A TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL. An interview with John Summers, Enterprise VP and GM, Akamai

Q&A TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL. An interview with John Summers, Enterprise VP and GM, Akamai TAKING ENTERPRISE SECURITY TO THE NEXT LEVEL An interview with John Summers, Enterprise VP and GM, Akamai Q&A What are the top things that business leaders need to understand about today s cybersecurity

More information

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services

A Layered Approach to Fraud Mitigation. Nick White Product Manager, FIS Payments Integrated Financial Services A Layered Approach to Fraud Mitigation Nick White Product Manager, FIS Payments Integrated Financial Services Session Agenda Growing Fraud Concerns Old Habits Die Hard Maneuvering through the Barriers

More information

Welcome! Copyright 2017 MAC. All Rights Reserved.

Welcome! Copyright 2017 MAC. All Rights Reserved. Welcome! Copyright 2019 2017 MAC. MAC. All rights All reserved. Rights Reserved. Why QIR Matters-Breach Case Some large hospitality breaches involve multiple reseller companies across the USA. Because

More information

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

Webinars INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America

Webinars INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America Webinars INSPIRING A SAFE AND SECURE CYBER WORLD 2018 Media Kit - North America 1 THE (ISC) 2 SECURE WEBINARS (ISC) 2 Secure Webinars are a proven method of reaching high-level IT security executives in

More information

Easy IT Audit Engagements

Easy IT Audit Engagements Easy IT Audit Engagements Fellen Yang Risk Advisory Services Senior Manager fellen.yang@elliottdavis.com Nikhila Shankar Risk Advisory Services Manager nikhila.shankar@elliottdavis.com Disclaimer This

More information

NYDFS Cybersecurity Regulations

NYDFS Cybersecurity Regulations SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

All the resources you need to get buy-in from your team and advocate for the tools you need.

All the resources you need to get buy-in from your team and advocate for the tools you need. Top 5 Reasons The Business Case for Bomgar Privileged Access All the resources you need to get buy-in from your team and advocate for the tools you need. You already know Bomgar will help you manage and

More information

Spiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP

Spiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP Debi Mohanty Senior Manager Deloitte & Touche LLP Multi-factor (MFA) Authentication September 2018 Spiros Angelopoulos Principal Solutions Architect ForgeRock MFA Evolved Authentication Spiros Angelopoulos

More information

Change & Configuration Management Market

Change & Configuration Management Market Change & Configuration Management Market Table of Contents 1. Market Size & Forecast... 3 2. Geographic Segmentation... 4 2.1 Change & Configuration Management Market in Americas... 4 2.2 Americas - Market

More information

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP AN IPSWITCH WHITEPAPER The Definitive Guide to Secure FTP The Importance of File Transfer Are you concerned with the security of file transfer processes in your company? According to a survey of IT pros

More information

Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars

Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars Case Study Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars At a Glance Industry Automotive Services BlackBerry Cybersecurity Services

More information

Microsoft DirectAccess

Microsoft DirectAccess Microsoft DirectAccess The New Choice of Enterprises Over Traditional VPN Whitepaper August 2017 Microsoft DirectAccess The New Choice of Enterprises Over Traditional VPN Microsoft DirectAccess is a unique

More information

WEBINARS INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America

WEBINARS INSPIRING A SAFE AND SECURE CYBER WORLD Media Kit - North America INSPIRING A SAFE AND SECURE CYBER WORLD 2019 Media Kit - North America THE (ISC) 2 (ISC) 2 Webinars are a proven method of reaching high-level IT security executives in an intimate setting. Members advance

More information

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development

Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare Ruslans Arzaniks Head of Development Citizen Biometric Authentication based on e-document verification. e-government perspective. Mindshare 2017 Ruslans Arzaniks Head of Development About us WHO WE ARE X Infotech is a global provider of software

More information

Safelayer's Adaptive Authentication: Increased security through context information

Safelayer's Adaptive Authentication: Increased security through context information 1 Safelayer's Adaptive Authentication: Increased security through context information The password continues to be the most widely used credential, although awareness is growing that it provides insufficient

More information