13.07.2015 Views

Driving Innovation in Security Technology Through ... - FST Media

Driving Innovation in Security Technology Through ... - FST Media

Driving Innovation in Security Technology Through ... - FST Media

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Driv<strong>in</strong>g</strong> <strong>Innovation</strong> <strong>in</strong> <strong>Security</strong> <strong>Technology</strong> <strong>Through</strong> Emerg<strong>in</strong>g Channels“Like most th<strong>in</strong>gsthat are developed,you hope securityis considered atthe beg<strong>in</strong>n<strong>in</strong>g butsecurity professionalsare use to that notbe<strong>in</strong>g the case.”– Ken Brandt, ANZ“I th<strong>in</strong>k traditionally themove to mobile wasseen as a retail move.That’s no longer thecase. Now corporatecustomers are tell<strong>in</strong>gus very, very loudly thatthey are mobile.”– Diane Shehata, NAB2and approve trade transactions through a mobiledevice. We have a huge diversity of cultures <strong>in</strong> ourmarket that makes we need to understand andcater to, for example support<strong>in</strong>g Islamic bank<strong>in</strong>g <strong>in</strong>several of key markets, such as Malaysia and UAE.Vic Mankotia, CA Technologies: When I talkto banks and <strong>in</strong>stitutions and people gett<strong>in</strong>g <strong>in</strong>tomobile bank<strong>in</strong>g, there’s a lot of discussion aboutapplications. Ken Brandt, where is ANZ Bank<strong>in</strong>gGroup (ANZ) go<strong>in</strong>g, or where is the <strong>in</strong>dustry go<strong>in</strong>g,<strong>in</strong> your op<strong>in</strong>ion? Are you th<strong>in</strong>k<strong>in</strong>g of security whenyou build these applications or do you th<strong>in</strong>k aboutit afterwards?Ken Brandt, ANZ: The last question is a broaderquestion and it’s fair to say, like most th<strong>in</strong>gs thatare developed, you hope security is considered atthe beg<strong>in</strong>n<strong>in</strong>g but security professionals are usedto that not be<strong>in</strong>g the case. Depend<strong>in</strong>g on who isthe developer and how it’s be<strong>in</strong>g developed andhow the product is be<strong>in</strong>g planned, you might be<strong>in</strong> there at the beg<strong>in</strong>n<strong>in</strong>g – and that’s chang<strong>in</strong>g forthe good – but I th<strong>in</strong>k we’re still <strong>in</strong> catch-up mode.ANZ is much more security conscious now, <strong>in</strong> partbecause of all the news <strong>in</strong> the media about differentattacks on the bank. It has certa<strong>in</strong>ly captured theattention of the ANZ board of directors. It’s notthe best reason for <strong>in</strong>creas<strong>in</strong>g awareness but it has<strong>in</strong>creased awareness.Diane Shehata, NAB: I am very concerned aboutthe bus<strong>in</strong>ess side. I th<strong>in</strong>k traditionally the move tomobile was seen as a retail move. That’s no longerthe case. Now corporate customers are tell<strong>in</strong>g usvery, very loudly that they are mobile. I’m hear<strong>in</strong>g itfrom those of our customers that are <strong>in</strong>ternationalor are generally on the road. They want to bemobile. So <strong>in</strong> the bus<strong>in</strong>ess-type channels we expectpayments to be securely authorised.There’s a whole range of security that we build<strong>in</strong>to the channels on top of all the other type ofsecurity that we have at the back-end to detectwhether or not this particular transaction is <strong>in</strong>l<strong>in</strong>e with this customer’s normal behaviour. Butwhat the customer sees is the security that’s built<strong>in</strong>to the channel, which is around segregation ofduties, and how that is captured <strong>in</strong> a mobile device.Certa<strong>in</strong>ly we see this as the grow<strong>in</strong>g market for us.Vic Mankotia, CA Technologies: Thedifference is that branches are operational 9 to 5 –maybe weekends for certa<strong>in</strong> banks. Mobile bank<strong>in</strong>gis 24/7. That’s a different challenge. What I don’t see<strong>in</strong> the Australian market is a lot of authentication.How do you see regulation play<strong>in</strong>g <strong>in</strong> this space?Chris Smith, NAB: Australia was among the firstever to experience hack<strong>in</strong>g. In 2003, there was aphish<strong>in</strong>g attack on the Commonwealth Bank ofAustralia (CBA). So the notoriety of be<strong>in</strong>g the firstto be impacted by this underground activity meanswe’ve had more experience than everybody else.Initially putt<strong>in</strong>g <strong>in</strong> SMS security to authenticatewas a market-lead<strong>in</strong>g move to secure transactions– or at least to drive awareness. We’re probablynot go<strong>in</strong>g to be No 1 on the hit list anymore but Ith<strong>in</strong>k there are signs of <strong>in</strong>novation here: ANZ’s GoMoney, CBA’s movement <strong>in</strong> Commbank Kach<strong>in</strong>g,and some of the work we’re do<strong>in</strong>g is really mov<strong>in</strong>gthe power of choice to consumers. With that we’llhave no choice but to look at the next phase ofauthentication. Actually I am quite optimistic wedo lead <strong>in</strong> many parts of the world <strong>in</strong> terms ofauthentication.Vic Mankotia, CA Technologies: Risk-basedor transaction-based?Chris Smith, NAB: We hope it’s risk-based, butit’s probably transaction-focused. A lot of thirdparty applications are probably be<strong>in</strong>g built withoutthe awareness or rigour of some k<strong>in</strong>d of securityframework.Vic Mankotia, CA Technologies: That’s a verycontentious issue. Let’s take Square, for example.I was at a conference last week <strong>in</strong> San Francisco.I jumped <strong>in</strong>to a cab and the driver took my creditcard and swiped it on his iPhone and I got an email15 m<strong>in</strong>utes later say<strong>in</strong>g, “Here is your receipt.”He’s charged my credit card, there is a Googlemap connect l<strong>in</strong>k which tells you where I travelledfrom and I can file that under expenses. There areapplications be<strong>in</strong>g built around mobile platformsby third parties, consolidators or people who wantto capitalise on the opportunity. The risk doesnot lie with the bank or the carrier or the devicemanufacturer, or the software company help<strong>in</strong>g itout. It’s the third party that I’m worried about. It’sthe authentication, the identity, the access control,the content aware either <strong>in</strong> access management. Allfour of these have to work together.I’m go<strong>in</strong>g to board a flight today. My passport,my identity, is not go<strong>in</strong>g to be enough. I have to goand get an access or board<strong>in</strong>g pass, I’ve got to goto immigration and get it authenticated. I’ve gotextra <strong>in</strong> my bags, scan my contents and then I go tothe gate, so all four have to work together and veryfew companies offer that. Dave, from a BankWestperspective, what do you see?Dave Williams, Bankwest: Everyth<strong>in</strong>g goesthrough the same security gateway, but I th<strong>in</strong>k ifyou look at [Google’s] Android and [Apple’s] iOS,they are completely different <strong>in</strong> terms of security.In the Apple sphere, the authentication you need togo through to be able to publish gives you a certa<strong>in</strong>level of protection and a level of traceability. Youcan go back to where the app came from and who

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!