13.07.2015 Views

Driving Innovation in Security Technology Through ... - FST Media

Driving Innovation in Security Technology Through ... - FST Media

Driving Innovation in Security Technology Through ... - FST Media

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Driv<strong>in</strong>g</strong> <strong>Innovation</strong> <strong>in</strong> <strong>Security</strong> <strong>Technology</strong> <strong>Through</strong> Emerg<strong>in</strong>g Channelspublished it and what’s beh<strong>in</strong>d it. In Android,it’s almost a free-for-all. We really need to seesometh<strong>in</strong>g happen<strong>in</strong>g <strong>in</strong> the Android space tomake security much better because it’s already thepredom<strong>in</strong>ant operat<strong>in</strong>g system. That’s a real riskfor us. It means that <strong>in</strong> the Android space we’remore likely to move back <strong>in</strong>to browser technologydeployed on the Android platform so the app doesnoth<strong>in</strong>g more than lodge the browser. The securityis <strong>in</strong> the browser itself.Vic Mankotia, CA Technologies: That’s a verydifferent approach. What I’m frequently hear<strong>in</strong>g <strong>in</strong>the <strong>in</strong>dustry relates to wrapp<strong>in</strong>g that applicationaround identity. That is, put any out there, wrapit around identity or compliance, access control,authentication, and then most applications will getthe right <strong>in</strong>formation from the right person to addaccess.Dave Williams, Bankwest: Which <strong>in</strong> Apple isgreat, but with Android we are much more scepticalthat it can’t be apped <strong>in</strong> any k<strong>in</strong>d of way.Vic Mankotia, CA Technologies: Tim, whatabout wealth management: are you really look<strong>in</strong>gat this platform or is it a ‘good to have’?Tim Richardson, MLC: All consumers wouldwant it if it was readily available but you need toask, what are the priorities <strong>in</strong> terms of our slate ofwork? What can you expose without affect<strong>in</strong>g theclients or leav<strong>in</strong>g them vulnerable? In terms ofbanks, there’s a huge appetite for iPads out thereand most of the executives want them, but we needto do it <strong>in</strong> a manner that meets the requirementsof the security road map. It’s about hav<strong>in</strong>g aco-ord<strong>in</strong>ated strategy that approaches this <strong>in</strong> acontrolled manner. I th<strong>in</strong>k it is top of everybody’sm<strong>in</strong>d but when it comes to fund<strong>in</strong>g it still has tobe weighed up aga<strong>in</strong>st other <strong>in</strong>itiatives, which isalways the challenge every bus<strong>in</strong>ess faces.Vic Mankotia, CA Technologies: When Ilook at frequent flyer miles with Qantas, I’m notconcerned so much about security. It’s a number.If someone knows my miles, I don’t really care. Butif I’m mov<strong>in</strong>g $1000 or $10,000 to someone else’saccount, I’m concerned about the transaction.Naresh, can you talk about Standard Chartered’sBreeze and how it got to where it is?Naresh Vyas, Standard Chartered: For us,security was important <strong>in</strong> terms of build<strong>in</strong>g themobile apps and mobile capabilities. We ensuredsecurity is on par with what we offer on an onl<strong>in</strong>echannel. For example, we let customers decidewhat limits they want to have on various channels– $100 might be the maximum, $10,000, $50,000.The other th<strong>in</strong>g we’ve done on the mobile is allowcustomers to transfer money to people they alreadyhave as a beneficiary or as a payee. If you need to setup a new beneficiary you need a lot of <strong>in</strong>formation,such as bank rout<strong>in</strong>g codes, so we do not supportthis via mobile.Vic Mankotia, CA Technologies: Richard,what do you see as the biggest security risk onthe mobile platform and what are you look<strong>in</strong>g at<strong>in</strong> an ideal world to protect that experience on themobile platform?Richard Farrell, ANZ: You want to make surethat transactions are secured end-to-end; that yourcustomer <strong>in</strong>formation is secured. You also wantto ensure that your personal and authenticationdetails are protected. In an ideal world you wouldhave a controlled sandbox around it and say forexample you are us<strong>in</strong>g jail-broken iPhone, you stillwant a high level of control and security around it.The goMoney mobile application has been hugelysuccessfully for ANZ account<strong>in</strong>g for 36 per cent ofall onl<strong>in</strong>e log<strong>in</strong>s by ANZ customers and doubledigit growth month-on-month. But this level ofgrowth can be a double-edged sword. On one sideit is grow<strong>in</strong>g your bus<strong>in</strong>ess but on the other side,you potentially have half a million users us<strong>in</strong>g anapplication that will most likely be the target ofmalware and attacks <strong>in</strong> the future. On top of that,if you are look<strong>in</strong>g at putt<strong>in</strong>g it on multiple devices –such as Android, iPhone devices and tablet devices,your attacks surface has just significantly grown.Due to the fast pace of mobile development, someapproaches are mov<strong>in</strong>g from a waterfall to agilebased methodology challeng<strong>in</strong>g your traditionalSDL (Secure Development Lifecycle) approaches.Ber<strong>in</strong> Lautenbach, GE Capital: Five years agowe were do<strong>in</strong>g all this stuff on a PC and a PC is a lotless secure than a mobile phone <strong>in</strong> general terms.At least with a mobile phone you know people havegot it on them all the time; they know if they’velost it. So there’s actually a whole load of securitymechanisms. Bill, you were speak<strong>in</strong>g about iOS, agreat platform to build this stuff on. Does it meanit’s not compromised? No, it can be compromised.There’s th<strong>in</strong>gs that can go wrong with it. But as afundamental platform to build on, it’s far betterthan W<strong>in</strong>dows. So your question about DLP (DataLoss Prevention): some of the th<strong>in</strong>gs that I’msee<strong>in</strong>g at the moment that are really nice on themobile phones, you can do on iOS. It’s harder onAndroid because the segregation side isn’t as good.A client goes on iOS – it’s your email client, yourcalendar, it’s everyth<strong>in</strong>g. It’s clunky. But this stuff isalways clunky when it starts. And now I’ve got onecentral po<strong>in</strong>t of control on your device, but with mydata on it I can control what data you’ve got. I cansee where that data is go<strong>in</strong>g. I actually have morecontrol.“You need to ask, whatare the priorities <strong>in</strong>terms of our slate ofwork? What can youexpose without affect<strong>in</strong>gthe clients or leav<strong>in</strong>gthem vulnerable?”– Tim Richardson, MLC“Five years ago wewere do<strong>in</strong>g all this stuffon a PC and a PC isa lot less secure thana mobile phone <strong>in</strong>general terms.”– Ber<strong>in</strong> Lautenbach,GE Capital3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!