PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

Financial Services Arms Race to Protect Sensitive Data in the Cloud

By Kurt Long
October 27, 2017
in Industry Opinions
0
2
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
mobile card controls

digital safety concept padlock in electronic environment.

The financial services industry has embraced the power of cloud-based technology and as a result, there’s been a widescale reinvention of the industry. Large firms are getting larger, and new firms can compete for the wealth management dollar with the benefits of scalable technology. Fintech firms have grown at a rate of 41% over the past 4 years with over $40 billion dollars in cumulative investment according to PWC. 82% of firms plan to increase fintech partnerships over the next three to five years.

Cloud technologies allow firms to cut costs for infrastructure, scale, improve efficiency, and provide instant information to their customers who have grown accustomed to convenience. With this shift to the cloud, a wave of sensitive data has followed – leaving firms vulnerable to cybersecurity threats resulting in data theft and fraud.  Firms are using untraditional methods to tackle internal and external threats – in an arms race to secure their sensitive data and customer trust.

Threat Landscape for Financial institutions and Banks

Financial services is the highest targeted industry of all, facing 65% more attacks than any other industry. In 2017, 200 million records were breached resulting in a 937% increase year over year. Ransomware, DDoS attacks, malware, phishing, and insiders threaten their ability to service customers and secure sensitive data. Fear of data loss and reputational damage from the next “big breach” stem from fallen firms who have lost the trust of their clients and who’s names have been splashed in the media. So, how do security teams and executives prioritize threat defenses? Where are their dollars best spent to protect their organization?

The source of attacks has changed overtime. Outside attacks account for 42% of security incidents while insiders accounted for 58% of attacks to the industry – 53% being inadvertent actors and 5% being malicious according to an IBM X-Force Report. Outside attackers have identified the weakest link the in the security chain – the human. Malicious emails, phishing, compromised credentials, and stolen laptops offer outside attackers the opportunity to compromise a network, and often, the human insider is the one to inadvertently grant access to the malicious outsider – this his altered the way the industry views security.

Security has changed

The approach to security has shifted from the concept of a mote surrounding the “kingdom” to now a cognitive approach where security is multi-layered and involves both internal and external controls with cooperation from the entire organization. As firms race to secure their valuable financial and customer information, regulations are sprouting at record pace. In 2017, cyber standards were released from the NYDFS, OCC, FDIC, NIAC, and GDPR. To secure their organization and meet these cyber- standards, organizations are taking a People Centric approach to Security.

People Centric Security- Monitoring Behavior with Machine Learning

With people now at the center of the security vector, protecting sensitive information starts with knowing “who” is accessing “what” information. To manage the risk associated with insider threats, organizations are leveraging behavioral monitoring and machine learning to draw insights into whether an employee is exuding appropriate or suspicious behavior.

i.e. Tim, Account Manager, is based in the United States. He accesses around 100 accounts per day during the work week in his usual work activity. Suddenly, Tim’s account starts accessing over 300 accounts per day from Switzerland. Digging into analytics, you can see what drove this behavior. Was it business? Or does it seem like suspicious activity? Through machine learning, Tim’s past behavior is reviewed to determine whether or not it is abnormal. If it’s unusual behavior, then access can be cut off upon discovery.

Machine Learning and Community Intelligence

Machine learning uses technology to analyze employee’s past actions to predict future behavior. In doing so, false positives can be filtered out and recognized as normal business operations. Time previously spent on investigations can now be focus on monitoring and creating security safeguards.

Machine learning can also be trained to take a proactive approach to security. When an incident does occur, systems can be trained to do quick forensic investigations and possible remedy the security vulnerability. Organizations are also adopting adaptive access control, which makes dynamic risk-based decisions on user access, weighing level of trust against risk at the moment of access. Machine learning offers a path forward for businesses to scale their security operations to combat internal and external threats while saving valuable resources to the organization on.

Through Community Intelligence, automated sharing of new attacks and threats found around the globe can be identified and distributed. Machine learning can be used to recognize threat patterns to alert businesses that could potentially be affected by the same threat.

Author Bio

Kurt Long is the Founder and CEO of FairWarning®, whose Patient Privacy Intelligence customers represent over 8,000 healthcare facilities globally, and protects financial services customers managing over $500 Billion in assets. Prior to FairWarning®, Long founded and served as CEO of OpenNetwork Technologies a leader in web single sign-on and identity management software solutions. As CEO, Long led OpenNetwork to over 2,000 percent growth with customers across the United States, United Kingdom, Europe and Australia. OpenNetwork was acquired by BMC Software of Houston.

https://www.linkedin.com/in/kurt-long-8223211/

https://twitter.com/FairWarningInc

2
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: DataFairWarningFinancial Services

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    open banking

    Open Banking Has Begun to Intrude on Banks’ Customer Relationships

    December 5, 2025
    conversational payments

    Conversational Payments: The Next Big Shift in Financial Services  

    December 4, 2025
    embedded finance

    Inside the Embedded Finance Shift Transforming SMB Software

    December 3, 2025
    metal cards

    Metal Card Magnitude: How a Premium Touch Can Enthrall High-Value Customers

    December 2, 2025
    digital gift cards

    How Nonprofits Can Leverage Digital Gift Cards to Help Those in Need

    December 1, 2025
    stored-value prepaid

    How Stored-Value Accounts Are the Next Iteration of Prepaid Payments

    November 26, 2025
    google crypto wallet, crypto regulation

    Crypto Heads Into 2026 Awaiting Its ‘Rocketship Point’

    November 25, 2025
    Merchants Real-Time Payments, swipe fees, BNPL

    The 3 Key Trends That Will Shape Merchant Payments in 2026

    November 24, 2025

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result