PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

Financial Services Arms Race to Protect Sensitive Data in the Cloud

By Kurt Long
October 27, 2017
in Industry Opinions
0
2
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
mobile card controls

digital safety concept padlock in electronic environment.

The financial services industry has embraced the power of cloud-based technology and as a result, there’s been a widescale reinvention of the industry. Large firms are getting larger, and new firms can compete for the wealth management dollar with the benefits of scalable technology. Fintech firms have grown at a rate of 41% over the past 4 years with over $40 billion dollars in cumulative investment according to PWC. 82% of firms plan to increase fintech partnerships over the next three to five years.

Cloud technologies allow firms to cut costs for infrastructure, scale, improve efficiency, and provide instant information to their customers who have grown accustomed to convenience. With this shift to the cloud, a wave of sensitive data has followed – leaving firms vulnerable to cybersecurity threats resulting in data theft and fraud.  Firms are using untraditional methods to tackle internal and external threats – in an arms race to secure their sensitive data and customer trust.

Threat Landscape for Financial institutions and Banks

Financial services is the highest targeted industry of all, facing 65% more attacks than any other industry. In 2017, 200 million records were breached resulting in a 937% increase year over year. Ransomware, DDoS attacks, malware, phishing, and insiders threaten their ability to service customers and secure sensitive data. Fear of data loss and reputational damage from the next “big breach” stem from fallen firms who have lost the trust of their clients and who’s names have been splashed in the media. So, how do security teams and executives prioritize threat defenses? Where are their dollars best spent to protect their organization?

The source of attacks has changed overtime. Outside attacks account for 42% of security incidents while insiders accounted for 58% of attacks to the industry – 53% being inadvertent actors and 5% being malicious according to an IBM X-Force Report. Outside attackers have identified the weakest link the in the security chain – the human. Malicious emails, phishing, compromised credentials, and stolen laptops offer outside attackers the opportunity to compromise a network, and often, the human insider is the one to inadvertently grant access to the malicious outsider – this his altered the way the industry views security.

Security has changed

The approach to security has shifted from the concept of a mote surrounding the “kingdom” to now a cognitive approach where security is multi-layered and involves both internal and external controls with cooperation from the entire organization. As firms race to secure their valuable financial and customer information, regulations are sprouting at record pace. In 2017, cyber standards were released from the NYDFS, OCC, FDIC, NIAC, and GDPR. To secure their organization and meet these cyber- standards, organizations are taking a People Centric approach to Security.

People Centric Security- Monitoring Behavior with Machine Learning

With people now at the center of the security vector, protecting sensitive information starts with knowing “who” is accessing “what” information. To manage the risk associated with insider threats, organizations are leveraging behavioral monitoring and machine learning to draw insights into whether an employee is exuding appropriate or suspicious behavior.

i.e. Tim, Account Manager, is based in the United States. He accesses around 100 accounts per day during the work week in his usual work activity. Suddenly, Tim’s account starts accessing over 300 accounts per day from Switzerland. Digging into analytics, you can see what drove this behavior. Was it business? Or does it seem like suspicious activity? Through machine learning, Tim’s past behavior is reviewed to determine whether or not it is abnormal. If it’s unusual behavior, then access can be cut off upon discovery.

Machine Learning and Community Intelligence

Machine learning uses technology to analyze employee’s past actions to predict future behavior. In doing so, false positives can be filtered out and recognized as normal business operations. Time previously spent on investigations can now be focus on monitoring and creating security safeguards.

Machine learning can also be trained to take a proactive approach to security. When an incident does occur, systems can be trained to do quick forensic investigations and possible remedy the security vulnerability. Organizations are also adopting adaptive access control, which makes dynamic risk-based decisions on user access, weighing level of trust against risk at the moment of access. Machine learning offers a path forward for businesses to scale their security operations to combat internal and external threats while saving valuable resources to the organization on.

Through Community Intelligence, automated sharing of new attacks and threats found around the globe can be identified and distributed. Machine learning can be used to recognize threat patterns to alert businesses that could potentially be affected by the same threat.

Author Bio

Kurt Long is the Founder and CEO of FairWarning®, whose Patient Privacy Intelligence customers represent over 8,000 healthcare facilities globally, and protects financial services customers managing over $500 Billion in assets. Prior to FairWarning®, Long founded and served as CEO of OpenNetwork Technologies a leader in web single sign-on and identity management software solutions. As CEO, Long led OpenNetwork to over 2,000 percent growth with customers across the United States, United Kingdom, Europe and Australia. OpenNetwork was acquired by BMC Software of Houston.

https://www.linkedin.com/in/kurt-long-8223211/

https://twitter.com/FairWarningInc

2
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
Tags: DataFairWarningFinancial Services

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    [honeypot phone]

    Must Reads

    stripe ai

    New Approaches to Fighting New-Account Fraud

    November 14, 2025
    credit union data

    The Information Age: How Credit Unions Can Maximize the Impact of Their Data

    November 13, 2025
    embedded lending

    Empowering Merchants with Embedded Lending: How ISVs Can Optimize Revenue This Holiday Season

    November 12, 2025
    visa mastercard settlement

    Visa and Mastercard’s Merchant Settlement Could Imperil Rewards Cards

    November 11, 2025
    merchant ai

    Agentic Commerce Faces Many Hurdles Before It Reaches Maturity

    November 10, 2025
    square ai bitcoin

    The Challenge of Monetizing Value in Digital Banking

    November 7, 2025
    AI artificial intelligence gift cards

    Deck the Holograms: How AI Is Redefining Holiday Magic

    November 6, 2025
    digital wallets student loan repayment

    How Digital Wallets Could be the Answer to the Student Loan Repayment Crisis 

    November 5, 2025

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result