cyber security in the era digital of transformation security in the era digital of transformation....

15
© CGI Group Inc. CONFIDENTIAL Cyber Security in the Era of Digital Transformation Jiří Kaplický June 2016

Upload: others

Post on 23-Apr-2020

5 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

© CGI Group Inc. CONFIDENTIAL

Cyber Security in the Era of Digital Transformation Jiří Kaplický June 2016

Page 2: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

Agenda

• Digital Transformation in the Cyber Security context

• Shift from analog word to fully digital - Is everybody

prepared?

• Go digital, reduce fraud!

• Technology trends and new authentication methods

• Identity Management in Transition - from Employees to

Customers

Page 3: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

Cyber Security in the Era of Digital Transformation

• Digital Transformation

• Acceleration of business activities, processes, competencies and

models

• New business models, new technologies, new …

• New opportunities for cyber criminals

• Cyber Security = pillar of Digital transformation

Cyber Security is no more an IT issue – it’s a business issue

3

Page 4: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

From analog to digital – is everybody prepared?

• Is everybody prepared for NEW ….

• New technologies and processes may be hip, but also complicated

4

VS

Page 5: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

Paperless

• Transition from analog documents to digital • Signature, validation, archiving

• eIDAS – end of uncertainty in Identity EU region • Enabler of European Digital Single Market

5

Printing & Documents in the CEE Companies; IDC 2016

Page 6: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

Biometry - Dynamic Signature New technology as transition enabler

Dynamic signature is a biometric modality that uses, for recognition

purposes, the anatomic and behavioral characteristics that an

individual exhibits when signing his or her name (or other phrase).

• New technology still uses well known method – handwritten signature

• Captured image is enriched with: • direction, stroke, pressure …

• Legally recognized – fulfills most req. the Act No. 227/2000 Coll.

6

Page 7: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

eIDAS Directive Accelerator of Digital Transformation

eIDAS

eSeal

eSignature

WebSite Authentication

eIdentification (eID)

eTimeStamp

eDelivery

7

• Central role of eID

• Cross border

• Interoperability

• Harmonization

• Key processes

• Sign

• Validate

• Archive

Page 8: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

8

Digital Transformation and Fraud

• The Digital Single Market: Trust and security as key drivers • Trust in digital is critical for customers • Security as the top priority

Internet users express concern about being the victim of bank card or online banking fraud (63%) and fear their social media or email account being hacked (60%)

February 2015 Eurobarometer survey on Cyber-security

0%

20%

56%

32%

65%

0%

25%

37%

57%

60%

61%

68%

0% 20% 40% 60% 80%

Legacymodernization

Out of the box/SaaS

Regulatoryimplementation

Cybersecurity/fraud

Data analyticcapabilities

Digital build-out

2015 2014 Source: CGI Voice of Our Clients (2015)

Page 9: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

Protect the bank Financial crime is costly and complex

Key challenges for FS Companies

The financial crime landscape • Ever more complex and

sophisticated • Regulators are not synchronized • Transaction volumes are growing

The traditional approach is flawed • Fraudsters continue to bypass and

evade the banks’ controls • Silos of applications don’t drive the

efficiencies required

The costs are also growing • Fines are increasing • Complex to implement on legacy • Reputation damage impacts share

price, profits and RoE

9

0%

16%

12%

8%

4%

ROE

15%

8%

- 7%

Pre-crisis

+ 3%

11%

2014 avg

6%

- 3% to -7%

15%

2017-2019

Increasing regulation is driving change

OFAC Fines in 2015

Further regulation to reduce ROE next 3-5 years

Further restructuring and

transformation required for banks

to address increasing regulation

Basel 2.5 & 3 reduced bank

ROE by 7% Banks responded

with operational efficiencies

$619M

$787M

$1.9BN

$1.45BN

Page 10: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

CGI’s “protect the bank”

10

…delivered through the combination and investment of CGI IP

Command and Control Centre | CGI IP: Case Management

Intelligent self learning | CGI IP: ISL

BIG DATA

Sanctions Screening

CGI IP: Centaur

Know your customer (KYC)

Suspicious activity Fraud

CGI IP: Hotscan

EMBEDDED CYBERSECURITY

Page 11: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

CGI Centaur Platform Next Generation Fraud Protection Platform

11 11

LAYER 1FDS

CLIENT

L1S

L2S

Internet WAF

L1S L1S

FRONTEND

OTHER BACKEND AND DWH

FRAUD ANALYTICAL AND COMPETENCE CENTER

LAYER 3-5 FDS

CENTAUR Overview:

Monitors account behavior across single and multiple channels using internal and external data

Pre-defined rules to detect suspicious (client or employee) activities and transactions

Ability to recommend modifications to the model

High-performance scalable real-time risk engine

Big Data Analytics Platform

BENEFITS:

High speed and real time

Enables use on new instruments – eg. Immediate Payments

Flexible design enables rapid implementation and integration of Cyber, Case Management etc.

Can be utilized as a stand alone solution

Transparent “open” approach

Page 12: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

IAM in Digital Transformation Era

• Key challanges of IAM • IAM re-aligned with today’s digital and cyber eco-system • Identity Federation • Open APIs • Demand for authetication methods resilient to fraud • IAM in Transition - from Employees to Customers

• New trends and methods

• Context / risk based – geolocation, device, operation, time • Biometrics

• Vein, iris, fingerprints, voice … • Commercial solutions - Apple TouchID, Android M (6.0), Windows Hello,

CGI éligo • Behavioral

• Keystroke, cursor movements

12

Page 13: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

Rethink IAM

13

IdP IdP

Current state of IAM Future state of IAM

IdP

IdP

IdP

Page 14: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

Future IAM and API requirements

• Identity Broker • Federated identity • Support for multiple authentication methods • Multiprotocol support – SAML, JWS, Oauth

• Openness of the Digital Economy requires Open APIs • Security Requirements for Open APIs

• Unified solution for API protection and audit – API GW • Different clients – different requirements

• Data sets • Protocols • Authentication methods • Authorization schemes

14

Page 15: Cyber Security in the Era Digital of Transformation Security in the Era Digital of Transformation. Jiří Kaplický . June 2016 . ... • Fraudsters continue to bypass and evade the

Our commitment to you We approach every engagement with one objective in mind: to help clients succeed