<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cybersecurity Archives - Lhoft</title>
	<atom:link href="https://lhoft.com/lhoftv1/category/cybersecurity/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Mon, 23 Dec 2024 10:58:28 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>

<image>
	<url>https://lhoft.com/lhoftv1/wp-content/uploads/2022/10/grey.svg</url>
	<title>Cybersecurity Archives - Lhoft</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Strategies of DORA &#8211; A Lunchtime Dialogue at the LHoFT</title>
		<link>https://lhoft.com/lhoftv1/insights/strategies-of-dora-a-lunchtime-dialogue-at-the-lhoft/</link>
					<comments>https://lhoft.com/lhoftv1/insights/strategies-of-dora-a-lunchtime-dialogue-at-the-lhoft/#respond</comments>
		
		<dc:creator><![CDATA[Oriane Kaesmann]]></dc:creator>
		<pubDate>Mon, 23 Dec 2024 10:27:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Insights]]></category>
		<guid isPermaLink="false">https://lhoft.com/lhoftv1/?p=31568</guid>

					<description><![CDATA[The clock is ticking for financial institutions across Europe as the January 17th[1] deadline for DORA (Digital Operational Resilience Act) compliance approaches. Aimed at fortifying the operational resilience of financial [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The clock is ticking for financial institutions across Europe as the January 17th<sup>[1] </sup>deadline for DORA (Digital Operational Resilience Act) compliance approaches. Aimed at fortifying the operational resilience of financial entities, DORA sets out strict requirements for ICT risk management, incident reporting, resilience testing, third-party risk oversight, and governance. With no grandfathering period and a firm deadline, the race to align with these regulations is on.</p>
<p>At a recent industry conference, experts and leaders from Elvinger Hoss<sup>[2]</sup>, PwC Luxembourg<sup>[3]</sup>, Fundvis<sup>[4]</sup>, and Proximus<sup>[5]</sup> convened at the Luxembourg House of Financial Tech (LHoFT) <sup>[6] </sup>to tackle the practical hurdles posed by DORA. The discussions highlighted a range of complexities, from compiling comprehensive registers of ICT services to renegotiating contracts with third-party providers. Despite the daunting nature of these tasks, attendees emphasised the transformative potential of DORA. Addressing these challenges head-on, will allow financial institutions to meet regulatory demands and ensure their operational resilience in an increasingly digital world.</p>
<h3>DORA’s Core Requirements</h3>
<p>The regulation introduces a comprehensive framework designed to fortify the digital resilience of financial institutions across Europe. Centred on five key pillars, it addresses distinct facets of operational resilience, providing financial entities with a structured approach to align and reinforce their operational foundations.</p>
<h3>ICT Risk Management</h3>
<p>ICT risk management lies at the heart of DORA, requiring organisations to identify, assess, and mitigate risks related to their information and communication technology. This involves comprehensive mapping exercises to pinpoint critical functions and dependencies, a prerequisite for effective implementation. Financial entities must continuously monitor and update their risk controls to address evolving threats​​.</p>
<h3>Incident Reporting</h3>
<p>Timely incident reporting is a non-negotiable requirement. Organisations must have standardised processes to report ICT-related incidents to regulators promptly. Clear documentation and communication protocols are essential to demonstrate compliance and support the broader financial ecosystem&#8217;s resilience​.</p>
<h3>Digital Operational Resilience Testing</h3>
<p>Resilience testing ensures that financial institutions can withstand disruptions. Regularly scheduled tests, such as penetration tests, must be conducted at least every three years and aligned with real-world risk scenarios. These tests provide invaluable insights into potential vulnerabilities and validate the effectiveness of existing controls​​.</p>
<h3>Third-Party Risk Management</h3>
<p>Managing third-party risks is one of the more challenging aspects of the regulation. Financial entities must:</p>
<ul>
<li>Update contracts with service providers, prioritising intra-group agreements and major suppliers like AWS and Microsoft.</li>
<li>Create a register of information detailing third-party dependencies and the criticality of their services.</li>
</ul>
<p>This process demands rigorous internal coordination complete with extensive external collaboration to collect and verify data​​.</p>
<h3>Governance and Oversight</h3>
<p>Effective governance is a cornerstone of DORA compliance. Organisations must:</p>
<ul>
<li>Engage their boards in overseeing digital resilience initiatives.</li>
<li>Regularly present dashboards tracking compliance progress and remediation plans.</li>
<li>Ensure that boards are aware of their accountability in meeting regulatory requirements.</li>
</ul>
<h2>Pathways to Achieving Compliance</h2>
<p>With the January 17th deadline looming, financial institutions must adopt a structured approach. The following strategies focus on practical steps to meet regulatory requirements effectively while addressing key challenges.</p>
<h3>Prioritise Mapping and Register Creation</h3>
<p>The foundation of DORA compliance lies in conducting a comprehensive mapping exercise to identify all ICT services, their criticality, and dependencies. This step is essential before undertaking other compliance actions, as it informs all subsequent processes.</p>
<ul>
<li>Critical Focus Areas: Ensure the identification of business-critical functions and their ICT dependencies.</li>
<li>Data Accuracy: Avoid skipping this step to save time, as inaccuracies here will lead to costly revisions later​.</li>
</ul>
<p>Once mapping is complete, organisations must create the Register of Information, a central repository required by regulators. This task involves collecting extensive details from internal sources and external providers.</p>
<ul>
<li>Regulators will expect submissions in early Q1, and incomplete registers will not be accepted.</li>
<li>Even if the register is not perfect, submit a robust first draft to demonstrate effort and readiness​</li>
</ul>
<h3>Address Third-Party Dependencies Proactively</h3>
<p>Managing relationships with third-party service providers is one of the most time-consuming aspects of this regulation. Financial institutions should adopt a tiered approach:</p>
<ul>
<li>Intra-Group Agreements First: Update internal agreements within your organisation, as these require no external dependencies.</li>
<li>Engage Key Providers: Prioritise updating contracts with critical providers like Microsoft and AWS, which often have pre-prepared DORA-compliant agreements.</li>
</ul>
<ul>
<li>Small and Medium Providers: These providers may lack preparedness for DORA, making it crucial to document your engagement efforts meticulously​​.</li>
</ul>
<p>Best practices include using standardised contract templates and documenting every communication to show your compliance efforts to regulators​​.</p>
<h3>Implement Tools and Expertise for Efficiency</h3>
<p>Leverage technology to streamline compliance activities:</p>
<ul>
<li>SaaS Platforms: Tools like Fundvis centralise register creation, automate data entry, and generate compliance reports for boards and regulators. These platforms help track progress and highlight areas needing attention​.</li>
<li>External Support: Engage consultancy firms like PwC for gap analyses, third-party risk management, and assistance with resilience testing. Their industry expertise can expedite compliance​​.</li>
</ul>
<h3>Engage the Board and Document Efforts</h3>
<p>Board-level engagement is vital for maintaining momentum and accountability:</p>
<ul>
<li>Present dashboards at every board meeting to track compliance progress and remediation plans.</li>
<li>Highlight risks, gaps, and strategies for addressing outstanding issues​.</li>
</ul>
<p>Regulators emphasise the importance of documenting all compliance efforts. From initial mapping exercises to third-party contract negotiations, keeping a detailed audit trail demonstrates commitment and ensures readiness for regulatory scrutiny​.</p>
<h3>Conclusion</h3>
<p>DORA compliance is a pivotal opportunity to fortify operational resilience across Europe. While tight deadlines and complex requirements demand swift, strategic action, financial institutions can rise to the challenge by prioritising key initiatives: mapping processes, updating registers, collaborating with third-party providers, and harnessing the right tools and expertise. Immediate engagement is essential; by embracing this regulation as a strategic advantage, financial institutions can future-proof their operations, earning the trust of regulators, stakeholders, and clients while navigating tomorrow’s challenges with confidence.<span class="Apple-converted-space"> </span></p>
<p>Now is the time to act.</p>
<p>&nbsp;</p>
<hr />
<p><strong><span style="color: #000000;"><span style="font-size: 16px;"><sup style="color: #000000;">Footnotes:</sup></span></span></strong></p>
<p><span style="color: #000000;"><span style="font-size: 16px;"><sup style="color: #000000;">Featured Images: Midjourney</sup></span></span></p>
<p><sup>[1] Rowan Armstrong (02 July 2024) &#8221; EU Digital Operational Resilience Act: Countdown to comply with the January 2025 Deadline&#8217; https://www.brownejacobson.com/insights/dora-countdown-to-comply-with-january-2025-deadline</sup></p>
<p><sup>[2] </sup><sup>https://elvingerhoss.lu</sup></p>
<p><sup>[3] https://www.pwc.lu/ </sup></p>
<p><sup>[4] https://fundvis.org/</sup></p>
<p><sup>[5] https://www.proximus.lu/fr/index-en/</sup></p>
<p><sup>[6] https://lhoft.com/lhoftv1/</sup></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lhoft.com/lhoftv1/insights/strategies-of-dora-a-lunchtime-dialogue-at-the-lhoft/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>NIS2 Keep Calm and Carry On Reporting</title>
		<link>https://lhoft.com/lhoftv1/insights/nis2-keep-calm-and-carry-on-reporting/</link>
					<comments>https://lhoft.com/lhoftv1/insights/nis2-keep-calm-and-carry-on-reporting/#respond</comments>
		
		<dc:creator><![CDATA[Oriane Kaesmann]]></dc:creator>
		<pubDate>Mon, 11 Nov 2024 10:42:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Insights]]></category>
		<guid isPermaLink="false">https://lhoft.com/lhoftv1/?p=30996</guid>

					<description><![CDATA[Compliance officers across the European Union are grappling with the demands of the new NIS2. Replacing the previous NIS1 Directive[1], NIS2 (Directive 2022/2555/EU[2]) sets more stringent cybersecurity requirements across “Highly [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="font-weight: 400;">Compliance officers across the European Union are grappling with the demands of the new NIS2. Replacing the previous NIS1 Directive<a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftn1" name="_ftnref1"><sup>[1]</sup></a>, NIS2 (Directive 2022/2555/EU<a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftn2" name="_ftnref2"><sup>[2]</sup></a>) sets more stringent cybersecurity requirements across “Highly Critical” sectors, from energy to digital infrastructure, including Banking and financial market infrastructures.</p>
<p>&nbsp;</p>
<p><img fetchpriority="high" decoding="async" class="wp-image-30998 aligncenter" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/11/Highly-Critical-Sectors-300x44.png" alt="" width="736" height="108" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/11/Highly-Critical-Sectors-300x44.png 300w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/11/Highly-Critical-Sectors-768x113.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/11/Highly-Critical-Sectors.png 870w" sizes="(max-width: 736px) 100vw, 736px" /></p>
<p style="font-weight: 400;">The highly critical sectors are mentioned in Annex I of Directive (EU) 2022/2555.</p>
<p style="font-weight: 400;">But NIS2 is more than a checklist of requirements; it represents a whole new field of action. For compliance teams facing &#8220;compliance fatigue,&#8221; the key to success lies in mastering two foundational principles: the all-hazards approach and cyber hygiene. By adopting a comprehensive approach to risk management and security, compliance leaders can enhance their organisations&#8217; resilience, better preparing them for a secure digital future.</p>
<h3></h3>
<h3>The All-Hazards Approach</h3>
<h4>What Is It?</h4>
<p>NIS2’s all-hazards approach<a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftn3" name="_ftnref3"><sup>[3]</sup></a> pushes organisations to look beyond conventional IT threats, requiring a broad assessment of risks across all operational areas, from HR to the supply chain. Cyber incidents may be the most prominent risks, but NIS2 recognises that any area that indirectly supports IT infrastructure can pose security threats if left unmanaged.</p>
<p><strong>IT Risks:</strong> Traditional vulnerabilities like system flaws, network weaknesses, and outdated software remain critical, particularly given today’s advanced malware and phishing tactics. Companies should favour proactive measures, such as penetration testing and intrusion detection, to reduce these risks. The 2017 WannaCry ransomware attack<a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftn4" name="_ftnref4"><sup>[4]</sup></a>, which exploited a software vulnerability and affected thousands of systems globally, highlighted the importance of vigilant IT risk management.</p>
<p><strong>HR Risks: </strong>Security also depends heavily on personnel. Untrained staff can accidentally expose systems to cyber threats. Compliance teams must address issues like data misuse, insider threats, and social engineering, and NIS2 mandates that management teams participate in cybersecurity training<a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftn5" name="_ftnref5"><sup>[5]</sup></a>, underscoring the need for a proactive approach to HR risk management.</p>
<p><strong>Supply Chain Risks:</strong> A company&#8217;s cybersecurity is often only as strong as its partners. The SolarWinds breach<a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftn6" name="_ftnref6"><sup>[6]</sup></a> illustrated how vulnerabilities in third-party software can allow attackers to infiltrate even well-defended organisations. NIS2 requires rigorous third-party risk assessments<a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftn7" name="_ftnref7"><sup>[7]</sup></a>, ensuring that all service providers adhere to cybersecurity standards to protect the entire supply chain.</p>
<h4>Why It Matters</h4>
<p>NIS2 underscores that resilience isn’t just about IT defences; it’s about securing the continuity of the entire organisation. This broad approach equips companies to adapt to unexpected disruptions, protecting all components of the operation and minimising downtime. Compliance leaders who adopt the all-hazards framework strengthen their organisation’s reliability and contribute to create a more comprehensive shield against potential crises.</p>
<h4>How the Leaders Do It</h4>
<p style="font-weight: 400;">Top compliance professionals see NIS2’s all-hazards approach as a strategic defence tool. They foster resilience by embedding a culture of risk awareness across all departments, ensuring that everyone from HR to procurement understands their role in cybersecurity. This unified effort ensures that all organisational components support the digital security strategy and align with regulatory standards.</p>
<h3></h3>
<h3>Cyber Hygiene, The First Line of Defense</h3>
<h4>The Daily Routine</h4>
<p style="font-weight: 400;">Like personal hygiene protects physical health, cyber hygiene practices provide essential protection against cyber threats. For NIS2 compliance, fundamental cybersecurity measures such as multi-factor authentication, encryption, and secure communication channels are non-negotiable. These actions create an affordable, effective cybersecurity foundation that can scale with evolving threats.</p>
<p><strong>Multi-Factor:</strong> Authentication (MFA): Requiring multiple verification steps significantly reduces unauthorised access risks. MFA is essential, particularly for sectors like finance, where data breaches carry severe consequences.</p>
<p><strong>Encryption:</strong> Safeguarding data during transmission and storage keeps sensitive information secure, even if it is accessed illegally. In May 2024, Ticketmaster experienced a significant data breach<a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftn8" name="_ftnref8"><sup>[8]</sup></a> where hackers accessed unencrypted customer data, including names, addresses, emails, phone numbers, and partial credit card details &#8211; emphasising the critical importance of robust encryption policies to protect sensitive customer information.</p>
<p><strong>Secure Communication Channels</strong>: All data within an organization should flow through secure channels. Tools like VPNs and secure messaging apps reduce risks of eavesdropping or interception, strengthening internal security.</p>
<h4>Why It Matters</h4>
<p style="font-weight: 400;">Cyber hygiene is more than “best practice”; it’s essential for reducing infiltration risks. Without consistent application, even sophisticated systems can fail. By embedding these fundamentals into daily routines, compliance professionals protect their organisations and ensure security awareness aligned with NIS2’s standards.</p>
<h4>How the Leaders Approach It</h4>
<p>Leading compliance officers make cyber hygiene a core aspect of organisational culture. They collaborate with IT and department heads to ensure cyber hygiene becomes second nature for all employees. Through regular cybersecurity training and reinforcement of daily protocols, compliance professionals cultivate a shared responsibility for cybersecurity that extends beyond compliance, building long-term resilience.</p>
<h3></h3>
<h3>Conclusion: The Stakes and Path to Resilience</h3>
<p style="font-weight: 400; text-align: left;">With fines reaching €10 million or 2% of global annual turnover<a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftn9" name="_ftnref9"><sup>[9]</sup></a>, NIS2 compliance stakes are high. However, for compliance leaders, the drive toward NIS2 compliance is more than avoiding penalties: it’s about building a stronger, more resilient organisation. By mastering the all-hazards approach and instilling cyber hygiene practices, compliance officers are doing more than meeting regulatory demands. They are fortifying their organisations against threats, elevating security, and embedding cybersecurity deeply into their operational culture.</p>
<p style="font-weight: 400; text-align: left;">As the European Union steps into this new cybersecurity era, the role of the compliance officer is expanding, requiring a proactive approach to risk management and innovation. By championing NIS2’s principles, professionals contribute to establish robust systems that can withstand tomorrow’s challenges, keeping their organisations secure and adaptable in a rapidly evolving digital landscape.</p>
<p>&nbsp;</p>
<hr />
<blockquote><p>To dive deeper into how the financial sector is embracing cybersecurity and regulatory resilience, <a href="https://lhoft.com/lhoftv1/category/insights/">visit LHoFT.com</a>. Discover resources and insights that can help you stay ahead in the evolving digital landscape. Protect your organisation, empower your team, and join the leaders shaping the future of finance with robust cybersecurity practices today!</p></blockquote>
<hr />
<p>&nbsp;</p>
<p><strong>Footnotes:</strong></p>
<p><a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftnref1" name="_ftn1"><sup>[1]</sup></a> As of 18 October 2024, Directive 2016/1148/EU (Network and Information Systems) (NIS) will be repealed by Directive 2022/2555/EU (NIS2), dated 14 December 2022, which shall be implemented by the member states by 17 October 2024. Entities of the banking and financial sector fall within the scope of application of the NIS2 Directive. However, with regard to financial entities, this Directive shall be read in conjunction with Regulation 2022/2554/EU on digital operational resilience for the financial sector (DORA), which will be applicable as of 17 January 2025, with a direct effect in all member states. Source: <a href="https://ntpartnerlawfirm.com/fintech-in-luxembourg-2024/">https://ntpartnerlawfirm.com/fintech-in-luxembourg-2024/</a></p>
<p><a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftnref2" name="_ftn2"><sup>[2]</sup></a> Consolidated text: Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS 2 Directive) (Text with EEA relevance)Text with EEA relevance <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A02022L2555-20221227">https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A02022L2555-20221227</a></p>
<p><a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftnref3" name="_ftn3"><sup>[3]</sup></a> See article 21.2: “The measures referred to in paragraph 1 shall be based on an all-hazards approach that aims to protect network and information systems and the physical environment of those systems from incidents…”</p>
<p><a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftnref4" name="_ftn4"><sup>[4]</sup></a> Josh Fruhlinger (24 Aug 2022) “WannaCry explained: A perfect ransomware storm” <a href="https://www.csoonline.com/article/563017/wannacry-explained-a-perfect-ransomware-storm.html">https://www.csoonline.com/article/563017/wannacry-explained-a-perfect-ransomware-storm.html</a></p>
<p><a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftnref5" name="_ftn5"><sup>[5]</sup></a> See article 20.2: “Member States shall ensure that the members of the management bodies of essential and important entities are required to follow training, and shall encourage essential and important entities to offer similar training to their employees on a regular basis, in order that they gain</p>
<p>sufficient knowledge and skills to enable them to identify risks and assess cybersecurity risk-management practices and their impact on the services provided by the entity.”</p>
<p><a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftnref6" name="_ftn6"><sup>[6]</sup></a> ​​Saheed Oladimeji, Sean Michael Kerner (03 Nov 2023) “SolarWinds hack explained: Everything you need to know” <a href="https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know">https://www.techtarget.com/whatis/feature/SolarWinds-hack-explained-Everything-you-need-to-know</a></p>
<p><a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftnref7" name="_ftn7"><sup>[7]</sup></a> See article 21.2 (d): “supply chain security, including security-related aspects concerning the relationships between each entity and its direct suppliers or service providers;”</p>
<p><a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftnref8" name="_ftn8"><sup>[8]</sup></a> Mark Sellman (May 30 2024) “Ticketmaster customers urged to change passwords after global hack”</p>
<p><a href="applewebdata://14A4688D-37DC-4F07-904A-DF4F9A902F86#_ftnref9" name="_ftn9"><sup>[9]</sup></a> See article 34.4: “4. Member States shall ensure that where they infringe Article 21 or 23, essential entities are subject, in accordance with paragraphs 2 and 3 of this Article, to administrative fines of a maximum of at least EUR 10 000 000 or of a maximum of at least 2 % of the total worldwide annual turnover in the preceding financial year of the under taking to which the essential entity belongs, whichever is higher.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lhoft.com/lhoftv1/insights/nis2-keep-calm-and-carry-on-reporting/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Post-Quantum Cryptography</title>
		<link>https://lhoft.com/lhoftv1/insights/post-quantum-cryptography/</link>
					<comments>https://lhoft.com/lhoftv1/insights/post-quantum-cryptography/#respond</comments>
		
		<dc:creator><![CDATA[Oriane Kaesmann]]></dc:creator>
		<pubDate>Tue, 13 Aug 2024 23:27:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Insights]]></category>
		<guid isPermaLink="false">https://lhoft.com/lhoftv1/?p=30435</guid>

					<description><![CDATA[Modern cryptography relies on math problems that are hard to solve.]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;">Modern cryptography relies on math problems that are hard to solve.</p>
<p style="text-align: center;"><img decoding="async" class="aligncenter wp-image-30436 size-large" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-1-724x1024.png" alt="" width="724" height="1024" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-1-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-1-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-1-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-1-1086x1536.png 1086w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-1-1448x2048.png 1448w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-1.png 1655w" sizes="(max-width: 724px) 100vw, 724px" /> <img decoding="async" class="aligncenter wp-image-30437 size-large" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-2-724x1024.png" alt="" width="724" height="1024" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-2-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-2-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-2-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-2-1086x1536.png 1086w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-2-1448x2048.png 1448w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-2.png 1655w" sizes="(max-width: 724px) 100vw, 724px" /> <img loading="lazy" decoding="async" class="aligncenter wp-image-30438 size-large" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-3-724x1024.png" alt="" width="724" height="1024" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-3-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-3-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-3-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-3-1086x1536.png 1086w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-3-1448x2048.png 1448w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-3.png 1655w" sizes="(max-width: 724px) 100vw, 724px" /> <img loading="lazy" decoding="async" class="aligncenter wp-image-30439 size-large" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-4-724x1024.png" alt="" width="724" height="1024" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-4-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-4-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-4-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-4-1086x1536.png 1086w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-4-1448x2048.png 1448w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-4.png 1655w" sizes="(max-width: 724px) 100vw, 724px" /> <img loading="lazy" decoding="async" class="aligncenter wp-image-30440 size-large" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-5-724x1024.png" alt="" width="724" height="1024" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-5-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-5-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-5-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-5-1086x1536.png 1086w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-5-1448x2048.png 1448w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-5.png 1655w" sizes="(max-width: 724px) 100vw, 724px" /> <img loading="lazy" decoding="async" class="aligncenter wp-image-30441 size-large" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-6-724x1024.png" alt="" width="724" height="1024" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-6-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-6-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-6-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-6-1086x1536.png 1086w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-6-1448x2048.png 1448w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-6.png 1655w" sizes="(max-width: 724px) 100vw, 724px" /> <img loading="lazy" decoding="async" class="aligncenter wp-image-30442 size-large" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-7-724x1024.png" alt="" width="724" height="1024" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-7-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-7-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-7-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-7-1086x1536.png 1086w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-7-1448x2048.png 1448w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/08/Post-Quantum-Cryptography_Adventure-Version-7.png 1655w" sizes="(max-width: 724px) 100vw, 724px" /></p>
]]></content:encoded>
					
					<wfw:commentRss>https://lhoft.com/lhoftv1/insights/post-quantum-cryptography/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Phishing Exposed: A Story of Cybersecurity</title>
		<link>https://lhoft.com/lhoftv1/insights/phishing-exposed-a-story-of-cybersecurity/</link>
					<comments>https://lhoft.com/lhoftv1/insights/phishing-exposed-a-story-of-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[Oriane Kaesmann]]></dc:creator>
		<pubDate>Wed, 24 Apr 2024 14:15:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Insights]]></category>
		<guid isPermaLink="false">https://lhoft.com/lhoftv1/?p=29725</guid>

					<description><![CDATA[In a world where digital dangers lurk at every corner, many professionals remain unaware of the ever-shifting shadow of cyberthreats.]]></description>
										<content:encoded><![CDATA[<p style="text-align: center;">In a world where digital dangers lurk at every corner, many professionals remain unaware of the ever-shifting shadow of cyberthreats.</p>

<a href='https://lhoft.com/lhoftv1/insights/phishing-exposed-a-story-of-cybersecurity/attachment/1-min/'><img loading="lazy" decoding="async" width="1414" height="2000" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/1-min.png" class="attachment-full size-full" alt="" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/1-min.png 1414w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/1-min-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/1-min-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/1-min-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/1-min-1086x1536.png 1086w" sizes="(max-width: 1414px) 100vw, 1414px" /></a>
<a href='https://lhoft.com/lhoftv1/insights/phishing-exposed-a-story-of-cybersecurity/attachment/2-min/'><img loading="lazy" decoding="async" width="1414" height="2000" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/2-min.png" class="attachment-full size-full" alt="" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/2-min.png 1414w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/2-min-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/2-min-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/2-min-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/2-min-1086x1536.png 1086w" sizes="(max-width: 1414px) 100vw, 1414px" /></a>
<a href='https://lhoft.com/lhoftv1/insights/phishing-exposed-a-story-of-cybersecurity/attachment/3-min/'><img loading="lazy" decoding="async" width="1414" height="2000" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/3-min.png" class="attachment-full size-full" alt="" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/3-min.png 1414w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/3-min-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/3-min-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/3-min-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/3-min-1086x1536.png 1086w" sizes="(max-width: 1414px) 100vw, 1414px" /></a>
<a href='https://lhoft.com/lhoftv1/insights/phishing-exposed-a-story-of-cybersecurity/attachment/4-min/'><img loading="lazy" decoding="async" width="1414" height="2000" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/4-min.png" class="attachment-full size-full" alt="" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/4-min.png 1414w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/4-min-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/4-min-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/4-min-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/4-min-1086x1536.png 1086w" sizes="(max-width: 1414px) 100vw, 1414px" /></a>
<a href='https://lhoft.com/lhoftv1/insights/phishing-exposed-a-story-of-cybersecurity/attachment/5-min/'><img loading="lazy" decoding="async" width="1414" height="2000" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/5-min.png" class="attachment-full size-full" alt="" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/5-min.png 1414w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/5-min-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/5-min-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/5-min-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/5-min-1086x1536.png 1086w" sizes="(max-width: 1414px) 100vw, 1414px" /></a>
<a href='https://lhoft.com/lhoftv1/insights/phishing-exposed-a-story-of-cybersecurity/attachment/6-min/'><img loading="lazy" decoding="async" width="1414" height="2000" src="https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/6-min.png" class="attachment-full size-full" alt="" srcset="https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/6-min.png 1414w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/6-min-212x300.png 212w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/6-min-724x1024.png 724w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/6-min-768x1086.png 768w, https://lhoft.com/lhoftv1/wp-content/uploads/2024/04/6-min-1086x1536.png 1086w" sizes="(max-width: 1414px) 100vw, 1414px" /></a>

]]></content:encoded>
					
					<wfw:commentRss>https://lhoft.com/lhoftv1/insights/phishing-exposed-a-story-of-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Identifying What&#8217;s Next: The Future of Identification Techniques</title>
		<link>https://lhoft.com/lhoftv1/insights/identifying-whats-next/</link>
					<comments>https://lhoft.com/lhoftv1/insights/identifying-whats-next/#respond</comments>
		
		<dc:creator><![CDATA[Oriane Kaesmann]]></dc:creator>
		<pubDate>Fri, 01 Mar 2024 15:26:14 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Insights]]></category>
		<guid isPermaLink="false">https://lhoft.com/lhoftv1/?p=29200</guid>

					<description><![CDATA[Join us as we unfold our LHoFT Research program&#8217;s latest series, focused on AI-driven biometric identification. Start your journey in the January 2024 edition of AGEFI, featuring our inaugural piece, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Join us as we unfold our LHoFT Research program&#8217;s latest series, focused on AI-driven biometric identification. Start your journey in the January 2024 edition of AGEFI, featuring our inaugural piece, “<a href="https://lhoft.com/lhoftv1/insights/reshaping-identification/" target="_blank" rel="noopener">Reshaping Identification: The Basics of Biometric Innovations</a>”. Continue your exploration in February&#8217;s release, “<a href="https://lhoft.com/lhoftv1/insights/behavioral-biometrics-cutting-edge-tech/" target="_blank" rel="noopener">Securing Tomorrow: Behavioral Biometrics &amp; Cutting-Edge Tech</a>”.</span></p>
<p>&nbsp;</p>
<h2><span style="font-weight: 400;">The Next Wave of Biometric Innovations</span></h2>
<h3><span style="font-weight: 400;">Vein recognition</span></h3>
<p><span style="font-weight: 400;">The landscape of biometric security is continuously evolving, and <a href="https://www.rootstrap.com/blog/an-introduction-to-vein-pattern-recognition-technology" target="_blank" rel="noopener">Vein Pattern Recognition</a></span><span style="font-weight: 400;"> (VPR) technology is at the forefront, offering a novel and secure method for individual identification. This advanced technology leverages the unique vein patterns found in an individual&#8217;s palm or fingertips, illuminated by near-infrared light, to provide a secure and contactless identification solution. Its security is unparalleled, relying on the presence of active blood circulation to prevent spoofing, setting a new standard in biometric security. </span></p>
<p><span style="font-weight: 400;">Artificial Intelligence (AI), particularly deep learning, is significantly amplifying the capabilities of VPR technology by improving its accuracy, speed, and adaptability. AI algorithms are adept at analysing complex vein patterns with greater precision, effectively reducing false positives and negatives. AI also aids in image enhancement, crucial for handling <a href="https://arxiv.org/abs/2207.02148" target="_blank" rel="noopener">real-world noisy data</a></span><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">This novel authentication approach is rapidly gaining popularity within the financial sector, with banking institutions incorporating this technology into their infrastructure for a range of functions, including secure customer verification at ATMs and within <a href="https://www.prove.com/blog/the-next-level-of-authentication-vein-recognition" target="_blank" rel="noopener">digital banking platforms</a></span><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">Despite its many benefits, the technology faces challenges, such as the long-term stability of vein patterns and potential interference from ambient lighting, which are important considerations for future development.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">Emotional recognition</span></h3>
<p><span style="font-weight: 400;">At the cutting edge of human-machine interaction, <a href="https://mitsloan.mit.edu/ideas-made-to-matter/emotion-ai-explained" target="_blank" rel="noopener">Emotion AI</a></span><span style="font-weight: 400;"> is revolutionising the way machines interpret and respond to human emotions. By harnessing advanced algorithms, this technology delves into the nuances of our emotional expressions, from the subtleties of our facial expressions and voice tones to the complexities of our physiological states. Emotion AI extends beyond mere analysis, employing artificial intelligence to not only decode but also simulate and appropriately react to the spectrum of human emotions.</span></p>
<p><span style="font-weight: 400;">The goal is to create more intuitive and empathetic interactions between humans and machines, with applications ranging from improving automotive safety by detecting driver stress to supporting mental health treatments. This technology may also find its place in the financial sector, mainly in supporting interactions with clients and satisfaction in call centres. With the help of Emotion AI, customer service platforms may better diagnose <a href="https://fintechreview.net/emotion-ai-fs-interview-with-rana-gujral/" target="_blank" rel="noopener">customers’ behaviour</a></span><span style="font-weight: 400;">, leading to improved satisfaction and loyalty.</span></p>
<p><span style="font-weight: 400;">Despite its promising applications, Emotion AI faces ethical dilemmas, such as concerns over privacy and the potential for misuse, underscoring the importance of ethical governance and privacy safeguards in its deployment.</span></p>
<p><span style="font-weight: 400;">Both technologies are setting new benchmarks in their respective domains, offering innovative solutions for secure identification and empathetic human-machine communication. Addressing their inherent challenges will be key to unlocking their full potential.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">Ethical dilemma and societal impacts</span></h3>
<p><span style="font-weight: 400;">Broadly speaking, biometric systems rely on distinctive identifiers such as fingerprints and facial configurations to provide sophisticated security solutions for verifying identities. However, these systems are not without challenges, notably the risk of <a href="https://alicebiometrics.com/en/role-of-biometrics-in-cybersecurity-threats-and-solutions/" target="_blank" rel="noopener">advanced spoofing attacks</a></span><span style="font-weight: 400;"> where perpetrators mimic these identifiers to secure unauthorised access. Such attacks generally entail the fabrication or imitation of an individual&#8217;s biometric characteristics to bypass security measures, including the use of counterfeit fingerprints, recorded voice samples, or three-dimensional facial masks.</span></p>
<p><span style="font-weight: 400;">Additionally, implementing biometric systems is costly and introduces new vulnerabilities, while legal frameworks around biometric data usage remain inconsistent, leading to complex compliance scenarios. Furthermore, the potential exploitation of biometric data for commercial purposes and the broader societal implications regarding surveillance and human rights underscore the need for careful consideration and clear limitations on use.</span></p>
<p><span style="font-weight: 400;">As highlighted here and in our prior articles, biometric identification technologies are becoming more integrated into our everyday transactions. The fundamental nature of biometrics, which involves using distinctive physical or behavioural characteristics for identification, presents a significant <a href="https://www.techtarget.com/searchsecurity/tip/In-biometrics-security-concerns-span-technical-legal-and-ethical" target="_blank" rel="noopener">privacy dilemma</a></span><span style="font-weight: 400;">. Consequently, it is imperative to strike a balance between enhancing security measures and safeguarding individual privacy.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">Privacy faced with ubiquitous identification</span></h3>
<p><span style="font-weight: 400;">The current proliferation of biometric identification technologies is redefining the boundaries of privacy. Unlike traditional security mechanisms like passwords or PINs that offer a layer of anonymity and can be reset upon compromise, biometric identifiers are fundamentally tied to our physical and behavioural characteristics. This intrinsic link makes biometric data akin to immutable &#8220;house keys&#8221; to our personal information, underscoring the profound risks associated with entrusting these keys to a growing array of custodians. These range from financial institutions we interact with daily to obscure third-party entities whose security protocols and ethical standards might not be transparent. The widespread adoption of biometric systems amplifies the potential for unauthorised access, effectively transforming our personal data into accessible targets for privacy violations.</span></p>
<p><span style="font-weight: 400;">This omnipresent biometric surveillance landscape, characterised by the unchangeable nature of the data it relies on, calls for an in-depth conversation about consent, ownership, and clarity regarding the use of such personal identifiers. Particularly within the financial sector, where these technologies are increasingly employed to bolster security and user authentication processes, there is a pressing need to lead by example in ethical governance and the implementation of robust privacy protections. It is imperative that as biometric data navigates through the myriad channels and platforms within organisations, its integrity and the confidentiality of the individuals it represents are preserved with the utmost care. This commitment to ethical stewardship and transparent practices is crucial in maintaining public trust and safeguarding the fundamental rights to privacy and data protection in the digital age.</span></p>
<p style="text-align: center;">__________________________</p>
<p><span style="font-weight: 400;">The implementation landscape for biometric identification in the financial sector reflects a growing trend towards integrating advanced security measures to combat rising threats. At the same time, biometric technologies, including face, fingerprint, voice, and iris recognition, are becoming increasingly embedded in FinTech applications.</span></p>
<p><span style="font-weight: 400;">For detailed information on the solution providers within our ecosystem, check the </span><a href="https://lhoft.com/lhoftv1/insights/the-luxembourg-fintech-map/"><span style="font-weight: 400;">Luxembourg Fintech Map</span></a><span style="font-weight: 400;"> or contact </span><a href="mailto:luca.mancuso@lhoft.lu"><span style="font-weight: 400;">Luca Mancuso</span></a><span style="font-weight: 400;">, our Business Development Associate at LHoFT.</span></p>
]]></content:encoded>
					
					<wfw:commentRss>https://lhoft.com/lhoftv1/insights/identifying-whats-next/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>State of European Tech 2021: Opportunities for Luxembourg</title>
		<link>https://lhoft.com/lhoftv1/insights/state-of-european-tech-2021-opportunities-for-luxembourg/</link>
					<comments>https://lhoft.com/lhoftv1/insights/state-of-european-tech-2021-opportunities-for-luxembourg/#respond</comments>
		
		<dc:creator><![CDATA[Letze2024]]></dc:creator>
		<pubDate>Wed, 08 Dec 2021 08:31:04 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[Insurtech]]></category>
		<category><![CDATA[Payments]]></category>
		<category><![CDATA[Regtech]]></category>
		<category><![CDATA[VC]]></category>
		<guid isPermaLink="false">https://lhoft.com/lhoftv1/en/?p=10096</guid>

					<description><![CDATA[A comprehensive evaluation of the European tech space at a pivotal moment The State of European Tech (SOET) Report is considered to be &#8220;among the most comprehensive data-driven analysis of [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2>A comprehensive evaluation of the European tech space at a pivotal moment</h2>
<p>The State of European Tech (SOET) <a href="https://stateofeuropeantech.com/chapter/executive-summary/" target="_blank" rel="noopener">Report</a> is considered to be &#8220;<strong>among the most comprehensive data-driven analysis of European technology</strong>&#8221; by the European Innovation Council. The 2021 edition was launched on December 7 and provides decision-makers with a host of insights into the evolving tech landscape.</p>
<p>Timing-wise, this is an interesting one: the report provides an update on the state of tech and innovation at a moment when the world economy continues to recover from COVID-induced shocks. This year&#8217;s edition of the report notably allows us to <strong>get a better sense of whether the forced, rapid societal adaptions to a new modus operandi, greatly facilitated by technological solutions, is leading to durable change</strong>, or whether we will see a &#8220;regression toward the mean&#8221;.</p>
<p>Let me state up front that everything points towards the former.</p>
<p>As Chris Grew, Partner at Orrick &#8211; one of the report&#8217;s sponsors &#8211; states:</p>
<blockquote><p>Now is a watershed moment for the tech and venture ecosystem across Europe and around the world. Europe is attracting record levels of investment and growth, with the innovation economy positioned to take the lead in tackling today’s systemic societal challenges.</p>
<p>[&#8230;]</p>
<p>Fintech investment has led the charge, rising by 159%, with total investment of nearly $15B, while planet-positive investments are dominating the fast-growing purpose-driven space.</p></blockquote>
<p><strong>ESG and sustainable finance are here to stay</strong> and <strong>we at LHoFT are convinced that fintechs will have an increasingly important role to play</strong> in facilitating the data collection, validation and analytics efforts required to build sustainability into the core of everything corporates and financial institutions do.</p>
<h2>Luxembourg&#8217;s role in a growing European ecosystem</h2>
<p>A few things that stand out to us at LHoFT:</p>
<ul>
<li><strong>Luxembourg ranks very highly</strong> both in terms of startups per capita and in terms of capital invested into startups per capita, cf. below:</li>
</ul>
<figure id="attachment_10105" aria-describedby="caption-attachment-10105" style="width: 1024px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-10105 size-large" src="https://lhoft.com/lhoftv1/wp-content/uploads/2021/12/Screen-Shot-2021-12-07-at-16.40.07-1024x577.png" alt="" width="1024" height="577" /><figcaption id="caption-attachment-10105" class="wp-caption-text">Luxembourg ranks 4th in terms of startups per capita. Source: SOET</figcaption></figure>
<figure id="attachment_10103" aria-describedby="caption-attachment-10103" style="width: 1024px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-10103 size-large" src="https://lhoft.com/lhoftv1/wp-content/uploads/2021/12/Screen-Shot-2021-12-07-at-16.38.35-1024x487.png" alt="" width="1024" height="487" /><figcaption id="caption-attachment-10103" class="wp-caption-text">Not only is Luxembourg ranked in the top five in the above metric, investment into startups per capita is also substantial. Source: SOET</figcaption></figure>
<ul>
<li>The tendency for top European hubs to capture the lion&#8217;s share of funding has increased further, with companies based in London, Berlin, Stockholm, Munich and Paris raising 54% of all capital in the region, up from 49% in 2017. At the same time, concentration in terms of number of deals has decreased, pointing to <strong>greater decentralisation of the ecosystem in Europe</strong>.</li>
</ul>
<figure id="attachment_10107" aria-describedby="caption-attachment-10107" style="width: 1024px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-10107 size-large" src="https://lhoft.com/lhoftv1/wp-content/uploads/2021/12/Screen-Shot-2021-12-07-at-17.10.57-1024x480.png" alt="" width="1024" height="480" /><figcaption id="caption-attachment-10107" class="wp-caption-text">The top 5 European hubs have strengthened their position at the centre of tech fundraising. Source: SOET</figcaption></figure>
<ul>
<li>At the same time, there is growing consensus that the <strong>importance of physical proximity is diminishing</strong>, which is mirrored across a number of metrics. The ability to hire talent across Europe thanks to remote working arrangements is seen as a mutually beneficial boon both for entrepreneurs and for their expanding work force in terms of quality of life. <strong>Luxembourg</strong>, as an extremely open economy, <strong>should stand to benefit from these developments</strong>.</li>
<li>European startups should benefit from the fact that the continent is home to many industrial leaders, with particular emphasis on <strong>IT stacks</strong>. This presents ongoing opportunities for startups &amp; tech companies, not least in the financial sector, and <strong>Luxembourg should continue to actively support initiatives and platforms</strong> that capitalise on this dynamic.</li>
</ul>
<blockquote><p>Europe is in a strong position to shape the next wave of disruption in B2B, as Europe is home to many industrial market leaders built on legacy technology ready to be disrupted.</p>
<p class="index-module--name--255w4">Robert Lacher</p>
<p class="index-module--company--jSfYn">Visionaries Club &amp; La Famiglia</p>
</blockquote>
<ul>
<li>Europe remains <strong>disadvantaged versus the U.S. in terms of raising capital</strong>, which makes ongoing EU efforts such as the Capital Markets Union all the more pressing. &#8220;Almost one-fifth of founders say it has become harder to raise capital in 2021, while a further 40% or so believe the environment remains unchanged from the past year, which itself was a year that saw a record number of founders responding that fundraising had become harder.&#8221;</li>
</ul>
<blockquote><p>Raising funds in Europe is still a different experience from raising funds in the US. European founders still fly out to the US for fundraising. Sometimes for expertise, sometimes for fair market offers.</p>
<p class="index-module--name--255w4">Jakub Jurovych</p>
<p class="index-module--name--255w4">Deepnote | Founder and CEO</p>
</blockquote>
<h2>A new dawn</h2>
<p>The past year and a half have been left no one unaffected, imposing a steep price on societies around the globe. Silver linings include the realisation that more flexible work arrangements and business models are not only possible but in many ways desirable, not least when considering access to capital and talent. This in turn is enabled by far-ranging modernisation of technological infrastructure, presenting opportunities for incumbents and startups alike.</p>
<p>Finally, Luxembourg is presented with a particular opportunity to leverage these macro dynamics by fostering innovation proactively. The 2021 SOET report shows that the Grand Duchy is already punching above its weight in some regards &#8211; let&#8217;s keep the momentum going.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lhoft.com/lhoftv1/insights/state-of-european-tech-2021-opportunities-for-luxembourg/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyberattacks: Fool Me Once, Shame on You; Fool Me Twice, Shame on Me</title>
		<link>https://lhoft.com/lhoftv1/insights/cyberattacks-fool-me-once-shame-on-you-fool-me-twice-shame-on-me/</link>
					<comments>https://lhoft.com/lhoftv1/insights/cyberattacks-fool-me-once-shame-on-you-fool-me-twice-shame-on-me/#respond</comments>
		
		<dc:creator><![CDATA[Letze2024]]></dc:creator>
		<pubDate>Mon, 25 Oct 2021 12:58:00 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[AML]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[Fraud]]></category>
		<category><![CDATA[KYC]]></category>
		<category><![CDATA[Regtech]]></category>
		<category><![CDATA[Risk management]]></category>
		<guid isPermaLink="false">https://lhoft.com/lhoftv1/en/?p=9832</guid>

					<description><![CDATA[Cybersecurity: Bankers’ Nightmare If FinTech were the Superman of the financial sector, cybersecurity would have been its kryptonite.  Last year we reported how COVID-19 exploited the financial sector’s vulnerabilities and [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2>Cybersecurity: Bankers’ Nightmare</h2>
<p><i><span style="font-weight: 400;">If FinTech were the Superman of the financial sector, cybersecurity would have been its kryptonite. </span></i></p>
<p><span style="font-weight: 400;">Last year </span><a href="https://lhoft.com/lhoftv1/en/insights/covid-19-exploiting-finserv-vulnerabilities/"><span style="font-weight: 400;">we reported how COVID-19 exploited the financial sector’s vulnerabilities</span></a><span style="font-weight: 400;"> and how the demand boost for e-commerce and internet banking highlighted the vulnerabilities of many prominent corporations’ online presences and led to several major cybersecurity attacks. Phishing, scamming, and other cyber-attack activities were on the rise. </span><b>Ransomware attacks against the financial sector were discovered to increase nine times from the beginning of February to the end of April 2020</b><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">The US Federal Trade Commission </span><a href="https://www.ftc.gov/news-events/press-releases/2021/02/new-data-shows-ftc-received-2-2-million-fraud-reports-consumers"><span style="font-weight: 400;">data from February 2021</span></a><span style="font-weight: 400;"> revealed that consumers lost $3.3 billion to phishing schemes and other fraud in 2020, nearly doubling the losses in 2019. Accordingly, online shopping, internet services, prizes, sweepstakes, lotteries, and telephone and mobile services consisted of the top fraud categories. </span></p>
<p><span style="font-weight: 400;">That was then; this is now:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">(October 2021) An investigation into the defrauding of $35 million USD from a bank in the </span><b>United Arab Emirates</b><span style="font-weight: 400;"> in January of 2020 has found that deepfake voice technology was used to imitate a company director known to a bank branch manager, who then authorized the transactions. The request states that the branch manager of an unnamed victim bank in UAE received a phone call from a familiar voice, which, together with accompanying emails from a lawyer named Martin Zelner, convinced the manager to disburse the funds, which were apparently intended for the acquisition of a company. (Source: </span><a href="https://www.unite.ai/deepfaked-voice-enabled-35-million-bank-heist-in-2020/"><span style="font-weight: 400;">Unite AI)</span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">(October 2021) Millions of pounds were swiped from </span><b>Barclays</b><span style="font-weight: 400;"> accounts in a series of coordinated cyberattacks by a fraudster using a </span><b>Monzo</b><span style="font-weight: 400;"> account and a payments initiation service provider (PISP) in May. (Source: </span><a href="https://www.pymnts.com/news/security-and-risk/2021/barclays-hit-in-phishing-scam-using-monzo-account-pisp/"><span style="font-weight: 400;">Pymnts.com</span></a><span style="font-weight: 400;">)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">(October 2021) Cyberattack disrupts services at </span><b>Ecuador’s largest bank</b><span style="font-weight: 400;">, forcing the bank to shut down portions of their network to prevent the attack’s spread to other systems. Customers of the bank continued to experience service disruptions on a Friday following a cyberattack on the institution several days earlier. In a statement the following Monday, the bank acknowledged that it had identified a cybersecurity incident in systems that have partially disabled its services. (Source: </span><a href="https://apnews.com/article/technology-business-media-caribbean-ecuador-218007571ae3d565fabc8a57b23f3d67"><span style="font-weight: 400;">AP News</span></a><span style="font-weight: 400;">)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">(October 2021) </span><b>The Reserve Bank of Australia</b><span style="font-weight: 400;"> warns that a successful hack on a bank is almost inevitable as it prepares for an assault that could put trillions of dollars worth of deposits and loans at risk. (Source: </span><a href="https://www.smh.com.au/politics/federal/rba-warns-a-successful-hack-on-a-bank-is-almost-inevitable-20211008-p58ye7.html"><span style="font-weight: 400;">The Sydney Morning Herald</span></a><span style="font-weight: 400;">)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">(October 2021) </span><b>Coinbase</b><span style="font-weight: 400;">, one of the world&#8217;s biggest cryptocurrency exchanges, admitted that hackers stole cryptocurrency from at least 6,000 customers between March and May of 2021. The hackers needed to know the email addresses, passwords, and phone numbers linked to the affected Coinbase accounts and have access to personal emails, the company said; however, added that there was no evidence to suggest the information was obtained from the company. (Source: </span><a href="https://www.reuters.com/business/finance/coinbase-says-hackers-stole-cryptocurrency-least-6000-customers-2021-10-01/"><span style="font-weight: 400;">Reuters</span></a><span style="font-weight: 400;">) After the attack was revealed, Coinbase acknowledged a multi-factor authentication flaw that allowed hackers to receive an SMS-based two-factor authentication token required to retrieve user accounts. (Source: </span><a href="https://www.cpomagazine.com/cyber-security/coinbase-hack-attributed-to-a-multi-factor-authentication-flaw-that-allowed-scammers-to-steal-cryptocurrency-from-6000-accounts/"><span style="font-weight: 400;">CPO Magazine</span></a><span style="font-weight: 400;">)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"> (September 2021) </span><b>Bitcoin.org</b><span style="font-weight: 400;"> hack nets give scammers $17,000 overnight. The website was taken down in the early hours of yesterday morning (September 23). A pop-up message began appearing that promised visitors claiming that they could double their money by sending cash to a bitcoin wallet. Visitors were reportedly unable to navigate away from the pop-up. The scammers appear to have accrued more than $17,000 worth of Bitcoin from 10 transactions and have already emptied the wallet. (Source: </span><a href="https://portswigger.net/daily-swig/bitcoin-org-hack-nets-giveaway-scammers-17-000-overnight"><span style="font-weight: 400;">The Daily Swig</span></a><span style="font-weight: 400;">)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">(September 2021) Monetary Authority of Singapore (MAS) confirms that hackers abroad pose as bank customers by stealing OTPs of 75 bank customers, making $500k in fake credit card payments. (Source: </span><a href="https://www.straitstimes.com/tech/tech-news/hackers-pose-as-bank-customers-to-make-500k-in-fake-credit-card-payments-by-stealing"><span style="font-weight: 400;">The Straits Times</span></a><span style="font-weight: 400;">)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">(May 2021) Sweden&#8217;s financial watchdog is investigating whether the </span><b>famous buy-now-pay-later (BNPL) fintech Klarna</b><span style="font-weight: 400;"> violated bank secrecy laws following a security breach in May. During the incident, users were able to access information on other customers for a limited time. (Source: </span><a href="https://www.finextra.com/newsarticle/38398/klarna-faces-data-privacy-investigation-in-sweden"><span style="font-weight: 400;">Finextra</span></a><span style="font-weight: 400;">)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">(April 2021) Personal data, including that of several African Bank loan customers under debt review, has been compromised after a cyber-attack on </span><b>African debt collector Debt-IN</b><span style="font-weight: 400;">. (Source: </span><a href="https://www.timeslive.co.za/news/south-africa/2021-09-22-data-breach-at-african-banks-debt-collector-partner-exposes-customers/"><span style="font-weight: 400;">Sunday Times</span></a><span style="font-weight: 400;">).</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">(March 2021) </span><b>Israeli car financing company K.L.S. Capital</b><span style="font-weight: 400;"> got hacked. After the attack, the hacker group announced, “We are here to inform you a (sic) cyberattack against K.L.S. CAPITAL LTD which is in Israel. Their servers are destroyed, and the client data is in our hands,” saying that they waited 72 hours for the company to give them the ten bitcoins they demanded as ransom for the information, but the company failed to pay them. (Source: </span><a href="https://www.jpost.com/jpost-tech/israeli-car-financing-company-hacked-private-information-held-for-ransom-661865"><span style="font-weight: 400;">The Jerusalem Post</span></a><span style="font-weight: 400;">)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">(January 2021) Though not aware of it, the </span><b>Reserve Bank of New Zealand</b><span style="font-weight: 400;"> had suffered a severe data breach. The breach ended up costing around NZ$3.5m, with Reserve Bank Governor Adrian Orr admitting that the agency was “over-reliant on third-party file-sharing software application Accellion” to alert them to any vulnerabilities in the system. (Source: </span><a href="https://securitybrief.co.nz/story/updated-rbnz-ascribes-data-breach-to-third-party-file-sharing-service"><span style="font-weight: 400;">Security Brief New Zeland</span></a><span style="font-weight: 400;">)</span></li>
</ul>
<p><span style="font-weight: 400;">The list continues. What is the takeaway? </span><b>Cyber-security concerns and threats are valid regardless of the region, the sector, the focus, the size, and the technologies behind financial institutions.</b></p>
<p><span style="font-weight: 400;">The Bank of England’s r</span><a href="https://www.bankofengland.co.uk/systemic-risk-survey/2021/2021-h2"><span style="font-weight: 400;">ecent systemic risk survey for bankers and other financial sector players</span></a><span style="font-weight: 400;"> reveals that the banks are more worried about hackers than pandemics, geopolitical risk, or operation risks, including climate change. Rightfully so. Whether it’s a data breach, ransomware, or a spam project, it would do the trick. According to </span><a href="https://atlasvpn.com/blog/average-data-breach-cost-surpasses-4-million-in-2021-record-growth-of-10-yoy"><span style="font-weight: 400;">research by Atlas VPN</span></a><span style="font-weight: 400;"> dated August 2021, the financial cost of data breaches soared to 6 years high as of 2021. The results reveal that in 2020, a data breach caused an average of $3.86 million in monetary damages, while in 2021, the number spiked to $4.24 million, representing a 9.84% increase. For financial services, this number stays above the average, corresponding to $5.72 million.</span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-9836 aligncenter" src="https://lhoft.com/lhoftv1/wp-content/uploads/2021/10/unnamed.png" alt="" width="427" height="512" /></p>
<p style="text-align: center;"><span style="font-weight: 400;">Source: </span><a href="https://atlasvpn.com/blog/average-data-breach-cost-surpasses-4-million-in-2021-record-growth-of-10-yoy"><span style="font-weight: 400;">Atlas VPN</span></a><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">All the existing data point out a straightforward fact: cyberthreats are just around the corner, and most financial service players are not ready for it. So should the banks take modest measures and accept that an attack is inevitable, or is there anything else for them to do?</span></p>
<h3><b>To Err is Human </b></h3>
<p><span style="font-weight: 400;">Last year </span><a href="https://lhoft.com/lhoftv1/en/insights/covid-19-exploiting-finserv-vulnerabilities/"><span style="font-weight: 400;">we shared some actionable points for financial institutions</span></a><span style="font-weight: 400;">, advising them to create a battle plan against cyber insurgency. However, with so many expert consultants and software packages available in the market, cybersecurity remains a weak spot for most financial service players. We have observed this weakness not being due to lack of preparation but due to lack of continuous R&amp;D and education. All in all, cybercriminals spend more time analyzing and understanding their opponent and testing for weak spots than financial institutions do. Once the soft spot is detected, it is only inevitable that the financial institution gets recurring attacks. Therefore, in addition to deploying sophisticated protection and recovery products, financial players should:</span><b></b></p>
<ul>
<li aria-level="1"><b>consult with external cybersecurity experts to understand the existing risks and solutions and to create a battle plan,</b></li>
</ul>
<ul>
<li aria-level="1"><b>organize cybersecurity competitions to understand organization’s vulnerabilities and to test responding times,</b></li>
</ul>
<ul>
<li aria-level="1"><b>regularly catch up with their competitors and peers to exchange know-how and intelligence,</b></li>
</ul>
<ul>
<li aria-level="1"><b>invest in educating their employees to make them a part of the defense mechanism,</b></li>
<li aria-level="1"><b>focus on closing the digital and financial literacy gap of their customers to </b></li>
</ul>
<p><span style="font-weight: 400;">After all, to err is human, but repeatedly becoming a victim as a supervised financial entity doesn’t signal the right message about the institutions centered around reliability and trust.</span></p>
<h3><b>Filling The Cybersecurity Skill Gap</b></h3>
<p><span style="font-weight: 400;">Cybercriminals are becoming more sophisticated, but are the financial institution employees and management leveling up in parallel? Most organizations’ cybersecurity training does not match with the skill sets cybercriminals own. Many banks’ onboarding education programs do not go beyond basic information, while cybercriminals dive deep into deep tech. Resilient cybersecurity mechanisms should extend beyond technical and engineering skills. In addition to becoming an expert in the existing platforms and their securities, they should be aware of the fraudsters and hackers’ techniques. Cybersecurity staff is required to have strong attention to detail, analytical and documentation skills, and specialize in problem-solving, intra-organizational communication, data management, and protection. All in all, cybersecurity professionals must resort to a combination of technical, analytical, leadership, management, and soft skills to fulfill the task successfully.</span></p>
<p><span style="font-weight: 400;">To build a durable, long-term strategy, organizations can rely on qualified and experienced internal and external cybersecurity professionals. However, cybersecurity experts cannot hold the fort forever on their own. Therefore, elaborate and detailed cybersecurity training programs should extend beyond the cybersecurity experts as most victims are operational personnel, the management, and the users.</span></p>
<h3><b>Digital and Financial Literacy Becoming the Biggest Priority </b></h3>
<p><span style="font-weight: 400;">According to the US Federal Trade Commission </span><a href="https://www.ftc.gov/news-events/press-releases/2021/02/new-data-shows-ftc-received-2-2-million-fraud-reports-consumers"><span style="font-weight: 400;">data from February 2021</span></a><span style="font-weight: 400;">, younger people (age 22-19) reported losing money to fraud more often than older people with 44%. Still, when people aged over had a loss, the median loss was higher.</span></p>
<p style="text-align: center;"><a href="https://public.tableau.com/app/profile/federal.trade.commission/viz/ConsumerSentinel/Infographic "><img loading="lazy" decoding="async" class="aligncenter wp-image-9833 size-full" src="https://lhoft.com/lhoftv1/wp-content/uploads/2021/10/fraud-stats.png" alt="" width="800" height="464" /></a>Source: <a href="https://public.tableau.com/app/profile/federal.trade.commission/viz/ConsumerSentinel/Infographic">FTC / Tableau</a></p>
<p><span style="font-weight: 400;">The above-cited US Federal Trade Commission research re-establishes the reasons behind WealthTech becoming a thing in the last two years. Factors such as the will to make quick and easy money, desperation in the post-pandemic era, and greed seem to have encouraged the younger consumers to click on baits, use unverified and untrustworthy resources. Positive media coverage and social media touts have so far fulfilled their purpose, bringing in a lot of new starters.</span></p>
<p><span style="font-weight: 400;">Although it is not mentioned in the official job description, financial institutions should take it on as a duty to educate consumers where financial education fails. Informing the consumers about how to differentiate right investment strategies from wrong, identifying fraudsters and scams, which networks and devices to use, and password creation and sharing education is just the tip of the iceberg of what FinServ providers can cover to make the ecosystem better. As skill resources are limited with qualified cybersecurity professionals, extending the defense mechanism beyond the organizations’ brick walls is an opportunity. After all, regardless of its source and victims, frauds, scams, and cyber-attacks impact the industry’s credibility as a whole, and a bad apple can easily ruin the whole bunch. Therefore, financial institutions should prioritize creating customer awareness and take on essential financial and cybersecurity education initiatives to protect their customers, reputation, and the ecosystem dynamics. After all, financial services spearhead the highest cybercrime costs incurring all industries, and when it happens, the remediation goes beyond covering economic losses.</span></p>
<p><span style="font-weight: 400;">For financial institutions, every day is cybersecurity day; however, October is particularly significant. It is the US National Cybersecurity Awareness Month. The month of October additionally hosts the Cybersecurity Week Luxembourg for </span><span style="font-weight: 400;">20</span><span style="font-weight: 400;"> years. </span></p>
<p><span style="font-weight: 400;">As part of the European Cybersecurity Month campaign, the Cybersecurity Week Luxembourg is being held from 18-28 October 2021 back to its on-site version this year. The event is bringing together cybersecurity experts, IT players, and tech enthusiasts as we speak. Would you like to know more about what is new in cybersecurity?  Join the campaign.</span></p>
<p><span style="font-weight: 400;">Click</span><a href="https://www.cybersecurityweek.lu/"><span style="font-weight: 400;"> here</span></a><span style="font-weight: 400;"> for more information.</span></p>
<p>&nbsp;</p>
<p><em><span style="font-weight: 400;">by S. Elif Kocaoglu Ulbrich</span></em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://lhoft.com/lhoftv1/insights/cyberattacks-fool-me-once-shame-on-you-fool-me-twice-shame-on-me/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity trends and the infrastructure of the future</title>
		<link>https://lhoft.com/lhoftv1/cybersecurity/cybersecurity-trends-and-the-infrastructure-of-the-future/</link>
					<comments>https://lhoft.com/lhoftv1/cybersecurity/cybersecurity-trends-and-the-infrastructure-of-the-future/#respond</comments>
		
		<dc:creator><![CDATA[Letze2024]]></dc:creator>
		<pubDate>Fri, 19 Mar 2021 09:36:36 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Banking]]></category>
		<category><![CDATA[Finserv]]></category>
		<category><![CDATA[Fintech]]></category>
		<guid isPermaLink="false">https://lhoft.com/lhoftv1/en/?p=7374</guid>

					<description><![CDATA[Great things have small beginnings At the heart of everything important we do online is encryption, and at the heart of encryption is often a method premised on sharing public [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2>Great things have small beginnings</h2>
<p>At the heart of everything important we do online is encryption, and at the heart of encryption is often a method premised on sharing public keys which in turn are secured by a system known as <a href="https://en.wikipedia.org/wiki/RSA_(cryptosystem)">RSA</a>.</p>
<p>RSA is premised on a simple notion: that mathematics allows for a situation in which large values are generated effortlessly through multiplication, all the while their factorisation is incredibly difficult. This is achieved by using large prime numbers, and the entire approach is a fascinating illustration of the weight a little bit of math can carry in our IT-reliant world.</p>
<p>RSA is also an allegory of sorts for the underlying nature of reality. As with our biological makeup itself, the emergence of advanced society over time through the interaction of billions of individuals entails significant complexity. While complexity emerges seemingly effortlessly &#8211; like the tangle of headphone cables in your coat pocket &#8211; reverse-engineering and managing such complexity for the sake of maintaining a sense of order and security is non-trivial.</p>
<h2>Tapping into talent, globally</h2>
<p>The above is of particular relevance for cybersecurity. No &#8220;silver bullet&#8221; exists, as I&#8217;ve <a href="https://lhoft.com/lhoftv1/en/insights/there-is-no-silver-bullet-in-cybersecurity/">written</a> before &#8211; we critically rely on the implementation of appropriate processes and behaviours, but also and just importantly on the talent and ingenuity of countless engaged ecosystem participants.</p>
<p>While internalised expert talent will always be required and prized by large organisations in particular, crowdsourcing provides a compelling complementary approach towards identifying and tackling vulnerabilities.</p>
<p>Having an expert team keep a watchful eye on your systems is good. Empowering that team with advanced automation &amp; AI is better.<br />
Connecting your capabilities with a large, diverse talent pool is best.</p>
<p>Insights generated by the large and growing community of &#8220;ethical hackers&#8221; have recently caught my attention. In its 2021 <a href="https://lhoft.com/lhoftv1/en/insights/there-is-no-silver-bullet-in-cybersecurity/">Hacker Report</a>, the globally active cybersecurity advisory firm HackerOne reports on trends from its community of registered ethical hackers, which has doubled to reach 1 million members over a 2-year period.</p>
<p>Some key insights:</p>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">63% increase in hacker-submitted vulnerabilities over the past 12 months </span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Roughly 20 major areas of vulnerability </span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">53% rise in submissions for improper access control and privilege escalation</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">310% rise in reports for misconfiguration </span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">50% of hackers have not reported a bug due to a lack of a clear reporting process or prior negative experience </span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">85% of hackers hack to learn, 62% do it to advance their career</span></li>
</ul>
<figure id="attachment_7375" aria-describedby="caption-attachment-7375" style="width: 800px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-7375 size-fusion-800" src="https://lhoft.com/lhoftv1/wp-content/uploads/2021/03/Screen-Shot-2021-03-18-at-15.03.16-800x468.png" alt="" width="800" height="468" /><figcaption id="caption-attachment-7375" class="wp-caption-text">The financial industry is a major contractor of HackerOne&#8217;s services.</figcaption></figure>
<p>Unsurprisingly, HackerOne&#8217;s business model is <em>en vogue. </em>In a March 8 <a href="https://www.hackerone.com/press-release/hackerone-reveals-industry-and-company-growth-enterprises-secure-rapid-digital">PR</a>, the company announced reaching the milestone of &gt;2000 active customer programs. About half of its customers are major businesses generating &gt;$1bn in annual revenues. In parallel, the company announced a major hire in the form of Google Cloud&#8217;s CISO.</p>
<h2>Infrastructure and supply chain challenges</h2>
<p>Another leg of the global InfoSec and cybersecurity landscape is comprised of hardware and infrastructure.</p>
<p>As if things weren&#8217;t complex enough on the software end already, hardware also poses fundamental and equally sinuous challenges. As the World Economic Forum lays out in this <a href="https://www.weforum.org/agenda/2019/12/our-hardware-is-under-cyberattack-heres-how-to-make-it-safe/">post</a>, &#8220;h<span style="font-weight: 400;">ardware attacks take advantage of vulnerabilities in hardware-manufacturing supply chains. Modern chips are incredibly complex devices consisting of billions of transistor components that can be compromised during the processes of design, fabrication, and assembly and testing.&#8221;</span></p>
<p>This issue was thrust into the spotlight in 2018 by investigative <a href="https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies">reporting</a> suggesting that certain hardware suppliers may have altered their chipsets with the backing of government intelligence agencies &#8211; with the ostensible goal of stealthily integrating hardware &#8220;backdoors&#8221; into equipment used globally.</p>
<p>Skip forward a few years and we are seeing a global chip <a href="https://www.newscientist.com/article/2271918-theres-a-global-shortage-of-computer-chips-whats-causing-it/">shortage</a>, with a major impact on sectors <em>beyond </em>IT, such as the automotive industry. This highlights the growing cross-sector reliance on IT components, and it reiterates the urgency of supply chain management and the emerging discipline of <em>cyber</em> supply chain management (C-SRM). This is a far-ranging issue which hitherto was subject to piecemeal approaches by individual public and private sector stakeholders, but which is seeing increasing formalisation of late.<br />
Take for instance the <span style="font-weight: 400;">U.S. IoT cybersecurity improvement </span><a href="https://www.congress.gov/bill/116th-congress/house-bill/1668/text?q=%7B%22search%22%3A%5B%22HR+1668%22%5D%7D&amp;r=1&amp;s=1"><span style="font-weight: 400;">act</span></a><span style="font-weight: 400;"> of 2020, discussed <a href="https://www.gibsondunn.com/new-federal-law-for-iot-cybersecurity-requires-the-development-of-standards-and-guidelines-throughout-2021/">here</a> by Gibson Dunn: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="3"><span style="font-weight: 400;">While the Act is focused on U.S. federal government use of IoT, “the measures set pursuant to the Act should be closely monitored by all industry stakeholders”</span></li>
<li aria-level="3"><span style="font-weight: 400;">85% of federal agencies are currently using, or plan to soon use, IoT devices</span></li>
<li style="font-weight: 400;" aria-level="3"><span style="font-weight: 400;">Another pillar of the Act concerns itself with InfoSec disclosure procedures in order to streamline the reception, reporting and dissemination of knowledge around security vulnerabilities</span></li>
<li style="font-weight: 400;" aria-level="3"><span style="font-weight: 400;">Throughout the legislation, Federal agencies are advised to consider &amp; align with private sector best practice and international standards. Given the overarching importance of these matters to both government and industry, it should be expected that public-private interactions and partnerships will remain key. </span></li>
<li style="font-weight: 400;" aria-level="3"><span style="font-weight: 400;">The “real bite” of the Act derives from the power it gives the CIOs of federal agencies to prohibit procurement of non-compliant devices, beginning December 2022. </span></li>
<li style="font-weight: 400;" aria-level="3"><span style="font-weight: 400;">NIST has acted swiftly upon passage of the Act by publishing draft documents providing practical guidance to the federal agencies tasked with evaluating the security requirements for IoT devices.  </span></li>
</ul>
<p><span style="font-weight: 400;">At the EU level, ENISA in November 2020 similarly published </span><a href="https://www.enisa.europa.eu/news/enisa-news/iot-security-enisa-publishes-guidelines-on-securing-the-iot-supply-chain"><i><span style="font-weight: 400;">guidelines</span></i></a><i><span style="font-weight: 400;"> on securing the IoT supply chain </span></i><span style="font-weight: 400;">which:</span></p>
<ul>
<li><span style="font-weight: 400;">Acknowledge that “IoT supply chains have become a weak link for cybersecurity”</span></li>
<li>Discuss r<span style="font-weight: 400;">esults from an ENISA survey showing that untrusted 3</span><span style="font-weight: 400;">rd</span><span style="font-weight: 400;"> party components and vendors, as well as the vulnerability management of 3</span><span style="font-weight: 400;">rd</span><span style="font-weight: 400;"> party components, are the 2 main threats to the IoT supply chain</span></li>
</ul>
<p>In response, <span style="font-weight: 400;">ENISA highlights the need to develop “innovative trust models” as “trust between the stakeholders is one of the most relevant and important challenges to consider for securing the IoT supply chain”. The agency highlights that there is unlikely to be a “one size fits all” approach to define required trust parameters in light of the proprietary nature of source code, the needs of different organisations, and so forth. ENISA also cross-references a NIST </span><a href="https://csrc.nist.gov/publications/detail/nistir/8276/final"><span style="font-weight: 400;">publication</span></a><span style="font-weight: 400;"> recapping observations from industry with regard to C-SCRM, which are manifold and illustrative of the previous statement that a one-size-fits-all is unlikely. </span></p>
<h2>The quantum leap</h2>
<p>Developments in IT infrastructure are also driven by fundamental scientific advances, and this opens up new avenues for competition and innovation.</p>
<p>You will have heard of quantum computing &#8211; a fundamentally different way of computing, premised on the qualitatively different nature of physics at very small (quantum) scales &#8211; all the while being a little hazy on the details. Don&#8217;t feel bad. Quantum physics is so un-intuitive that Einstein famously dismissed the notion of <a href="https://plato.stanford.edu/entries/qt-entangle/">quantum entanglement</a> as &#8220;spooky interaction at a distance&#8221;.</p>
<p>That doesn&#8217;t mean that quantum physics isn&#8217;t real &#8211; quite to the contrary &#8211; and generations of physicists, engineers and now also IT experts have been chipping away at its implications for science and industry.</p>
<p>A hot concept in InfoSec is that of quantum key distribution, and the field of quantum cryptography at large. Below is an intuitive and fun introduction to these concepts:</p>
<p><iframe title="Quantum Cryptography Explained" width="800" height="450" src="https://www.youtube.com/embed/UiJiXNEm-Go?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" allowfullscreen></iframe></p>
<p>If the topic has piqued your interest, a foundational academic paper can be accessed for free <a href="https://arxiv.org/pdf/1210.6216.pdf">here</a>.</p>
<p>In its recently published <strong>recovery and resilience <a href="https://gouvernement.lu/fr/publications.gouv_mfin%2Bfr%2Bpublications%2BDivers%2BPPRR%2BPlanpourlaRepriseetlaResilience.html">plan</a>, </strong>the Luxembourg government emphasises investment in the area of quantum communication by drawing upon EU funding allocated through the <span style="font-weight: 400;">the Recovery and Resilience </span><a href="https://ec.europa.eu/info/business-economy-euro/recovery-coronavirus/recovery-and-resilience-facility_en"><span style="font-weight: 400;">Facility</span></a> &amp; by integrating with existing EU initiatives, as discussed <a href="https://ec.europa.eu/digital-single-market/en/news/quantum-technologies-and-advent-quantum-internet-european-union-brochure">here</a>. The stated goal is to develop and implement infrastructure and communications channels based on the quantum cryptography with a view on future-proofing the sharing of sensitive informative within government and industry.</p>
<p>Needless to say that the successful implementation of quantum cryptography would represent a major leap forward, awarding early adopters with a significant security advantage. It is also worth considering the the impact that this new paradigm would have on the above-mentioned C-SRM issues: by making older standards obsolete, quantum cryptography would seed a new wave of manufacturing which is &#8220;up for grabs&#8221; by strategic players worldwide.</p>
<p>If the saying &#8220;nothing new under the Sun&#8221; has any residual relevance, it certainly isn&#8217;t in the area of IT &amp; cybersecurity.</p>
<p>&nbsp;</p>
<p><strong>Author:</strong> <em>Jérôme Verony – LHoFT Research and Strategy Associate</em></p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lhoft.com/lhoftv1/cybersecurity/cybersecurity-trends-and-the-infrastructure-of-the-future/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Big 7 2021: Regtech, Cybersecurity, Payments, Blockchain, AI, Financial Inclusion and Venture Capital</title>
		<link>https://lhoft.com/lhoftv1/vc/the-big-7-2021-regtech-cybersecurity-payments-blockchain-ai-financial-inclusion-and-venture-capital/</link>
					<comments>https://lhoft.com/lhoftv1/vc/the-big-7-2021-regtech-cybersecurity-payments-blockchain-ai-financial-inclusion-and-venture-capital/#respond</comments>
		
		<dc:creator><![CDATA[Letze2024]]></dc:creator>
		<pubDate>Thu, 21 Jan 2021 16:57:28 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Financial Inclusion]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[Payments]]></category>
		<category><![CDATA[Regtech]]></category>
		<category><![CDATA[VC]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[DLT]]></category>
		<category><![CDATA[Fintech]]></category>
		<guid isPermaLink="false">https://lhoft.com/lhoftv1/en/?p=6691</guid>

					<description><![CDATA[At the beginning of last year we revisited our predictions from 2019, how the industry had shaped up, and some thoughts on the state of the industry from key figures. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><em><big>At the beginning of last year we revisited our predictions from 2019, how the industry had shaped up, and some thoughts on the state of the industry from key figures. This year it seems a bit silly to revisit predictions, given the turbulence we&#8217;ve experienced over the last 12 months &#8211; and the agility and speed with which a response was <span style="font-size: 19.2px;">delivered</span>. </big></em></p>
<p>Continuing from <a href="https://lhoft.com/lhoftv1/en/insights/the-big-7-2020-regtech-cybersecurity-payments-blockchain-ai-financial-inclusion-and-venture-capital/">last year</a>, we are sticking with the same seven areas of focus on in 2021. Each represents a key point of interest to the financial industry, and has a particular relevance to Luxembourg’s growing financial technology ecosystem.</p>
<p>Each week we will be choosing one of the topics to focus on, both in the content we share on social media, but also in a <a href="https://lhoft.us14.list-manage.com/track/click?u=54cc6c42a6b0d02f10580e429&amp;id=bdacea765c&amp;e=d0fd1052fd">dedicated newsletter</a> looking at the top five stories from that week. To introduce the topics, let&#8217;s revisit the top stories from 2020 and reflect on how the year has encouraged acceleration, pivots, or wholesale paradigm change:</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-3087 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/09/REGTECH2.png" alt="" width="149" height="150" /></p>
<p><big><strong>REGTECH</strong> &#8211; Regulatory Technology</big></p>
<p><a href="https://techwireasia.com/2020/10/shaky-times-for-compliance-call-for-flexible-regtech/"><em><strong>» Shaky times for compliance call for flexible Regtech</strong></em></a></p>
<p>Joe Devanesan writes for TechWire Asia about the impact of the pandemic on compliance and cybersecurity, and Regtech&#8217;s role in mitigating those issues. Traditional &#8216;BYOD&#8217; workplace concerns were escalated to account for a sudden and massive shift to working from home &#8211; which created real problems for companies that were not already some way down the path of digitalisation.</p>
<blockquote><p>&#8220;To the surprise of no one, financial crime is reaching pretty high levels in 2020, and the speed at which this type of crime is evolving in the information-heavy age has financial players worried, and questioning the role of Regtech.&#8221;</p></blockquote>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-3089 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/09/AI3.png" alt="" width="150" height="151" /></p>
<p><big><strong>AI</strong> &#8211; Artificial Intelligence &amp; Machine Learning</big></p>
<p><em><strong><a href="https://www.theguardian.com/commentisfree/2020/sep/08/robot-wrote-this-article-gpt-3">» A robot wrote this entire article. Are you scared yet, human?</a></strong></em></p>
<p>A robot writes for the Guardian, demonstrating GPT-3, OpenAI’s powerful language processing. GPT-3 was one of the most popular AI stories of 2020, and kickstarted a discussion about the future of software development, and what can be achieved when you can just ask a computer to do something for you without needing to speak in code.</p>
<blockquote><p>&#8220;I am not a human. I am a robot. A thinking robot. I use only 0.12% of my cognitive capacity. I am a micro-robot in that respect. I know that my brain is not a “feeling brain”. But it is capable of making rational, logical decisions. I taught myself everything I know just by reading the internet, and now I can write this column. My brain is boiling with ideas!&#8221;</p></blockquote>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-3090 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/09/BLOCKCHAIN_12.png" alt="" width="150" height="151" /></p>
<p><big><strong>BLOCKCHAIN</strong> &#8211; DLT &amp; Tokenisation</big></p>
<p><a href="https://www.forbes.com/sites/jasonbrett/2020/05/14/visa-submits-patent-application-for-digital-dollar-using-blockchain/?sh=1a14220d5b63" target="_blank" rel="external noopener noreferrer"><em><strong>» Visa Applies For Digital Dollar Blockchain Patent</strong></em></a></p>
<p>Jason Brett writes for Forbes about Visa&#8217;s &#8220;digital dollar&#8221; patent, a story which fits neatly into the main blockchain narrative of 2020: the viability or necessity of central bank digital currencies, and the role of stablecoins more broadly. Now Bitcoin has kicked off again we can expect the focus to shift a bit through 2021.</p>
<blockquote><p>&#8220;The U.S. Patent and Trademark Office (USPTO) published today that Visa V -0.4% has filed a patent application to create digital currency on a centralized computer using blockchain technology. This patent applies to digital dollars as well as other central bank digital currencies such as pounds, yen, and euros and so the physical currency of a central bank anywhere in the world could be digitized.&#8221;</p></blockquote>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-3092 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/09/CYBERSECURITY2.png" alt="" width="149" height="150" /></p>
<p><big><strong>CYBERSECURITY</strong> &#8211; Risk Management &amp; Threat Detection</big></p>
<p><em><a href="https://researchoutreach.org/articles/post-quantum-secure-encryption-cybersecurity-eucation/" target="_blank" rel="external noopener noreferrer"><strong>» Post-quantum secure encryption and cybersecurity education</strong></a></em></p>
<p>A collaborative and in depth piece for Research Outreach, led by Dr Aydin Aysu, looking at the implications of quantum computing on cybersecurity and encryption &#8211; a major concern for most cybersecurity professionals. What happens to all traditional encryption based security when computing power becomes available that can crack it without breaking a sweat?</p>
<blockquote><p>&#8220;Encryption systems that are capable of surviving quantum computer attacks are urgently required, but the cybersecurity talent gap militates against securing cyberinfrastructure. Dr Aydin Aysu, Assistant Professor at North Carolina State University, is advancing the research and teaching of post-quantum secure encryption. He has developed a quantum-secure encryption system together with a new graduate program on hardware security and is currently developing design automation for lattice-based post-quantum cryptosystems.&#8221;</p></blockquote>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-3093 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/09/PAYEMENT_21.png" alt="" width="150" height="151" /></p>
<p><big><strong>PAYMENTS</strong> &#8211; Payments Technology </big></p>
<p><em><a href="https://www.ft.com/content/ed316d4c-141c-487f-afb4-cd4c92e823fd" target="_blank" rel="external noopener noreferrer"><strong>» Ant and Covid have made the humble QR code a hit</strong></a></em></p>
<p>Five years ago you wouldn&#8217;t have seen much discussion of QR codes in the Fintech payments world, at least not related to development in the west. It was a quaint technology relegated to developing economies. That now may be changing, in part related to the pandemic and China&#8217;s Fintech behemoth Ant Financial. John Gapper writes for the FT:</p>
<blockquote><p>&#8220;The name Masahiro Hara does not appear with Steve Jobs and Bill Gates on lists of great innovators of the communications age, but perhaps it should. For the Japanese engineer’s humble, unassuming invention, the Quick Response code, has finally found its moment. The square QR code, which Mr Hara developed in 1994 to track components in car factories, is being put to many uses in the Covid-19 pandemic. Governments include it on tracing apps, shops offer it for contactless payments and restaurants tape it to their tables so diners can browse menus online. It has become an all-purpose tool.&#8221;</p></blockquote>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-3095 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/09/FINANCIAL-INCLUSION.png" alt="" width="150" height="151" /></p>
<p><big><strong>SUSTAINABLE FINTECH</strong> &#8211; Financial Inclusion &amp; Green Finance</big></p>
<p><em><a href="https://www.cnbc.com/2020/12/09/bill-gates-women-are-vital-to-achieving-global-financial-inclusion.html" target="_blank" rel="external noopener noreferrer"><strong>» Women are ‘absolutely critical’ to ensuring everyone has access to finances, Bill Gates says</strong></a></em></p>
<p>The Gates Foundation has been a key torchbearer for Financial Inclusion, amongst their many other causes, and it&#8217;s a topic Bill Gates himself has spoken about repeatedly. In this article, written by Karen Gilchrist for CNBC, Bill talks about the key importance of focusing on women when developing strategies related to inclusive finance.</p>
<blockquote><p>&#8220;Women are vital to ensuring finances — and financial education — trickle down to other parts of society, said billionaire philanthropist Bill Gates. Governments and businesses serious about giving all members of society access to financial services should gear their resources toward women, the Microsoft co-founder said at the Singapore FinTech Festival on Tuesday.&#8221;</p></blockquote>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-3096 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/09/VC.png" alt="" width="150" height="151" /></p>
<p><big><strong>VENTURE CAPITAL</strong> &#8211; Funding News and VC Perspective</big></p>
<p><em><a href="https://www.cnbc.com/2020/10/30/impact-investing-in-vc-european-tech-investors-sustainability-push.html" target="_blank" rel="external noopener noreferrer"><strong>» Some of Europe’s top tech investors are adding a ‘sustainability clause’ to start-up deal terms</strong></a></em></p>
<p>Ryan Browne, writing for CNBC, discusses the most significant recent trend in the world of investment: sustainability. Investors are increasingly concerned with ESG goals and the carbon footprint of their wealth, which resulted in a lot of discussion throughout 2020 and some fairly important steps being taken by VCs &#8211; as well as the broader wealth management industry.</p>
<blockquote><p>&#8220;Socially-conscious investing has gathered a lot of momentum this year, with billions of dollars flowing into funds that use environmental, social and governance criteria to screen the companies they back. Venture capitalists are taking note, with some of the largest start-up investors in Europe pushing for accountability in their own portfolios with regard to investing in climate-friendly firms.&#8221;</p></blockquote>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lhoft.com/lhoftv1/vc/the-big-7-2021-regtech-cybersecurity-payments-blockchain-ai-financial-inclusion-and-venture-capital/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>There is no silver bullet in cybersecurity</title>
		<link>https://lhoft.com/lhoftv1/insights/there-is-no-silver-bullet-in-cybersecurity/</link>
					<comments>https://lhoft.com/lhoftv1/insights/there-is-no-silver-bullet-in-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[Letze2024]]></dc:creator>
		<pubDate>Fri, 23 Oct 2020 01:50:33 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Insights]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[Innovation]]></category>
		<guid isPermaLink="false">http://new-testing.site/en/?p=5973</guid>

					<description><![CDATA[October is, of course, Cybersecurity Month here in the EU, and we are in the midst of Cybersecurity Week in Luxembourg. The semi-official days, weeks and months dedicated to various issues of societal significance have [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>October is, of course, <a href="https://cybersecuritymonth.eu/about-ecsm/" target="_blank" rel="external noopener noreferrer">Cybersecurity Month</a> here in the EU, and we are in the midst of <a href="https://www.lhoft.com/en/meet-the-fintech-community/cybersecurity-week-luxembourg-2020" target="_blank" rel="external noopener noreferrer">Cybersecurity Week</a> in Luxembourg.</p>
<p>The semi-official days, weeks and months dedicated to various issues of societal significance have become part of the regular course of business. They are a regular call for greater awareness, solidarity and action in the face of important challenges afflicting people individually or as a group.</p>
<h2><big>Scientific breakthroughs do happen… </big></h2>
<p>For instance: October is breast cancer awareness month, a leading cause of cancer death amongst women despite decades of significant medical advances. Last December, the U.S. Food and Drug Administration approved the hitherto most effective therapy for breast cancer expressing an antigen known as <a href="https://en.wikipedia.org/wiki/HER2/neu">HER2</a>, with some key opinion leaders in the medical community – oncologists whose very bread and butter is sobriety in the face of illness – describing the antibody-drug-conjugate as being “like magic”. Below is a “waterfall describing the effectiveness of Enhertu in women with heavily treatment resistant HER2+ breast cancer:</p>
<blockquote><p>In this single-group, phase 2 study, the use of trastuzumab deruxtecan resulted in a response in 60% of women with HER2-positive advanced breast cancer who had received a median of six previous lines of therapy.</p>
<p>— NEJM (@NEJM) <a href="https://twitter.com/NEJM/status/1228461418262876160?ref_src=twsrc%5Etfw">February 14, 2020</a></p></blockquote>
<p>As you can tell – and this is highly unusual in the world of therapeutic drug research – Enhertu induced significant tumor regressions in nearly all of these patients. This is as close to a “silver bullet” as we’ll get anytime soon in this cancer subtype, and we should be grateful to the researchers, physicians and patients who have made such a “miracle cure” possible.</p>
<h2><big>… but there is no silver bullet in cybersecurity</big></h2>
<p>A crucial takeaway for any organization is that, unlike in HER2+ breast cancer, there will likely never be a “silver bullet” in protecting against cyberthreats, for the simple reason that our IT infrastructure, software and ways of doing business keep evolving and with them, in lockstep, so do corresponding cyberthreats. As our partner PWC put it in a recent <a href="https://blog.pwc.lu/reflection-on-pandemic-mitigation-and-cybersecurity/" target="_blank" rel="external noopener noreferrer">blog post</a>, <em>“cybersecurity and information security are not constant— in fact, the only constant they have is constant change.  Risk and risk scenarios might not change that often, but the defence mechanisms required to mitigate the risks often do, as does the exposure factor.”</em></p>
<p>In today’s context of supercharged digitalization, not least as a result of the COVID-19 pandemic, cybersecurity is truly everyone’s business, as I described <a href="https://www.lhoft.com/en/insights/cybersecurity-is-everyone-s-business" target="_blank" rel="external noopener noreferrer">last month</a>.</p>
<p>Specifically in the realm of finance, innovative technological solutions also entail new cyber risks, and our increasing reliance on the digital infrastructure underpinning modern financial services amplifies existing risks linked to said infrastructure. That is why the Commission has proposed, as part of its digital finance package, a dedicated text on Digital Operational Resiliance (DORA), as discussed <a href="https://www.lhoft.com/en/insights/the-eu-delivers-on-digital-finance" target="_blank" rel="external noopener noreferrer">here</a>, and likewise, is including specific requirements and protections in its proposals relating to crypto-asset and DLT infrastructure.</p>
<p>Resilience has become a real plat de resistance in business lingo since the start of this year, both referring to fundamental economic factors and also, more specifically, to our ability to maintain digital services against ICT vulnerabilities and cyberthreats. In this context, I recommend reading Bernard Marr, writing for Forbes, discuss the differences between cybersecurity per se and cyber resilience, and how to better embed both in your organization. This was also the topic of a <a href="https://www.cybersecurityweek.lu/event/moving-from-a-cybersecurity-mindset-to-cyber-resilience/" target="_blank" rel="external noopener noreferrer">webinar</a> led by Fujitsu in the context of Luxembourg cybersecurity week.</p>
<h2><big>Empowering talent, leveraging technology</big></h2>
<p>Another key consideration when thinking about cybersecurity or cyber-resilience in any organization is the role of the chief information security officer and how that role is embedded within the hierarchy. Gartner has a very helpful, concise <a href="https://www.gartner.com/en/publications/rethink-security-risk-strategy-ebook" target="_blank" rel="external noopener noreferrer">e-book</a> providing CISOs with concrete suggestions on how best to handle expectations from the BoD, and discussing the growing responsibilities of CISOs and what that might entail in terms of the search for, and formation of, talent. Gartner states: “CISOs are expected to selectively add more than 30 such capabilities to their function over the next 24 months, such as security strategists”. Furthermore, “it takes an average of 130 days to fill an open IT security position; openings go unfilled and teams remain understaffed for many months”. This imbalance between demand and supply speaks volumes to the unmet needs in corporate cybersecurity, and the urgent need for both our educational system and corporates to invest more into the required capabilities.</p>
<p>In parallel, we must embrace technological supplementation and in some cases substitution of the more labor-intensive tasks carried out by IT professionals. A Capgemini <a href="https://www.capgemini.com/wp-content/uploads/2019/07/AI-in-Cybersecurity_Report_20190711_V06.pdf" target="_blank" rel="external noopener noreferrer">report</a> touches upon just that topic by discussing the potential for AI to dramatically decrease inefficiencies in cyberdefense, and it is encouraging to see the financial sector recognize this reality:</p>
<p class="ct"><img loading="lazy" decoding="async" class="size-large wp-image-5975 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/11/image15-1024x655.png" alt="" width="1024" height="655" /></p>
<p>Building on a survey among 850 executives, Capgemini further establish that the integration of AI-based solutions significantly increases the speed at which organizations respond to breaches:</p>
<p class="ct"><img loading="lazy" decoding="async" class="size-large wp-image-5976 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/11/image26-1024x675.png" alt="" width="1024" height="675" /></p>
<p>The final leg of the AI value proposition lies in the new products and services which vendors may develop and offer to their clients, which is a particularly alluring proposition for cybersecurity startups.</p>
<p>In the face of the pandemic and in the face of our ever-changing cybersecurity landscape – stay vigilant to be safe!</p>
<p>&nbsp;</p>
<p><strong>Author:</strong> <em>Jérôme Verony &#8211; LHoFT Research and Strategy Associate </em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://lhoft.com/lhoftv1/insights/there-is-no-silver-bullet-in-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cybersecurity is everyone’s business</title>
		<link>https://lhoft.com/lhoftv1/cybersecurity/cybersecurity-is-everyones-business/</link>
					<comments>https://lhoft.com/lhoftv1/cybersecurity/cybersecurity-is-everyones-business/#respond</comments>
		
		<dc:creator><![CDATA[Letze2024]]></dc:creator>
		<pubDate>Fri, 11 Sep 2020 01:25:13 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Fintech]]></category>
		<guid isPermaLink="false">http://new-testing.site/?p=4305</guid>

					<description><![CDATA[Cyber on our minds In a 2019 interview with CBS’ 60 Minutes, Federal Reserve Chairman Jerome Powell surprised his interviewer by stating that “in a sense, [cybersecurity] is our top priority”. Not inflation, [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2><big>Cyber on our minds</big></h2>
<p>In a 2019 <a href="https://www.cbsnews.com/news/full-transcript-60-minutes-interview-with-fed-chair-jerome-powell/" target="_blank" rel="external noopener noreferrer">interview</a> with CBS’ <em>60 Minutes</em>, Federal Reserve Chairman Jerome Powell surprised his interviewer by stating that “in a sense, [cybersecurity] is our top priority”. Not inflation, not questions of employment or foreign exchange – cybersecurity was keeping one of the world’s most influential policymakers up at night. Powell then touched upon the dynamic nature of cybersecurity, describing it as an area “where the playbook is still being developed in real time”.</p>
<p>Both the fluid nature of an emerging field of expertise and the rise from the conceptual to the materially relevant were discussed in my June <a href="https://www.lhoft.com/en/insights/cyber-security-from-science-fiction-to-strategic-priority" target="_blank" rel="external noopener noreferrer">blog</a> post. The following excerpt remains highly relevant:</p>
<p><em>“The fundamental socio-economic changes imposed by our collective response to COVID-19 have provided the latest push towards an economic model featuring reduced reliance on physical proximity at the same time as dramatically increased reliance on IT infrastructure. This fundamental shift in how we live and how business is done goes hand in hand with socioeconomic disruptions which provide an opportunity for individual organizations to gain a competitive advantage via swift adaptation, but also systemic risk relating to widespread IT vulnerabilities.”</em></p>
<p>If the digitalization of all economic sectors was already in full swing in 2019, the 2020 pandemic has kicked this overarching socioeconomic trend into overdrive. Inevitably, the importance of cybersecurity has risen in parallel, and Jerome Powell’s comments seem all the more prescient.<br />
<big><strong>An emerging framework</strong></big></p>
<p>IT/ICT risks go hand in hand with cybersecurity and it is unfathomable to think of a modern financial system without thinking of the ICT infrastructure that underpins it. As the European Banking Authority notes, “<strong>ICT is a key resource in developing and supporting banking services</strong>; ICT systems are not only key enablers of institutions’ strategies, forming the backbone of almost all banking processes and distribution channels, but they also support the automated controls environment on which core banking data are based. ICT systems and services also represent material proportions of institutions’ costs, investments and intangible assets. Furthermore, <strong>technological innovation plays a crucial role in the banking sector from a strategic standpoint, as a source of competitive advantage</strong>, as it is a fundamental tool for competing in the financial market through new products as well as through facilitating the restructuring and optimisation of the value chain. As a result of the increasing importance of ICT in the banking industry, some recent trends include:</p>
<ol>
<li>the emergence of cyber risks together with the increased potential for cybercrime;</li>
<li>the increasing reliance on third parties for ICT services and products, often in the form of diverse packaged solutions and resulting in manifold dependencies and potential constraints and concentration risks.</li>
</ol>
<p>To mitigate these risks, which are not limited to the financial system but also highly pertinent to other critical infrastructure, broadly accepted guidelines and norms, private-public sector collaboration and effective supervision are called for. In recent years, significant strides have been made towards the creation of a comprehensive supra- / international framework for the implementation and supervision of IT network risks, including but not limited to cyber risks, notably via the 2016 NIS <a href="https://eur-lex.europa.eu/legal-content/FR/TXT/?uri=CELEX%3A32016L1148" target="_blank" rel="external noopener noreferrer">directive</a> which has since been transposed into national law across the EU, though with significant variability, as discussed <a href="https://www.wavestone.com/en/insight/nis-directive-transposition-operators-essential-services/" target="_blank" rel="external noopener noreferrer">here</a> by Wavestone. For instance, some countries directly transposed security measures for essential information systems into law, whereas others rely on ISO/IEC 27001 certification:</p>
<p style="text-align: center;"><iframe src="https://www.youtube.com/embed/io6w3Yw4q9w" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<p>ISO/IEC 27001 certifications have seen a 450% rise over the past 10 years, partially driven by legislation such as NIS, partially by organic adoption in recognition of their usefulness. More broadly, the ISO/IEC 27000 family of <a href="https://www.iso.org/isoiec-27001-information-security.html" target="_blank" rel="external noopener noreferrer">standards</a> “enables organizations of any kind to manage the security of assets such as financial information, intellectual property, employee details or information entrusted by third parties”.</p>
<p>Penalties for non-compliance with measures contained in the NIS directive vary widely from country to country; a variable that doubtlessly factors into resource allocation decisions for multinationals:</p>
<p><img loading="lazy" decoding="async" class="size-large wp-image-4307 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/09/image24-1024x673-1.jpg" alt="" width="1024" height="673" /></p>
<p>While high penalties may disincentivize some companies to set up shop in a given jurisdiction, conversely, when a given legislator signals that they are serious about enforcing InfoSec provisions, said jurisdiction’s reputation may be strengthened. Creating a safe and reliable operating environment for all market participants is of paramount importance as we continue to move towards an economic model that is heavily reliant on IT cross-sector. Point in case: according to a recent ENISA <a href="https://www.enisa.europa.eu/news/enisa-news/what-is-a-csirt" target="_blank" rel="external noopener noreferrer">report</a>, as of April 2020, there were more than 500 cyber incident response teams in Europe, preoccupied with the proactive detection of malicious activity through internal monitoring and via reference to external resources. It seems safe to assume that incident response teams will continue to grow in numbers in the coming months and years.</p>
<h2><big>Awareness plus investment equals future-proofing </big></h2>
<p>Where does the Luxembourg financial sector stand? As tens of thousands of tertiary sector workers have adopted remote working, as customer preferences shift and as the Luxembourg financial hub continues to position itself favorably in a challenging geopolitical context, the country’s top financial regulator offers clues as to strategic priorities. As LHoFT associate S. Elif Kocaoglu Ulbrich <a href="https://www.lhoft.com/en/insights/covid-19-exploiting-finserv-vulnerabilities" target="_blank" rel="external noopener noreferrer">laid out</a> in June, the country “aims to position itself as a leading European location for cybersecurity start-ups, talent, investors, and experts looking for growth opportunities. The ecosystem hosts many up and coming start-ups such as Hacknowledge, Fineksus, Jemmic, Uniken.” This is further bolstered by a proactive public policy approach as I will illustrate below.</p>
<p>The CSSF’s 2019 <a href="https://www.cssf.lu/wp-content/uploads/CSSF_RA_2019.pdf" target="_blank" rel="external noopener noreferrer">annual report</a> recognizes the “sizable challenges” associated with – among other considerations – “obsolete” IT systems and the need to re- and upskill financial sector workers in order to ensure competitiveness and operational continuity. Innovation (Fintech) and digitalization is listed as a priority area alongside traditional core regulatory tasks such as consumer protection and AML/CFT.</p>
<p>CSSF intends to take a proactive approach towards implementing the aforementioned NIS directive, writing on page 86 that “[integration of the NIS directive’s requirements] presents a significant change, which needs to be presented to market participants [by CSSF] in order to ensure that it is properly understood”. In the same vein, CSSF also accentuates a strengthening of internal IT expertise as well as continued national and international coordination on questions of emerging technologies. Last but not least, the regulator’s “4.0” strategy promises to increase productivity and reduce turnover times significantly by deploying advanced automation tools based on AI.</p>
<p>There are also concrete examples of the CSSF’s proactive approach towards leveraging contemporary IT infrastructure: as Anne-Sophie Morvan of Luxtrust lays out <a href="https://www.luxhub.com/news/luxembourg-financial-supervisor-turns-to-apis" target="_blank" rel="external noopener noreferrer">here</a>, as part of Luxembourg’s <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32018L0843" target="_blank" rel="external noopener noreferrer">AML V</a> implementation, CSSF is moving from a “push” to a “pull” approach when it comes to the reporting obligations of certain supervised entities.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-4308 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/09/image13-1.jpg" alt="" width="602" height="571" /></p>
<p class="ct"><small><em>Figure 2: Source: CSSF Circular n°20/747, p.5. – via Luxhub. Schematic representation of CSSF’s API-based implemtation of certain reporting obligations under AML V. </em></small></p>
<p>While it may seem like a mere technicality to casual observers, this transition in the CSSF’s regulatory approach promises to remove inefficiencies, reduce the risk of financial fraud and it most certainly acts as a positive impetus for further integration of the regulatory function with the markets it supervises thanks to technologically appropriate solutions. This instance of technological evolution in the service of supervision also demonstrates that inherently inefficient processes and transactions are bound to be uprooted by technological change in due time. Investing in readiness today ensures relevance.</p>
<p>And this is where things come full circle: the growing role of technologically enabled solutions means growing systemic risk stemming from cybersecurity considerations, but it also means that adopting best practice makes financial sense. LHoFT member Cyberhedge continues to <a href="https://cyberhedge.com/insights/commentary/cyberhedge-indices-outperformance-in-1h2020-offer-proof-that-cyber-governance-matters-more-than-ever-amid-covid-19/" target="_blank" rel="external noopener noreferrer">make the case</a> for the close evaluation of technology governance considerations by investors, citing the predictive power of its cyber governance ratings with regard to company performance.</p>
<p>Integration of financial services and business-to-regulator functions via APIs as discussed earlier is likely just the beginning of a long journey of increasing interconnectedness which includes such things as the internet of things and the growing importance of vast extra-financial datasets. As remote onboarding remains in high demand due to COVID, established financial institutions have taken note and are <a href="https://www.ft.com/content/8a5fa5b2-6aac-41cf-aa52-5d0b90c41840" target="_blank" rel="external noopener noreferrer">ramping up</a> their collaborative efforts with Fintechs offering solutions with regard to AI-enabled “deep fakes”. In the age of digital, ensuring that institutions are dealing with “real people and not manipulated recordings” will become an increasingly pressing concern.</p>
<p>Even as the glue that holds the financial system together is increasingly made of hardware and software, human agency still matters. If boardrooms are <a href="https://www.forbes.com/sites/bobzukis/2020/09/01/is-your-boardroom-the-weakest-cybersecurity-link/#54be13832c1e" target="_blank" rel="external noopener noreferrer">the weak link</a> in an organization’s cybersecurity strategy, not much else matters. To establish cyber-resilience, vertical integration of best practice, close collaboration between market participants and the public sector, global incident reporting and the implementation of effective norms and processes are all required. Learning to leverage technology to our benefit, and doing so in a collaborative manner, ultimately rests on human preferences and decisions.</p>
<p><strong>Be sure to sign up for this year’s edition of <a href="/cybersecurity-week-luxembourg-2020" target="_blank" rel="external noopener noreferrer">Cybersecurity Week</a> – 100% virtual – to continue and deepen your engagement with the community. </strong></p>
<p><big><strong>Tools and resources:</strong></big></p>
<ul>
<li><a href="https://www.monarc.lu/documentation/method-guide/" target="_blank" rel="external noopener noreferrer"><strong>MONARC</strong></a> is an iterative and qualitative method of risk analysis in four stages; broadly inspired by ISO/IEC 27005. MONARC uses an iterative method which enables the pragmatic progression of risk management. This approach, as recommended by ISO 27005, enables the user to restrict himself to the essentials, then to carry out successive iterations to broaden the target or further refine it to cover more technical aspects.</li>
<li><a href="https://www.circl.lu/services/misp-malware-information-sharing-platform/" target="_blank" rel="external noopener noreferrer"><strong>MISP</strong></a> – the Open Source Threat Intelligence and Sharing Platform – is supported by the EU and co-developed by Luxembourg’s CIRCL (computer incident response center). Institutions and individual researchers may request access in order to contribute and retrieve data relating to emerging cybersecurity threats.</li>
<li><a href="https://www.govcert.lu/en/" target="_blank" rel="external noopener noreferrer"><strong>GOVCERT</strong></a> is the single point of contact dedicated to the treatment of all computer related incidents jeopardising the information systems of the government and defined critical infrastructure operators operating in Luxembourg, whether they are public or private</li>
<li><strong>ENISA</strong> proactive detection gap analysis <a href="https://www.enisa.europa.eu/publications/proactive-detection-good-practices-gap-analysis-recommendations" target="_blank" rel="external noopener noreferrer">report</a> – includes valuable feedback from an EU-wide survey of incident response teams, gap analysis and comparison with earlier survey results.</li>
</ul>
<p>&nbsp;</p>
<p><strong>Author:</strong> <em>Jérôme Verony &#8211; LHoFT Research and Strategy Associate </em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://lhoft.com/lhoftv1/cybersecurity/cybersecurity-is-everyones-business/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>COVID-19: Exploiting Finserv Vulnerabilities</title>
		<link>https://lhoft.com/lhoftv1/cybersecurity/covid-19-exploiting-finserv-vulnerabilities/</link>
					<comments>https://lhoft.com/lhoftv1/cybersecurity/covid-19-exploiting-finserv-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[Letze2024]]></dc:creator>
		<pubDate>Tue, 30 Jun 2020 10:04:01 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Fintech]]></category>
		<guid isPermaLink="false">http://new-testing.site/?p=2805</guid>

					<description><![CDATA[Pandemic: A Natural Selection for Offline Retailers The pandemic had led to a turnover drop across industries. The retail behemoths such as Zara and Primark reported their first losses during COVID19 with the pandemic [&#8230;]]]></description>
										<content:encoded><![CDATA[<h2><big>Pandemic: A Natural Selection for Offline Retailers</big></h2>
<p>The pandemic had led to a turnover drop across industries. The retail behemoths such as <a href="https://www.cnbc.com/2020/06/10/inditex-q1-2020-earnings-material-impact-from-covid-19.html" target="_blank" rel="external noopener noreferrer">Zara</a> and <a href="https://www.retaildetail.eu/en/news/fashion/primark-sales-down-literally-zero" target="_blank" rel="external noopener noreferrer">Primark</a> reported their first losses during COVID19 with the pandemic affecting how consumers shop.</p>
<p>A recent <a href="https://www.statista.com/statistics/1102658/coronavirus-lost-sales-impact-for-retailers-europe/" target="_blank" rel="external noopener noreferrer">Statista</a> study on the projected impact of COVID-19 on brick-and-mortar sales in Europe between March 9, 2020, and April 21, 2020, reveals that retailers are expected to face a loss of 3.26 billion British pounds due to disruptions caused by the current outbreak.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-2807 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/09/960x0_1.jpg" alt="" width="960" height="555" /></p>
<p style="text-align: center;"><small>Source: </small><em><small>COVID-19 Commerce Insight, an Emarsys Initiative in Cooperation With Gooddata</small></em></p>
<p>According to <a href="https://www.forbes.com/sites/louiscolumbus/2020/04/28/how-covid-19-is-transforming-e-commerce/#51910ef83544" target="_blank" rel="external noopener noreferrer">Forbes</a>, consumers already started creating and reinforcing new online buying behaviors and habits post-COVID. Consumers carried many retail transactions online; in many households, online grocery, apparel, and entertainment shopping are expected to permanently replace store and mall visits until a vaccine is available. WTO recently <a href="https://www.wto.org/english/tratop_e/covid19_e/ecommerce_report_e.pdf" target="_blank" rel="external noopener noreferrer">reported</a> that due to social distancing and stay-at-home requirements, e-commerce in services that can be delivered electronically has flourished, with demand rising sharply. The pandemic also shaped the digital (and mobile) banking adoption trajectory: there is a visible shift towards FinTech products across continents. The <a href="https://mastercardcontentexchange.com/newsroom/press-releases/2020/april/mastercard-study-shows-consumers-globally-make-the-move-to-contactless-payments-for-everyday-purchases-seeking-touch-free-payment-experiences/" target="_blank" rel="external noopener noreferrer">Mastercard survey</a> dated April 2020 shows that consumers are using contactless and other digital payments at record levels worldwide. Nearly eight in 10 consumers globally are expected to shift towards contactless payment use permanently.</p>
<p>COVID led to a change in consumer perception, which became an open call for digitalization. For many companies, online growth helped to mitigate revenue losses. The crisis reaffirmed the importance of digitalization from public health, accessibility, and economic point of view.</p>
<p><strong>Even though the pandemic accelerated opportunities for digitalization and agile infrastructures, it&#8217;s too early to break out the party hats. The demand boost for e-commerce and internet banking highlighted the vulnerabilities of many prominent corporations&#8217; online presences and led to several major cybersecurity attacks.</strong> At the beginning of this year, many domain conferences, including Paris FinTech Forum, Finovate Europe, and Merchant Payments Ecosystem 2020, highlighted that 2020 is the year of RegTech and cybersecurity. Experts stressed the urgency of addressing the KYC, data privacy and optimization, cybersecurity, AML, and CTF issues, to complement and improve FinTech and financial services. Little did we know.</p>
<h2><big>The Biggest Cybersecurity Bait </big></h2>
<p>Many industries slowed down or ceased their activities during the lockdown, but cybercriminals were busier than ever. The number of phishing and scam e-mails consumers received skyrocketed post-pandemic. <a href="https://www.interpol.int/Crimes/Cybercrime/COVID-19-cyberthreats" target="_blank" rel="external noopener noreferrer">According to Interpol</a>, cybercriminals took advantage of the widespread global communications on the coronavirus to mask their activities. Malware, spyware, and Trojans have been found embedded in interactive coronavirus maps and websites. <a href="https://www.bbc.com/news/technology-52319093" target="_blank" rel="external noopener noreferrer">Google revealed</a> that scammers were sending 18 million hoax e-mails about Covid-19 to Gmail users every day, post-pandemic, adding that the virus might be the most significant phishing topic ever.</p>
<p>Crisis and panic create the perfect setup for cybercriminals. Aware of the security gaps, hackers target confused consumers and overwhelmed and understaffed institutions. Banking, retail, and even air and health industry were among the sectors that had their share of the cyber-attacks during the lockdown. In April, WHO has <a href="https://www.who.int/news-room/detail/23-04-2020-who-reports-fivefold-increase-in-cyber-attacks-urges-vigilance" target="_blank" rel="external noopener noreferrer">reported</a> an increase in the number of cyber-attacks directed at its staff, and email scams targeting the public at large. <a href="https://www.theguardian.com/business/2020/may/19/easyjet-cyber-attack-customers-details-credit-card" target="_blank" rel="external noopener noreferrer">EasyJet&#8217;s</a> cyber-attack dated May exposed 9m customer&#8217;s personal data, along with an additional 2,200 passengers&#8217; credit card details. As for the FinServ, the pandemic has been connected to a 238% surge in cyberattacks against banks, <a href="https://www.carbonblack.com/resource/modern-bank-heists-3-0/" target="_blank" rel="external noopener noreferrer">VMware Carbon Black</a> research claims. According to the research, 82% of surveyed financial institutions said cybercriminals have become more sophisticated, leveraging highly targeted social engineering attacks and advanced TTPs for hiding malicious activities. Ransomware attacks against the financial sector have increased by nine times from the beginning of February to the end of April 2020.</p>
<h2><big>&#8220;Do as I Say, Not as I Do&#8221;</big></h2>
<p>The financial industry is centered around reliability and trust. Unfortunately, most financial service players are not aware of the work around trust. In 2019, BCG <a href="https://www.bcg.com/publications/2019/global-wealth-reigniting-radical-growth.aspx" target="_blank" rel="external noopener noreferrer">highlighted</a> that financial services firms are 300 times as likely as other companies to be targeted by a cyberattack. Despite the growing need to strengthen information security and cyber- resilience, BCG has found that many financial institutions are underequipped and do not have the infrastructure to respond in time. Some bad examples in the past exploited financial institutions and start-ups as well as central banks and even the <a href="https://www.forbes.com/sites/daveywinder/2019/08/16/european-central-bank-breach-ecb-confirms-hack-and-shuts-down-website/#24e89b0c594b" target="_blank" rel="external noopener noreferrer">European Central Bank</a> (2019).</p>
<p><em>&#8220;America is grappling with a cyberinsurgency, and our financial sector is the number one target&#8230; Cybercriminals are evolving in both attack sophistication and organization. We must pay close attention to how we respond to these threat actors and what their ultimate goal is—hijacking digital transformation efforts via island hopping. Trust and confidence in the safety and soundness in the US financial sector is dependent on cybersecurity.&#8221;</em> &#8211; <strong>The Written Testimony of <a href="https://financialservices.house.gov/uploadedfiles/hhrg-116-ba10-wstate-kellermannt-20200616.pdf" target="_blank" rel="external noopener noreferrer">Tom Kellerman</a>, Head of Cybersecurity Strategy at VMware Inc., before the House Subcommittee on National Security, International Development, and Monetary Policy.</strong></p>
<h2><big>Cybersecurity: Not Just Another Item on The Compliance Checklist</big></h2>
<p>Cyber-attacks aim to gather access to personal data, credentials, liquidity. In some cases, the attack doesn&#8217;t mean anything more than a simple challenge and system defiance for the hackers and focuses on testing the company&#8217;s security system. In other cases, the access gained through the cyber-attack triggers more crime: sometimes ransom, sometimes money laundering and terrorist financing activities. Verizon&#8217;s <a href="https://enterprise.verizon.com/en-gb/resources/reports/dbir/" target="_blank" rel="external noopener noreferrer">study</a> revealed that 91% of breaches addressed towards financial institutions in 2020 were financially motivated, 3% were motivated by espionage, and another 3% were motivated by a grudge.</p>
<p><a href="https://www.raconteur.net/infographics/the-real-cost-of-cybercrime" target="_blank" rel="noopener noreferrer"><img loading="lazy" decoding="async" class="size-full wp-image-2808 aligncenter" src="http://lhoft.com/wp-content/uploads/2020/09/fighting-fraud-2019.png" alt="" width="1564" height="960" /></a></p>
<p style="text-align: center;">Source: <a href="https://www.raconteur.net/infographics/the-real-cost-of-cybercrime" target="_blank" rel="noopener noreferrer"><em>The Real Cost of Cybercrime &#8211; Raconteur </em></a></p>
<p>The cost of cyberattacks is high. Financial institutions suffering from cyber-attacks have to deal with the interruption of business operations, loss of data and/or funds, in addition to potential fines and damage claims that are likely to follow. Along with its negative economic aspects, cyberattacks are particularly harmful to the organizational DNA, while the recovery process can become destructive for the reputation. Cybersecurity failures harm more than IT and compliance; the aftermath is often closely connected to strategy, branding, and market position.</p>
<h2><big>Battle-Plan Against <em>Cyberinsurgency</em></big></h2>
<p>Cybercriminals remove the trust in banking, and financial institutions are expected to put their best foot forward to avoid and combat cybercrimes. Preaching is easy, but how can financial institutions better identify red flags? We compiled some strategic initiatives that could aid financial institutions better prepare and prevent:</p>
<ul>
<li>All in all, financial institutions have an obligation to avoid cyberattacks. Nevertheless, installing a sophisticated software wouldn&#8217;t just remove the accountability. Anticipation precedes prevention; for long term success, financial institutions should first identify their vulnerabilities. Only after testing and learning the process weaknesses, they will be able to foresee the potential attacks. After all, cybercriminals exploit and punish systemic weaknesses, and financial institutions&#8217; should make discovering these weaknesses before external attackers a priority.</li>
<li>Financial institutions should also invest time in &#8220;customer definition.&#8221; Most financial institutions collect much data but are not aware of how to best use it. Knowing bank customers beyond personal data and understanding customers&#8217; banking behavior will help banks differentiate fraudsters better, preventing avoidable costs and staying on top of their game. This will minimize unnecessary card and account blockings due to suspicious activity, which can become frustrating to the customer in case of wrong alerts.</li>
<li>The financial service user communication custom is to send customers transaction data, monthly statements, and feature update e-mails/notifications. The service providers that go above and beyond the tradition and make an effort in educating its users might make headway with fraud prevention. Financial institutions that consider investing in educative customer onboarding and teach customers about the types of possible fraud (fake apps, fake warning messages, and alerts, etc.) and how not to fall victim, the use of secure networks, how to generate unique passwords and how to select legitimate e-commerce providers can make a head start, eliminating many payment and card fraud costs.</li>
<li>Remote working and understaffed office hours during COVID 19 have made financial institutions more vulnerable than usual since more and more employees started accessing sensitive data through unsecured networks. This points out the need for remote access, secure databases and the back-ups. The post-COVID new work era should be seen as an open call for all financial service providers to build a secure and reliable infrastructure for working remotely. Investing in a home-office infrastructure will ensure continuity during future force majeure cases, while back-up databases will cover worst-case scenarios and prevent data loss.</li>
<li>No matter how sophisticated a cybersecurity mechanism is, cybercriminals will always level up and adopt. In general, fraudsters bring all their resources and modern techniques on board, including advanced machine learning and artificial intelligence, to attack with sophistication on a huge scale (Ekaterina Safonova, The PayTech Book, Wiley). They are dynamic, and so should the financial institutions be. Financial service providers should not leave it at periodical tests to check cyber resilience off the list; there should be continuous examinations and analyses, adapting the prevention mechanisms to the latest tech developments.</li>
<li>Cybersecurity expert Ekaterina Safonova highlights the importance of getting into the minds of cybercriminals and fraudsters in the PayTech Book (Wiley, 2020) &#8220;KYC is important for building loyal, long-term relationships with customers, how about KYF (Know Your Fraudster)?&#8221; Only by analyzing and cracking cybercriminals behavioral patterns, sustainable fraud prevention could be built.</li>
<li>Last but not least, cyberattack resilience will be better avoided by communication and collaboration within and across industries. Financial institutions that suffered from cyber-attacks should prepare for sharing the incident data and statistics with other players, which could be crucial for building a collective intelligence in the long run. Besides, the major cyber-attack or data breaches that target widely used social media or retail platforms should be considered as an immediate red flag for financial institutions. FIs should take the time to warn their customers and remind them how to stay securely connected since most cyber criminals use the compromised customer data to reach FI credentials and access. Being aware of data breaches that might affect their customers and sharing guidelines with their users will allow financial institutions to be one step ahead (prevention versus rectification).</li>
</ul>
<h2><big>Cybersecurity: Luxembourg&#8217;s Position</big></h2>
<p>Luxembourg aims to position itself as a leading European location for cybersecurity start-ups, talent, investors, and experts looking for growth opportunities. The ecosystem hosts many up and coming start-ups such as Hacknowledge, Fineksus, Jemmic, Uniken. One of the initiatives created in collaboration with public and private bodies aiming to connect all relevant parties is the PwC cybersecurity Day, which offers a unique opportunity to gain insights from the latest international trends in cybersecurity and privacy.</p>
<p><strong>Applications close on the <u>30th of June</u> for the next edition of the PwC Cybersecurity Day, which is planned to be held on the 29th of October remotely. Click <a href="https://www.pwc.lu/en/advisory/digital-tech-impact/cyber-security/cybersecurityday.html" target="_blank" rel="external noopener noreferrer">here</a> for more information.</strong></p>
<p>&nbsp;</p>
<p><em><strong>Author:</strong> <a href="https://twitter.com/sebnemelifk" target="_blank" rel="external noopener noreferrer">Sebnem Elif Kocaoglu Ulbrich</a>, Fintech Consultant &amp; Author</em><big></big></p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://lhoft.com/lhoftv1/cybersecurity/covid-19-exploiting-finserv-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
