Banking Frontiers

Open Banking Roundtable

-

Banking Frontiers, in associatio­n with Fortinet, organized a web panel discussion by BFSI CISOs on the growing thrust on trust through security. Edited excerpts:

Sunder Krishnan, CRO, Reliance Nippon Life Insurance:

The ongoing pandemic and WF WFH had led to rise in th threat and risk factors, as WFH involves use of several devices for doing organizati­onal w work. How do we know th that data has got leaked? Afte After a customer logs in with a big proposal to a bank, insurance or mutual fund company, he may receive many calls from competitor­s, implying that customer data is getting leaked. We have experience­d this kind of business environmen­t. These days, customers are alert and they want topmost security and privacy and business teams are giving importance to that informatio­n security.

Data is oil and wealth and data is up for grabs. Therefore, it needs to be protected. Everybody knows that the customer is the primary data owner. Then the business head becomes the owner of the data in the organizati­on. The organizati­on naturally does not want data leakage as it leads to among other risks reputation­al risk. When data leaks get media exposure, there are repercussi­ons for the company, including in the stock markets.

In the Indian subcontine­nt, behaviour tracking has become important, especially after the pandemic. For example, while doing trading, there is a requiremen­t to track the conversati­ons of the dealers, and we need to ensure that they do not carry their mobile phones. The dealer must sign the legal undertakin­g that there is nobody around him and no device is around him.

From the data leakage perspectiv­e, we must capture customers’ behaviour, login, and logout. If there is any unusual pattern, then we get alerts. The new GRC software alerts us if somebody leaks the data. We also get alerts if somebody downloads important documents that contain data processes and manual documents. There are apps to monitor behavior. However, fraudsters have become smarter, they have started using artificial intelligen­ce and machine learning.

Dr N Rajendran, CEO, IFTAS:

Financial transactio­ns are very crucial and h hence people are n not a l l o wed to carry their mobile phones i nto the data center - we u use to follow these gui guidelines before the covid. But, after covid CISOs have opened the boundaries. They have accepted the use of the employees’ personal devices as part of their business requiremen­ts.

People have gone to their home towns just before the start of the lockdown and still they have not been able to resume normal duties at the offices. This has pushed CISOs to do a lot of innovation­s. CISOs have changed their behaviours and they have been able to handle this unexpected eventualit­y. At the same time, they are not compromisi­ng with the data. It is important to build trust in the payment system, without which no organizati­on could have been able to survive. The first thing in fraud risk management is to arrive at a score where all the behavior patterns are examined before making the final decision on the transactio­ns. This is done either at the payment system or at the core banking system. Risk management is not only just transactio­n informatio­n, it should also be for the endpoint of customer and merchants. All the behaviour patterns are co-related to their previous transactio­ns and locations and these things need to be checked. There is an automatic decline if limits get crossed and raises an alarm for the banks. Such things are already there in the banking system - the endpoint needs to be co-related with the sec urity operating systems.

Companies depend on the customer database’s for behaviour, failure and transactio­n pattern evaluation­s and making the decisions. The transactio­n goes to the fraud and risk management systems; it also helps to validate whether to decline

or go ahead with the transactio­ns. A lot of patterns will come and you need to integrate them with IoT. The remote working places are becoming more painful for the CISOs to monitor and control, as employees’ videos are not available.

In my organizati­on, we follow processes and it takes time to arrive at decisions, while fraudsters can do things on their own. The organizati­ons need to adopt an integrated approach and involve security devices to analyse and then take the decisions. This helps in closer decisions and removes false possibilit­ies.

Shibu Thomas, CISO, South India Bank:

Customer is t he c ore and critical part of the b banking business a and products and we need to protect and allow him to do transactio­ns safely a and sec urely. The mo most i mportant and critical l job of the CISO is to ensure that there is trust in the system, which banks are required to provide to their customers. We cannot keep on adding the security layers because the customer also gets frustrated as they need to get their job done as fast as possible. Within 3 clicks, customers should be able to reach the page and get their transactio­ns done.

South Indian Bank has introduced its `Mirror +’ app, using which, our customers can l ock ATM, i nternet and mobile, channels. So, unless the customer unlocks it, no one will be able to do the transactio­n.

As much as 88% of the transactio­ns in our bank are digital. We are among the top 10 banks to have digital transactio­ns. Recently, there is a rise in digital transactio­ns and correspond­ingly in the number of online frauds. Fraudsters are using innovative ways to defraud unsuspecti­ng people. We need to provide seamless transactio­ns to our customers and detect their mistakes and prevent frauds. This is the key challenge for us and within the regulatory directions, we must roll out facilities and features. The moment you introduce another option in the payment system, the fraudster starts moving into it. It is an irony that we need to keep pace with the fraudsters and their technologi­cal prowess.

We are already using behaviour analytics tools for analyzing user and network behaviour. We are working on in-depth analysis of user behaviour. For example, a user uses a keyboard in a particular way and if somebody else is using the same keyboard in the same way and trying to access the system, then behaviour metrics can alert it.

We can analyze the user behaviour and network to a certain extent and then it needs to coordinate with our central operating system. There are coordinati­on engines, which try to cooperate with the fraud risk management engines. We e look at the transactio­ns along with the behaviour transactio­ns and putting all these together we have a good behaviour system in place. There are new applicatio­ns and technologi­es getting developed and innovation­s happening but we need to go deeper.

Artificial intelligen­ce and machine learning could provide in-depth analysis. If somebody is standing outside an ATM and trying to pull money from others’ bank account by using their debit cards, then the reaction time should be in seconds. We need a machine learning and automated system to react fast and hopefully protect the customer from this fraudulent behavior.

K Suryanaray­anan, CISO, Central Bank of India:

Trust is the common thing thin for any business and a now the concept of zero trust has evolved. We are doing it for a long l time along wit w h multi- f a c t or authentica­tion auth for the security of our product. The most important thing is the customer trust in the bank. If the customer does not have trust in the bank, then it is difficult for the bank to survive. We are taking all the security measures to ensure that customers’ money is safe with the bank. Since there is no boundary for digital transactio­ns, it is imperative that banks should control this access facility in a very secure manner. Recently, RBI has come up with guidelines for use of debit and credit cards in domestic transactio­ns.

Alain Sanchez, EMEA CISO, Senior Evangelist at Fortinet:

As CISOs, we are exp expected to deliver an i impression of trust to our customers. Otherwise, how will they trust us? When y you are giving money to the bank, you expect that this money is safe. On the other end, we need to challenge everything - applicatio­ns vendor, data canters, etc. Companies need artificial intelligen­ce as it helps the human brain to handle extreme burden. It is a complex task to check millions of transactio­ns in a few seconds.

We cannot say that one technology is a panacea, so behaviour analytics needs to work in parallel with authentica­tion passwords. There is also need for proper segmentati­on policy, and use of VPNs in an ecosystem. It is a holistic approach via cybersecur­ity. We are moving forward with these solutions. Even machine learning takes time to learn - it can take 4-8 weeks of learning, so ML is not an overnight process. You need to devote a couple of months for it. For example, we use cameras, sensors, industrial processes and these are also subjected to ML algorithms, but sometimes they talk in a different language. There can be gaps in the proprietar­y languages so that we need to configure and activate them.

Adoption of integrated platforms is also one of the big trends in the coming future. We always need progress and innovation to go faster in the ideal world. Artificial intelligen­ce is not a detriment to humans. In fact, AI is helping to remove some stress in taking decisions. These are other reliable trends adjusting to the cybersecur­ity trends. It is collaborat­ive thing where everyone must act. A human being takes decisions and makes strategies and AI helps in it, so correlatio­ns are required.

 ??  ??
 ??  ??
 ??  ??
 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from India