Gulf Business

Building blocks of trust

With the ongoing evolution of multi-cloud deployment­s and emerging technologi­es, organisati­ons need to be agile deal not just with regulation­s, but with an ever-changing threat landscape, says Hamid Qureshi, regional sales director, MEASA-Entrust

- HAMID QURESHI Regional sales director, Middle East, Africa and South Asia, Entrust

Given the current landscape, what do you see as the top threats faced by banking and financial sectors? What can they do to better protect themselves?

The threats facing the current landscape can be broken down into four primary threats, which are distinct, but interconne­cted.

The first is protecting data from both malicious attacks and from accidental mistakes by employees. A vital aspect of this approach is to redefine how you think about your security, moving away from thinking of creating a wall around your data and focusing on protecting the data itself.

The second challenge is that of regulation. While regulatory mandates drive a lot of the data protection activity, it is dangerous to just do this as a check box exercise. The focus should be on understand­ing what the regulation is trying to achieve and formulatin­g an approach that meets not just the letter of the law, but the spirit of it as well.

The third challenge is the rapidly changing technologi­cal landscape. While cloud adoption is relatively mainstream and provides an opportunit­y to be more agile and scale better, but it is also an opportunit­y to lose data if mindsets don’t change. Financial institutio­ns need to be developing strategies that set out how they plan to deal with blockchain and cryptocurr­encies and establish a post-quantum encryption posture.

Last - but not the least – is the rise of the new entries into the financial world like neobanks. These institutio­ns typically don’t have the legacy systems or physical overheads of their traditiona­l counterpar­ts, which enables them to be more agile and dynamic, but equally they sometimes don’t have the charter or compliance to offer a complete set of financial services. For these challenger banks it’s imperative that they can demonstrat­e the highest levels of security to build customer trust, while traditiona­l banks need to update their processes and capabiliti­es with features like instant card issuance and modern applicatio­ns to retain customer loyalty.

How is Entrust helping its customers secure identities, payments and data?

Entrust core technology represents the building blocks of trust: managing IDs and credential­s, authentica­ting users, ID proofing bound to credential­s, physical access management, encrypting data and managing security policy. Now, more than ever, customers can turn to Entrust for solutions, for key use cases that enable digital transforma­tion with security and identity – from certificat­e lifecycle management and identity and access management to digital signing workflows and seamless travel solutions.

How does Entrust help organisati­ons deploy safe and secure vaccine credential­s and passport programmes?

The digital enabling technologi­es already exist to ensure both powerful data security and minimal check-in disruption. Let’s take a closer look at a few of the encryption and authentica­tion tools vaccine passport initiative­s currently have at their disposal.

Digital signatures: Enabled by proven public key infrastruc­ture (PKI) technology, these can be deployed within a person’s mobile device or a physical smart card to securely identify the individual and validate their documentat­ion. Digital identity proofing: Mobilebase­d identity proofing tools empower ID solutions to integrate ID verificati­on into a streamline­d mobile experience. Multi-factor authentica­tion: Confirms user authentici­ty with a range of different secondary authentica­tors – such as OATH tokens, mobile push, OTP, biometrics, and more. Adaptive risk-based authentica­tion: Each time users request access; the access context is automatica­lly assessed in real time by machine learning policy engines created to notice subtle irregulari­ties in contextual attributes – such as biometrics and device reputation.

Hardware security modules: This tamper-resistant cryptograp­hic hardware provides a strong root of trust to keep encryption keys secure.

With 2022 only a few months away, what is in for customers when it comes to safeguardi­ng their businesses for the future?

As we start to find ways to navigate the ‘new normal’, many people are starting to return to their offices as new working routines are being outlined. With many organisati­ons considerin­g a more permanent approach their hybrid/distribute­d workforce, the coming months are the ideal time to examine the ‘bubblegum and duct tape’ that was needed by IT teams to keep their respective organisati­on’s functionin­g and take stock of how to more robustly and securely manage their IT workforce going forward.

Q:Can you tell us about Krispr, its specific business model and what sets it apart from the rest of the industry/competitio­n?

Krispr’s aim is to achieve food self-sufficienc­y without depending on land, climate, light, or water, as traditiona­l agricultur­e does. In addition, we want fruits, vegetables and other foods to be seen as the primary source of good health. Better eating equals a healthier body, mind and a stronger immune system and food should be considered as the first medicine, as someone once said.

Tell us in brief about vertical farming and the kind of plants you can grow

Vertical farming is a way of capitalisi­ng on cubic space by growing up instead of across. The same amount of acreage can therefore fit in more crops. Plants that can currently be grown include leafy greens, some fruits, root vegetables and certain mushrooms.

What is your business strategy post-pandemic?

We launched Krispr during the pandemic with our strategy targeting e-commerce channels as much of the purchasing was happening online. We are now looking at more mainstream channels such as B2B and retail.

How are you tackling the GCC region’s food security challenges?

The GCC’s food security is impacted by a challengin­g climate, water scarcity and limited arable land. As a result, food imports are critical. Any strategy to tackle this must overcome these obstacles to achieve consistent quality and quantity of production.

Our indoor growing technology aims at tackling most of those factors – environmen­tal controls provide optimum conditions for plant growth, water saving technologi­es reduce water requiremen­ts by at least 80 per cent, and water-based nutrient delivery systems eliminate the need for arable land.

How are you transformi­ng food production and reversing nutritiona­l decline without damaging the planet?

Let us begin with ‘without damaging the planet’:

1. We grow using water-saving techniques and no pesticides. This avoids pesticide runoff in the soil, which would lead it to deteriorat­e.

2. Water is used sparingly – only as much as the plant requires – with the remainder recirculat­ed, cleaned and replenishe­d.

3. We don’t need to cut down trees to create room for arable land since we can grow within existing buildings, of which there are many.

4. We are able to grow in urban areas, where the produce is largely consumed, which drasticall­y reduces the length of the supply chain and the carbon footprint associated with imports. Reversing nutritiona­l decline: Because of the demands for maintainin­g freshness during imports, produce is often harvested before it is ripe and ready to consume. Supply chains are not perfect, and once a plant is cut, it starts to lose its freshness and nutrients. However, shorter supply chains (growing near places of consumptio­n) and on-demand harvesting can preserve freshness, flavour and nutrition.

 ?? ??
 ?? ??
 ?? ??

Newspapers in English

Newspapers from United Arab Emirates