SlideShare a Scribd company logo
1 of 7
Download to read offline
November 2023
Rethink Mobile App
Security with Build38
Combining Best-in-Class
Mobile App Self-Protection and
Threat Intelligence
Navigating the speed of change
Embedded Finance
Banking-as-a-Service
Buy Now Pay Later
Digital Only Banking
Peer-To-Peer Lending
Smart Contract
Digital Wallets
DeFi and Blockchain
Digital Only
Banking
TOP Fintech
Trends
3
Issue: Rising Mobile App Attack Sophistication
80 apps installed
on an individual’s
mobile phone
On average 2 hours
& 51 minutes a day
on mobile apps
63% of apps contain
open-source
components with
known security
vulnerabilities
An average of 39
vulnerabilities x
vulnerable mobile
app
680% increase in
fraud transactions
originating from
mobile apps
70% of online fraud
is accomplished
through mobile
platforms
Cybercrime
damage $10
trillion by 2025*
Security know-how
shortage & continued
cost increase
4
The Mobile App Security Maturity Curve
Level
of
Mobile
In-App
Security
Sophistication
Non-existent /
Unaware
Opportunistic
Mid-Grade
Compliance
Focused
Transformative
Operational
Excellence
"Why would
anyone attack our
mobile app?"
Just a bit of
security is believed
to be enough "We
are safe"
Somewhat
protected "We
have done
everything
possible"
Doing what is
expected
"Regulation
compliance is
great"
Taking risks very
seriously,
employing Threat
Intelligence
technology
"Role model,
low
susceptibility to
risk
Sources: Gartner, Forrester and Build38 client insight
5
6 Steps of Continuous Mobile App Protection
Hardening
Prevention
Detection
Prediction
Govern
CC
Mobile App
Application
Logic
Protection
Library
Response
Understand your risks, know your attack
surface, uncover weak spots.
Continuously harden and personalize
the app
Minimize the attack surface, prevent
incidents.
Recognize incidents and threats, isolate
and contain them.
React to breaches, mitigate the damage,
analyze and learn.
Integrate cybersecurity into overall risk
management strategies
Build38 defends against a wide range of threats
Client Library
Native Code
Protection
CC
Security Enhanced
Functions
Reverse Engineering
Network sniffing, API
manipulation
Environments like
emulators and debugger
Manipulation/theft of resources
and IDs; misuse of apps as bots
Multiple Account Fraud;
Impersonation
Mobile app cloning and app
lifting
Key extraction
Rooting/Jailbreak/ Hooking
Integrity
Side Channel Attack
Replay attack - MITM
Code Manipulation x
x
x
x
x
x
x
x
Erik van der Zee
BuBusiness Development Director
+31620793591
Erik.vanderzee@build38.com
www.build38.com
https://www.linkedin.com/in/erik-van-der-zee-nl/
Contact

More Related Content

Similar to S2_4_2 Build38.pdf eu fintech pitch battle

Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
anuragsinghal1981
 

Similar to S2_4_2 Build38.pdf eu fintech pitch battle (20)

Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...Tech mahindra whitepaper modified mobile app store architecture with pro acti...
Tech mahindra whitepaper modified mobile app store architecture with pro acti...
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
 
2024 Cybersecurity Trends- Stay Ahead Now
2024 Cybersecurity Trends- Stay Ahead Now2024 Cybersecurity Trends- Stay Ahead Now
2024 Cybersecurity Trends- Stay Ahead Now
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech Cybersecurity- Role of FinTech
Cybersecurity- Role of FinTech
 
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdfnavigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
navigating-the-digital-battlefield-emerging-challenges-in-cyber-security.pdf
 
Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享Y20151003 IoT 資訊安全_趨勢科技分享
Y20151003 IoT 資訊安全_趨勢科技分享
 
Report on Mobile security
Report  on Mobile securityReport  on Mobile security
Report on Mobile security
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile SecurityWEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
WEBINAR - August 9, 2016: New Legal Requirements for Mobile Security
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
Stay Ahead of Threats The Importance of Cyber Security Services.pdf
Stay Ahead of Threats The Importance of Cyber Security Services.pdfStay Ahead of Threats The Importance of Cyber Security Services.pdf
Stay Ahead of Threats The Importance of Cyber Security Services.pdf
 
7 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 20227 Steps to Boosting Your App Security in 2022
7 Steps to Boosting Your App Security in 2022
 

More from FinTech Belgium

S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdfS5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
FinTech Belgium
 

More from FinTech Belgium (20)

Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
Pitch Ogloba Feb 2nd 2024 .pptx
Pitch Ogloba Feb 2nd 2024           .pptxPitch Ogloba Feb 2nd 2024           .pptx
Pitch Ogloba Feb 2nd 2024 .pptx
 
20240315 _E-Invoicing Digiteal. .pptx
20240315 _E-Invoicing Digiteal.    .pptx20240315 _E-Invoicing Digiteal.    .pptx
20240315 _E-Invoicing Digiteal. .pptx
 
04_Gambit_Laurent Bodson. .pptx
04_Gambit_Laurent Bodson.          .pptx04_Gambit_Laurent Bodson.          .pptx
04_Gambit_Laurent Bodson. .pptx
 
03_Discai_Dagmar Schouterden. .pdf
03_Discai_Dagmar Schouterden.       .pdf03_Discai_Dagmar Schouterden.       .pdf
03_Discai_Dagmar Schouterden. .pdf
 
01_DLA Piper_Nicolas Kalokyris. .pptx
01_DLA Piper_Nicolas Kalokyris.    .pptx01_DLA Piper_Nicolas Kalokyris.    .pptx
01_DLA Piper_Nicolas Kalokyris. .pptx
 
00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx00_Main ppt_AI Act & EU AI Regulation.pptx
00_Main ppt_AI Act & EU AI Regulation.pptx
 
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
00_MAIN_ppt Antwerp Acceleration Day.pptx.pdf
 
Fintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdfFintech Belgium_Keynote_30012024[52].pdf
Fintech Belgium_Keynote_30012024[52].pdf
 
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
01_Voorstelling Argenta (Antwerp Acceleration Day).pptx
 
AMS_04 Toon Daenen. .pptx
AMS_04 Toon Daenen.                .pptxAMS_04 Toon Daenen.                .pptx
AMS_04 Toon Daenen. .pptx
 
AMS_03 François De Witte_. .pptx
AMS_03 François De Witte_.         .pptxAMS_03 François De Witte_.         .pptx
AMS_03 François De Witte_. .pptx
 
AMS_01_Rie_.De Sordo Cock pptx
AMS_01_Rie_.De Sordo Cock           pptxAMS_01_Rie_.De Sordo Cock           pptx
AMS_01_Rie_.De Sordo Cock pptx
 
AMS_00 FTBE_0126_2024. .pptx
AMS_00 FTBE_0126_2024.             .pptxAMS_00 FTBE_0126_2024.             .pptx
AMS_00 FTBE_0126_2024. .pptx
 
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdfS5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
S5 _ 3 _ 2 _ Romania (Nic Balaceanu).pdf
 

Recently uploaded

Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
amitlee9823
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
lizamodels9
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 

Recently uploaded (20)

RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 

S2_4_2 Build38.pdf eu fintech pitch battle

  • 1. November 2023 Rethink Mobile App Security with Build38 Combining Best-in-Class Mobile App Self-Protection and Threat Intelligence
  • 2. Navigating the speed of change Embedded Finance Banking-as-a-Service Buy Now Pay Later Digital Only Banking Peer-To-Peer Lending Smart Contract Digital Wallets DeFi and Blockchain Digital Only Banking TOP Fintech Trends
  • 3. 3 Issue: Rising Mobile App Attack Sophistication 80 apps installed on an individual’s mobile phone On average 2 hours & 51 minutes a day on mobile apps 63% of apps contain open-source components with known security vulnerabilities An average of 39 vulnerabilities x vulnerable mobile app 680% increase in fraud transactions originating from mobile apps 70% of online fraud is accomplished through mobile platforms Cybercrime damage $10 trillion by 2025* Security know-how shortage & continued cost increase
  • 4. 4 The Mobile App Security Maturity Curve Level of Mobile In-App Security Sophistication Non-existent / Unaware Opportunistic Mid-Grade Compliance Focused Transformative Operational Excellence "Why would anyone attack our mobile app?" Just a bit of security is believed to be enough "We are safe" Somewhat protected "We have done everything possible" Doing what is expected "Regulation compliance is great" Taking risks very seriously, employing Threat Intelligence technology "Role model, low susceptibility to risk Sources: Gartner, Forrester and Build38 client insight
  • 5. 5 6 Steps of Continuous Mobile App Protection Hardening Prevention Detection Prediction Govern CC Mobile App Application Logic Protection Library Response Understand your risks, know your attack surface, uncover weak spots. Continuously harden and personalize the app Minimize the attack surface, prevent incidents. Recognize incidents and threats, isolate and contain them. React to breaches, mitigate the damage, analyze and learn. Integrate cybersecurity into overall risk management strategies
  • 6. Build38 defends against a wide range of threats Client Library Native Code Protection CC Security Enhanced Functions Reverse Engineering Network sniffing, API manipulation Environments like emulators and debugger Manipulation/theft of resources and IDs; misuse of apps as bots Multiple Account Fraud; Impersonation Mobile app cloning and app lifting Key extraction Rooting/Jailbreak/ Hooking Integrity Side Channel Attack Replay attack - MITM Code Manipulation x x x x x x x x
  • 7. Erik van der Zee BuBusiness Development Director +31620793591 Erik.vanderzee@build38.com www.build38.com https://www.linkedin.com/in/erik-van-der-zee-nl/ Contact