This document summarizes a webinar on cybersecurity challenges for the fintech industry during the coronavirus pandemic. The webinar will feature a presentation by Professor Georges Ataya on how fintech companies can be reliable partners for the financial sector during this crisis. Topics will include case studies, methods for improving cybersecurity, and skills lacking in the industry. There will also be discussions of European regulations, certification for small and medium enterprises, and assessing cybersecurity competencies. The goal is to provide guidance on cybersecurity best practices for fintech companies.
This presentation was delivered by Graeme Parker at the PECB Insights Conference in Montreal in June 2017. The presentation focuses on the concepts of Smart Cities and introduces the key elements to be considered in order to ensure suitable security and privacy for the city and its citizens.
Presentation by Creative Barcode for a Hidden Art Creative Hub event, on intellectual property, copyrighting, and how creative people can protect their work.
This presentation was delivered by Graeme Parker at the PECB Insights Conference in Montreal in June 2017. The presentation focuses on the concepts of Smart Cities and introduces the key elements to be considered in order to ensure suitable security and privacy for the city and its citizens.
Presentation by Creative Barcode for a Hidden Art Creative Hub event, on intellectual property, copyrighting, and how creative people can protect their work.
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)Andris Soroka
Some basics why technology point of view is best when dealing with emerging threats of cyber world and digital economy. Data Security Solutions (DSS.LV) is IBM QRadar Advanced Level Partner and Silver Level Accredited in Qradar Security Intelligence Solutions.
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
Explore the world of IoT cybersecurity. Expose challenges and discover effective strategies to secure your digital security. Stay secure in the dynamical landscape of cybersecurity in IoT.
The first brochure for SMi Group's 3rd annual Oil & Gas Cyber Security conference & exhibition is here. Don't miss the Early Bird deadline and contact Alia Malick if you want to get involved.
Returning to London for its sixth year next march this event is attracting significant interest. Join us at SMi Group's European Smart Grid Cyber Security 2016 conference & exhibition
DSS.LV @ IBM and ALSO Tech Workshop in Riga, Latvia (May, 2016)Andris Soroka
Some basics why technology point of view is best when dealing with emerging threats of cyber world and digital economy. Data Security Solutions (DSS.LV) is IBM QRadar Advanced Level Partner and Silver Level Accredited in Qradar Security Intelligence Solutions.
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
Explore the world of IoT cybersecurity. Expose challenges and discover effective strategies to secure your digital security. Stay secure in the dynamical landscape of cybersecurity in IoT.
The first brochure for SMi Group's 3rd annual Oil & Gas Cyber Security conference & exhibition is here. Don't miss the Early Bird deadline and contact Alia Malick if you want to get involved.
Returning to London for its sixth year next march this event is attracting significant interest. Join us at SMi Group's European Smart Grid Cyber Security 2016 conference & exhibition
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
Internet Society (ISOC) aims are:
make security an integrated function of connected objects and encourages IoT device and service providers for consumers to adopt the Online Trust Alliance (OTA) security and privacy principles ;
increase the consumer demand for security and privacy in the IoT devices they purchase;
create government policies and regulations that promote better security and privacy features in IoT devices.
Securing the digital economy does not fall on the individual, but instead relies on the ability of leaders to work collectively to forge digital trust.
In the ever-evolving world of web app development services, staying ahead of security threats is more critical than ever. As technology advances, so do the tactics of cybercriminals.
Cybersecurity stands as the bedrock of our digital world, safeguarding systems, networks, and data from a rising tide of cyber threats. In the era of the Internet of Things (IoT), wherean ever-expanding array of devices and objects are seamlessly interconnected, the importance of cybersecurity has escalated to unprecedented levels.
what is the future of Pi Network currency.DOT TECH
The future of the Pi cryptocurrency is uncertain, and its success will depend on several factors. Pi is a relatively new cryptocurrency that aims to be user-friendly and accessible to a wide audience. Here are a few key considerations for its future:
Message: @Pi_vendor_247 on telegram if u want to sell PI COINS.
1. Mainnet Launch: As of my last knowledge update in January 2022, Pi was still in the testnet phase. Its success will depend on a successful transition to a mainnet, where actual transactions can take place.
2. User Adoption: Pi's success will be closely tied to user adoption. The more users who join the network and actively participate, the stronger the ecosystem can become.
3. Utility and Use Cases: For a cryptocurrency to thrive, it must offer utility and practical use cases. The Pi team has talked about various applications, including peer-to-peer transactions, smart contracts, and more. The development and implementation of these features will be essential.
4. Regulatory Environment: The regulatory environment for cryptocurrencies is evolving globally. How Pi navigates and complies with regulations in various jurisdictions will significantly impact its future.
5. Technology Development: The Pi network must continue to develop and improve its technology, security, and scalability to compete with established cryptocurrencies.
6. Community Engagement: The Pi community plays a critical role in its future. Engaged users can help build trust and grow the network.
7. Monetization and Sustainability: The Pi team's monetization strategy, such as fees, partnerships, or other revenue sources, will affect its long-term sustainability.
It's essential to approach Pi or any new cryptocurrency with caution and conduct due diligence. Cryptocurrency investments involve risks, and potential rewards can be uncertain. The success and future of Pi will depend on the collective efforts of its team, community, and the broader cryptocurrency market dynamics. It's advisable to stay updated on Pi's development and follow any updates from the official Pi Network website or announcements from the team.
how to sell pi coins in all Africa Countries.DOT TECH
Yes. You can sell your pi network for other cryptocurrencies like Bitcoin, usdt , Ethereum and other currencies And this is done easily with the help from a pi merchant.
What is a pi merchant ?
Since pi is not launched yet in any exchange. The only way you can sell right now is through merchants.
A verified Pi merchant is someone who buys pi network coins from miners and resell them to investors looking forward to hold massive quantities of pi coins before mainnet launch in 2026.
I will leave the telegram contact of my personal pi merchant to trade with.
@Pi_vendor_247
when will pi network coin be available on crypto exchange.DOT TECH
There is no set date for when Pi coins will enter the market.
However, the developers are working hard to get them released as soon as possible.
Once they are available, users will be able to exchange other cryptocurrencies for Pi coins on designated exchanges.
But for now the only way to sell your pi coins is through verified pi vendor.
Here is the telegram contact of my personal pi vendor
@Pi_vendor_247
Financial Assets: Debit vs Equity Securities.pptxWrito-Finance
financial assets represent claim for future benefit or cash. Financial assets are formed by establishing contracts between participants. These financial assets are used for collection of huge amounts of money for business purposes.
Two major Types: Debt Securities and Equity Securities.
Debt Securities are Also known as fixed-income securities or instruments. The type of assets is formed by establishing contracts between investor and issuer of the asset.
• The first type of Debit securities is BONDS. Bonds are issued by corporations and government (both local and national government).
• The second important type of Debit security is NOTES. Apart from similarities associated with notes and bonds, notes have shorter term maturity.
• The 3rd important type of Debit security is TRESURY BILLS. These securities have short-term ranging from three months, six months, and one year. Issuer of such securities are governments.
• Above discussed debit securities are mostly issued by governments and corporations. CERTIFICATE OF DEPOSITS CDs are issued by Banks and Financial Institutions. Risk factor associated with CDs gets reduced when issued by reputable institutions or Banks.
Following are the risk attached with debt securities: Credit risk, interest rate risk and currency risk
There are no fixed maturity dates in such securities, and asset’s value is determined by company’s performance. There are two major types of equity securities: common stock and preferred stock.
Common Stock: These are simple equity securities and bear no complexities which the preferred stock bears. Holders of such securities or instrument have the voting rights when it comes to select the company’s board of director or the business decisions to be made.
Preferred Stock: Preferred stocks are sometime referred to as hybrid securities, because it contains elements of both debit security and equity security. Preferred stock confers ownership rights to security holder that is why it is equity instrument
<a href="https://www.writofinance.com/equity-securities-features-types-risk/" >Equity securities </a> as a whole is used for capital funding for companies. Companies have multiple expenses to cover. Potential growth of company is required in competitive market. So, these securities are used for capital generation, and then uses it for company’s growth.
Concluding remarks
Both are employed in business. Businesses are often established through debit securities, then what is the need for equity securities. Companies have to cover multiple expenses and expansion of business. They can also use equity instruments for repayment of debits. So, there are multiple uses for securities. As an investor, you need tools for analysis. Investment decisions are made by carefully analyzing the market. For better analysis of the stock market, investors often employ financial analysis of companies.
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...Quotidiano Piemontese
Turin Startup Ecosystem 2024
Una ricerca de il Club degli Investitori, in collaborazione con ToTeM Torino Tech Map e con il supporto della ESCP Business School e di Growth Capital
What price will pi network be listed on exchangesDOT TECH
The rate at which pi will be listed is practically unknown. But due to speculations surrounding it the predicted rate is tends to be from 30$ — 50$.
So if you are interested in selling your pi network coins at a high rate tho. Or you can't wait till the mainnet launch in 2026. You can easily trade your pi coins with a merchant.
A merchant is someone who buys pi coins from miners and resell them to Investors looking forward to hold massive quantities till mainnet launch.
I will leave the telegram contact of my personal pi vendor to trade with.
@Pi_vendor_247
Exploring Abhay Bhutada’s Views After Poonawalla Fincorp’s Collaboration With...beulahfernandes8
The financial landscape in India has witnessed a significant development with the recent collaboration between Poonawalla Fincorp and IndusInd Bank.
The launch of the co-branded credit card, the IndusInd Bank Poonawalla Fincorp eLITE RuPay Platinum Credit Card, marks a major milestone for both entities.
This strategic move aims to redefine and elevate the banking experience for customers.
If you are looking for a pi coin investor. Then look no further because I have the right one he is a pi vendor (he buy and resell to whales in China). I met him on a crypto conference and ever since I and my friends have sold more than 10k pi coins to him And he bought all and still want more. I will drop his telegram handle below just send him a message.
@Pi_vendor_247
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
USDA Loans in California: A Comprehensive Overview.pptxmarketing367770
USDA Loans in California: A Comprehensive Overview
If you're dreaming of owning a home in California's rural or suburban areas, a USDA loan might be the perfect solution. The U.S. Department of Agriculture (USDA) offers these loans to help low-to-moderate-income individuals and families achieve homeownership.
Key Features of USDA Loans:
Zero Down Payment: USDA loans require no down payment, making homeownership more accessible.
Competitive Interest Rates: These loans often come with lower interest rates compared to conventional loans.
Flexible Credit Requirements: USDA loans have more lenient credit score requirements, helping those with less-than-perfect credit.
Guaranteed Loan Program: The USDA guarantees a portion of the loan, reducing risk for lenders and expanding borrowing options.
Eligibility Criteria:
Location: The property must be located in a USDA-designated rural or suburban area. Many areas in California qualify.
Income Limits: Applicants must meet income guidelines, which vary by region and household size.
Primary Residence: The home must be used as the borrower's primary residence.
Application Process:
Find a USDA-Approved Lender: Not all lenders offer USDA loans, so it's essential to choose one approved by the USDA.
Pre-Qualification: Determine your eligibility and the amount you can borrow.
Property Search: Look for properties in eligible rural or suburban areas.
Loan Application: Submit your application, including financial and personal information.
Processing and Approval: The lender and USDA will review your application. If approved, you can proceed to closing.
USDA loans are an excellent option for those looking to buy a home in California's rural and suburban areas. With no down payment and flexible requirements, these loans make homeownership more attainable for many families. Explore your eligibility today and take the first step toward owning your dream home.
BYD SWOT Analysis and In-Depth Insights 2024.pptxmikemetalprod
Indepth analysis of the BYD 2024
BYD (Build Your Dreams) is a Chinese automaker and battery manufacturer that has snowballed over the past two decades to become a significant player in electric vehicles and global clean energy technology.
This SWOT analysis examines BYD's strengths, weaknesses, opportunities, and threats as it competes in the fast-changing automotive and energy storage industries.
Founded in 1995 and headquartered in Shenzhen, BYD started as a battery company before expanding into automobiles in the early 2000s.
Initially manufacturing gasoline-powered vehicles, BYD focused on plug-in hybrid and fully electric vehicles, leveraging its expertise in battery technology.
Today, BYD is the world’s largest electric vehicle manufacturer, delivering over 1.2 million electric cars globally. The company also produces electric buses, trucks, forklifts, and rail transit.
On the energy side, BYD is a major supplier of rechargeable batteries for cell phones, laptops, electric vehicles, and energy storage systems.
Introduction to Indian Financial System ()Avanish Goel
The financial system of a country is an important tool for economic development of the country, as it helps in creation of wealth by linking savings with investments.
It facilitates the flow of funds form the households (savers) to business firms (investors) to aid in wealth creation and development of both the parties
Poonawalla Fincorp and IndusInd Bank Introduce New Co-Branded Credit Cardnickysharmasucks
The unveiling of the IndusInd Bank Poonawalla Fincorp eLITE RuPay Platinum Credit Card marks a notable milestone in the Indian financial landscape, showcasing a successful partnership between two leading institutions, Poonawalla Fincorp and IndusInd Bank. This co-branded credit card not only offers users a plethora of benefits but also reflects a commitment to innovation and adaptation. With a focus on providing value-driven and customer-centric solutions, this launch represents more than just a new product—it signifies a step towards redefining the banking experience for millions. Promising convenience, rewards, and a touch of luxury in everyday financial transactions, this collaboration aims to cater to the evolving needs of customers and set new standards in the industry.
2. Programme
Introduction by Toon Vanagt
Fintech industry: A reliable partner
for the financial sector by Professor
Georges Ataya
o Case studies
o What methods should be put in place?
o The skills that are lacking
o Certifications
3. Your Speakers
Georges Ataya
Academic Director at Solvay Brussels School
Managing partner Ataya & partner
Co-Founder of the Belgian Cybersecurity Coalition
Co-founder DPO Circle
Member of the Advisory Boards at Agoria, BECI, CIONET,
ISACA
Past International Vice President at ISACA and co-
founder of the body of knowledge of CISM and CGEIT
Toon Vanagt
Host, Board of FinTech Belgium
CEO of data.be
4. Cybersecurity context
Fintech concerns for Cybersecurity
European regulations and guidelines
Certification for SME
Cybersecurity skills assessment
Competences and knowledge
Professional certification
Cybersecurity
for FINTECH
Prof. Georges Ataya
5.
6. Urgent Cyber Security Issues
1. Financial Crimes
2.The Rise of Multi-Cloud Computing
3. Third-Party and Supply Chain Attacks
4. Shortage of Cybersecurity Professionals
5. More Sophisticated Phishing Exploits
6. Cyber Attacks on the Grid
7. Personal Attacks
8. State-Sponsored Attacks
9. IoT and Autonomous Systems
10. Smart Health Devices and EMR
“Cyber crime is big
business, with the most
elite hackers earning a cool
half a million dollars a
year just to test system
security; the bad guys are
raking in billions”.
Source: www.csoonline.com
The 14 biggest data breaches of the 21st
century
Adobe
Date: October 2013
Impact: 153 million user records
Adult Friend Finder
Date: October 2016
Impact: 412.2 million accounts
Canva
Date: May 2019
Impact: 137 million user accounts
eBay
Date: May 2014
Impact: 145 million users
Equifax
Date: July 29, 2017
Impact: 147.9 million consumers
LinkedIn
Date: 2012 (and 2016)
Impact: 165 million user accounts
Marriott International
Date: 2014-18
Impact: 500 million customers
Yahoo
Date: 2013-14
Impact: 3 billion user accounts
7. Sources of external threat
Intelligence
Agencies
Criminal
Groups
Terrorist
Groups
Activist
Groups
Armed
Forces
7
8. The fact that there’re many cases in which large
traditional banks have failed to protect the data of
their customers do not imply that Fintech is better
than other financial institutions
Source: FSBT.TECH (Open API Platform)
A report by PWC indicates that it is easy for the new
banks to focus on securing the activities of their
clients on their systems than for large conventional
banks.
11. setting the security and notification
requirements for digital service providers and
build national capabilities
help to manage digital identities by providing
online trust and allows citizens and business to
use national eID and trust services across borders
gives control to individuals over their personal
data and to simplify the regulatory
environment for international business
eIDAS
framework for European Cybersecurity
Certificates for products, processes and
services that will be valid throughout the EU
12.
13. Cyber Security Coalition & CCB Elements of the scheme
Page 13
Cybersecurity Fundamentals for SME
Plan your cyber security
• Understand the enterprise context
• Management commitment
• Training, communication and awareness
• Custom made or internally developed software and hardware
• Incident management basics
Manage risks for your most important assets
• Inventory of IT devices
• Risk management (Predefined)
• Information classification and handling (minimum mores)
• Backups and Restore
Cybersecurity Technical measures
• Firewalls
• Secured configuration
• User access controls
• Malware
• Patch management
• Email Security
https://cyberguide.ccb.belgium.be/en
14. Cyber Security Coalition & CCB Elements of the scheme
Page 14
Cybersecurity Fundamentals for SME
https://cyberguide.ccb.belgium.be/en
Project 1 Project 2 Project 3 Project 4 Project 5
Self-assessment
questionnaire &
tool
Promotion &
Communication
Advice
Development
Labelling
Currently on hold
Registry of
specialists &
solution providers
16. Cybersecurity
Awareness
Corporate and general Management
Application Development
Business managers and Users
IT Professionals
Information Security Professionals
Awareness Classes
Incident Management
Guide
16
24. 24
A MANAGER FOR CYBER SECURITY
PROTECTION and INCIDENT MANAGEMENT
Information Security Governance
Information Security Incident
Management
Information Security Program
Development & Management
Information Risk Management
& Compliance
27. DREAM. LEARN. LEAD.
• THANKS
Full online Education
Starting in April 2020
S2 (CISSP preparation)
G2 (COBIT 2019)
B2 (Data Management)
M2 (Application development)
April and
May 2020
30. Georges Ataya
Professor, founder and Academic Director of Digital and information
security management at SBS-EM
Co-Fouder of the Belgian Cybersecurity Coalition
Co-founder DPO Circle
Member of the Advisory Board: Agoria, BECI, CIONET, ISACA, belgian
Cybersecurity Coalition
Managing Director ICT Control advisory firm
Founded IT Management Academy
Past International Vice President at ISACA
Past Partner Ernst & Young
Past Deputy International CIO ITT World Directories
Previously Project Manager and Senior IT Auditor
Linkedin: ataya
Academy.atayapartners.com/fintech-sessions
31.
32. • NEXT FRIDAY AT 14PM:
Webinar: Financial crisis survival / Coronavirus
Homeworking Challenge
• NEXT THURSDAY APRIL 23rd:
Digital Classroom: How to become and stay
licensed in Belgium?, April 23rd from 2pm to
6pm, in collaboration with Febelfin Academy
Editor's Notes
When watching the trends and the extent of attacks, we understand the need for securiting the logic of our processes, the essence of how we do business.
The motives behind most APTs are as old as civilization itself: espionage, sabotage, crime, terrorism, warfare, protest and vandalism.
Such threats are familiar to everybody, although their physical manifestations are generally beyond the everyday work experiences of most citizens and company staff.
The average person rarely encounters spies, criminals or hackers when going about his/her business, but networks are bringing such threats much closer to home.
Abundant Regulations seek to bring organisation to new level of basic security
It is not a secret that the complexity of our business processes, the multitude of diverse technologies and the absence of homogeneity of our architecture constitute major vulnerabilities
On the other hand, the expansion of cyber criminal activities, the demanding requirements of various regulations and the demand for improved services increase on their turn the need for more effort required to deliver up to expectations.
Roundel in Fort de Salses (southern France), 15th century, drawing byViollet-le-Duc
Today, cybersecurity now needs to be addressed in a more holistic manner. Building higher defensive walls and installing defense-in-depth solutions are no longer sufficient to prevent criminal intrusions and compromise.
Today, many organisations still put all their faith in annual intrusion tests run with external consultants, with little regards to the complexity of the enterprise system.
Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.
Protect – Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services.
Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.
Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event.
Recover – Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.
Identify – Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.
Protect – Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services.
Detect – Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.
Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event.
Recover – Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.
The CISO function evolves as new management methods and threats landscape require different skills and capabilities.