SlideShare a Scribd company logo
Risk Management in
Varlam Ebanoidze
RiskTech 4 FinTech
Image: Agoda
Era
Risk Management in Open Finance Era
Image: ansonmiao
Helicopter view on 'Open Finance' and on associated transition risks &
opportunities.
Capitalizing on 'Risk DataValue Chain' – three use cases.
Tech Enablers
(Smart Data Sharing – key enabler for next ecosystem)
What is different about Risk Management in FinTech?
Image: ansonmiao
Data
A brand new Risk Framework.
Traditional closed perimeter defense model vs. New, open,
third party info sharing & outsourcing ecosystem model;
Openness &
Partnerships
“Open Finance” (cross) - industry data sharing and open-
source endless Opportunities.
How “Openness + Data” looks like together
Image: ansonmiao
Image: ansonmiao
Open Ecosystem challenges in the highly regulated industry
- how to secure data - how to share data not only securely but smartly
Analogy from the tech industry:
-Think about a restaurant reservation application that has Google Maps embedded
into it.
- APIs allow external applications to read data from Google and portray the data on
their own applications.
What we need in case of Open Finance is:
# 1. A ‘new perimeter (s)’. #2 Smart ways to ensure a secure data- sharing.
Image: ansonmiao
Helicopter view on 'Open Banking' and on associated transition risks and
opportunities
WHO
• Banks, Fintechs & other companies involved in personal finance business.
WHAT
• DataAPI and PaymentAPI services via AISP & PISP.
HOW
• B2B business, intermediary between the Banks and ‘all kind of Fintech’
companies.
• Providing anAPI service in highly specialized eco-system market, using by
itself third party infrastructure in the Claud.
• Efficiently, securely and in compliance of existing laws and regulations.
Open Banking’s simplified (PSD2)WHO,WHAT and HOW.
A path from OpenBanking to DataEconomy via OpenFinance
- different Strategies to achieve it in different jurisdictions (market-driven, regulatory-driven, or hybrid)
- Industry development lenses (the ecosystem of partners)
- technical Enablers (APIs connectivity)
1) 'Who is Who' in open banking - mapping of the companies’ business model differentiators in today's Open
Banking.
2) 'Who will be Who' in the next Ecosystem of Open Finance - why Banks Must Become the DataCustodian in
the DataEconomy
- Implementation of the data strategy is a supernational task for the EU. The European Commission has
published a Data Strategy proposal in 2019 https://lnkd.in/dWG9Uqu to allow the EU to take full advantage of
data-driven innovation by managing the cross-sectoral use of data between sectors (in health, manufacturing,
agriculture, mobility, energy, etc).
- So it is for the UK too, where the concept of OpenBanking is a part of the wider SmartData Strategy declared
by the UK's government..
A dilemma between the proper regulation and an efficient grow, at the level of
designing
- an evolution of the Internet
is different of the path made
by traditional media like
Radio, Telephone or
Television.
- security is a Negative goal
Image: ansonmiao
# 1. A ‘new perimeter (s)’ (ZTA) uses zero trust principles to plan infrastructure & workflows.
ZT assumes there is no implicit trust granted to assets or user accounts based solely on
their physical or network location (i.e., local area networks versus the internet).
With the
movement
towards the
Openness
and the
Cloud, to
minimize the
increased
risks of the
connectivity.
> > > ZEROTRUSTARCHITECTURE 4 CONSUMERTRUST
Image: ansonmiao
The key tech enablers for Open Banking are external APIs, But…
https://www.openbanking.org.uk/providers/account-providers/api-performance/
- But, unlike more mature areas of
cybersecurity, when people talk
of API security, they mean lots of
different things..
- Questions Every Executive Should
AskAboutTheir APIs' by NIST:
Asset Managt: How many APIs
do we have? What do the APIs
do? Who are the API owners?
Image: ansonmiao
Is PSD2’s SCA a good fit for Open Finance ?
8 major challenges within
the EU Open Banking
regulation's technical
aspects (SCA); ranging from
“too strict” 2FA till the OS
upgrade discipline by
smartphone holders.
Image: ansonmiao
SCA vs. Smart Data SharingTechnologies
Designed for an Ecosystem
What is Differential Privacy?
https://www.youtube.com/watch?v=-
JRURYTfBXQ
No need for the most of the
data to be shared at all !
Image: ansonmiao
SCA vs. Smart Data SharingTechnologies
Designed for an Ecosystem
What is Differential Privacy?
https://www.youtube.com/watch?v=-
JRURYTfBXQ
No need for the most of the data
to be shared at all !
Differential privacy: where noise is added to an analytical
system so that it is impossible to reverse-engineer the
individual inputs
Federated analysis: where parties share the insights from
their analysis without sharing the data itself
Homomorphic encryption: where data is encrypted before
it is shared, such that it can still be analyzed but not
decoded into the original information
Zero-knowledge proofs: where users can prove their
knowledge of value without revealing the value itself
Secure multiparty computation: where data analysis is
spread across multiple parties such that no individual party
can see the complete set of inputs
Image: ansonmiao
SCA vs. Smart Data SharingTechnologies
PET, Differential Privacy, Double-Blind Consent-Driven Data Sharing on BlockChan
For PSD2 For Ecosystem
Image: ansonmiao
A multiplicative impact of FinTech -TechFin key enablers
Image: ansonmiao
TechFin – FinTech: banks are welcomed to the new business of
Trusted Data Assets Stewards
Use-case: a new employer in a new country would request onboarding info, based on the
given consent, directly from a customer's/new employee's local bank via the secure API and
in compliance with the rules of GDPR.Also, an use case of CDI from HKMA:
https://www.linkedin.com/posts/varlam-ebanoidze-41594043_cdi-hkftw-hkfintechweek-activity-
6729104774077153281--T6Y
Capitalizing on 'Risk DataValue Chain'
Three use cases:
- Digital onboarding
- Transaction monitoring
- From big data to security by design
Image: ansonmiao
Investing in Onboarding automation & Transaction Monitoring via Open Finance by
aggregating different financial and non-financial data.
Image: ansonmiao
Capitalizing on 'Risk DataValue Chain' – Onboarding
Open finance has the
potential to remove
many of the hurdles
new customers face –
like having to fill in
long applications that
require them to dig up
hard-to-
access financial infor
mation or send
notarised copies
of documents with
this information
Image: ansonmiao
Digital Touch vs. Human Touch
Apart from the strategic decisions to invest or underinvest in Digital vs Non-digital process, IMHO, the
bottom line of the operational problem IS the visualization of the holistic process
incl. the call center's part to address the bottlenecks in digital processes by suggesting both the data-
driven algo. (the better prediction power) & process optimization tools.
Image: ansonmiao
Capitalizing on 'Risk DataValue Chain' –Transaction Monitoring
1. single customer view and Single BehavioralView
2. static RulesVs Interactive Models
3. risk data's value-chaining
Image: ansonmiao
Capitalizing on 'Risk DataValue Chain' – Layered approach to the risk model
To achieve an accurate KYC procedure, a Layered approach to the risk model is offered.
It enables on one hand avoiding the Parallelism and saving the computational power of the algorithm (if
identity is easy to check, at 1st layer no need to follow other layers), on the other hand, provides the assurance
that a customer is who they say they are - by checking Several layers from Account to Device & Activity.
Interested to know how the online fraud risk
management at Alibaba Group and with the
help of Alibaba by its merchants was evolved to
allow this? Here is the answer:
https://lnkd.in/dFjBb7X
This paper is to introduce the Fraud Risk
Management at Alibaba under big data. Alibaba
has built a fraud risk monitoring and
management system based on #real-time big
data processing and intelligent #riskmodels. It
captures fraud signals directly from huge
amount data of #userbehaviors and network,
analyzes them in real-time using machine
learning, and accurately predicts the bad users
and transactions. To extend the fraud risk
prevention ability to external customers, Alibaba
also built up a big data based fraud prevention
product called #AntBuckler.
Best practice: "At its peak, 256,000 transactions a second. No report of any breakdown over the 10 years."
Image: ansonmiao
Capitalizing on 'Risk Data Value Chain' – Design thinking in C-I-A Triad - from Big
Data to Security by Design
Image: ansonmiao
Security through behavioral interventions - from the series of the
customer-centric security.
In the practical context, the idea is Open Banking enabled
budgeting app's conceptual analogy for InfoSec.
'Which threats we take seriously and which we neglect is
mostly driven by availability bias — we intuitively assess the
likelihood of outcomes based on how easy they are to imagine.
So we overestimate the danger of terrorism (which is vivid,
concrete, and direct) and underestimate the dangers
of climate change (which is vague, abstract, and indirect). Our
ability to predict rare events is systematically undermined by
our intuitions.'
So, how to visualize the risk (make it more evident) to the
customer and help in risk management decision making?
Impact of the Covid 19
As the pandemic accelerates Digital
transition the boundaries between the
monitoring of external threats (Cyber)
& the assessment of risks inherent to
new infrastructure (Digital) became
more evident for Boards.
Up to 70% of all public clouds and the data on them are concentrated with just 3 cloud service providers. I doubt
that the systemic risk of such concentration and the domino effect for those organizations which store data (or use
IAAS ) with these 3 companies is assessed and backed-up adequately.
Image: ansonmiao
Questions?
RiskTech 4 FinTech
https://www.linkedin.com/in/varlam-ebanoidze-41594043
/
THANKYOU

More Related Content

What's hot

AI INSURANCE SPOTLIGHT
AI INSURANCE SPOTLIGHTAI INSURANCE SPOTLIGHT
AI INSURANCE SPOTLIGHT
AlbanTranchard
 
Insurance 2030: AI Accelerating The Change
Insurance 2030: AI Accelerating The ChangeInsurance 2030: AI Accelerating The Change
Insurance 2030: AI Accelerating The Change
Artivatic.ai
 
Artificial Intelligence (AI) for Financial Services
Artificial Intelligence (AI) for Financial Services Artificial Intelligence (AI) for Financial Services
Artificial Intelligence (AI) for Financial Services
NVIDIA
 
Ai in insurance how to automate insurance claim processing with machine lear...
Ai in insurance  how to automate insurance claim processing with machine lear...Ai in insurance  how to automate insurance claim processing with machine lear...
Ai in insurance how to automate insurance claim processing with machine lear...
Skyl.ai
 
AI in insurance services
AI in insurance servicesAI in insurance services
AI in insurance services
trinhanhtuan247
 
PHBC Platform Technology
PHBC Platform TechnologyPHBC Platform Technology
PHBC Platform Technology
Alex G. Lee, Ph.D. Esq. CLP
 
Blockchain Technology Innovation & Patent Development Strategy Insights from ...
Blockchain Technology Innovation & Patent Development Strategy Insights from ...Blockchain Technology Innovation & Patent Development Strategy Insights from ...
Blockchain Technology Innovation & Patent Development Strategy Insights from ...
Alex G. Lee, Ph.D. Esq. CLP
 
AI in Insurance - InView Primer
AI in Insurance - InView PrimerAI in Insurance - InView Primer
AI in Insurance - InView Primer
The Digital Insurer
 
IoT, new business models and digital agility 102116
IoT, new business models and digital agility 102116IoT, new business models and digital agility 102116
IoT, new business models and digital agility 102116
Economic Strategy Institute
 
AI transforms insurance industry
AI transforms insurance industryAI transforms insurance industry
AI transforms insurance industry
JOS Group
 
Dynamic IoT data, protocol, and middleware interoperability with resource sli...
Dynamic IoT data, protocol, and middleware interoperability with resource sli...Dynamic IoT data, protocol, and middleware interoperability with resource sli...
Dynamic IoT data, protocol, and middleware interoperability with resource sli...
Hong-Linh Truong
 
Top Technology Trends and Related Jobs
Top Technology Trends and Related JobsTop Technology Trends and Related Jobs
Top Technology Trends and Related Jobs
Rock Interview
 
Blockchain + Big Data + AI + IoT Integration
Blockchain + Big Data + AI + IoT IntegrationBlockchain + Big Data + AI + IoT Integration
Blockchain + Big Data + AI + IoT Integration
Alex G. Lee, Ph.D. Esq. CLP
 
Free Ebook in AI, Robotics, Blockchain, IoT, Big data/Data Science, Cybersecu...
Free Ebook in AI, Robotics, Blockchain, IoT, Big data/Data Science, Cybersecu...Free Ebook in AI, Robotics, Blockchain, IoT, Big data/Data Science, Cybersecu...
Free Ebook in AI, Robotics, Blockchain, IoT, Big data/Data Science, Cybersecu...
Alex G. Lee, Ph.D. Esq. CLP
 
AUSIS AI UNDERWRITING PLATFORM TRANSFORMING INSURANCE
AUSIS AI UNDERWRITING PLATFORM TRANSFORMING INSURANCEAUSIS AI UNDERWRITING PLATFORM TRANSFORMING INSURANCE
AUSIS AI UNDERWRITING PLATFORM TRANSFORMING INSURANCE
Artivatic.ai
 
Leveraging IoT & Related Technologies in Real Estate & PropTech
Leveraging IoT & Related Technologies in Real Estate & PropTechLeveraging IoT & Related Technologies in Real Estate & PropTech
Leveraging IoT & Related Technologies in Real Estate & PropTech
Mobinius Technologies
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital world
Andris Soroka
 
Ten trends of IoT in 2020 - InsideAIML
Ten trends of IoT in 2020 - InsideAIMLTen trends of IoT in 2020 - InsideAIML
Ten trends of IoT in 2020 - InsideAIML
VijaySharma802
 
Insurance Applications of Machine Learning - The 9th International Istanbul I...
Insurance Applications of Machine Learning - The 9th International Istanbul I...Insurance Applications of Machine Learning - The 9th International Istanbul I...
Insurance Applications of Machine Learning - The 9th International Istanbul I...
SigortaTatbikatcilariDernegi
 
Software Market Trends 2012 2.0
Software Market Trends 2012 2.0Software Market Trends 2012 2.0
Software Market Trends 2012 2.0
allaboutsyed
 

What's hot (20)

AI INSURANCE SPOTLIGHT
AI INSURANCE SPOTLIGHTAI INSURANCE SPOTLIGHT
AI INSURANCE SPOTLIGHT
 
Insurance 2030: AI Accelerating The Change
Insurance 2030: AI Accelerating The ChangeInsurance 2030: AI Accelerating The Change
Insurance 2030: AI Accelerating The Change
 
Artificial Intelligence (AI) for Financial Services
Artificial Intelligence (AI) for Financial Services Artificial Intelligence (AI) for Financial Services
Artificial Intelligence (AI) for Financial Services
 
Ai in insurance how to automate insurance claim processing with machine lear...
Ai in insurance  how to automate insurance claim processing with machine lear...Ai in insurance  how to automate insurance claim processing with machine lear...
Ai in insurance how to automate insurance claim processing with machine lear...
 
AI in insurance services
AI in insurance servicesAI in insurance services
AI in insurance services
 
PHBC Platform Technology
PHBC Platform TechnologyPHBC Platform Technology
PHBC Platform Technology
 
Blockchain Technology Innovation & Patent Development Strategy Insights from ...
Blockchain Technology Innovation & Patent Development Strategy Insights from ...Blockchain Technology Innovation & Patent Development Strategy Insights from ...
Blockchain Technology Innovation & Patent Development Strategy Insights from ...
 
AI in Insurance - InView Primer
AI in Insurance - InView PrimerAI in Insurance - InView Primer
AI in Insurance - InView Primer
 
IoT, new business models and digital agility 102116
IoT, new business models and digital agility 102116IoT, new business models and digital agility 102116
IoT, new business models and digital agility 102116
 
AI transforms insurance industry
AI transforms insurance industryAI transforms insurance industry
AI transforms insurance industry
 
Dynamic IoT data, protocol, and middleware interoperability with resource sli...
Dynamic IoT data, protocol, and middleware interoperability with resource sli...Dynamic IoT data, protocol, and middleware interoperability with resource sli...
Dynamic IoT data, protocol, and middleware interoperability with resource sli...
 
Top Technology Trends and Related Jobs
Top Technology Trends and Related JobsTop Technology Trends and Related Jobs
Top Technology Trends and Related Jobs
 
Blockchain + Big Data + AI + IoT Integration
Blockchain + Big Data + AI + IoT IntegrationBlockchain + Big Data + AI + IoT Integration
Blockchain + Big Data + AI + IoT Integration
 
Free Ebook in AI, Robotics, Blockchain, IoT, Big data/Data Science, Cybersecu...
Free Ebook in AI, Robotics, Blockchain, IoT, Big data/Data Science, Cybersecu...Free Ebook in AI, Robotics, Blockchain, IoT, Big data/Data Science, Cybersecu...
Free Ebook in AI, Robotics, Blockchain, IoT, Big data/Data Science, Cybersecu...
 
AUSIS AI UNDERWRITING PLATFORM TRANSFORMING INSURANCE
AUSIS AI UNDERWRITING PLATFORM TRANSFORMING INSURANCEAUSIS AI UNDERWRITING PLATFORM TRANSFORMING INSURANCE
AUSIS AI UNDERWRITING PLATFORM TRANSFORMING INSURANCE
 
Leveraging IoT & Related Technologies in Real Estate & PropTech
Leveraging IoT & Related Technologies in Real Estate & PropTechLeveraging IoT & Related Technologies in Real Estate & PropTech
Leveraging IoT & Related Technologies in Real Estate & PropTech
 
DSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital worldDSS @ Digital ERA 2014 - Security in the digital world
DSS @ Digital ERA 2014 - Security in the digital world
 
Ten trends of IoT in 2020 - InsideAIML
Ten trends of IoT in 2020 - InsideAIMLTen trends of IoT in 2020 - InsideAIML
Ten trends of IoT in 2020 - InsideAIML
 
Insurance Applications of Machine Learning - The 9th International Istanbul I...
Insurance Applications of Machine Learning - The 9th International Istanbul I...Insurance Applications of Machine Learning - The 9th International Istanbul I...
Insurance Applications of Machine Learning - The 9th International Istanbul I...
 
Software Market Trends 2012 2.0
Software Market Trends 2012 2.0Software Market Trends 2012 2.0
Software Market Trends 2012 2.0
 

Similar to "Risk Management in Open Finance Era" 26-12-2020

DutchMLSchool 2022 - Multi Perspective Anomalies
DutchMLSchool 2022 - Multi Perspective AnomaliesDutchMLSchool 2022 - Multi Perspective Anomalies
DutchMLSchool 2022 - Multi Perspective Anomalies
BigML, Inc
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Rahul Neel Mani
 
5-Unit (CAB).pdf
5-Unit (CAB).pdf5-Unit (CAB).pdf
5-Unit (CAB).pdf
Chandrapriya Rediex
 
Industry and Regulatory Insights Using Applied Science
Industry and Regulatory Insights Using Applied ScienceIndustry and Regulatory Insights Using Applied Science
Industry and Regulatory Insights Using Applied Science
Sven Von Dem Knesebeck
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
Vanya Vladeva
 
Insurtech Cyber Boxer
Insurtech Cyber BoxerInsurtech Cyber Boxer
Insurtech Cyber Boxer
Amit Rai
 
The Long Awaited Cloud Solution - How Cloud Computing Benefits Insurance & FSI
The Long Awaited Cloud Solution - How Cloud Computing Benefits Insurance & FSIThe Long Awaited Cloud Solution - How Cloud Computing Benefits Insurance & FSI
The Long Awaited Cloud Solution - How Cloud Computing Benefits Insurance & FSI
PT Datacomm Diangraha
 
SMACIC_Clean
SMACIC_CleanSMACIC_Clean
SMACIC_Clean
Assad Jees
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
Wavestone
 
Internet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsInternet of Things- IoT Monetization Models
Internet of Things- IoT Monetization Models
Subrahmanyam KVJ
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
RuchikaSachdeva4
 
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
Fabrizio Cilli
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
Eryk Budi Pratama
 
Data-driven Banking: Managing the Digital Transformation
Data-driven Banking: Managing the Digital TransformationData-driven Banking: Managing the Digital Transformation
Data-driven Banking: Managing the Digital Transformation
LindaWatson19
 
Bank offered rate based on Artificial Intelligence
Bank offered rate based on Artificial IntelligenceBank offered rate based on Artificial Intelligence
Bank offered rate based on Artificial Intelligence
IJAEMSJORNAL
 
Pwc.pptx
Pwc.pptxPwc.pptx
Pwc.pptx
Sandhya Singh
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
Capgemini
 
Cyber Threat Prediction using ML
Cyber Threat Prediction using MLCyber Threat Prediction using ML
Cyber Threat Prediction using ML
IRJET Journal
 
3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication
Glenn Peake
 
Introduction to new technologies
Introduction to new technologiesIntroduction to new technologies
Introduction to new technologies
Tracey Roberts
 

Similar to "Risk Management in Open Finance Era" 26-12-2020 (20)

DutchMLSchool 2022 - Multi Perspective Anomalies
DutchMLSchool 2022 - Multi Perspective AnomaliesDutchMLSchool 2022 - Multi Perspective Anomalies
DutchMLSchool 2022 - Multi Perspective Anomalies
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
5-Unit (CAB).pdf
5-Unit (CAB).pdf5-Unit (CAB).pdf
5-Unit (CAB).pdf
 
Industry and Regulatory Insights Using Applied Science
Industry and Regulatory Insights Using Applied ScienceIndustry and Regulatory Insights Using Applied Science
Industry and Regulatory Insights Using Applied Science
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Insurtech Cyber Boxer
Insurtech Cyber BoxerInsurtech Cyber Boxer
Insurtech Cyber Boxer
 
The Long Awaited Cloud Solution - How Cloud Computing Benefits Insurance & FSI
The Long Awaited Cloud Solution - How Cloud Computing Benefits Insurance & FSIThe Long Awaited Cloud Solution - How Cloud Computing Benefits Insurance & FSI
The Long Awaited Cloud Solution - How Cloud Computing Benefits Insurance & FSI
 
SMACIC_Clean
SMACIC_CleanSMACIC_Clean
SMACIC_Clean
 
The Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devicesThe Internet of Things: the 4 security dimensions of smart devices
The Internet of Things: the 4 security dimensions of smart devices
 
Internet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsInternet of Things- IoT Monetization Models
Internet of Things- IoT Monetization Models
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
ISACA GRC-CYBER CALL FOR PAPERS ABSTRACT v.3.0
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Data-driven Banking: Managing the Digital Transformation
Data-driven Banking: Managing the Digital TransformationData-driven Banking: Managing the Digital Transformation
Data-driven Banking: Managing the Digital Transformation
 
Bank offered rate based on Artificial Intelligence
Bank offered rate based on Artificial IntelligenceBank offered rate based on Artificial Intelligence
Bank offered rate based on Artificial Intelligence
 
Pwc.pptx
Pwc.pptxPwc.pptx
Pwc.pptx
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
Cyber Threat Prediction using ML
Cyber Threat Prediction using MLCyber Threat Prediction using ML
Cyber Threat Prediction using ML
 
3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication3SIXTY_client_and_prospect_publication
3SIXTY_client_and_prospect_publication
 
Introduction to new technologies
Introduction to new technologiesIntroduction to new technologies
Introduction to new technologies
 

Recently uploaded

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 

Recently uploaded (20)

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 

"Risk Management in Open Finance Era" 26-12-2020

  • 1. Risk Management in Varlam Ebanoidze RiskTech 4 FinTech Image: Agoda Era
  • 2. Risk Management in Open Finance Era Image: ansonmiao Helicopter view on 'Open Finance' and on associated transition risks & opportunities. Capitalizing on 'Risk DataValue Chain' – three use cases. Tech Enablers (Smart Data Sharing – key enabler for next ecosystem)
  • 3. What is different about Risk Management in FinTech? Image: ansonmiao Data A brand new Risk Framework. Traditional closed perimeter defense model vs. New, open, third party info sharing & outsourcing ecosystem model; Openness & Partnerships “Open Finance” (cross) - industry data sharing and open- source endless Opportunities.
  • 4. How “Openness + Data” looks like together Image: ansonmiao
  • 5. Image: ansonmiao Open Ecosystem challenges in the highly regulated industry - how to secure data - how to share data not only securely but smartly Analogy from the tech industry: -Think about a restaurant reservation application that has Google Maps embedded into it. - APIs allow external applications to read data from Google and portray the data on their own applications. What we need in case of Open Finance is: # 1. A ‘new perimeter (s)’. #2 Smart ways to ensure a secure data- sharing.
  • 6. Image: ansonmiao Helicopter view on 'Open Banking' and on associated transition risks and opportunities
  • 7. WHO • Banks, Fintechs & other companies involved in personal finance business. WHAT • DataAPI and PaymentAPI services via AISP & PISP. HOW • B2B business, intermediary between the Banks and ‘all kind of Fintech’ companies. • Providing anAPI service in highly specialized eco-system market, using by itself third party infrastructure in the Claud. • Efficiently, securely and in compliance of existing laws and regulations. Open Banking’s simplified (PSD2)WHO,WHAT and HOW.
  • 8. A path from OpenBanking to DataEconomy via OpenFinance - different Strategies to achieve it in different jurisdictions (market-driven, regulatory-driven, or hybrid) - Industry development lenses (the ecosystem of partners) - technical Enablers (APIs connectivity) 1) 'Who is Who' in open banking - mapping of the companies’ business model differentiators in today's Open Banking. 2) 'Who will be Who' in the next Ecosystem of Open Finance - why Banks Must Become the DataCustodian in the DataEconomy - Implementation of the data strategy is a supernational task for the EU. The European Commission has published a Data Strategy proposal in 2019 https://lnkd.in/dWG9Uqu to allow the EU to take full advantage of data-driven innovation by managing the cross-sectoral use of data between sectors (in health, manufacturing, agriculture, mobility, energy, etc). - So it is for the UK too, where the concept of OpenBanking is a part of the wider SmartData Strategy declared by the UK's government..
  • 9. A dilemma between the proper regulation and an efficient grow, at the level of designing - an evolution of the Internet is different of the path made by traditional media like Radio, Telephone or Television. - security is a Negative goal
  • 10.
  • 11. Image: ansonmiao # 1. A ‘new perimeter (s)’ (ZTA) uses zero trust principles to plan infrastructure & workflows. ZT assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet). With the movement towards the Openness and the Cloud, to minimize the increased risks of the connectivity. > > > ZEROTRUSTARCHITECTURE 4 CONSUMERTRUST
  • 12. Image: ansonmiao The key tech enablers for Open Banking are external APIs, But… https://www.openbanking.org.uk/providers/account-providers/api-performance/ - But, unlike more mature areas of cybersecurity, when people talk of API security, they mean lots of different things.. - Questions Every Executive Should AskAboutTheir APIs' by NIST: Asset Managt: How many APIs do we have? What do the APIs do? Who are the API owners?
  • 13. Image: ansonmiao Is PSD2’s SCA a good fit for Open Finance ? 8 major challenges within the EU Open Banking regulation's technical aspects (SCA); ranging from “too strict” 2FA till the OS upgrade discipline by smartphone holders.
  • 14. Image: ansonmiao SCA vs. Smart Data SharingTechnologies Designed for an Ecosystem What is Differential Privacy? https://www.youtube.com/watch?v=- JRURYTfBXQ No need for the most of the data to be shared at all !
  • 15. Image: ansonmiao SCA vs. Smart Data SharingTechnologies Designed for an Ecosystem What is Differential Privacy? https://www.youtube.com/watch?v=- JRURYTfBXQ No need for the most of the data to be shared at all ! Differential privacy: where noise is added to an analytical system so that it is impossible to reverse-engineer the individual inputs Federated analysis: where parties share the insights from their analysis without sharing the data itself Homomorphic encryption: where data is encrypted before it is shared, such that it can still be analyzed but not decoded into the original information Zero-knowledge proofs: where users can prove their knowledge of value without revealing the value itself Secure multiparty computation: where data analysis is spread across multiple parties such that no individual party can see the complete set of inputs
  • 16. Image: ansonmiao SCA vs. Smart Data SharingTechnologies PET, Differential Privacy, Double-Blind Consent-Driven Data Sharing on BlockChan For PSD2 For Ecosystem
  • 17. Image: ansonmiao A multiplicative impact of FinTech -TechFin key enablers
  • 18. Image: ansonmiao TechFin – FinTech: banks are welcomed to the new business of Trusted Data Assets Stewards Use-case: a new employer in a new country would request onboarding info, based on the given consent, directly from a customer's/new employee's local bank via the secure API and in compliance with the rules of GDPR.Also, an use case of CDI from HKMA: https://www.linkedin.com/posts/varlam-ebanoidze-41594043_cdi-hkftw-hkfintechweek-activity- 6729104774077153281--T6Y
  • 19. Capitalizing on 'Risk DataValue Chain' Three use cases: - Digital onboarding - Transaction monitoring - From big data to security by design
  • 20. Image: ansonmiao Investing in Onboarding automation & Transaction Monitoring via Open Finance by aggregating different financial and non-financial data.
  • 21. Image: ansonmiao Capitalizing on 'Risk DataValue Chain' – Onboarding Open finance has the potential to remove many of the hurdles new customers face – like having to fill in long applications that require them to dig up hard-to- access financial infor mation or send notarised copies of documents with this information
  • 22. Image: ansonmiao Digital Touch vs. Human Touch Apart from the strategic decisions to invest or underinvest in Digital vs Non-digital process, IMHO, the bottom line of the operational problem IS the visualization of the holistic process incl. the call center's part to address the bottlenecks in digital processes by suggesting both the data- driven algo. (the better prediction power) & process optimization tools.
  • 23. Image: ansonmiao Capitalizing on 'Risk DataValue Chain' –Transaction Monitoring 1. single customer view and Single BehavioralView 2. static RulesVs Interactive Models 3. risk data's value-chaining
  • 24. Image: ansonmiao Capitalizing on 'Risk DataValue Chain' – Layered approach to the risk model To achieve an accurate KYC procedure, a Layered approach to the risk model is offered. It enables on one hand avoiding the Parallelism and saving the computational power of the algorithm (if identity is easy to check, at 1st layer no need to follow other layers), on the other hand, provides the assurance that a customer is who they say they are - by checking Several layers from Account to Device & Activity.
  • 25. Interested to know how the online fraud risk management at Alibaba Group and with the help of Alibaba by its merchants was evolved to allow this? Here is the answer: https://lnkd.in/dFjBb7X This paper is to introduce the Fraud Risk Management at Alibaba under big data. Alibaba has built a fraud risk monitoring and management system based on #real-time big data processing and intelligent #riskmodels. It captures fraud signals directly from huge amount data of #userbehaviors and network, analyzes them in real-time using machine learning, and accurately predicts the bad users and transactions. To extend the fraud risk prevention ability to external customers, Alibaba also built up a big data based fraud prevention product called #AntBuckler. Best practice: "At its peak, 256,000 transactions a second. No report of any breakdown over the 10 years."
  • 26. Image: ansonmiao Capitalizing on 'Risk Data Value Chain' – Design thinking in C-I-A Triad - from Big Data to Security by Design
  • 27. Image: ansonmiao Security through behavioral interventions - from the series of the customer-centric security. In the practical context, the idea is Open Banking enabled budgeting app's conceptual analogy for InfoSec. 'Which threats we take seriously and which we neglect is mostly driven by availability bias — we intuitively assess the likelihood of outcomes based on how easy they are to imagine. So we overestimate the danger of terrorism (which is vivid, concrete, and direct) and underestimate the dangers of climate change (which is vague, abstract, and indirect). Our ability to predict rare events is systematically undermined by our intuitions.' So, how to visualize the risk (make it more evident) to the customer and help in risk management decision making?
  • 28. Impact of the Covid 19 As the pandemic accelerates Digital transition the boundaries between the monitoring of external threats (Cyber) & the assessment of risks inherent to new infrastructure (Digital) became more evident for Boards.
  • 29. Up to 70% of all public clouds and the data on them are concentrated with just 3 cloud service providers. I doubt that the systemic risk of such concentration and the domino effect for those organizations which store data (or use IAAS ) with these 3 companies is assessed and backed-up adequately.
  • 30.
  • 31.
  • 32.
  • 33. Image: ansonmiao Questions? RiskTech 4 FinTech https://www.linkedin.com/in/varlam-ebanoidze-41594043 / THANKYOU