The document discusses various topics related to digital security presented at different events, including a keynote on issues with encryption for IoT devices, a panel discussion on authentication technology at the BankTech Asia conference, and presentations on blockchain, IoT, and quantum attacks at the PrimeKey PKI Tech Days. It also describes a solution implemented by SecureMetric using multi-factor authentication with RADIUS and one-time passwords to securely access the SWIFT application.
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock
Presented by Mike Ellis, CEO, ForgeRock at ForgeRock Open Stack Identity Summit, June 2013
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Contents
I. AI, Blockchain, IoT Technology Innovation Status
1. Technology Innovation Status in Innovation Entity
2. Technology Innovation Evolution
3. Technology Innovation Status in Innovation Country
4. Technology Innovation Status in CPC Classification
5. Technology Innovation Status in Specific Technology
A. Deep RL Technology Innovation Status
B. Deep Learning for Autonomous Vehicle Technology Innovation Status
C. Deep Learning for 5G Technology Innovation Status
D. Deep Learning for Cybersecurity Technology Innovation Status
E. Blockchain Privacy Technology Innovation Status
F. Blockchain Interoperability Technology Innovation Status
G. Blockchain DID Technology Innovation Status
H. Blockchain Toknization Technology Innovation Status
II. AI Blockchain IoT Convergence Technology Innovation Status
1. Technology Innovation Status in Innovation Entity
2. Convergence Technology Innovation Status in Convergence Field
3. Convergence Technology Innovation Evolution
4. Technology Innovation Status in Innovation Country
5. Technology Innovation Status in CPC Classification
6. Technology Innovation Status in Specific Application
Privacy-preserving Blockchain-based AI Data/Model Marketplace
Blockchain-based Decentralized Machine Learning Platform
Blockchain-based Secure Telehealth-diagnostic System
Peer-to-Peer Micro-Loan Transaction System
Predictive Maintenance Platform for Industrial Machine using Industrial IoT
Blockchain Augmented IoT System for Dynamic Supply Chain Tracking
Decentralized Energy Management Utilizing Blockchain Technology
Provisioning Edge Devices in Mobile Carrier Network as Compute Nodes in Blockchain Network
Distributed Handoff-related Processing for Wireless Networks
III. Appendix
1. AI Blockchain IoT Convergence AT A Glance
2. AI, Blockchain, IoT for Finance AT A Glance
3. AI, Blockchain, IoT for Healthcare AT A Glance
4. 5G Based AI + Blockchain + IoT Convergence AT A Glance
Cyber-I, in association with Intel Security (formerly McAfee), recently delivered an executive over entitled "Security Trends Affecting Security Strategy".
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...Agile Testing Alliance
Jitendra Dutt Sharma who is Head of Competency Center at Amdocs Quality Engineering Services took a Session on "QE Organization strategy in Digital Era" at Global Testing Retreat #ATAGTR2019
Please refer our following post for session details:
https://atablogs.agiletestingalliance.org/2019/12/04/global-testing-retreat-atagtr2019-welcomes-jitendra-dutt-sharma-as-our-esteemed-speaker/
ForgeRock Open Identity Stack Summit - Kick-off by Mike EllisForgeRock
Presented by Mike Ellis, CEO, ForgeRock at ForgeRock Open Stack Identity Summit, June 2013
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Contents
I. AI, Blockchain, IoT Technology Innovation Status
1. Technology Innovation Status in Innovation Entity
2. Technology Innovation Evolution
3. Technology Innovation Status in Innovation Country
4. Technology Innovation Status in CPC Classification
5. Technology Innovation Status in Specific Technology
A. Deep RL Technology Innovation Status
B. Deep Learning for Autonomous Vehicle Technology Innovation Status
C. Deep Learning for 5G Technology Innovation Status
D. Deep Learning for Cybersecurity Technology Innovation Status
E. Blockchain Privacy Technology Innovation Status
F. Blockchain Interoperability Technology Innovation Status
G. Blockchain DID Technology Innovation Status
H. Blockchain Toknization Technology Innovation Status
II. AI Blockchain IoT Convergence Technology Innovation Status
1. Technology Innovation Status in Innovation Entity
2. Convergence Technology Innovation Status in Convergence Field
3. Convergence Technology Innovation Evolution
4. Technology Innovation Status in Innovation Country
5. Technology Innovation Status in CPC Classification
6. Technology Innovation Status in Specific Application
Privacy-preserving Blockchain-based AI Data/Model Marketplace
Blockchain-based Decentralized Machine Learning Platform
Blockchain-based Secure Telehealth-diagnostic System
Peer-to-Peer Micro-Loan Transaction System
Predictive Maintenance Platform for Industrial Machine using Industrial IoT
Blockchain Augmented IoT System for Dynamic Supply Chain Tracking
Decentralized Energy Management Utilizing Blockchain Technology
Provisioning Edge Devices in Mobile Carrier Network as Compute Nodes in Blockchain Network
Distributed Handoff-related Processing for Wireless Networks
III. Appendix
1. AI Blockchain IoT Convergence AT A Glance
2. AI, Blockchain, IoT for Finance AT A Glance
3. AI, Blockchain, IoT for Healthcare AT A Glance
4. 5G Based AI + Blockchain + IoT Convergence AT A Glance
Cyber-I, in association with Intel Security (formerly McAfee), recently delivered an executive over entitled "Security Trends Affecting Security Strategy".
#ATAGTR2019 Presentation "QE Organization strategy in Digital Era" By Jitendr...Agile Testing Alliance
Jitendra Dutt Sharma who is Head of Competency Center at Amdocs Quality Engineering Services took a Session on "QE Organization strategy in Digital Era" at Global Testing Retreat #ATAGTR2019
Please refer our following post for session details:
https://atablogs.agiletestingalliance.org/2019/12/04/global-testing-retreat-atagtr2019-welcomes-jitendra-dutt-sharma-as-our-esteemed-speaker/
Fourth Industrial Revolution & Data Economy
AI/Blockchain/IoT/Big Data Introduction
AI/Blockchain/IoT Technology Innovation Insights from Patents
AI/Blockchain/IoT Technology Innovation Frontline
AI/Blockchain/IoT Technology Innovation vs. Privacy Protection
AI/Blockchain/IoT Business Strategy & BM Development
Startup Strategy
AI + Blockchain + IoT Technology Convergence Introduction
AI + Blockchain + IoT Convergence System Development Demo
AI + Blockchain + IoT Convergence System for Digital New Deal
Contents
I. AI, Blockchain, IoT, and Their Convergence Technology Innovation Status
II. AI, Blockchain, IoT Convergence Use Case System Implementation Examples
1. Blockchain-based Privacy-Preserving Federated Learning System
2. Blockchain-based Decentralized IoT & AI Data Marketplace
3. Blockchain-based Trustworthy AI & IoT Systems
4. Blockchain-based Decentralized Parallel Edge Machine Learning
5. Predictive Maintenance Platform for Industrial Machine using Industrial IoT
6. AI+Blockchain System for Car Sharing Service
7. Connected Autonomous Vehicle Communication Management System
8. 5G-based AI+Blockchain+IoT Edge Computing System
This is a talk which I gave to the Brighton IoT Forum on 23/03/2016. It looks at the challenges of scaling IoT security from the perspective of protection of critical national infrastructure from cyber-attack. It then campares this to the security scaling challenges of a small startup business with a great product idea. The presentation concludes that there are similarities between both 'micro' and 'macro' IoT scaling scenarios. In both cases it is essential to cultivate a 'security mindset'.
The Internet of Things (also known as IoT) is one of the fastest growing spaces in technology today. In this talk, we will explain what IoT can mean to your business, and what your business needs to do now to thrive in a connected world.
In this discussion, we will:
*Identify how IoT has already impacted your life
*Discuss business uses for IoT products
*Provide practical steps your business can take to prepare for an IoT project or product
From worthwhile.com
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
Presented at the Ethereum Engineering Group Meetup in Brisbane, Australia, on 13 Nov 2019. We report on research to use an Ethereum blockchain as an MFA and/or MPA device to secure command channels on IoT networks, even when the underlying network may be compromised.
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiativeAlexander Hirner
IoT must shift from proprietary to decentralized and open but secure for a triple win: hardware manufacturers, consumers and system developers. The reasons why Ethereum is a suitable enabler and testbed for protocol extensions in the IoT space are explained with some examples. Privacy and security provide a common topic to other IoT developments.
Beyond the hype and the media-fueled apocalyptic scenarios, let's analyze what A.I really
means for the future of the industrial world.
I'll demystify what’s beyond the buzzwords of the moment, and have a close look at A.I,
Blockchain and IoT, illustrated with some real-world use-cases.
I'll finally propose a few scenarios where these three technologies could converge into the 3rd era of the Internet.
Introduction to ENT (Entity Network Translation)ENT Technologies
Want to eliminate hacks of critical infrastructure, vehicles and military systems? Do you think patients should exclusively own and control access to their medical records? Want to eliminate counterfeiting on digital and physical goods? Want to be able to exclusively own, sell, transfer, buy or lease your data and digital assets like physical property?
ENT makes all these things possible - TODAY.
ENT (Entity Network Translation) is a fully decentralized, next-generation trust infrastructure that replaces passwords, PKI, blockchain, and centralized data stores. ENT is a radical innovation in core enabling trust technology & networked systems.
+ Trusted micro-networking between entities of any kind: humans, devices, data and files, software processes, physical objects, concepts like corporations and currencies, and groups of any/all of these;
+ Exponentially increases security and privacy because entities are individually protected and connected directly without any middleman or central management;
+ Built on a patent-pending fundamental advancement in asymmetric key models called Relational Key Infrastructure (RKI) that eliminates central authorities and key management - the first key infrastructure innovation in 30 years;
+ Fully decentralized and owner-driven;
+ Useful for any purpose: Internet of Things, government, healthcare, finance, manufacturing, retail, etc;
+ Useful in any environment: scales from embedded components up to complex global systems;
+ Open standard for transparent governance, high usability across industries and wide adoption.
IoT–smart contracts in data trusted exchange supplied chain based on block ch...IJECEIAES
Internet of Things (IoT) assumes a critical part in the advancement of different fields. The IoT data trusted exchange in recent year extend of uses influence an awesome request and increasing scale. In such a platform, exchange the data sets that they require and specialist organization can search. However, the enough trust as the third-party mediators for data exchange in centralized infrastructure cannot provide. This paper proposes a blockchain for IoT data trusted exchange based on decentralized solution. In particular, the fundamental standards of blockchain in verify manner, individuals can communicate with each other without a confided in mediator intermediary. Blockchain enable us to have a distributed, digital ledger. IoT (Internet of Things) sensor devices (zigbee) utilizing blockchain technology to assert public availability of temperature records, tracking location shipment, humidity, preventing damage, data immutability. The sensor devices looking the temperature, location, damage of each parcel during the shipment to completely guarantee directions. In blockchain all data is got moved from one position to another, where a smart contract assesses against the product attributes. Ethereum blockchain and smart contracts atlast it gets through knowledge a design to be copied and presents its decentralized distributed digital ledger, auditable, transparent, features visually.
Smart City Lecture 1: How to build a Smart CityPeter Waher
The Smart City series of lectures span the fundamental ideas, visions and the technologies related to the development of services for the Smart City (or Society) and the Internet of Things.
Before building a Smart City, we must agree on what a Smart City is, or could be. This lecture presents a concrete vision for what a Smart City is. We will work through some immediate conclusions. This will help us define some basic requirements on architecture and infrastructure, vital to create a scalable and resilient Smart City. With a focus on decentralized and federated architectures, new standardization efforts are presented that provide a basis for interoperability in the Smart City.
IoT and Blockchain Challenges and RisksAhmed Banafa
The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities. The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
The Internet Of Things will have an increasing impact to all industries and health and fitness are no exception. This definitive guide provides a blue print for the things we all need to keep in mind as we adopt the IOT revolution.
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!DIGITALCONFEX
Dive into the dynamic world of innovation with inaugural edition of iTech Magazine, where cutting-edge technology meets insightful storytelling. Explore the latest trends, uncover groundbreaking advancements, and connect with the forefront of the tech landscape.
Elevate your tech journey with in-depth features, expert perspectives, and a spotlight on the innovations shaping our digital future. Welcome to iTech Magazine – Where Tomorrow's Tech Unfolds Today!
Visit to know more: https://digitalconfex.com/itech-magazine/
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdfCIO Look Magazine
This edition features a handful of The Most Trusted Leaders in Security & Surveillance to Know that are leading us into a better future
Read More: https://ciolook.com/the-most-trusted-leaders-in-security-surveillance-to-know-in-2023-june2023/
Fourth Industrial Revolution & Data Economy
AI/Blockchain/IoT/Big Data Introduction
AI/Blockchain/IoT Technology Innovation Insights from Patents
AI/Blockchain/IoT Technology Innovation Frontline
AI/Blockchain/IoT Technology Innovation vs. Privacy Protection
AI/Blockchain/IoT Business Strategy & BM Development
Startup Strategy
AI + Blockchain + IoT Technology Convergence Introduction
AI + Blockchain + IoT Convergence System Development Demo
AI + Blockchain + IoT Convergence System for Digital New Deal
Contents
I. AI, Blockchain, IoT, and Their Convergence Technology Innovation Status
II. AI, Blockchain, IoT Convergence Use Case System Implementation Examples
1. Blockchain-based Privacy-Preserving Federated Learning System
2. Blockchain-based Decentralized IoT & AI Data Marketplace
3. Blockchain-based Trustworthy AI & IoT Systems
4. Blockchain-based Decentralized Parallel Edge Machine Learning
5. Predictive Maintenance Platform for Industrial Machine using Industrial IoT
6. AI+Blockchain System for Car Sharing Service
7. Connected Autonomous Vehicle Communication Management System
8. 5G-based AI+Blockchain+IoT Edge Computing System
This is a talk which I gave to the Brighton IoT Forum on 23/03/2016. It looks at the challenges of scaling IoT security from the perspective of protection of critical national infrastructure from cyber-attack. It then campares this to the security scaling challenges of a small startup business with a great product idea. The presentation concludes that there are similarities between both 'micro' and 'macro' IoT scaling scenarios. In both cases it is essential to cultivate a 'security mindset'.
The Internet of Things (also known as IoT) is one of the fastest growing spaces in technology today. In this talk, we will explain what IoT can mean to your business, and what your business needs to do now to thrive in a connected world.
In this discussion, we will:
*Identify how IoT has already impacted your life
*Discuss business uses for IoT products
*Provide practical steps your business can take to prepare for an IoT project or product
From worthwhile.com
Internet of Things (IoT) two-factor authentication using blockchainDavid Wood
Presented at the Ethereum Engineering Group Meetup in Brisbane, Australia, on 13 Nov 2019. We report on research to use an Ethereum blockchain as an MFA and/or MPA device to secure command channels on IoT networks, even when the underlying network may be compromised.
5th Meetup - Ethereum & IoT: examples, opportunities and IBM initiativeAlexander Hirner
IoT must shift from proprietary to decentralized and open but secure for a triple win: hardware manufacturers, consumers and system developers. The reasons why Ethereum is a suitable enabler and testbed for protocol extensions in the IoT space are explained with some examples. Privacy and security provide a common topic to other IoT developments.
Beyond the hype and the media-fueled apocalyptic scenarios, let's analyze what A.I really
means for the future of the industrial world.
I'll demystify what’s beyond the buzzwords of the moment, and have a close look at A.I,
Blockchain and IoT, illustrated with some real-world use-cases.
I'll finally propose a few scenarios where these three technologies could converge into the 3rd era of the Internet.
Introduction to ENT (Entity Network Translation)ENT Technologies
Want to eliminate hacks of critical infrastructure, vehicles and military systems? Do you think patients should exclusively own and control access to their medical records? Want to eliminate counterfeiting on digital and physical goods? Want to be able to exclusively own, sell, transfer, buy or lease your data and digital assets like physical property?
ENT makes all these things possible - TODAY.
ENT (Entity Network Translation) is a fully decentralized, next-generation trust infrastructure that replaces passwords, PKI, blockchain, and centralized data stores. ENT is a radical innovation in core enabling trust technology & networked systems.
+ Trusted micro-networking between entities of any kind: humans, devices, data and files, software processes, physical objects, concepts like corporations and currencies, and groups of any/all of these;
+ Exponentially increases security and privacy because entities are individually protected and connected directly without any middleman or central management;
+ Built on a patent-pending fundamental advancement in asymmetric key models called Relational Key Infrastructure (RKI) that eliminates central authorities and key management - the first key infrastructure innovation in 30 years;
+ Fully decentralized and owner-driven;
+ Useful for any purpose: Internet of Things, government, healthcare, finance, manufacturing, retail, etc;
+ Useful in any environment: scales from embedded components up to complex global systems;
+ Open standard for transparent governance, high usability across industries and wide adoption.
IoT–smart contracts in data trusted exchange supplied chain based on block ch...IJECEIAES
Internet of Things (IoT) assumes a critical part in the advancement of different fields. The IoT data trusted exchange in recent year extend of uses influence an awesome request and increasing scale. In such a platform, exchange the data sets that they require and specialist organization can search. However, the enough trust as the third-party mediators for data exchange in centralized infrastructure cannot provide. This paper proposes a blockchain for IoT data trusted exchange based on decentralized solution. In particular, the fundamental standards of blockchain in verify manner, individuals can communicate with each other without a confided in mediator intermediary. Blockchain enable us to have a distributed, digital ledger. IoT (Internet of Things) sensor devices (zigbee) utilizing blockchain technology to assert public availability of temperature records, tracking location shipment, humidity, preventing damage, data immutability. The sensor devices looking the temperature, location, damage of each parcel during the shipment to completely guarantee directions. In blockchain all data is got moved from one position to another, where a smart contract assesses against the product attributes. Ethereum blockchain and smart contracts atlast it gets through knowledge a design to be copied and presents its decentralized distributed digital ledger, auditable, transparent, features visually.
Smart City Lecture 1: How to build a Smart CityPeter Waher
The Smart City series of lectures span the fundamental ideas, visions and the technologies related to the development of services for the Smart City (or Society) and the Internet of Things.
Before building a Smart City, we must agree on what a Smart City is, or could be. This lecture presents a concrete vision for what a Smart City is. We will work through some immediate conclusions. This will help us define some basic requirements on architecture and infrastructure, vital to create a scalable and resilient Smart City. With a focus on decentralized and federated architectures, new standardization efforts are presented that provide a basis for interoperability in the Smart City.
IoT and Blockchain Challenges and RisksAhmed Banafa
The biggest challenge facing IoT security is coming from the very architecture of the current IoT ecosystem; it’s all based on a centralized model known as the server/client model. All devices are identified, authenticated and connected through cloud servers that support huge processing and storage capacities. The connection between devices will have to go through the cloud, even if they happen to be a few feet apart. While this model has connected computing devices for decades and will continue to support today IoT networks, it will not be able to respond to the growing needs of the huge IoT ecosystems of tomorrow.
The Internet Of Things will have an increasing impact to all industries and health and fitness are no exception. This definitive guide provides a blue print for the things we all need to keep in mind as we adopt the IOT revolution.
Fog computing security and privacy issues, open challenges, and blockchain so...IJECEIAES
Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!DIGITALCONFEX
Dive into the dynamic world of innovation with inaugural edition of iTech Magazine, where cutting-edge technology meets insightful storytelling. Explore the latest trends, uncover groundbreaking advancements, and connect with the forefront of the tech landscape.
Elevate your tech journey with in-depth features, expert perspectives, and a spotlight on the innovations shaping our digital future. Welcome to iTech Magazine – Where Tomorrow's Tech Unfolds Today!
Visit to know more: https://digitalconfex.com/itech-magazine/
The Most Trusted Leaders in Security & Surveillance to Know in 2023.pdfCIO Look Magazine
This edition features a handful of The Most Trusted Leaders in Security & Surveillance to Know that are leading us into a better future
Read More: https://ciolook.com/the-most-trusted-leaders-in-security-surveillance-to-know-in-2023-june2023/
The 5 most trusted cyber security companies to watch.Merry D'souza
Through this latest edition of Insights Success, we wish to feature organizations that are quite adept in utilizing and adopting these tech-trends in their operations. ‘The 5 Most Trusted Cyber Security Companies to Watch,’ is an edition which will take you on a journey towards the digital security space. So, give it a read and enjoy articles curated by our in-house editorial team.
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
As a novel computing platform in network, IoT will bring many security challenges to enterprise networks, and create new opportunities for security industry. This talk will provide a general overview of enterprise network security problems, especially the data security, caused by IoT. After that, a few existing security technologies are evaluated as necessary elements of a holistic network security that cover IoT devices. These technologies include : (a) IoT security monitoring and control; (b) FOTA for firmware vulnerability management; (c) NetFlow based big data security analysis. In the end, the practice of standard security protocols (such as OpenIoC and IODEF) will be strongly advocated for delivering effective IoT security solutions.
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
How to design secure software products for IoT, embedded application, smart metering, smart lighting, medical application with the help of Common Criteria
Insights Success has come up with an issue of “The 10 Best Performing IoT Solution Providers” that are known for utilizing advanced tools and techniques and delivers results more than what clients generally expect from them.
Insights Success has come up with an issue of “The 10 Best Performing IoT Solution Providers” that are known for utilizing advanced tools and techniques and delivers results more than what clients generally expect from them.
<a href="https://www.insightssuccess.in/the-10-best-performing-iot-solution-providers-june2018/ ">https://www.insightssuccess.in/the-10-best-performing-iot-solution-providers-june2018/
</a>
Physical security and IT security: at Expo Milan
2015 the protection of people, resources, data
and devices was a key factor in the success of the
event. From video surveillance to the prevention
of cyber attacks, Cisco’s IP network, the pervasive
multilevel security and a task force dedicated to
monitoring the entire infrastructure allowed the
organizers to concentrate on operational tasks
knowing that the event was in safe hands.
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
In this webcast, KuppingerCole´s Principal Analyst Martin Kuppinger will introduce the concept of Identity Management for the Internet of Things. Following Martin's opening talk, ForgeRock´s Gerhard Zehethofer will discuss how ForgeRock is now extending these capabilities into the areas of managed and unmanaged devices, enhancing the customer experience as well as security and privacy at scale for people, services, and things.
Block Armour is a Singapore, UK, USA, and India based award-winning Cybersecurity venture focused on harnessing modern approaches and emerging technologies such as Blockchain to counter growing cybersecurity challenges in bold new ways. Accelerated by Airbus and featured among the Top 25 Cybersecurity innovations worldwide, Block Armour has developed a next-gen Zero Trust security platform and delivers integrated cybersecurity solutions for today’s hybrid enterprise-IT environments. The award-winning platform is powered by Software Defined Perimeter (SDP) architecture and private Blockchain technology, and is aligned with the NIST Zero Trust Framework.
Block Armour is helping organizations in multiple geographies to consolidate their Cybersecurity investments (across on-prem systems, Cloud, and IoT), enforce Zero Trust principles enterprise-wide, defend against cyberattacks, and comply with regulations.
Identity Summit UK: THE IDENTITY BROKER AS DRIVER FOR GROWTHForgeRock
OLIVER STAMPFLI, SECURITY ARCHITECT IDENTITY & ACCESS MANAGEMENT, SWISSCOM
JENS SONNENTRÜCKER, HEAD OF IDENTITY ACCESS MANAGEMENT & GOVERNANCE, SWISSCOM
The goal for Swisscom was to be able to offer one ID Broker for all services, so that subscribers essentially would be able to “Bring Your Own Identity” (BYOI). If not done this way, each application or service offered by Swisscom would have required a connection with each IDP. By implementing a ForgeRock solution, Swisscom was able to reduce costs spent on administration and significantly upgrade ease of use for the customer base, while also increasing sharing options across service offerings.
What happens in the Innovation of Things?Kim Escherich
From the ComputerWorld Internet of Things conference in Copenhagen October 27 2015. On definitions, markets, trends, needed capabilities and how to implement using IBM BlueMix.
Digital Transformation and IT Strategy Toolkit and TemplatesAurelien Domont, MBA
This Digital Transformation and IT Strategy Toolkit was created by ex-McKinsey, Deloitte and BCG Management Consultants, after more than 5,000 hours of work. It is considered the world's best & most comprehensive Digital Transformation and IT Strategy Toolkit. It includes all the Frameworks, Best Practices & Templates required to successfully undertake the Digital Transformation of your organization and define a robust IT Strategy.
Editable Toolkit to help you reuse our content: 700 Powerpoint slides | 35 Excel sheets | 84 minutes of Video training
This PowerPoint presentation is only a small preview of our Toolkits. For more details, visit www.domontconsulting.com
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
Business Valuation Principles for EntrepreneursBen Wann
This insightful presentation is designed to equip entrepreneurs with the essential knowledge and tools needed to accurately value their businesses. Understanding business valuation is crucial for making informed decisions, whether you're seeking investment, planning to sell, or simply want to gauge your company's worth.
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
Premium MEAN Stack Development Solutions for Modern BusinessesSynapseIndia
Stay ahead of the curve with our premium MEAN Stack Development Solutions. Our expert developers utilize MongoDB, Express.js, AngularJS, and Node.js to create modern and responsive web applications. Trust us for cutting-edge solutions that drive your business growth and success.
Know more: https://www.synapseindia.com/technology/mean-stack-development-company.html
Improving profitability for small businessBen Wann
In this comprehensive presentation, we will explore strategies and practical tips for enhancing profitability in small businesses. Tailored to meet the unique challenges faced by small enterprises, this session covers various aspects that directly impact the bottom line. Attendees will learn how to optimize operational efficiency, manage expenses, and increase revenue through innovative marketing and customer engagement techniques.
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...BBPMedia1
Marvin neemt je in deze presentatie mee in de voordelen van non-endemic advertising op retail media netwerken. Hij brengt ook de uitdagingen in beeld die de markt op dit moment heeft op het gebied van retail media voor niet-leveranciers.
Retail media wordt gezien als het nieuwe advertising-medium en ook mediabureaus richten massaal retail media-afdelingen op. Merken die niet in de betreffende winkel liggen staan ook nog niet in de rij om op de retail media netwerken te adverteren. Marvin belicht de uitdagingen die er zijn om echt aansluiting te vinden op die markt van non-endemic advertising.
"𝑩𝑬𝑮𝑼𝑵 𝑾𝑰𝑻𝑯 𝑻𝑱 𝑰𝑺 𝑯𝑨𝑳𝑭 𝑫𝑶𝑵𝑬"
𝐓𝐉 𝐂𝐨𝐦𝐬 (𝐓𝐉 𝐂𝐨𝐦𝐦𝐮𝐧𝐢𝐜𝐚𝐭𝐢𝐨𝐧𝐬) is a professional event agency that includes experts in the event-organizing market in Vietnam, Korea, and ASEAN countries. We provide unlimited types of events from Music concerts, Fan meetings, and Culture festivals to Corporate events, Internal company events, Golf tournaments, MICE events, and Exhibitions.
𝐓𝐉 𝐂𝐨𝐦𝐬 provides unlimited package services including such as Event organizing, Event planning, Event production, Manpower, PR marketing, Design 2D/3D, VIP protocols, Interpreter agency, etc.
Sports events - Golf competitions/billiards competitions/company sports events: dynamic and challenging
⭐ 𝐅𝐞𝐚𝐭𝐮𝐫𝐞𝐝 𝐩𝐫𝐨𝐣𝐞𝐜𝐭𝐬:
➢ 2024 BAEKHYUN [Lonsdaleite] IN HO CHI MINH
➢ SUPER JUNIOR-L.S.S. THE SHOW : Th3ee Guys in HO CHI MINH
➢FreenBecky 1st Fan Meeting in Vietnam
➢CHILDREN ART EXHIBITION 2024: BEYOND BARRIERS
➢ WOW K-Music Festival 2023
➢ Winner [CROSS] Tour in HCM
➢ Super Show 9 in HCM with Super Junior
➢ HCMC - Gyeongsangbuk-do Culture and Tourism Festival
➢ Korean Vietnam Partnership - Fair with LG
➢ Korean President visits Samsung Electronics R&D Center
➢ Vietnam Food Expo with Lotte Wellfood
"𝐄𝐯𝐞𝐫𝐲 𝐞𝐯𝐞𝐧𝐭 𝐢𝐬 𝐚 𝐬𝐭𝐨𝐫𝐲, 𝐚 𝐬𝐩𝐞𝐜𝐢𝐚𝐥 𝐣𝐨𝐮𝐫𝐧𝐞𝐲. 𝐖𝐞 𝐚𝐥𝐰𝐚𝐲𝐬 𝐛𝐞𝐥𝐢𝐞𝐯𝐞 𝐭𝐡𝐚𝐭 𝐬𝐡𝐨𝐫𝐭𝐥𝐲 𝐲𝐨𝐮 𝐰𝐢𝐥𝐥 𝐛𝐞 𝐚 𝐩𝐚𝐫𝐭 𝐨𝐟 𝐨𝐮𝐫 𝐬𝐭𝐨𝐫𝐢𝐞𝐬."
Memorandum Of Association Constitution of Company.pptseri bangash
www.seribangash.com
A Memorandum of Association (MOA) is a legal document that outlines the fundamental principles and objectives upon which a company operates. It serves as the company's charter or constitution and defines the scope of its activities. Here's a detailed note on the MOA:
Contents of Memorandum of Association:
Name Clause: This clause states the name of the company, which should end with words like "Limited" or "Ltd." for a public limited company and "Private Limited" or "Pvt. Ltd." for a private limited company.
https://seribangash.com/article-of-association-is-legal-doc-of-company/
Registered Office Clause: It specifies the location where the company's registered office is situated. This office is where all official communications and notices are sent.
Objective Clause: This clause delineates the main objectives for which the company is formed. It's important to define these objectives clearly, as the company cannot undertake activities beyond those mentioned in this clause.
www.seribangash.com
Liability Clause: It outlines the extent of liability of the company's members. In the case of companies limited by shares, the liability of members is limited to the amount unpaid on their shares. For companies limited by guarantee, members' liability is limited to the amount they undertake to contribute if the company is wound up.
https://seribangash.com/promotors-is-person-conceived-formation-company/
Capital Clause: This clause specifies the authorized capital of the company, i.e., the maximum amount of share capital the company is authorized to issue. It also mentions the division of this capital into shares and their respective nominal value.
Association Clause: It simply states that the subscribers wish to form a company and agree to become members of it, in accordance with the terms of the MOA.
Importance of Memorandum of Association:
Legal Requirement: The MOA is a legal requirement for the formation of a company. It must be filed with the Registrar of Companies during the incorporation process.
Constitutional Document: It serves as the company's constitutional document, defining its scope, powers, and limitations.
Protection of Members: It protects the interests of the company's members by clearly defining the objectives and limiting their liability.
External Communication: It provides clarity to external parties, such as investors, creditors, and regulatory authorities, regarding the company's objectives and powers.
https://seribangash.com/difference-public-and-private-company-law/
Binding Authority: The company and its members are bound by the provisions of the MOA. Any action taken beyond its scope may be considered ultra vires (beyond the powers) of the company and therefore void.
Amendment of MOA:
While the MOA lays down the company's fundamental principles, it is not entirely immutable. It can be amended, but only under specific circumstances and in compliance with legal procedures. Amendments typically require shareholder
VAT Registration Outlined In UAE: Benefits and Requirementsuae taxgpt
Vat Registration is a legal obligation for businesses meeting the threshold requirement, helping companies avoid fines and ramifications. Contact now!
https://viralsocialtrends.com/vat-registration-outlined-in-uae/
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
Affordable Stationery Printing Services in Jaipur | Navpack n PrintNavpack & Print
Looking for professional printing services in Jaipur? Navpack n Print offers high-quality and affordable stationery printing for all your business needs. Stand out with custom stationery designs and fast turnaround times. Contact us today for a quote!
Enterprise Excellence is Inclusive Excellence.pdfKaiNexus
Enterprise excellence and inclusive excellence are closely linked, and real-world challenges have shown that both are essential to the success of any organization. To achieve enterprise excellence, organizations must focus on improving their operations and processes while creating an inclusive environment that engages everyone. In this interactive session, the facilitator will highlight commonly established business practices and how they limit our ability to engage everyone every day. More importantly, though, participants will likely gain increased awareness of what we can do differently to maximize enterprise excellence through deliberate inclusion.
What is Enterprise Excellence?
Enterprise Excellence is a holistic approach that's aimed at achieving world-class performance across all aspects of the organization.
What might I learn?
A way to engage all in creating Inclusive Excellence. Lessons from the US military and their parallels to the story of Harry Potter. How belt systems and CI teams can destroy inclusive practices. How leadership language invites people to the party. There are three things leaders can do to engage everyone every day: maximizing psychological safety to create environments where folks learn, contribute, and challenge the status quo.
Who might benefit? Anyone and everyone leading folks from the shop floor to top floor.
Dr. William Harvey is a seasoned Operations Leader with extensive experience in chemical processing, manufacturing, and operations management. At Michelman, he currently oversees multiple sites, leading teams in strategic planning and coaching/practicing continuous improvement. William is set to start his eighth year of teaching at the University of Cincinnati where he teaches marketing, finance, and management. William holds various certifications in change management, quality, leadership, operational excellence, team building, and DiSC, among others.
1. VOLUME 9 2017
Not for Sale
WWW.SECUREMETRIC.COM
SECUREMETRIC TECHNOLOGY GROUP
FORMULA FOR STRONG DIGITAL SECURITY
PAGE 4-5
The Next
Big Thing
by Andreas Philipp
PAGE 6-7
FINTECHFINTECH
The Disruption in Digital Finance
PAGE 14-15 INFOGRAPHIC
SECUREMETRIC TECHNOLOGY
A DECADE IN
ADVANCING &
EMPOWERING
GLOBAL
DIGITAL SECURITY
2. Kuala Lumpur,
Malaysia - After a series of
organizing Banking Technology event in
Jakarta and Manila, Knowledge Group of
Companies Malaysia held its final regional
series of Banking & Technology
Conference in Kuala Lumpur Malaysia.
BankTech Asia 2016 was held at Nexus
Connexion Ballroom last November 8 - 9.
SecureMetric is proud to be a Gold
Sponsor for this event.
After years of preparation on
SecureMetric's latest technology
authentication product, SecureMetric
introduced CENTAGATE at the
BankTech Asia event. CENTAGATE is a
fully owned and developed product by
SecureMetric.
SECUREMETRIC JOINED
BANKTECH ASIA
KUALA LUMPUR 2016
VOLUME 9 20172 | NEWS & EVENTS
3. With the support of Mr. Sea from MIMOS, together with
SecureMetric Technology's CEO, Mr. Edward Law,
SecureMetric conducted an interesting panel discussion during
the breakout session with the topic "Meeting Requirements &
Combating Threats with latest Authentication Technology".
More than 50 delegates were present during the Day 2 session on
November 2, 2016.
These 2-day event were attended by more than 150 delegates
from the banking sector of Malaysia and other Asian region.
CENTAGATE captures the interest of the delegates. They’ve
visited SecureMetric booth to have a glimpse of the demo for
both CENTAGATE on-premise and CENTAGATE UAP
versions. A lot of follow-up meetings have been setup to further
discuss clients requirement after the event.
SecureMetric is looking forward to introduce this remarkable
solution for the banking industry in Malaysia and to urge
them the banking sector in Malaysia to actively look into
upgrading their authentication platform based on the
requirement set by Bank Negara Malaysia
ADAPTIVE
INTELLIGENCE
NEXT GENERATION
AUTHENTICATION
GATEWAY
Technology Recipient Supported by
Visit www.securemetric.com for more information
VOLUME 9 2017 NEWS & EVENTS | 3
4. Thisyear's PrimeKey PKI Tech Days
gathered approximately 80 International
PKI professionals from around the globe
at the nice and cozy Huvudsta Gård
Conference Centre, situated in Solna, just
a few minutes outside of Stockholm City.
The event has a good combination of
interesting presentations from PrimeKey
and from various customers and partners
from their extensive network. It is difficult
to think of a place where you can listen
and talk to many experts within the PKI
field at the same time.
IoT and Blockchain were certainly an
PKI TECH DAYS 2016
@ STOCKHOLM, SWEDEN
interesting topic in the market today.
Chris Adriaensen from ForgeRock talked
about on how to Identify Relationship
Management and how PKI evolve in the
age of IoT. Primekey's Chief Technology
Officer, Tomas Gustavsson discussed
about his inspiration and reflection on
Blockchain vs. PKI. Both experts
definitely blew our minds through
interesting in-depth presentations and
knowledge sharing.
We are privileged to listened to Ryan
Hurst from Google talk and it was even
more interesting since he talked about
Certificate Transparency and a
C2 Company from USA shared about the
ICT and PKI landscape in Silicon Valley.
Furthermore, we learned on how to
Benefit from e-Signatures and leverage on
eIDAS (a PKI directive by the European
Union, EU) from Cryptomathic,
Guillaume Forget.
As always, when we discuss IT security, we
need to know about possible cyber-attacks.
This matter was covered as Najwa Aaraj
from DarkMatter shared her presentation
regarding the Modern Crypto Systems
and Practical Attacks. In the same line,
we had a well-known
cryptographer, PHD Vladimir Soukharev,
ORGANISED BY PRIMEKEY,
19TH – 20TH SEPTEMBER 2016
VOLUME 9 20174 | NEWS & EVENTS
5. Probably the best PKI in the world.
Visit www.securemetric.com for more information
who shared on How To Be Ready for Tomorrow’s Quantum
Attacks. Mr. Soukharev showed us an examples of cryptographic
algorithms that can, in fact, resist quantum attacks.
During the event, PrimeKey’s team gave the audience a
comprehensive product roadmap update for EJBCA Enterprise,
SignServer Enterprise and for their PKI Appliances. It was very
interesting to learn about how PrimeKey’s R&D could incorporate
both technology trends and customer demands in different road-
maps. It is not hard to imagine why EJBCA is “probably the best
PKI” in the market now.
Last but not least, we were proud to witnessed Sea Chong Seak
from MIMOS (R&D Agency of Malaysia) who talked about his
research experiences in the space of PKI for MyKad and the New
Trend in Authentication.
In addition to all the interesting presentations, we were invit-
ed to a special cruise dinner hosted by PrimeKey. While enjoying
a good meal, we were given an opportunity to see Stockholm City,
known as “Venice of the North”, from the seaside.
All in all, PrimeKey PKI Tech Days is definitely one of the best
PKI event we have attended and surely it has already become a
“MUST GO” event on our every year calendar.
VOLUME 9 2017 NEWS & EVENTS | 5
6. WHY ENCRYPTION FALLS SHORT,
THE NEXT BIG THING!
SURE?
The Internet of Things offers great
opportunities in a world where we are
connected and online 24 hours a day.
Whether in industrial applications, such as
medical, automotive and automation
technology, or in the private sphere, with
its smart TVs and the omniscient fitness
bracelet. In all areas of the IoT, we are
dealing with data streams containing
sensitive information which, in many
areas, might even affect privacy.
For years, companies have been busy
issuing security policies and the
corresponding IT measures such as
policies, instructions, procedures and
technologies. Even in the private sphere,
we have learned how to deal with our data
in the virtual world, e.g. when disclosing
personal information in online shopping
sessions or social networks.
Should all this become obsolete with the
IoT? With the introduction of intelligent
world is still ahead: Consumers and
businesses are only willing to activate the
IoT concepts they have already prepared
after strong IT security measures have been
introduced and implemented.
Nonetheless, due to the value proposition
and promised cost reduction, we can
certainly say that IoT is real today!
Cost pressure and IT Security
A question to start with: How likely is the
identification of a potential security flaw
that causes product liability consequences
for the device manufacturer of a webcam?
A webcam today costs approximately 100$,
with a profit margin of 10% - which puts
high pressure on the costs of adding
appropriate IT security to the device.
This concerns IoT devices for
end-consumers but equally applies to the
connected objects, the doors opened up to
connected shop floor systems and
Distributed Control Systems. Does this
mean established security procedures
become obsolete?
Even in the private sector, data collection
and transfers happen between a multitude
of objects, from our Smart TVs connected
to the internet to Smart Watches on our
wrists. Where is this collected data stored
and who has access to it? Basically, the
fundamental question is: Where is my
digital self-determination?
The increasing number of security issues
over the last years shows that this is not
part of a science fiction novel. Examples
are the unprotected remote maintenance
access to industrial facilities and private
homes or the various attacks on
automobiles.
Many experts predict that the real IoT
Andreas Philipp is Vice President of Business Development
with Utimaco, the innovation leader in Hardware Security
Modules. With over 15 years of experience in software
development, project management and system implementation,
Andreas changed to technical sales for HSMs and finally ran the
worldwide sales team of Utimaco for over 10 years.
With an overall extensive experience in the Security Module
Business of 25 years, Andreas has become a well-known industry
expert and a frequent conference speaker.
VOLUME 9 20176 | ARTICLE
7. area of mechatronics and automation,
where aspects of cost pressure often drive a
cost reduction spiral and may result in low
cost = low quality.
The question arises whether considering
the security functionalities of IoT devices
from a regulatory perspective is not more
appropriate? What if there was a kind of
technical inspectorate to periodically check
whether these “IoT devices” and
implementations are secure and
trustworthy?
Information Security – Where to start
and how to realize it?
Information security is a very wide and
complex domain with different facets to
consider. As for the IoT and IoT decides,
we observe that economic interests come
before security. An HP study from 2015
about IoT devices clearly shows this and
brings the following vulnerabilities to
light:
• Poorly secured web applications which
are allow cross-site scripting or SQL
injection
• Weak user and device authentication
• Unsecured communication channels
• Unsafe pre-configurations
• Basic vulnerabilities in hardware and
software
Sure, we can address the symptoms with
appropriate countermeasures but – much
more important – the causes need to be
eradicated. Why are the device web
applications so poorly secured? Why are
errors that have been corrected long ago
(when company websites started emerging)
made again?
Do we give too little attention to security
and safety when it comes to software
development? Agile software development
methods allow us to minimize the
administrative burden and enable highly
dynamic creation of software. But what is
required is an appropriate security concept
& measures across the entire lifecycle of an
application or product.
But let's get back to the vulnerabilities that
had already been addressed in the past. The
change in software development is
certainly one of the reasons why these "old"
faults re-occur. But more generally
speaking, dedicated security testing is
needed in addition to common test
pattern. These tests range from classic
scanning of known vulnerabilities to
detecting even unknown vulnerabilities by
using fuzzing tools (confrontation of a
system with random values to produce a
misbehavior).
Embedded or not?
Let’s now look at IoT devices and
hardware. Basically, we are dealing with
computer systems embedded into devices,
systems or machines and the very special
task of control, take over control to
communications. These embedded devices
– as opposed to personal computers – do
not have the "usual" peripherals like mouse
or keyboard.
With the introduction of embedded
system such as Arduino or Raspberry Pi, it
is now a days possible to start into the
adventure of embedded programming
directly. The focus here should be on the
facet of security, where security problems
subliminally but steadily open up due to
faulty implementations in software and
hardware:
• What if a programming error causes a
command to target a wrong part in a
supposedly protected RAM area?
• Vulnerabilities that are located in the
hardware design of such units are very hard
to detect.
Another important point to consider is
whether IoT devices are designed on
hardware that withstands side channel
attacks and of which level – which brings
us back to the importance of security
testing.
Protection of privacy versus
self-determined action
Basically, you can extend this list of
security issues in the area of IoT eternally.
Depending on the IoT system and the
application, security measured need to be
taken accordingly. However, at this point,
we should take a look at another player in
this game: the user!
Why should businesses invest in security
when – on the other side – millions of users
in social networks spread personal and
private information (about holiday
destinations and timing) and reveal their
entire consumer behavior for loyalty
programs like “Miles and More” or
PayPal?
Let’s say that, as a conclusion, IT security
together with safety and privacy measures
should certainly be implemented via
regulations and inspections. But on the
other hand, it is hard to deal with the
stupidity of end-consumers...
VOLUME 9 2017 ARTICLE | 7
8. TALE OF TWO SYSTEMS
UNIQUE COMBINATION BETWEEN SWIFT
AND SECUREOTP APPLICATIONS
SWIFTis a global member-owned
cooperative and the world’s leading
provider of secure financial messaging
services. SWIFT’s messaging services are
used and trusted by more than 11,000
financial institutions in more than 200
countries.
With recent hacking involving SWIFT
infrastructure, millions of dollar could be
“transported” to cross boundaries and even
in continents. The financial impact will be
un-imaginable; SWIFT itself, usually
deployed as its own island within the
financial institution network but still
hackers manage to gain access to SWIFT
via impersonation.
Naturally Financial Institution wants to
increase the security accessing SWIFT
application and one of the requirement is
to implement MFA (Multi-Factor
Authentication).
This is unusual applications that requires
authentication that is meant for external
customers such as Retail or Corporate
Internet Banking.
The case below is one of the exceptions:
SecureMetric had been requested by
BankA to propose a solution for SWIFT
to increase the security authentication for
it’s own personnel via Multi-Factor
Authentication.
With the limited knowledge of SWIFT
Alliance Access (SAA) application, we
need to look in-depth to the software for
any supported interfaces. The best solution
provided needs to observe the following
factors:
1. Should reduce the system down time
2. Minimize the development work or
modifying the software source code (in
this scenario, any development is out of
question)
3. Minimize impact to users experience,
4. Reduce integration time
With the assistance from Bank A, we
VOLUME 9 20178 | ARTICLE
9. notice that SWIFT application does
support Radius Protocol by default and so
does Secure Metric's product, SecureOTP.
One-time Passwords? Words that
sounds familiar to us ?
Let's differentiate the meaning of
One-Time Password and RADIUS.
One-time passwords (OTP) is a password
that is only valid for only one login session,
certain time or transaction, which may
assist by OTP tokens. OTP tokens can
display some length of digits and always
change with some criteria such as time,
click event etc. Every OTP has different
seed code and that's the reason every OTP
tokens will generate different OTP even
the tokens that is manufactured by same
factory.
Remote Authentication Dial-In User
Service (RADIUS) is a networking
protocol that p r o v i d e s
centralized Authentication management
for users who connect and use a network
service. All the data communication is
encrypted by shared key that was agreed
by RADIUS server and client.
With support of OTP and RADIUS, we
proposed a solution that uses our
SecureOTP Authentication Server with
OTP token to integrate with SAA.
SecureOTP Authentication Server
provides authentication service to the
client. No code changes or any file changes
to the SAA software, but only
configuration changes from administrator
console.
Technically, the SAA will be configured to
forward authentication via RADIUS to
SecureOTP Authentication Server.
SecureOTP Authentication Server will
perform authentication and return
authentication result back to SAA. SAA
will digest the result and will allow or
reject SAA user login based on the result.
The integration was seamless, UAT was
flawless and implementation was smooth.
Each SWIFT user were presented with an
OTP token and they would used it
whenever they need to login into SAA.
Bank A then decided to integration the
other payment gateway with SecureOTP
for MFA. The payment gateway vendor
was able to integrate with SecureOTP
using web services (SOAP). SecureOTP
then has become Bank A’s internal
enterprise authentication platform for
payment gateway related application.
This is a tale of how a simple request to
implement MFA for an internal payment
gateway application has grown into an
enterprise wide internal authentication
platform for payment related gateway
system.
We encourage you to talk to us today and
who knows, there might be another tale to
tell.
Trustworthy Voice and
Message Encryption
Trustworthy Voice and
Message Encryptiong yp
For more information please visit • www.securemetric.com
VOLUME 9 2017 ARTICLE | 9
10. HOW CAN BANKS
PROTECT THEIR CLIENTS
AGAINST IDENTITY
THEFT/FRAUD?
IN a recent report, 55 million Filipino
voters information were leaked in the
internet and those with bank accounts are
now susceptible to fraud and other risk
similar to identity theft. Names, Addresses
and Birthdates that are considered vital
and valuable were exposed to the public
which can be used to identity fraud.
Identity fraud occurs when fraudsters have
an enough information about person’s
identity which engage to the misuse of
personal data in order to commit crime
and it has a huge impact on personal
finances. Some of the identity theft and
fraud are not only done through online, at
times having someone’s information is
enough to steal identity and assets.
Bank industry are thinking of possible
solutions in fighting this hideous crimes,
one of the top banks in the Philippines is
considering Fingerprint Verification in
order to protect their clients who were
affected by the said data breach.
Fingerprint Verification. Authentication
and Verification techniques are now
leaning towards the use of fingerprint
since it is harder to fake something you are
than to fake something you have or
something you know. Fingerprint
recognition is a common technique that is
widely used and becoming a popular form
of account access.
Fingerprint Verification can help bank
clients against breach of information.
Fingerprint verification have a higher
security in authentication and verification
of account holders, it ensures the
confidentiality of information in storage or
in transit. Also, it will protect institutions
for making the transactions as
non-repudiation which in turn will be
deterrent to identity theft. It is convenient,
safe, non-intrusive, and reduced
administration costs compared to
passwords and other way of verification
such as ID Cards.
As a South East Asia’s market leader in the
digital security industry and serving
clients across the world, SecureMetric
Technology offers Secugen Biometrics
Solutions’ Hamster Pro 20 fingerprint
scanner. Hamster Pro 20 is an
ultra-compact and rugged design USB
Based fingerprint scanner industrial grade
device which can easily be deployed on the
branches.
Hamster Pro 20 Benefits and Features:
1. Create confidence and high trust to your
client that you are using a high quality and
certified fingerprint scanner.
2. Fast and Easy deployment to different
branches
3. Rugged, Heavy Duty and Maintenance
Free
4. Makes customers at ease that their
sensitive information are highly secured
FBI and STQC Certified, FIPS 201
Approved List and FAP 20 Compliant
Ultra-compact, lightweight and portable
IP65 rated for dust and water-resistance
Sensor resistant to scratches, impact,
vibration and electrostatic shock
Encryption of fingerprint templates (with
SecuGen Proprietary templates)
Latent print image removal (does not
accept prints left behind)
5. Auto-On™ (Automatic Finger
Placement Detection) Scan your finger as
soon as you touch the sensor – all without
having to prompt the system.
6. Smart Capture™ (Automatic Image
Adjustment to Accommodate Moist &
Dry Fingers) Ensures quality fingerprint
scanning of difficult fingers
7. Low Cost
Quality & solid built-up but comes in a
competitive pricing
VOLUME 9 201710 | ARTICLE
11. STAY PROTECTED
AND AVOID HACKERS
FROM STEALING
YOUR INFORMATION
BUSINESSES like
hospitals, governments, banks, academies
and corporations are mostly affected by
cyber attack and fraudulent transaction
since these industries has a vital data that
provide precise, timely and absolute
personal information shared by their
customers. With the wide digital
transformation, there are a lot of ways
cyber criminals are using in stealing such
data. Stealing of information can be
through email and online account (e.g
social media, online banking and the like).
Having a weak code is one cause of
security breach, password are use to restrict
unauthorized person to utilize their
personal account and to protect their data
from cyber criminals. Through password,
the security of personal data is assigned to
users of particular system rather than the
administrators, that's why people are
always reminded to have a lengthy and
intricate password which it will be
harder for the attacker
to gain access to user's
credentials. Most of
people reuse
passwords for their
different accounts
and this is risky as
hackers could access their
personal account. But can a single
password is enough to secure people from
hacking? Strong passwords are essential to
protect someone’s online accounts but
having two-factor authentication is more
secure than relying on a single password.
Having a password alone is not enough to
be protected since it is easy to guess and to
crack.
Two-factor authentication adds an extra
step in basic log-in procedure and it can
reduce the rate of online fraud. It
requires both something you know
which is the password and
something you have which can
be a phone or a token . By using
an One Time Password Token
it could be the best choice of
authentication method to
strengthen system security.
Security is extremely
important today and
companies whether big or
small can no longer be safe
from any cyber
attack. In the
world of
technology, change is inevitable and it is
important to stay ahead of the curve, by
using two-factor authentication is a
big step to keep away from
hackers. Also, people
should be aware and
educated on the possible
ways on how their
credentials can be
protected and make
sure that they use
distinctive and
secure password
for each of their
online account.
VOLUME 9 2017 ARTICLE | 11
12. SOFTWARE
SECURITY THROUGH
HARDWARE
Securityis an issue that
everyone would want to have and attain —
may it be personal security, national
security, network security and information
security, but in the advanced world of
software industry the most vital of things
to secure is the intellectual property. It is
necessary for every Software Developers to
have a solid grasp of intellectual property
rights and apply it to the Software
Industry.
Software Developers need to have a broad
knowledge about their rights to develop
and to protect their product. They have to
ensure exclusive ownership, confidentiality
of their work to have an advantage in the
competitive market. With the rapid
growth of technology, software firms are
looking for a simple and cost effective way
on how software can be protected.
Now, you might be wondering what could
be the most effective, possible way of
protecting software's — is it by using
encryption code which among others is
most commonly used by developers as it
allows them to decrypt the code or is it
much more secured if the developers have
a software security through a hardware?
Protecting software using codes and
license can be effective and more cheaper,
however, it may not provide full security
that a software needs. Today, encryption
system can be hard for people to crack or
decode, but the advances in technology
and software development could make it
effortless for them to pirate the software.
Industry experts agree that the
hardware-based protection provides
maximum security as it avoids to abuse the
software. This hardware protection is
known as a dongle or USB hardware key ,
a device incorporated with the software. It
controls the end-user on how to use the
software and the end-user’s access to the
software is managed by the dongle.
Security based upon hardware is more
convenient, functional and it is harder to
modify.
Whichever security protection you decide
to make use of, be sure that it matches your
software’s need and you have a good
knowledge of how it works and how will it
be beneficial for you or your business. And
of course, you have to consider the level of
security that your software requires.
For more information please visit • www.securemetric.com
Smarter Way To Protect
Your Software
VOLUME 9 201712 | ARTICLE
13. THE IMPORTANCE OF
SOFTWARE PROTECTION IN
THE INDUSTRY AND
ECONOMY
According to software
alliance, “more than four out of ten
software programs installed on personal
computers around the world were stolen,
with a commercial value of more than $51
billion.” In this case, not only the revenue
of the company is affected by this illegal
activity but the economy as well.
Most software firm in different countries
have problem on illegally distributed
software. Some of the businesses buy
licenses for a limited number of computers
and install it to more than the number of
computers allocated for them. Piracy has a
big impact to software industry, making it
less profitable, that ’s why software
industry are taking serious actions in
protecting their revenues and if piracy will
lessen, the economic benefit will increase.
It also devalue the work of Software
Developers which can lead to loss of jobs.
Study shows that lowering software piracy
by just 10 percent would create bigger
amount of employment rate.
So, the question is how can we resolve this
piracy issue? Software Developers are
implementing different means of lessening
piracy by changing on how software is
distributed to make it harder to decrypt
the code. With a wide range of security
options , developers also considering the
cost will be in terms of resources and time
on deciding on what possible security
system should they implement. Software
Developers use the profit from selling the
software’s in continuing research and
development for continuous advancement
and innovation of technology. Developing
software is a team effort from the
developers, sharing their creative ideas to
develop useful software’s. At the end of the
day, educating staff on this matter is one of
the most important ways in helping to
ensure software compliance to benefit all
developers and organizations affected by
this piracy issue.
VOLUME 9 2017 ARTICLE | 13
14. FINT
SERVICE-BASED INVESTING
Upcoming industry of paid
services around low-cost
investing
ROBO INVESTING
Online wealth management service providing automated, algorithm-based
portfolio management advice without using human financial planners
DIGITAL-BASED EQUITY CROWDFUNDING
Digital platforms offering accredited
investors the option to fund seed and
early stage companies
18.8%
Data analysis for better
decision making
$
$
14%
Payments and
International Transfers
13.4%
Lending$
11.3%
Small Business
Financial Solutions
6.5%
Bitcoin
6.5%
Identity
5.9%
Blockchain
5.4%
Personal
Finance
1.6%
Banking
5.9%
Shopping
FINTECH LATEST TRENDS
THE TRENDING FINTECH STARTUPS
6.5%
International
Transfer
5.9%
Mobile$
TOP REASONS WHY CONSUMERS
ADOPT FINTECH SOLUTIONS
43.4%
Easy to set up
an account
15.4%
More attractive
rates/fees
12.4%
Access to different
products and services
11.2%
Better online experience and functionality
10.3%
Better quality of service
5.5%
More innovative products
than available from
traditional bank
1.8%
Greater level of trust than
the traditional institutions
$
The Disruption in
15. ECH
FINANCE/
LENDING
COMPANIES
Attracted $567
million in funds,
the largest compared
to other categories
PAYMENT
RAILS
COMPANIES
Raised $416
million
MOBILE
WALLET
COMPANIES
Raised $286
million
FINTECH INVESTMENT CATEGORIES
PAYMENTS IN THE BLINK OF AN EYE
Finance/Lending
$
19%
Processing/Payment Gateways/Rails
14%
Mobile Wallet/White Label
10%
Authentication/Security/Fraud Analysis
7%
Remittance
7%
PSP
6%
Banks/Mobile Banking
4%
Prepaid Cards
2%
Networks
1%
Others
30%
$
$
$
IN 2013 & 2014
PAYMENT AS EASY AS A TAP, TOUCH OR A BLINK
Digital Finance
Source: http://www.fintech.finance/featured/fintech-digitally-disrupting-the-financial-world-infographic/
16. CENTRAL BANK UPDATE
A NEW POLICY
INthe beginning of 2016, there is a surge
of requests from financial institutions to
upgrade the security features these
requests ranges from enabling
Multi-Factor Authentication (MFA) for
Retail and / or Corporate Internet
Banking Portals to Secure Remote Access
Applications.
The surge of requests may be attributed to
the recent internet hacking incidents that
made it to the worldwide headlines,
prompting the various central banks to
issue instructions for financial institutions
to further enhance the security feature for
both customer facing application such as
internet banking or remote access
applications egvpn / remote desktop
service.
According to Wikipedia.com, “In
February 2016, instructions to steal
US$951 million from Bangladesh Bank,
the central bank of Bangladesh, were
issued via the SWIF T network. Five
transactions issued by hackers, worth
US$101 million and withdrawn from a
Bangladesh Bank account at the Federal
Reserve Bank of New York, succeeded,
with US$20 million traced to Sri Lanka
(since recovered) and US$81 million to the
Philippines (about $18 million recovered).
The Federal Reserve Bank of NY blocked
the remaining thirty transactions,
amounting to US$850 million, at the
request of Bangladesh Bank”.This incident
must be one of the biggest heist of
all-time, prompting a string of
resignations from the governor of
Bangladesh Bank to the presidents of
banks that were implicated in the scam.
This is probably the first incident that
involves government agency with private
financial institutions via a global banking
network.
Key weaknesses have been attributed to
lack of proper anti-virus software for
desktops, used to fulfill the transactions
in-adequate network protection devices
such as firewall and lack of remote access
control procedures.
We need to be aware that SECURITY for
both local and remote user access is no
longer an afterthought or just barely
fulfilling a checklist for compliance
purposes. The impact can cost hundreds of
millions, and hackers are using more
complicated methods and tools of gaining
access or trust to global financial network.
Investing into network protection devices
is compulsory and highly recommended to
secure user access via Multi-Factor
Authentication. Username and password is
insufficient to access high value
transactions related applications. We need
to wake up and face realities.
VOLUME 9 201716 | ARTICLE
17. SECUREMETRIC JOINED
ISOG SUMMIT 2016
MANILA, Philippines
- Information Security Organization
Group (ISOG) aim to build a culture of
Information Security through ISOG
Summit held last September 29-30 at
SMX Convention Center, Taguig. ISOG
is a team of Chief Information Security
Officers (CISO) from different financial
institutions with a mission to strengthen
information security through awareness
and education programs within
Philippines' banking and financial sector.
This two-day event addresses cyber-threats
to the advances of technology and how
these threats can be resolved. The event
was a success attended by more than 250
delegates from public and private sector,
vendors & service providers, policy
makers, government and leading
associations with the latest industry
standards with regard to cyber-security.
Fraud Management, Establishment of
Cyber-Forensics Teams, Security
Incidents and Events Management
(SIEM), Establishment of Security
Operations Centers (SOCs) were some of
the topics highlighted during the summit
and has been tackled by thirty-five (35)
resource speakers that is comprised of law
enforcement, corporate world, legal
specialization of cyber law and industry
leaders.
Mr. Manuel Joey Regala, ISOG's
president and founding member delivered
the opening remarks, he explained that
constant vigilance by way of policies,
procedures, technology solutions and total
participation by all of an organization's
stakeholders is the most effective antidote
to digital threats. "Organizations must
now connect and collaborate with other
organizations in their respective industries
as well as with other organizations in other
industries, they must also coordinate with
government policymakers and law
enforcers", he also added.
Over 30 exhibitors joined the summit and
as a South East Asian market leader in the
digital security industry, SecureMetric
Technology was one of the exhibitor who
participated in this historic event
organized by ISOG and was privileged to
be part of it. Numerous delegates visited
SecurMetric booth and showed interest on
the solution and products that are suitable
for organizations of different industries
and of any size. SecureMetric offers a wide
array of digital security solutions to help
clients defend their business against the
latest security threats and risks.
ISOG Summit was a good avenue to learn
and be aware of strategies and methods
with regard to information security
VOLUME 9 2017 NEWS & EVENTS | 17
18. IMPROVEMENTS ON
ELECTRONIC
TRANSACTIONS
HANOI,Vietnam-
The South East Asia’s market leader in
digital security, SecureMetric Technology
together with Malaysia’s Information and
Communications Technology Research
Center, MIMOS and the worldwide
supplier of professional cyber security
solution, UTIMACO, joined forces to
present a seminar that focuses on the
analysis of Centralized Authentication
Gateway solution (CENTAGATE) with
UAP, a new authentication technology
that integrates many different
authentication methods that helps to
mitigate network attacks. The seminar
theme is “Authentication in full
Information”. It was held last August 2,
2016 at Intercontinental Hotel, attended
by IT Directors (CIO) from the bank,
Officials in charge of Safety Information
from Financial Institutions and Insurance
in Vietnam.
Mr. Kang Siong, an expert from Center for
Research and National Development of
Malaysia (MIMOS) mentioned that today
and in the near future, the use of
traditional authentication method (eg:
User Name and Password) will still be
common in any online transaction and this
basic authentication has a lowest form of
security unlike with One-Time
Password(OTP), Certificate, Token, Bar
Codes and the like. By using a weak
password there will be a big chance of
hackers to steal personal information that
can be used to any cyber crime. There were
issues raised that using a multiple separate
authentication method in similar
transaction will be difficult for the user
since it will take more time and still have
the risk of any vulnerability. Mr. Kang
Siong shared his knowledge on how
CENTAGATE with the new UAP
authentication technology could play a
vast role to overcome this kind of
vulnerability.
C E N T A G A T E
integrates different
authentication method.
For instance, using smart
phones to create a
password and a barcode to
be scanned through
laptop camera to identify
and to have access.
IT Director of Prime
Minister office, Mr.
Ahmad Zulkfi is one
of the speaker who
discussed his
experience in using
authentication solution
for the Agency of the
Government of Malaysia specifically in
the Finance Ministry. According to him,
the Government of Malaysia is using
Centralized Authentication Solutions
since 2013, “This solution has a high
stability, continuous 24/7 operation,
fast response time, reduce costs and no
incidents happened since I used the
application”, Mr. Zulkfi added.
Evaluation of information security
incidents takes place in Vietnam in
recent times. CIO office, Malaysian
Prime Minister and SecureMetric
Technology’s Chief Executive
Officer, Mr. Edward Law shares the
security concerns of full information
that the agencies and organizations in
Vietnam are currently experiencing.They
stated that since 2013, the agencies and
organizations of Malaysia also suffered
from numerous hacker attacks on the
n technology could play a
o overcome this kind of
A G A T E
different
n method.
using smart
create a
d a barcode to
d through
a to identify
access.
of Prime
ffice, Mr.
kfi is one
ker who
his
in using
n solution
ncy of the
of Malaysia specifically in
Ministry. According to him,
ment of Malaysia is using
Authentication Solutions
“This solution has a high
ntinuous 24/7 operation,
time, reduce costs and no
ppened since I used the
Mr. Zulkfi added.
of information security
kes place in Vietnam in
CIO office, Malaysian
ster and SecureMetric
Chief Executive
Edward Law shares the
erns of full information
cies and organizations in
currently experiencing.They
ince 2013, the agencies and
s of Malaysia also suffered
us hacker attacks on the
VOLUME 9 201718 | NEWS & EVENTS
19. service system.
A strategy for security and safety information that is applicable to
the agencies and organizations has developed by the Malaysian
government in which it emphasizes the authentication solution.
Hence, Malaysia has lessen the attacks on network.
Questions from the delegates were entertained by technology
experts, most of delegates concern is about the feasibility of
solutions, compatibility with the software being used in the
organization. Delegates expresses their interest in the new
Authentication Solution offered by SecureMetric Technology.
SecureMetric Technology develops robust enterprise security
solution with all the essential product and service to meet client’s
needs in the most cost and time effective manner, based in Kuala
Lumpur with subsidiaries in Hanoi, Ho Chi Minh City, Jakarta,
Yangon, Singapore and Manila. With more than 15 years of
security experience in serving clients across the world.
SecureMetric Technology has successfully implemented many
projects for Multi-Factor Authentication and Public Key
Infrastructure(PKI) security projects both private and public
sector.
VOLUME 9 2017 NEWS & EVENTS | 19
20. SECUREMETRIC JOINED
ITIP NATIONAL
CONFERENCE 2016
BAGUIO CITY,
Philippines- I.T Interaction
Philippines (ITIP) held their 13th
Annual National Conference last
November 10-12,2016 at Camp John Hay
Trade and Cultural Center in Baguio City.
I.T Interaction Philippines (ITIP) is a
non-stock and non-profit professional
organization of large IBM users whose
members are represented by high-level
management from companies belonging to
the top local and multi-national
corporations. These three (3)-day event
intended to strengthen the organization's
objective, which is to serve as a venue and
opportunity for exchange of common
IT-related professional interests among its
members.
More than 300 delegates from banking
and finance, utilities, telecommunications,
manufacturing, distribution, retail,
government and software integrators were
present during the event to broaden their
knowledge on the New Trends in
Technology that they can utilize in their
respective industry. This year's convention
theme was “ITIP Cognitive Convergence:
A Meeting of Minds and Technologies”.
During the first day, 2016 ITIP President,
Mr. Roseller Lim welcome the delegates.
Opening remarks was delivered by IBM
Philippines' President & Country General
Manager, Mr. Luis Pineda and DICT
Chief Atty. Rodolfo Salalima conducted
the keynote presentation. Baguio City
Mayor, Hon. Mauricio Domogan was also
present during the event.
There were twenty-six (26) foreign and
local influential speakers talked about
current issues, management, new
developments in technology that has an
impact in the business industry. One of the
topic discussed is about the new cloud era
and big data storage, the speakers
explained on how these advancement in
technology can be a benefit in their
business strategies. Delegates were also
educated on the cyber security and its
transformation.
There were twenty-one (21) companies
from diverse industries sponsored the
event to show support to ITIP and as a
digital security provider, SecureMetric
Technology participated as one of the
exhibitor in the said event. SecureMetric
Technology was able to informed people
from varied business about the importance
of cyber security in their industry. These
three(3)-day event helped Securemetric
Technology to addressed and understand
clients digital security needs that will help
to improve SecureMetric's products and
services. With wide-array of products and
solution that SecureMetric Technology
has to offer, delegates from the event
showed interest on SecureMetric's
Two-Factor Authentication Token
,CENTAGATE, Biometric Solution and
Signature Pad.
With the vast cyber attack that is
happening in the business industries,
SecureMetric Technology will continue to
identify technology trends and will
develop solution that can help their clients
to defend them against latest security
threats and risk.
VOLUME 9 201720 | NEWS & EVENTS
21. SECUREMETRIC JOINING
TECHMART
HANOI 2016
Hanoi, Vietnam
Technology and equipment fair was held
annually with the aim of supporting and
connecting organizations to have the
technology and equipment be recognized
by the companies. Techmart organized
exhibitions which products were
introduced and promoted through media
activities and trade promotion before,
during and after the fair. Domestic and
foreign firms also have the chance to
introduce and sell their products and
technology on the event. With the
collaboration between Hanoi City
People's Committee and the Ministry of
Science and Technology, Technology &
Equipment Fair 2016 (Techmart 2016)
was held at the Museum of Hanoi, Pham
Hung street, Me Tri, Nam Tu Liem
District, Hanoi.
Techmart Hanoi 2016 took place from 28
September to 01 October,2016. The
convention have more than 430 booths
displaying their products and technology.
There were more than 30 booths from
foreign countries such as Japan, Germany,
China, Korea. There were also
participating booths from the provinces,
cities, universities, colleges, research
institutes of defence ministry, state
institutions, enterprises, organizations and
individuals with products and new
technology
Products and Technologies were
introduced at Techmart Hanoi 2016
focused on the information technology
field, electronic products, production line
automation, mechanical products,
manufacturing machinery for agriculture,
industrial, transportation, urban
management, preservation technology,
agro-forestry-fishery, food, high-tech
agriculture, plant varieties, animal breeds
of high economic value, environmental
treatment technologies, technology and
equipment for ancillary industries.
SecureMetric joined Techmart Hanoi
2016 to introduce its security solutions
and products to the Vietnam market and
Southeast Asia region. SecureMetric also
introduced PKI in Box, Centagate,
Software License Protection, Fingerprint
Reader, and Card Reader to delegates and
visitors who visited the booth. Our
products and solutions caught the
attention of the visitors during the exhibit.
SecureMetric has been invited to several
follow up meetings after the event.
SecureDongle, RFID reader were among
the top enquire products in this event and
SecureMetric is looking forward to close
some of its leads they got from the event.
VOLUME 9 2017 NEWS & EVENTS | 21
22. SECUREMETRIC JOINED
THE 3RD CYBERCRIME
SUMMIT
MANILA, Philippines
– Last March 15-16 2016, the
Anti-Cybercrime Group (ACG) and the
Philippine National Police (PNP)
cybercrime unit, in partnership with
Philippine Computer Emergency
Response Team(PhCert), Philippine
Institute of Cyber Security
Professionals(PICSPro), Bank Security
Management Association (BSMA) and
Information Security Officers Group
(ISOG) helped hand in hand in
organizing the 3rd Cybercrime Summit at
the PNP Multi-Purpose Center in Cramp
Crame, Quezon City. These two-day event
focused on the theme “Sustainable
Economy through Cyber Security”. PNP
Anti-Cybercrime Group Acting Director,
Police Senior Superintendent Guillermo
Lorenzo Eleazar welcome the Top
Top Executives and Senior Information
Security Officers from Business Sectors,
Government, Civil Society and Academe.
The delegates were informed on the latest
forms of cybercrime and how it affects the
economy during the summit. There were
twenty-three expert resource speakers who
shared their thoughts on how businesses
can be protected from the harm that these
cybercrime can cause. Online Scams,
Impact of Intellectual Properties in
Cybercrime and Technical Perspective of
Cyber Security were the topics that has
been given the utmost importance during
the seminar. Nonetheless, all the other
topics that were discussed are useful
especially now a days that cybercrime has
continued to grow and has become a
serious problem with an immense effect on
individuals, businesses and national
economies. There was a panel discussion
where delegates were able to provide an
opportunity to ask questions to the
speakers about cyber security and also, give
their different point of view on the said
topic.
Having the capacity to protect its clients
from the latest threats and risks,
SecureMetric Philippines participated as a
Silver Sponsor on this two-day event.
SMPH was able to market and introduce
its products and solutions to the attendees
as the convention is relevant to the service
and product that SMPH offers.
SecureMetric Philippines’ Vice-President
& Country Manager, Ms. Aimee Asanza
received a plaque of appreciation had the
privilege to award the Samsung A5 hand
phone to the raffle winner.
Key Management Solution
For more information please visit • www.securemetric.com
VOLUME 9 201722 | NEWS & EVENTS
23. MANILA, Philippines
SecureMetric Technology has participated
as a minor sponsor to the 2016 Chamber
of Thrift Banks Annual Convention last
March 18 at Dusit Thani Manila, Makati
City. Chamber of Thrift Banks is the
umbrella organization of the country’s
thrift banks and was organized primarily
to provide an institutional medium
through which members can collectively
assist and cooperate with one another, as
well as with other members of banking
sector, the national government and its
instrumentalities, more particularly the
Bangko Sentral ng Pilipinas (BSP). It aims
to promote, develop, expand and
strengthen the role of savings and loan
associations, private development banks
and savings and mortgage banks
(otherwise known as thrift institutions).
This year’s convention theme is
“Sustaining the Momentum for Inclusive
Growth”, attended by different members
bank, information technology experts and
other institutions. Tech-enabled consumer
lending, credit bureau services, economy,
banking facility/technology for thrift
banks and credit information system were
the highlighted topic during the event.The
ribbon cutting ceremony was conducted by
Bangko Sentral Deputy Governor, Mr.
Nestor Espenilla Jr., RCBC’s President &
CEO and CTB President, Mr. Rommel
Latinazo, City Savings Bank’s President &
CEO and the Convention Chairman, Mr.
Catalino Abacan to open the exhibit
followed by the keynote address delivered
by Bangko Sentral ng Pilipinas Governor,
Hon. Amado Tetangco JR. Chamber of
Thrift Banks’ induction of officers was also
held during the convention.
SecuMetric’s Senior Manager for
Pre-Sales, Mr. Chew Eng Siong is
privileged to explained to the delegates on
how to prevent and defend their business
from cyber attack through
CENTAGATE, since bank industry has
always been a victim of fraud and scams.
He also share the recent security breaches
and how cyber criminals are getting
innovative, exploiting security loopholes,
taking advantage of the unawareness of the
people about cyber security.
The convention has been an excellent
avenue for exchange of ideas, knowledge
and perspective not only to promote
well-being of the thrift banking sector but
also to see possibilities toward
contributing to the country’s social and
economic goals.
SECUREMETRIC JOINED
CHAMBER OF THRIFT BANKS
ANNUAL CONVENTION 2016
VOLUME 9 2017 NEWS & EVENTS | 23
24. BANK TECH ASIA 2016:
WHERE BANKING MEETS
TECHNOLOGY
MANILA, Philippines
With an impressive track record in
developing and running cutting edge
business related events, conference,
workshops and in-house training program,
Knowledge Group of Companies is behind
the success of the 8th Annual Premier
Banking Technology Event held at Dusit
Thani, Makati last May 24-25.
Endorsed by Malaysia Digital Economy
Corporation (MDEC), Banking
Technology Asia is a conference for
banking technology and fintech enthusiast
to have a better idea and anticipation of
the banking technology future.
More than 60 delegates from Top
Management, Business Units &
Supporting Units and Information
Technology of different banks in
Singapore, UAE, Malaysia, Vietnam,
Pakistan, bBangladesh and Philippines
were present during the event. Bank Tech
Asia’s organizing chairperson, Mr. Vincent
Fong welcome the delegates. These 2-day
event address various topics on the
opportunities and strategies on how
technology can integrate in the banking
industry, expert speakers also explained
that the advances in technology allows the
bank products and services more
convenient and effective to use.
SecureMetric’s Chief Executive Officer,
Mr. Edward Law together with eProtea
MSC’s Managing Director, Mr. Jeffrey
Fok-Boon Hung, iPay88’s Technical
Director, Mr. Khong Kok Loong shared
their insights about FSI versus Cyber
Criminals. Akati Consulting’s Chief
Executive Officer, Mr. Krishna Rajagopal
facilitated the panel discussion. In the
discussion, it was intricate that the cyber
criminals usually involve illegal access on
one or more computer systems to steal
information and it isv currently
experiencing by the banking industry. By
having an intensive background in
btechnology, panelist gave their opinion
on how to prevent and resolve this hideous
crime.
SecureMetric Technology participated as
one of the event’s exhibitor and took the
opportunity to market its products and
services that would meet security
requirements of the banking industry
compliance. CENTAGATE, is a
SecureMetric solution that can help to
prevent and defend bank industry from
cyber attack.
VOLUME 9 201724 | NEWS & EVENTS
25. SECUREMETRIC JOINED
RSA CONFERENCE
2016
SINGAPORE- RSA
Conference2016
The world’s largest information security
event, was held last July 20-22, 2016 at the
Marina Bay Sands Singapore. RSA
Conference conducts information security
events around the globe that connects
business people to industry leaders.
This three-day event have informative
sessions with five tracks which tackled
Cloud, Mobile, Iot Security, eFraud, Law
Enforcement, Global Perspective,
Security Strategy, Data Security, Threats
and Threat Actors. The event was attended
with around 6,200 registrants that
featured more than 85 speakers and has an
intensive learning sessions that focuses on
the latest information security issues and
strategies. Attendees were informed about
the swift changes currently happening in
the industry and keeping them in line with
the advanced defence against cyber threats.
Opening address was delivered by
Singapore’s Minister for Home Affairs
& for law, Minister K Shanmugam, in
which he highlighted the Ministry of
Health Affairs' strategy in fighting
cybercrime by arranging future plans and
priorities. RSA President Amit Yoran was
the keynote speaker during the event,
whilst the closing keynote was led by Bob
Geldof, a well renowned musician known
for his political activism particularly in his
anti-poverty efforts.
Another part of this event was a panel
discussion wherein one of the topics
discussed was about, “Asian nation get
smarter, but are they more secure?”. The
panellist included were International
Association of Privacy Professionals
Chairman Hilary Wandall, Ernst Young
Asia Pacific Cyber Security Leader Mr.
Paul O’ Rourke, Head of Cyber,
Commercial Solutions, JAPAC, Bae
Systems’ Mr. Alex Traverner and RSA’s
Chief Technology Officer Mr. Zulfikar
Ramzan.
More than 100 eminent exhibitors in
different region showcased their current
cyber security products and solutions.
SecureMetric Technology and
UTIMACO were one of the various
exhibitors that exposed their innovative
technologies that can help secure and
protect businesses against digital threats
and risk.
Primekey was also present during the
event and visited SecureMetric and
UTIMACO booth. Primekey has been in
partnership with SecureMetric
Technology and UTIMACO. These
companies joined forces together to
defend their clients in any possible cyber
attacks.
VOLUME 9 2017 NEWS & EVENTS | 25
26. CENTAGATE
UNIFIED AUTHENTICATION
PLATFORM
Organisations with multiple enterprise systems require optimised and centralised
multi-factor authentication with single sign-on capabilities across a wide variety of
business units and functions. The complexity of managing user IDs is moving towards
seamless identity management using a trust model as a framework.
What is CENTAGATE® UAP?
The research and development of CENTAGATE® UAP based on SAML
2.0 Specification addresses problems related to the increase of operational
risks attributed to users and system administrators who control and provide
cross-application functionalities in heterogeneous applications.
The growth of heterogeneous applications in an enterprise is inevitable due
to the proliferation of web-based applications available; within a firewall in
an Intranet or even outside a firewall in the Internet to run application
services.
CENTAGATE® UAP is designed to manage front-end application
authentication using an established protocol, Secure Assertion Markup
Language (SAML) protocol, which provides a centralised authentication
framework and aims to reduce significant application changes at the
backend.
Adaptive Multi-Factor User Access and Transaction Security
CERTIFICATE
2D-BARCODE
OTP
TIME-CONSTRAINED KEY
PASSWORD
CENTAGATE® Unified Authentication Platform
Advantages
Identification of usage and activities can be
centrally tracked and traced. This delivers
organised data integrity whereby a single
source of information can be properly
managed for a user life cycle i.e.
registration, activation, deletion,
termination and so on.
Containment of
Operational Risks
Cross-functions features enable
stakeholders to benefit enterprise- wide
from system owners, to system
administrators, to system developers and
system users. These benefits can be
translated from resources into terms of
time and money.
Amplified
Productivity
Minimise multiple changes result to less
impact and reduced cost as the platform is
managed centrally.
Reduced Cost
VOLUME 9 201726 | PRODUCT HIGHLIGHT
27. Present Challenges: Big Data And Security
Authentication
Database
Authentication
Database
Authentication
Database
Authentication
Database
Username
+ Password
Identity Card
Username + PIN
+ SMS TAC
Username + OTP
Application A
Application B
Application C
Application D
Current
User Authentication
Database
Certificate
Password
Time-Constrained
Key
2D-Barcode
OTP
Desired
User
Application A
Application B
Application C
Application D
Common Scenario vs Desired Scenario
The world is currently enduring a “big data” boom, hoping that an
explosion of data will bring solutions to a myriad of problems, from
preventing terrorist attacks to anticipating the next technology
trend and mitigating natural disasters before they happen.
In retrospect, not a day has gone by that cyber espionage cam-
paigns are uncovered, shadowy hacker groups infiltrate prominent
websites and endless streams of riveting disclosures occur involving
various government agencies across the globe.
As a result, standard security measures such as Secure Sockets
Layer (SSL) and Transport Layer Security (TLS) are not to be fully
relied on as they are at risk of eavesdropping. It is here the manage-
ment of privacy and the security of information of the very people
that reside in the system that is key.
Scalable High Trust Financial Systems
Federal financial planning, budgeting, monitoring and reporting
systems need enhanced authority over expenditure management
given limited resources. Streamlining of access is necessary to
reduce the risk of information leaks, fraud and ensure security.
CENTAGATE® UAP supports this via:
Within an enterprise environment, for example, applications
pertaining to budget approval that are set at a higher trust level
may require additional methods of authentication which is provid-
ed by CENTAGATE® UAP. In addition, based on the login
behaviour of the user such as a change in device location or login
time, CENTAGATE® UAP may request user for additional
authentication.
CENTAGATE® UAP comprises multiple authentication methods
with different trust values. Therein, enterprise systems can have the
flexibility to set the type of authentication method to facilitate
secured user access. Users also have the option to choose their
preferred method to login to the system.
CENTAGATE®
UAP System Architecture
Multi-Factor Authentication
Tokens such as
OTP Token, PKI Token and
Smart Card
Knowledge such as
SMS PIN, picture with
passphase
Cross-Function Services
Platform
Integration
Audit
Profile
Provision
Mgmt
Adaptive
Authentication
Multi-Factor
Authentication
VOLUME 9 2017 PRODUCT HIGHLIGHT | 27
28. Raya have been the biggest celebration of all Muslims in
Malaysia. As a multi racial country, this remarkable holiday is
celebrated by all races.This year, SecureMetric together with their close
partner, Utimaco, organised their first Raya Open House dinner for all
their clients and partners. This event was held at Mandarin Oriental
Hotel in Kuala Lumpur, Malaysia last 14 July 2016. SecureMetric
invited more than 80 people from different industries such as software
and system integrators, banking and security. Everyone enjoyed the
sumptuous buffet dinner served by the hotel. There were so much joy
and SecureMetric staff get a chance to share their knowledge to all
attendees.We are looking forward to organise another Hari Raya Open
House next year.
SECUREMETRIC & UTIMACO
HARI RAYA
OPEN HOUSE
@ MANDARIN
ORIENTAL
VOLUME 9 201728 | NEWS & EVENTS