Connect with us

Technology

THE PRAGMATIST’S GUIDE TO AI CYBERSECURITY SKILLS

Spencer Young, Regional Vice President EMEA at Imperva

 

Security teams – like the rest of the business world – are used to hearing about how AI and automation are going to change their jobs, hopefully for the better. Research from LinkedIn recently found that specialist machine learning jobs have seen a six times increase over the last year. But there’s a major problem with the sheer number of new skills that employees would need to learn in order to become experts in emerging AI technology. There’s a risk that if too much is asked of cybersecurity professionals in terms of upskilling, the overall balance of work actually tips in the wrong direction, leaving them overburdened.

But it’s nevertheless the case that AI will have a transformative impact on cybersecurity practice over the coming few years – so no-one can afford to ignore it. How can you achieve true balance?

The answer can be found with the three bears: not too much training, not too little – just the right amount. AI training programmes should be carefully aligned to business need and individual responsibility, paring down the mountain into usable, and necessary, chunks. It’s the same principle that guides all technology change: don’t overburden your teams with masses of learning, but also don’t allow your company to slip behind the competition through fear of change.

That balance is particularly tough when it comes to AI. It’s been so heavily trailered over the last few years that the whole world seems to be holding its breath for the inevitable robot invasion. But in reality, we’re still a long way from truly independent artificial intelligence. Too often, when people talk about AI, they mean some derivation of automation or machine learning – processes which still require a good amount of human input and minding.

We’re still essentially at the level of human-guided computer programmes – but as the complexity of their functions increases, so does the amount of training required to run them. With that in mind, here are three key areas to consider when implementing AI and automation.

 

Which skills are essential?

Before you get started, dedicate plenty of time to working out which machine learning solutions are best matched to your security needs. Don’t flood your security team with new tools just because they sound good – do they address problems your company faces on a regular basis?

For example, automated email text analysis is likely to be useful for most companies, helping their filters spot suspicious messages with more accuracy. Response orchestration, on the other hand, may be less urgent for large security teams with plenty of manpower than small ones without enough bandwidth to manage every task.

By selecting only those solutions that address essential needs, you can keep upskilling requirements to a minimum, whilst ensuring you have the best possible defence in place.

 

Lead from the front

Once you’ve decided which AI solutions will benefit your business, it’s a good idea to establish new ‘skill heads’ – for example, to manage automated detection of insider threats – in tandem with upskilling existing staff. By providing a single point of contact for each new skill, you provide not only a friendly face to answer questions, but also a role model for others in the company to follow – a humanisation of the job in hand. ‘We’re rolling out a new system’ sounds like a lot of work; ‘Anna is going to show you how she’s been using this new tool’ is more manageable.

By giving one person responsibility for the uptake and rollout of the new skill also helps to ensure that any wrinkles are picked up quickly and dealt with, and that updates and changes to the system are quickly folded into the practice of the business. It also saves each team member from having to learn the whole system from scratch – if there’s a single point of contact, the skill head can act as a one-stop-shop for advice on that particular system.

 

Remember the reality of AI

A realistic view of how advanced AI technology is at present should always underpin your security training and purchasing. Businesses need to make investment of time and money without trend chasing. Working with an experienced provider can help – having a knowledgeable voice to advise you on which solutions are worth the time can make the difference between improving your security team’s day-to-day life and piling extra work onto them.

AI is set to be one of the most effective labour-saving, accuracy-improving additions to the cybersecurity toolbox. 2019 will see it move ever closer to the mainstream, while automation and machine learning will become commonplace. Make sure that your team can make the most of these new technologies by being realistic about your training regime – those who pile too much on without support will find their investments have the opposite effect…

 

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

HOW TO KEEP DIGITAL TRANSFORMATION ON TRACK AFTER THE PANDEMIC

DIGITAL TRANSFORMATION

Ashley Coker, CEO and founder, Slate

 

Introduction

The global coronavirus health emergency has made it abundantly clear how dependent we are on digital services for business continuity and social cohesion. When physical contact must be minimised, digital businesses are in a better position to rapidly adapt and continue their services and respond to customers’ needs.

This is perhaps why Chancellor, Rishi Sunak, was prompted to delay the introduction of IR35 Off-Payroll working rules to the UK private sector until April 2021, as part of his package of measures to support British businesses through the COVID-19 crisis.

While some businesses expressed relief at the delayed introduction of IR35 rules in the private sector, many financial enterprises had already terminated contracts with IT contractors in preparation for the original deadline, with the risk of digital transformation programmes stalling.

 

What is IR35?

Inland Revenue legislation 35 (IR35) is a tax law designed to prevent individuals from using intermediaries, such as their own limited company, in order to avoid paying their fair share of tax and national insurance contributions (NICs). By setting up a limited company, some people were able to leave their employment in a bank on a Friday and return to the same job on a Monday as an IT contractor, with no change in their role, duties, or place of employment. HMRC wants to put a stop to this.

However, with an estimated 170,000 contractors working through their own personal service companies, HMRC has not had the resource to address cases individually and decided to put the onus on the organisations that hire contractors.

From April 2021, the responsibility for assessing whether a contractor is genuinely self-employed (outside of IR35) will fall on every medium and large private sector organisation with a turnover of over £10.2 million, a balance sheet of £5.1 million, and more than 50 employees. This means that every contract will have to be reassessed to decide whether an individual’s work falls inside or outside IR35. Contractors must be provided with a Status Determination Statement (SDS) for each contact that they undertake, confirming the organisation’s assessment of their status for IR35 purposes.

 

How has the financial sector prepared for IR35?

To avoid the time and resource required to scrutinise thousands of contractor contracts, many financial services organisations took a blanket decision which deems that all contractors are working inside IR35. Several prominent organisations have taken this route and terminated all contracts with contractors who bill for their services via limited companies.

Being deemed to be working inside IR35 has the effect of making hiring organisations liable for paying contractors’ income tax and National Insurance contributions at source, as though they were employees, without contractors benefiting from the sick pay and holiday pay benefits of the organisations’ employees. Tax experts have calculated that working inside IR35 will reduce contractors’ incomes by approximately 25 per cent. This makes projects less attractive to IT contractors who might be working on delivering digital change.

 

How does IR35 affect Digital Transformation?

Prior to the IR35 deadline extension, HSBC, Lloyds bank and Barclays bank were reported to have taken a uniform decision to classify all contractors as working within IR35. It was also reported that Deutsche Bank risked losing 50 out of 53 contractors working in its London-based change management team after taking the decision to cease working with contractors via personal service companies and asking them to join the payroll of a recruitment outsourcing agency used by the bank.

If IT contractors stop working with their financial service industry clients, to avoid falling foul of IR35 after April 2021, this could have a devastating impact on digital transformation projects that depend on the specialist skills of external contractors.

A number of contractors have reported that they plan to seek employment overseas after IR35 comes into force in the private sector, so that they can carry on enjoying the flexibility, job satisfaction and remuneration of working off-payroll. This could result in a brain drain for many sectors, such as banking, which relies heavily on the skills of external IT contractors to deliver digital transformation.

 

Fast track to digital delivery:

While IR35 could pose serious challenges for digital change programmes in the UK financial services sector after April 2021, some CIOs we have spoken to see the contract renewal phase as an opportunity to clear the decks, refocus and keep their best people on the pitch.

Our experience of providing corporates with highly-skilled software engineers who are born problem-solvers, who work in small, capped teams on a 5 in 50 model, has shown that they are often fundamental to getting stalled digital change programmes back on track. These developers work alongside enterprise IT teams, on a Seed, Scale, Succeed process, bringing fresh coding skills and transforming project thinking into product thinking, with continuous delivery of digital service iterations. They are technology specialists who relish the challenge of working on high profile digital journeys, but who do not wish to work as corporate employees and are therefore hard for financial services organisations to hire.

We now have another twelve months to prepare for IR35. In the meantime, as financial services organisations adapt to the demands of the pandemic, this is the time for small, agile teams of problem-solvers to shine.

Continue Reading

Technology

IN CONSUMER BIOMETRICS WE TRUST: AUTHENTICATION FOR THE DATA PRIVACY AGE

AUTHENTICATION

Jonas Andersson, Head of Standardization at Fingerprints

Data privacy is high on the global agenda. In the wake of data protection policies such as Europe’s GDPR, ensuring the integrity of personal data is an increasingly pertinent subject. This is a governmental and corporate policy reflection of the fact that our lives are moving increasingly online and, with it, our personal data is facing new and increased threats.

For all access to private data or services, we must be authenticated – this is the basis of privacy in the online world. But as PINs and passwords are increasingly viewed as insufficient to tackle this new reality, the world is looking to stronger authentication solutions, such as biometrics.

When implemented in the right way, biometrics will bring multiple benefits. It already enabled consumers to add layers of authentication to personal data previously unsecured in their owned devices – from apps and e-commerce, to our homes and devices. But its potential is phenomenal. Consumer-driven authentication via our phones and tablets is already today by far the largest application of biometrics in the world, with figures in the billions that dwarf government-led identification schemes such as India’s Aadhaar and the FBI database.

Crucially though, it’s a privacy and security measure that consumers have the power and choice to implement. And as third parties, such as financial services, healthcare and enterprise organizations, increasingly accept consumer biometrics authentication for their services, supporting the market’s continued adoption is an important and timely topic. But first, as biometrics creates its own sensitive personal data, there are a few points to clarify and discuss…

 

Consumers need confidence!

Undeniably, the success of existing applications of consumer biometrics is based on the advantages they offer consumers. Just look at the penetration and use of fingerprint biometrics in smartphones. But the success of future adoption will be determined by how confident consumers continue to feel in new situations. We’re frequently reminded not to use the same password or PIN multiple times, so it’s only natural consumers are beginning to feel concerned of their biometrics integrity as they start to utilize their fingerprint on multiple devices and apps: their phone, tablet, card, USB dongle…

In fact, consumer device authentication utilizes a ‘privacy by design’ approach that inherently protects end-user biometric data with an on-device authentication approach – where biometric data is enrolled, stored and managed all on the same device. The following principles have been fundamental to biometrics’ privacy protection in mobile and are what will enable new benefits for consumers in other personal device-based scenarios:

Translating images to templates

It’s a common misconception that biometric data, such as fingerprints, are stored as images. And in turn, if this image is accessed, the corresponding fingerprint is permanently compromised and unable to be restored or used securely on other applications. You’ll have heard the argument about biometrics: “I can change my password any time, but I only have ten fingerprints; what happens if they’re all hacked?”

In fact, data from a biometric sensor is captured and stored as a template in binary code – or encrypted 0s and 1s. This mathematical representation makes hacking basically pointless as, even if fraudsters could access the template, they can’t do anything with it. Template code cannot be reverse engineered into the original fingerprint image, nor can it be linked to other services and, in turn, other personal data. Moreover, this template is unique to the device it is on, making it impossible to re-use between devices, even if the same fingerprint has been enrolled!

The consumer is in control

This neatly leads on to my next point regarding storage. In consumer authentication use cases, information remains solely on the unique consumer device on which the template was created, remaining physically in control of the user.

Our recent consumer research found 38% were unwilling to share their biometric data but, with this approach, no data needs to be shared with third parties or cloud-based databases as everything is stored, and the authentication process is contained, within a single personal device.

Layers of security

Layering defense mechanisms is standard best practice for a range of security implementations – biometrics is no different. In addition to the transformation of biometric data into an irreversible template, these templates are also later encrypted and further protected by hardware and software both at rest and during the matching process.

The most successful example of a biometrics use case, the smartphone, utilizes the highly secure software isolation of Trusted Execution Environment (TEE) technology for storage and matching of biometric templates on device. The hardware on which it runs is intrinsically secured through its high degree of integration, complexity, miniaturization and specialization.

This approach is also championed by new use cases such as biometric payment cards. Here, the Secure Element (SE) – the chip technology that secures the financial data in your bank card – is utilized to store, process and match biometric information within the confines of the card. This treats biometric templates with the same security as the PIN and other financial data that is stored on our payment cards.

Removing the weakest link

Nothing is ‘un-hackable’, this is the reality of security. With enough time, money and effort, it’s possible to get into anything. A safe, a bank vault. However, attackers take the path of least resistance, and often it’s the end-user that is the ‘weakest link’ in the security chain when it comes to social engineering attacks.

End-users are vulnerable to attacks, such as phishing, where they can be tricked into giving away information such as a PIN or password. With consumer biometrics, the user only presents their biometrics to their personal device and can’t give anything away. This also removes the risks generated by mistakes or complacency, such as creating a password that’s easily guessed.

 

More authentication = more protection

Biometric authentication can protect a whole host of other sensitive personal data, far more quickly, conveniently and securely than was ever possible with PINs or passwords.

Today however, passwords and PINs remain the most used authentication methods outside of smartphones – something increasingly problematic. The friction created by asking users to create a new password has a significant impact on drop-out rates – especially as new ‘best practice’ guidelines recommend complex requirements such as including numbers, capitals, special characters and length. NIST’s digital identity guidelines outline the importance of usability challenges and stress, fundamentally, “positive user authentication experiences are integral to the success of an organization achieving desired business outcomes.”

6 out of 10 consumers feel they have too many PINs and passwords and worry about forgetting them. Unsurprisingly, 41% also admit to re-using the same PIN code or password across multiple sites, apps and devices. So, not only are PINs and passwords frustrating for consumers, they’re also becoming less secure.

Biometrics can be the authentication silver bullet as it combines security and a convenient UX, with leading fingerprint sensors authenticating in under a second. Its capacity to bring security to devices and processes previously either unsecured, poorly secured, or secured with a poor UX is phenomenal. Mobile is the perfect example of how it has been able to transform a device from being unsecured most of the time, to now only unlocked when in use. And now, just look at how your bank accepts your fingerprint authentication on your phone for access to your account.

With consumer biometrics, its quick and effortless to enroll onto new services and subscriptions. Consumers are happy to authenticate more frequently, because it’s so simple and the action is so intuitive. Plus, you cannot forget your fingerprint…

 

Consumer biometrics: on the agenda

It’s clear that biometrics is key to many organizations’ plans for privacy and security, but don’t just take our word for it. Many industry and government initiatives are moving quickly.

Europe’s GDPR highlighted biometrics as ‘sensitive personal data’ which clearly needs to be protected in the right way. Meanwhile, the benefits and integrity of consumer device biometric authentication were also recognized by Europe’s financial services directive, PSD2, citing biometrics as a trusted factor under its strong customer authentication (SCA) mandates.

Looking to industry bodies, FIDO Alliance is gaining significant traction in formalizing the quality and security of personal authentication with biometrics. Its work is complementing rising initiatives such as Self Sovereign Identity (SSI) models, whereby individuals or organizations are endeavoring to have sole ownership of digital identities and control how this personal data is shared and used. With an owned, FIDO-certified biometrics-secured device, users can add another authentication layer over stored digital identifiers.

For several years, we’ve also participated in industry body GlobalPlatform’s work to verify and standardize the quality of security protection on TEE. The biometric API extension defines security protections specifically around biometrics and is highly referenced in mobile implementations, and increasingly in new devices such as key fobs and home security devices too. With the dawn of the biometric payment card, we’re also supporting GlobalPlatform to define an SE specification for biometric cards.

The combination of government and industry engagement is setting the scene for so much more to be achieved with consumer authentication using biometrics. Undoubtedly, biometrics’ role in an increasingly data-conscious world has only just begun to take shape, and excitingly, it’s consumers who have the power at their fingertips – quite literally!

 

Continue Reading

Magazine

Partner Events

Trending

DIGITAL TRANSFORMATION DIGITAL TRANSFORMATION
Technology1 day ago

HOW TO KEEP DIGITAL TRANSFORMATION ON TRACK AFTER THE PANDEMIC

Ashley Coker, CEO and founder, Slate   Introduction The global coronavirus health emergency has made it abundantly clear how dependent...

DIGITAL BANKING DIGITAL BANKING
Banking1 day ago

THE FUTURE OF CUSTOMER EXPERIENCE IN DIGITAL BANKING

By Richard Billington, Chief Technology Officer, Netcall Over the past five years, the digital banking revolution has had a seismic...

COVID-19 COVID-19
Banking1 day ago

TRANSFORMING BANKING: WHY COVID-19 IS UNFREEZING CONSUMER HABITS

Raj Chakraborty, Senior Managing Director, Publicis Sapient   There is much debate about the impact of COVID-19 on the economy....

LEASE LEASE
Business1 day ago

IS YOUR OFFICE LEASE CRUSHING YOUR BOTTOM LINE? YOU HAVE OPTIONS

By Jonathan Wasserstrum, Founder / CEO, SquareFoot These are unprecedented times for us all. Nobody has a playbook to get...

HOME HOME
Wealth Management1 day ago

THE TRIALS AND TRIBULATIONS OF TRADERS TRADING FROM HOME

Steve Haworth, CEO of TeleWare Group Banks had hoped to keep their London trading floors open amid the worsening coronavirus...

OPEN BANKING OPEN BANKING
Banking1 day ago

HOW WILL REVOLUT’S MOVE INTO OPEN BANKING AFFECT US?

By Richard Mathias, Senior Technology Architect at LiveArea Despite current uncertainty, the financial services sector is experiencing transformative change year...

AUTHENTICATION AUTHENTICATION
Technology1 day ago

IN CONSUMER BIOMETRICS WE TRUST: AUTHENTICATION FOR THE DATA PRIVACY AGE

Jonas Andersson, Head of Standardization at Fingerprints Data privacy is high on the global agenda. In the wake of data...

COVID-19 COVID-19
Business6 days ago

CAPITAL MARKETS – LIQUIDITY MANAGEMENT DURING COVID-19

Tony Farnfield, Partner at management and technology consultancy, BearingPoint   When “Dr. Doom” predicted the 2008 financial crisis back in...

SONY BANK SONY BANK
News6 days ago

SONY BANK SECURES AND ENHANCES MOBILE BANKING WITH ONESPAN’S MOBILE SECURITY SUITE

App shielding, biometric authentication and additional technologies secure and improve the customer experience for Sony Bank’s mobile banking app  ...

MOBILE BANKING MOBILE BANKING
News6 days ago

KOREA’S KB BANK USES TRUSTONIC IN-APP PROTECTION TO ENHANCE MOBILE BANKING EXPERIENCE

Using Trustonic Application Protection enables KB Bank to dramatically improve the authentication experience for users of its mobile banking app...

Customer Customer
News7 days ago

CUSTOMER CARE TODAY WILL BUILD RESILIENCE FOR FUTURE CRISES

Cathal McGloin, CEO of ServisBOT writes, “The COVID-19 pandemic has created major spikes in calls to financial sector helplines dealing with customers...

CREDIT CARD MARKET CREDIT CARD MARKET
Banking1 week ago

THE CO-BRAND CREDIT CARD MARKET – SINK OR SWIM

By Chris Vinnicombe, VP Financial Services at Acxiom The co-brand credit card market is the result of the partnerships between...

CASH FLOW CASH FLOW
Finance1 week ago

HOW TO MANAGE YOUR CASH FLOW IN UNCERTAIN TIMES

While the world is constantly changing, probably at a faster pace now than ever before, businesses need to manage cash...

BUSINESS BUSINESS
News1 week ago

NEW IVALUA STUDY SHOWS TECHNOLOGY CHALLENGES ARE HINDERING PROCUREMENT TEAMS FROM ACHIEVING BUSINESS OBJECTIVES

Lack of system integrations and actionable insights are stopping organisations from accurately measuring performance   Ivalua, a leading provider of global...

FINANCIAL SERVICES FINANCIAL SERVICES
Technology1 week ago

WHY DIGITAL TRANSFORMATION IN FINANCIAL SERVICES IS ABOUT CULTURE FIRST, TECH SECOND

Stuart Templeton, Head of UK at Slack    In today’s world, there’s no such thing as a ‘non-tech fin’. Every...

COVID-19 COVID-19
Business1 week ago

STOP THE CONFUSION: HOW TO KNOW IF YOUR BUSINESS MAY BE INSURED AGAINST COVID-19

By Alex Balcombe, Partner at Harris Balcombe   The last few weeks has seen businesses in hospitality, tourism, retail, leisure...

PAYMENTS PAYMENTS
Top Stories1 week ago

BRAVE NEW WORLD: A FUTURISTIC VISION OF PAYMENTS

James Booth, VP, Head of Partnerships in EMEA for PPRO   Over the last ten years, the retail e-commerce ecosystem...

KLEVIO KLEVIO
Interviews1 week ago

A PROPTECH FOUNDER’S BEGINNING, THE START OF KLEVIO AND HOW ACCESS-TECH IMPROVES FACILITIES MANAGEMENT

An interview with Klevio’s CEO and Co-Founder, Aleš Špetič    What is Klevio?  Klevio is a smart intercom that allows...

COVID-19 COVID-19
Wealth Management1 week ago

HERE’S HOW YOU CAN LEARN TO TRADE RISK-FREE DURING THE COVID-19 MARKET CRASH

Trading app BullBear has launched new features to support budding investors looking to hone their skills against the backdrop of...

INSURANCE INSURANCE
Top Stories1 week ago

ENTERPRISE BLOCKCHAIN: DRAGGING INSURANCE OUT OF THE DARK AGES

Ryan Rugg, Global Head of The Industry Business Unit at R3   The history of insurance traces back to the development...

Trending