SlideShare a Scribd company logo
1 of 26
 
Wireless Banking April 1, 2003 Clifford A. Wilke  Director of Bank Technology Office of the Comptroller of the Currency Washington, DC
[object Object]
Wireless Banking  Motivations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Wireless Banking  Methods
[object Object],[object Object],[object Object],Wireless Link
[object Object],[object Object],[object Object],[object Object],Challenges
Reported Data Security Incidents Source: CERT/CC -- statistics are not limited to the banking industory and include all reported incidents
Identity Theft ,[object Object],[object Object],[object Object],[object Object]
Banking Risks  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Strategic Risk ,[object Object],[object Object],[object Object],[object Object]
Strategic Risk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transaction Risk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transaction Risk ,[object Object],[object Object],[object Object],[object Object],[object Object]
Transaction Risk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Transaction  and Reputation Risk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reputation Risk ,[object Object],[object Object],[object Object],[object Object]
Compliance Issues ,[object Object],[object Object],[object Object],[object Object]
GLBA Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Characteristics of Good  Risk Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Industry Initiatives ,[object Object],[object Object],[object Object]
Best Practices ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What’s Next - We Need  to Focus On ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],OCC Technology  Issuances
 
Summary ,[object Object]

More Related Content

What's hot

Issue identification cloud computing
Issue identification cloud computingIssue identification cloud computing
Issue identification cloud computinggirish0984
 
Creating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookCreating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookLumension
 
Chameleon PCI Presentation
Chameleon PCI PresentationChameleon PCI Presentation
Chameleon PCI Presentationchristoboshoff
 
Internet is a threat in financial secotr
Internet is a threat in financial secotr Internet is a threat in financial secotr
Internet is a threat in financial secotr khan shamim
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and toolsVibhor Raut
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business SolutionsAnthony Dials
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency SolutionsAnthony Dials
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyerClaude Gelinas
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System AdministrationLisa Dowdell, MSISTM
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-applSR NAIDU
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 

What's hot (20)

Issue identification cloud computing
Issue identification cloud computingIssue identification cloud computing
Issue identification cloud computing
 
Creating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookCreating Your Red Flags Rule Playbook
Creating Your Red Flags Rule Playbook
 
Jason Allred Resume
Jason Allred ResumeJason Allred Resume
Jason Allred Resume
 
Chameleon PCI Presentation
Chameleon PCI PresentationChameleon PCI Presentation
Chameleon PCI Presentation
 
Internet is a threat in financial secotr
Internet is a threat in financial secotr Internet is a threat in financial secotr
Internet is a threat in financial secotr
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and tools
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Afcea it security course 2015 flyer
Afcea it security course 2015 flyerAfcea it security course 2015 flyer
Afcea it security course 2015 flyer
 
Effective and complete Cybersecurity HOWTO
Effective and complete Cybersecurity HOWTOEffective and complete Cybersecurity HOWTO
Effective and complete Cybersecurity HOWTO
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
APF2015-slides-general
APF2015-slides-generalAPF2015-slides-general
APF2015-slides-general
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-appl
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 

Viewers also liked

Treasury_ManagementGWSCPAV1
Treasury_ManagementGWSCPAV1Treasury_ManagementGWSCPAV1
Treasury_ManagementGWSCPAV1Leonard Williams
 
what-your-treasury-system-must-do-to-cope-with-the-next-crisis
what-your-treasury-system-must-do-to-cope-with-the-next-crisiswhat-your-treasury-system-must-do-to-cope-with-the-next-crisis
what-your-treasury-system-must-do-to-cope-with-the-next-crisisPwC Belgium
 
Ravi SIP Report
Ravi SIP ReportRavi SIP Report
Ravi SIP ReportRavi Singh
 
Information Security Life Cycle
Information Security Life CycleInformation Security Life Cycle
Information Security Life Cyclevulsec123
 
DTCC Securities - Life Cycle " [LcoaS.pdf]
DTCC Securities - Life Cycle " [LcoaS.pdf]DTCC Securities - Life Cycle " [LcoaS.pdf]
DTCC Securities - Life Cycle " [LcoaS.pdf]Ashishkumar Lakshmanan
 
Bank of Baroda Treasury Analysis (2015)
Bank of Baroda Treasury Analysis (2015)Bank of Baroda Treasury Analysis (2015)
Bank of Baroda Treasury Analysis (2015)Suryansh Bansal
 
Treasury and trust operation (banking 2)
Treasury and trust operation (banking 2)Treasury and trust operation (banking 2)
Treasury and trust operation (banking 2)Sowie Althea
 
141117 chapter 1. treasury management
141117 chapter 1.  treasury management141117 chapter 1.  treasury management
141117 chapter 1. treasury managementAubrey Malacaste
 
Wells Fargo
Wells FargoWells Fargo
Wells FargoNhu Pham
 
Treasury management – a perspective ssld
Treasury management – a perspective ssldTreasury management – a perspective ssld
Treasury management – a perspective ssldAbhijeet Deshmukh
 
Treasury operations in_banks
Treasury operations in_banksTreasury operations in_banks
Treasury operations in_banksVaibhav Banjan
 
Fundamental of Islamic Banking - Treasury
Fundamental of Islamic Banking - TreasuryFundamental of Islamic Banking - Treasury
Fundamental of Islamic Banking - TreasuryMahyuddin Khalid
 
Concept Of Treasury And Treasury Management
Concept Of Treasury And Treasury ManagementConcept Of Treasury And Treasury Management
Concept Of Treasury And Treasury ManagementSVS College
 
Trading Flow Chart
Trading Flow ChartTrading Flow Chart
Trading Flow ChartAtul109
 
Clearance and settlement procedure
Clearance and settlement procedureClearance and settlement procedure
Clearance and settlement procedureChennu Vinodh Reddy
 

Viewers also liked (20)

Treasury_ManagementGWSCPAV1
Treasury_ManagementGWSCPAV1Treasury_ManagementGWSCPAV1
Treasury_ManagementGWSCPAV1
 
what-your-treasury-system-must-do-to-cope-with-the-next-crisis
what-your-treasury-system-must-do-to-cope-with-the-next-crisiswhat-your-treasury-system-must-do-to-cope-with-the-next-crisis
what-your-treasury-system-must-do-to-cope-with-the-next-crisis
 
Ravi SIP Report
Ravi SIP ReportRavi SIP Report
Ravi SIP Report
 
Treasury
TreasuryTreasury
Treasury
 
Teasury stocks
Teasury stocks  Teasury stocks
Teasury stocks
 
Treasury Management
Treasury ManagementTreasury Management
Treasury Management
 
Information Security Life Cycle
Information Security Life CycleInformation Security Life Cycle
Information Security Life Cycle
 
DTCC Securities - Life Cycle " [LcoaS.pdf]
DTCC Securities - Life Cycle " [LcoaS.pdf]DTCC Securities - Life Cycle " [LcoaS.pdf]
DTCC Securities - Life Cycle " [LcoaS.pdf]
 
Bank of Baroda Treasury Analysis (2015)
Bank of Baroda Treasury Analysis (2015)Bank of Baroda Treasury Analysis (2015)
Bank of Baroda Treasury Analysis (2015)
 
Treasury and trust operation (banking 2)
Treasury and trust operation (banking 2)Treasury and trust operation (banking 2)
Treasury and trust operation (banking 2)
 
141117 chapter 1. treasury management
141117 chapter 1.  treasury management141117 chapter 1.  treasury management
141117 chapter 1. treasury management
 
Wells Fargo
Wells FargoWells Fargo
Wells Fargo
 
Treasury management – a perspective ssld
Treasury management – a perspective ssldTreasury management – a perspective ssld
Treasury management – a perspective ssld
 
Fom ppt
Fom pptFom ppt
Fom ppt
 
Treasury operations in_banks
Treasury operations in_banksTreasury operations in_banks
Treasury operations in_banks
 
Fundamental of Islamic Banking - Treasury
Fundamental of Islamic Banking - TreasuryFundamental of Islamic Banking - Treasury
Fundamental of Islamic Banking - Treasury
 
Concept Of Treasury And Treasury Management
Concept Of Treasury And Treasury ManagementConcept Of Treasury And Treasury Management
Concept Of Treasury And Treasury Management
 
Trading Flow Chart
Trading Flow ChartTrading Flow Chart
Trading Flow Chart
 
Treasury Management
Treasury ManagementTreasury Management
Treasury Management
 
Clearance and settlement procedure
Clearance and settlement procedureClearance and settlement procedure
Clearance and settlement procedure
 

Similar to Clifford wilke

Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slidesecommerce
 
[ I B M] Ibm Banking Overview Final Version For F T U
[ I B M] Ibm Banking Overview Final Version For  F T U[ I B M] Ibm Banking Overview Final Version For  F T U
[ I B M] Ibm Banking Overview Final Version For F T UEcom Ftu
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Turvallisuus2013
 
S nandakumar
S nandakumarS nandakumar
S nandakumarIPPAI
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_bangloreIPPAI
 
Fitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFITSUM RISTU LAKEW
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBsJyothi Satyanathan
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...Prasanna Hegde
 
Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...
Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...
Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...HarshitaMadhale
 
Managing Mobile Menaces
Managing Mobile MenacesManaging Mobile Menaces
Managing Mobile MenacesNalneesh Gaur
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Application Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalApplication Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalManoj Agarwal
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 

Similar to Clifford wilke (20)

Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
[ I B M] Ibm Banking Overview Final Version For F T U
[ I B M] Ibm Banking Overview Final Version For  F T U[ I B M] Ibm Banking Overview Final Version For  F T U
[ I B M] Ibm Banking Overview Final Version For F T U
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
S nandakumar
S nandakumarS nandakumar
S nandakumar
 
S nandakumar_banglore
S nandakumar_bangloreS nandakumar_banglore
S nandakumar_banglore
 
Fitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerceFitsum ristu lakew transaction security on e-commerce
Fitsum ristu lakew transaction security on e-commerce
 
Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Aggregation Platforms-White Paper
Aggregation Platforms-White PaperAggregation Platforms-White Paper
Aggregation Platforms-White Paper
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
 
Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...
Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...
Unveiling the Multifactor Authentication Market: Securing Tomorrow's Digital ...
 
David Whitaker: Managing Your Vendors
David Whitaker: Managing Your VendorsDavid Whitaker: Managing Your Vendors
David Whitaker: Managing Your Vendors
 
Cisco Managed Security
Cisco Managed SecurityCisco Managed Security
Cisco Managed Security
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Managing Mobile Menaces
Managing Mobile MenacesManaging Mobile Menaces
Managing Mobile Menaces
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Application Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 FinalApplication Security Review 5 Dec 09 Final
Application Security Review 5 Dec 09 Final
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Security
SecuritySecurity
Security
 

More from Lanka Praneeth

The difference between practice and research 111607
The difference between practice and research 111607The difference between practice and research 111607
The difference between practice and research 111607Lanka Praneeth
 
Peg copeg dr_letter_01_08
Peg copeg dr_letter_01_08Peg copeg dr_letter_01_08
Peg copeg dr_letter_01_08Lanka Praneeth
 
How to make_your_first_robot
How to make_your_first_robotHow to make_your_first_robot
How to make_your_first_robotLanka Praneeth
 
Essential documents and_managing_trial_files
Essential documents and_managing_trial_filesEssential documents and_managing_trial_files
Essential documents and_managing_trial_filesLanka Praneeth
 
Electronic trial master filest
Electronic trial master filestElectronic trial master filest
Electronic trial master filestLanka Praneeth
 

More from Lanka Praneeth (10)

The difference between practice and research 111607
The difference between practice and research 111607The difference between practice and research 111607
The difference between practice and research 111607
 
Peg copeg dr_letter_01_08
Peg copeg dr_letter_01_08Peg copeg dr_letter_01_08
Peg copeg dr_letter_01_08
 
Naidoo
NaidooNaidoo
Naidoo
 
Kpo solutions
Kpo solutionsKpo solutions
Kpo solutions
 
How to make_your_first_robot
How to make_your_first_robotHow to make_your_first_robot
How to make_your_first_robot
 
Guidance on 1572
Guidance on 1572Guidance on 1572
Guidance on 1572
 
Essential documents and_managing_trial_files
Essential documents and_managing_trial_filesEssential documents and_managing_trial_files
Essential documents and_managing_trial_files
 
Electronic trial master filest
Electronic trial master filestElectronic trial master filest
Electronic trial master filest
 
Dispersion stati
Dispersion statiDispersion stati
Dispersion stati
 
Poster
PosterPoster
Poster
 

Clifford wilke

  • 1.  
  • 2. Wireless Banking April 1, 2003 Clifford A. Wilke Director of Bank Technology Office of the Comptroller of the Currency Washington, DC
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Reported Data Security Incidents Source: CERT/CC -- statistics are not limited to the banking industory and include all reported incidents
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.  
  • 26.

Editor's Notes

  1. This presentation focuses on Internet Banking as an extension of a bank’s delivery network for traditional consumer, retail and wholesale/commercial services. This is a baseline presentation designed for banker outreach activities to overview Internet banking trends, highlight key Risk Management practices banks should consider and raise awareness on OCC Internet banking supervisory activities. Due to the rapid evolution of Internet and Electronic banking, the audience may ask specific technical questions that are beyond the scope of this presentation and may require a greater degree of technical expertise to answer. Note: This presentation was last updated May 15, 2000.
  2. This slide should be your Presentation Title Slide, the first slide of your presentation. It should also be the last slide of your presentation. To insert a Title, double click on the “Insert Title” box in the template. Highlight the words “Insert Title” by clicking at the beginning of the box and dragging your mouse across the words. With the words highlighted, type in your title. The format allows two lines for a primary title and one for a subtitle. If you only need one title line, delete the top “Insert Title (If Applicable)” box. Also, if you do not use the subtitle box, delete it. Communication Tips: Giving text the right look can have an impact on the appearance of the presentation. Using too many fonts on the same slide looks unprofessional. Choose a font that is easy to read and projects well. Use bold type for titles and medium for subtitles. Design Notes: The “Full OCC Presentation Signature” (Broken Doughnut, Comptroller…, Administrator…, and Column) appears only on the first, last and contact slides. The Column is used on all slides that contain only text. All the slides except for the first and last have the “Faded Broken Doughnut Signature” in the bottom right corner. Slides with graphs, photos and text should not have the Column, only the “Faded Broken Doughnut Signature”.
  3. Management’s service provider or software vendor selection process should include: Risk Assessment Due Diligence Contract Requirements Oversight Program FFIEC is developing guidance to outline this process. The driving force behind the development of the Interagency guidance are concerns highlighted by bank’s implementing Internet Banking strategies. These strategies include traditional service providers/software vendors use to working with a regulated institution but also companies that are new to dealing with a regulated entity or just a new company. The newer companies may not have much of a financial history. Also, we are seeing an increasing reliance on strategic alliances. IMPORTANT TO EMPHASIZED PROCESS NATURE.