SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
This document is offered compliments of
BSP Media Group. www.bspmediagroup.com
All rights reserved.
Managing Mobile Money
Security Challenges
Johan Taute
Manager Financial Services & Security
Agenda
o Global Security Concerns & Threats
o Mobile Money Services Security Threats
o Gaining Customer Trust from a security perspective
o Creating a safe and secure application channel
o Factors that influence mobile money services
o Managing Security Challenges
Global Security Concerns & Threats
o Targeted attacks
o Malware growth on Android Devices

o DDoS Attacks world wide
o Microsoft no longer the only target
o Java’s tough year
o Apple users no longer ‘Safe’

http://www.digitalattackmap.com
Mobile Money Services Security Threats
o Many new players in the market
o Unregulated environments

o Customers and Employees
o Highly Motivated Criminal Syndicates
o Hacktivism
Gaining Customer Trust from a security perspective
o Protect customer information
o Properly Authenticate customers
o Protect customers against fraud
o Security Awareness programs
Factors that influence mobile money services
o Security expectation of bearers
o Voice
o Data (GPRS, EDGE, HSDPA, LTE, etc)
o SMS
o USSD
o Device dependencies
o Smartphones finally penetrating the market
Creating a Safe and Secure Application Channel
o Start with security in mind
o Apply OPEN standards
o Look at PCI DSS for guidance
o Service Delivery Channels
o Traditional GSM
o Online
o Mobile Applications
Managing Security Challenges
o Build and Maintain a Secure Network and Systems
o Protect Customer Data
o Maintain a Vulnerability Management Program
o Implement Strong Access Controls
o Regularly Test and Monitor Networks
o Maintain an Information Security Policy
Managing Security Challenges – A start
o Threat modeling
o Security Awareness
o Defensive Strategies
o Supply Chain Security
o Incident Response plan

http://www.microsoft.com/security/sdl/adopt/eop.aspx
The end game …
o Your network is being monitored all the time

o You need to respond to any form of attack quickly
o You need to know that for each attack source you block another will open up

o Security is a game with an ever evolving playing field… be prepared!
Thank You

Johan Taute
Manager Financial Services and Security
Online and Transformation Programs
Landline: +27 11 848 8437
Mobile: +27 82 994 0378
Email: johan.taute@vodacom.co.za johan.taute@vodacom.co.za
Address: Vodacom Corporate Park, 1st Floor
082 Vodacom Boulevard, Midrand 1685
www.vodacom.co.za

Best Network for Smartphones

11

Weitere ähnliche Inhalte

Andere mochten auch

Evolving iroko TV in a multiplatform ecosystem
Evolving iroko TV in a multiplatform ecosystem Evolving iroko TV in a multiplatform ecosystem
Evolving iroko TV in a multiplatform ecosystem
BSP Media Group
 
DIGITAL MIGRATION JOURNEY IN SOUTH AFRICA
DIGITAL MIGRATION JOURNEY IN SOUTH AFRICADIGITAL MIGRATION JOURNEY IN SOUTH AFRICA
DIGITAL MIGRATION JOURNEY IN SOUTH AFRICA
BSP Media Group
 
Implementing Mobile Number Portability in Africa: A Kenyan Case Study
Implementing Mobile Number Portability in Africa: A Kenyan Case StudyImplementing Mobile Number Portability in Africa: A Kenyan Case Study
Implementing Mobile Number Portability in Africa: A Kenyan Case Study
BSP Media Group
 
Building Confidence in MNP With Measures that Protect Consumers
Building Confidence in MNP With Measures that Protect ConsumersBuilding Confidence in MNP With Measures that Protect Consumers
Building Confidence in MNP With Measures that Protect Consumers
BSP Media Group
 
The Double-edge sword of Mobile Broadband and how to use it.
The Double-edge sword of Mobile Broadband and how to use it. The Double-edge sword of Mobile Broadband and how to use it.
The Double-edge sword of Mobile Broadband and how to use it.
BSP Media Group
 
Delivering the extended frictionless customer experience
Delivering the extended frictionless customer experience Delivering the extended frictionless customer experience
Delivering the extended frictionless customer experience
BSP Media Group
 
Bsp media branded_rp_africacom_2013_bunitv_freecopy
Bsp media branded_rp_africacom_2013_bunitv_freecopyBsp media branded_rp_africacom_2013_bunitv_freecopy
Bsp media branded_rp_africacom_2013_bunitv_freecopy
BSP Media Group
 
Delivering a better data and Video experience
Delivering a better data and Video experience Delivering a better data and Video experience
Delivering a better data and Video experience
BSP Media Group
 
Broadband in South Africa the roadmap to growth
Broadband in South Africa the roadmap to growth Broadband in South Africa the roadmap to growth
Broadband in South Africa the roadmap to growth
BSP Media Group
 
Assessing conditions for the development of LTE in Africa
Assessing conditions for the development of LTE in AfricaAssessing conditions for the development of LTE in Africa
Assessing conditions for the development of LTE in Africa
BSP Media Group
 
Improving Capacity Cost Effectively in Africa
Improving Capacity Cost Effectively in Africa Improving Capacity Cost Effectively in Africa
Improving Capacity Cost Effectively in Africa
BSP Media Group
 
Digital Services in Africa: New revenue opportunities.
Digital Services in Africa: New revenue opportunities.Digital Services in Africa: New revenue opportunities.
Digital Services in Africa: New revenue opportunities.
BSP Media Group
 

Andere mochten auch (13)

Evolving iroko TV in a multiplatform ecosystem
Evolving iroko TV in a multiplatform ecosystem Evolving iroko TV in a multiplatform ecosystem
Evolving iroko TV in a multiplatform ecosystem
 
DIGITAL MIGRATION JOURNEY IN SOUTH AFRICA
DIGITAL MIGRATION JOURNEY IN SOUTH AFRICADIGITAL MIGRATION JOURNEY IN SOUTH AFRICA
DIGITAL MIGRATION JOURNEY IN SOUTH AFRICA
 
Implementing Mobile Number Portability in Africa: A Kenyan Case Study
Implementing Mobile Number Portability in Africa: A Kenyan Case StudyImplementing Mobile Number Portability in Africa: A Kenyan Case Study
Implementing Mobile Number Portability in Africa: A Kenyan Case Study
 
Building Confidence in MNP With Measures that Protect Consumers
Building Confidence in MNP With Measures that Protect ConsumersBuilding Confidence in MNP With Measures that Protect Consumers
Building Confidence in MNP With Measures that Protect Consumers
 
The Double-edge sword of Mobile Broadband and how to use it.
The Double-edge sword of Mobile Broadband and how to use it. The Double-edge sword of Mobile Broadband and how to use it.
The Double-edge sword of Mobile Broadband and how to use it.
 
Delivering the extended frictionless customer experience
Delivering the extended frictionless customer experience Delivering the extended frictionless customer experience
Delivering the extended frictionless customer experience
 
Bsp media branded_rp_africacom_2013_bunitv_freecopy
Bsp media branded_rp_africacom_2013_bunitv_freecopyBsp media branded_rp_africacom_2013_bunitv_freecopy
Bsp media branded_rp_africacom_2013_bunitv_freecopy
 
Delivering a better data and Video experience
Delivering a better data and Video experience Delivering a better data and Video experience
Delivering a better data and Video experience
 
Broadband in South Africa the roadmap to growth
Broadband in South Africa the roadmap to growth Broadband in South Africa the roadmap to growth
Broadband in South Africa the roadmap to growth
 
VP Music and Culture
VP Music and Culture VP Music and Culture
VP Music and Culture
 
Assessing conditions for the development of LTE in Africa
Assessing conditions for the development of LTE in AfricaAssessing conditions for the development of LTE in Africa
Assessing conditions for the development of LTE in Africa
 
Improving Capacity Cost Effectively in Africa
Improving Capacity Cost Effectively in Africa Improving Capacity Cost Effectively in Africa
Improving Capacity Cost Effectively in Africa
 
Digital Services in Africa: New revenue opportunities.
Digital Services in Africa: New revenue opportunities.Digital Services in Africa: New revenue opportunities.
Digital Services in Africa: New revenue opportunities.
 

Ähnlich wie Managing Mobile Money security challenges

Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
Rhys A. Mossom
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
Pragati Rai
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
Yogesh Kumar
 
Mobile security... The next challenge
Mobile security... The next challengeMobile security... The next challenge
Mobile security... The next challenge
B.A.
 

Ähnlich wie Managing Mobile Money security challenges (20)

Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
New Product Development - [Net Technologies]
New Product Development - [Net Technologies]New Product Development - [Net Technologies]
New Product Development - [Net Technologies]
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
How to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdfHow to Secure Your Mobile Commerce App.pdf
How to Secure Your Mobile Commerce App.pdf
 
Life After Compliance march 2010 v2
Life After Compliance march 2010 v2Life After Compliance march 2010 v2
Life After Compliance march 2010 v2
 
Mbs w21
Mbs w21Mbs w21
Mbs w21
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Pulling our-socs-up
Pulling our-socs-upPulling our-socs-up
Pulling our-socs-up
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
 
Mobilemonday b2b b-asecurity
Mobilemonday b2b   b-asecurityMobilemonday b2b   b-asecurity
Mobilemonday b2b b-asecurity
 
Mobile security... The next challenge
Mobile security... The next challengeMobile security... The next challenge
Mobile security... The next challenge
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
How to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-paymentsHow to reduce security risks to ensure user confidence in m-payments
How to reduce security risks to ensure user confidence in m-payments
 
2008 Trends
2008 Trends2008 Trends
2008 Trends
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Managing Mobile Money security challenges

  • 1. This document is offered compliments of BSP Media Group. www.bspmediagroup.com All rights reserved.
  • 2. Managing Mobile Money Security Challenges Johan Taute Manager Financial Services & Security
  • 3. Agenda o Global Security Concerns & Threats o Mobile Money Services Security Threats o Gaining Customer Trust from a security perspective o Creating a safe and secure application channel o Factors that influence mobile money services o Managing Security Challenges
  • 4. Global Security Concerns & Threats o Targeted attacks o Malware growth on Android Devices o DDoS Attacks world wide o Microsoft no longer the only target o Java’s tough year o Apple users no longer ‘Safe’ http://www.digitalattackmap.com
  • 5. Mobile Money Services Security Threats o Many new players in the market o Unregulated environments o Customers and Employees o Highly Motivated Criminal Syndicates o Hacktivism
  • 6. Gaining Customer Trust from a security perspective o Protect customer information o Properly Authenticate customers o Protect customers against fraud o Security Awareness programs
  • 7. Factors that influence mobile money services o Security expectation of bearers o Voice o Data (GPRS, EDGE, HSDPA, LTE, etc) o SMS o USSD o Device dependencies o Smartphones finally penetrating the market
  • 8. Creating a Safe and Secure Application Channel o Start with security in mind o Apply OPEN standards o Look at PCI DSS for guidance o Service Delivery Channels o Traditional GSM o Online o Mobile Applications
  • 9. Managing Security Challenges o Build and Maintain a Secure Network and Systems o Protect Customer Data o Maintain a Vulnerability Management Program o Implement Strong Access Controls o Regularly Test and Monitor Networks o Maintain an Information Security Policy
  • 10. Managing Security Challenges – A start o Threat modeling o Security Awareness o Defensive Strategies o Supply Chain Security o Incident Response plan http://www.microsoft.com/security/sdl/adopt/eop.aspx
  • 11. The end game … o Your network is being monitored all the time o You need to respond to any form of attack quickly o You need to know that for each attack source you block another will open up o Security is a game with an ever evolving playing field… be prepared!
  • 12. Thank You Johan Taute Manager Financial Services and Security Online and Transformation Programs Landline: +27 11 848 8437 Mobile: +27 82 994 0378 Email: johan.taute@vodacom.co.za johan.taute@vodacom.co.za Address: Vodacom Corporate Park, 1st Floor 082 Vodacom Boulevard, Midrand 1685 www.vodacom.co.za Best Network for Smartphones 11