Chris Gunner, vCSO at Thrive – a leading NextGen MSP/MSSP, delivering global AI, cybersecurity, cloud, compliance, and digital transformation managed services – on how CISOs can position their cyber strategy to to become part of how a business navigates uncertainty

Quantification of cyber risk is a growing trend. While this can be genuinely useful, in practice it is often misunderstood or over-applied by security leaders. It can range from an arbitrary figure to attempting to model every possible risk on the register in a Monte Carlo simulation. The focus can fall on the mechanics of quantification, rather than how financial decision-makers actually use the information.

Think of the CFO – they don’t walk through every penny in the budget. Instead, they usually focus on the board-level levers that can materially affect the business. These often include three key areas: strategic optionality, removing friction from capital events and avoiding shocks and smoothing operating costs. Security conversations should be anchored the same way.

The Importance of Strategic Optionality

If faced with a credible one-year growth plan, CFOs may recommend a one-year office lease despite a 20% premium. This is because it maintains the option later of moving or re-contracting once the growth trajectory becomes more visible. Like most strategic decisions, it is about preserving flexibility in the face of uncertainty, even if that flexibility comes at a short-term cost.

If we apply this to a cyber context, there are often businesses that have taken a calculated gamble with their existing business strategies. While the plan is sound, there is a chance it might not land as expected. When they require security services, the choice between a ‘standard’ and ‘premium’ SOC frames the decision as one of optionality rather than security spend. Paying more now to preserve the ability to adapt later down the line. A simple illustration is incident response. An on-call retainer with defined response times can look more expensive than ad hoc support. Until an incident occurs and procurement becomes the bottleneck. In those moments, flexibility is often far more valuable than marginal savings achieved earlier.

Removing Friction from Capital Events

For CFOs, especially those operating in the alternative investment space, the focus is on structuring capital events. As opposed to managing day-to-day operational costs. One of the most painful points in that process is due diligence. The careful exchange between acquirer and target that aims to provide enough information for each to price risk, without giving the entire game away.

CISOs can materially influence how smooth or painful that process becomes. The most effective support often comes from understanding upfront what the diligence process will look like and preparing accordingly.

For example, they might develop executive-level ‘Security at ACME’ overviews to sit alongside more detailed trust centre or technical reports. Being available to diligence teams for interviews, and for example clearly articulating which services are outsourced to an MSSP, and why, builds credibility between those executive teams.

Decision-makers often don’t look at penetration test reports at a deal level. They are assessing whether the organisation understands its own control environment. A well-prepared CISO who can clearly explain why certain controls exist acts as a trust amplifier during transactions.

It is often the difference between a diligence process that closes cleanly and one that drifts. Two organisations can have similar maturity. Yet the one that can respond within a day with clear, consistent evidence reduces follow-up questions, avoids uncertainty premiums in pricing discussions and prevents security from becoming a late-stage negotiation point.

Avoiding Shocks and Smoothing Operating Costs

For any individual who has worked with a finance partner to define a departmental budget will know that predictability often takes precedence over absolute cost. Contract value can be secondary to payment terms, renewal timing or the ability to forecast spend with confidence.

CISOs can align with this by looking to reduce unplanned operating expenditure. In addition to understanding the cost structure of their controls by communicating with the technical pre-sales engineer, procurement and account teams.

A good example is cyber insurance. While often purchased directly by finance teams, many policies are relatively off-the-shelf and provide access to services the security team already operates or has under contract. Other policies include notable exclusions for the events most likely to occur. Such as a ransomware incident without business interruption cover. In many cases, these gaps can be addressed in-policy with a flat fee or a more predictable cost model.

The value here extends beyond risk transfer and into more predictable costs: replacing reactive spend with planned expenditure.

Aligning Cyber Conversations to Board Priorities

Across all of the above examples, the common thread is that the board is rarely asking security to prove its value in isolation, and is surprisingly comfortable with uncertainty. But they are asking whether the cyber papers support better decisions, fewer constraints and more predictable outcomes for the business as a whole.

CISOs who frame their priorities in those terms will find their conversations move away from justifying individual controls and towards understanding how security choices shape the organisation’s ability to respond to change. In that context, cyber becomes part of how the business navigates uncertainty, rather than a specialist function defending its budget. Speaking the board’s language, ultimately, is less about converting cyber risk into pounds and pence. It is more about understanding which levers matter at that level and showing how security choices influence them.

Learn more at thrivenextgen.com

  • Cybersecurity
  • Cybersecurity in FinTech
  • Digital Strategy

AccessPay, the leading bank integration provider, has announced a new partnership with PayPoint. It will integrate PayPoint’s Confirmation of Payee (CoP) capability…

AccessPaythe leading bank integration provider, has announced a new partnership with PayPoint. It will integrate PayPoint’s Confirmation of Payee (CoP) capability into AccessPay’s payments automation suite for modern finance teams. £258m was lost to authorised push payment (APP) fraud in the first half of 2025 alone. Organisations need access to robust payment controls that scale with their operations. PayPoint’s CoP offering enables AccessPay’s customers to verify payee account details as part of their payment workflows. Reinforcing AccessPay’s position at the centre of a growing ecosystem of technologies designed to automate and de-risk the Office of the CFO.

Fraud Prevention

CoP, also known as Account Name Verification (ANV), is a valuable anti-fraud measure. It checks the accuracy of payee details before funds are sent. It can be used to confirm payee details at the point of collection, when creating a payment instruction, or both. PayPoint’s CoP capability is designed to handle peak-usage scenarios for corporate clients, including payroll runs, supplier payments, and seasonal spikes. It is recognised for its ability to process exceptionally high transaction volumes. Additionally, it provides flexible access options, including APIs, user interface and bulk processing. This enables organisations at different stages of their automation journey to embed account name verification seamlessly into existing processes.

A Partnership Expanding a Tech Ecosystem

“Our customers want to automate high-volume, high-value payments with confidence, knowing robust safeguards are built directly into their processes. PayPoint is recognised for delivering payment and fraud services at a national scale. By partnering with them, we are strengthening the fraud and error protections available within the AccessPay platform. And improving operational efficiency by reducing payment resubmissions, exception handling and manual intervention. The service is already available to customers and has been positively received since we began working together in 2025.” Anish Kapoor, CEO of AccessPay

“AccessPay sits at the centre of modern finance operations. It securely connecting businesses to their banks and enabling automated payment flows at scale. Partnering with AccessPay allows us to extend our CoP capability to thousands of finance teams that are actively transforming how they manage payments. Together, we’re helping organisations reduce fraud risk, minimise payment errors, and deliver more secure, trusted payment experiences.” Jo Toolan, Managing Director Payments, PayPoint

The PayPoint partnership reinforces AccessPay’s commitment to expanding its technology ecosystem. To help finance and treasury teams automate securely, reduce manual intervention, and build resilient, future-ready payment operations. By combining AccessPay’s bank integration platform with PayPoint’s payment and fraud prevention expertise, organisations gain stronger protection against fraud. Also unlocking greater efficiency and confidence in automated finance processes.

About PayPoint

PayPoint is the UK’s leading multichannel payments and community services provider. It delivers innovative solutions that simplify and secure how customers and businesses transact. The core of our offering is MultiPay. A single payment platform that unifies Open Banking, card, Direct Debit, and over-the-counter cash payments into a streamlined solution.

Our Open Banking services are designed to deliver a frictionless and secure payment journey. From account-to-account payments to Confirmation of Payee (CoP), we empower companies with the tools to build trust and reduce fraud. All through a suite of easy-to-integrate APIs. These services can be integrated into your existing financial or customer management systems. Or accessed via our portal, white-labelled websites or mobile apps—providing flexibility to meet your needs.

As a proud Gold Partner of Open Banking Expo 2025 and winner of the Best Sector Initiative for our PayPoint OpenPay innovation at the Open Banking Expo Awards, we’re thrilled to return in 2026 to continue driving innovation and delivering value through Open Banking.

About AccessPay 

AccessPay is a leading provider of bank integration solutions, pioneering finance transformation for the Office of the CFO. AccessPay helps finance and treasury teams modernise their operations through secure, cloud-based bank connectivity.

Our platform connects back-office systems to banks, enabling the automated flow and transformation of payment, bank statement and other financial data. Thousands of businesses around the world partner with AccessPay to automate supplier and client payments, Direct Debit collections, and bank statement retrieval. Improving efficiency, reducing fraud risk, and gaining real-time cash visibility.

Founded in 2012 and headquartered in Manchester, UK, AccessPay is trusted by global enterprises to automate finance and treasury operations and build a future-ready Office of the CFO.

  • Cybersecurity in FinTech
  • Digital Payments

Obrela’s Dr. George Papamargaritis (EVP MSS) and Dr. Konstantia Barmpatsalou,  (Blue Team Support Manager) on why embracing a risk-led cybersecurity model will leave financial organisations better positioned not just to meet regulatory requirements but to strengthen resilience, protect customers and uphold the trust that is so essential to the future of financial systems

Cybersecurity in the financial sector was once viewed as a compliance-driven discipline. But as attackers have increasingly targeted institutions with sophisticated, persistent and often internally driven campaigns, it has become a strategic priority.

According to the Digital Universe Report H1 2025, financial services were the second most targeted industry globally, accounting for 19% of all observed cyberattacks. This reflects both the sector’s value to adversaries and the complexity of the digital ecosystems it now operates within.

Regulatory frameworks such as the FCA and PRA’s operational resilience rules, the EU’s Digital Operational Resilience Act (DORA) and NIS2 have strengthened baseline protections. However, the report’s findings demonstrate that regulation alone cannot deliver true cyber resilience. Institutions must adopt a strategic, risk-led approach that looks beyond compliance to understand real threats, behaviours and operational dependencies.

Tailored, Internal and Stealthier Threats

One of the most striking insights from the report is how targeted financial sector attacks have become. Industry-specific security risks now represent 32% of all incidents in the sector. This is an indication that adversaries are designing attacks using detailed knowledge of financial operations, from trading workflows to payment systems.

Internal activity is also a major concern. Suspicious internal activity accounts for 26% of detections across financial services, reflecting the frequency of compromised accounts, misused privileges and lateral movement. For a sector historically focused on defending the perimeter, this shift highlights the need for deeper visibility into user behaviour and identity-driven risks.

The wider threat landscape reveals adversaries are moving away from overt, signature-based attacks. In H1 2025, brute force activity made up 27% of global alerts, while vulnerability scanning accounted for 22% and known malicious indicators for 20%. Notably, direct malware payloads dropped to 0% of trending alerts, replaced by fileless techniques and living-off-the-land methods that bypass traditional defences.

For financial institutions, this is a challenge. Many compliance requirements still centre on endpoint protection, patching and malware controls. These will of course, remain important, but they cannot address threats that are increasingly behavioural, stealth-driven and identity-focused.

Operational Complexity

The financial sector’s cyber risk is intensified by its expanding operational footprint. Cloud adoption, open banking, digital identity models and extensive third-party ecosystems have all created new points of exposure. Financial services operate within a global digital infrastructure that is both vast and increasingly interconnected. This level of complexity cannot be effectively protected through compliance checklists alone.

Regulators are recognising these realities. DORA’s emphasis on ICT third-party risk, operational resilience testing and continuous oversight reflects the need for more proactive, intelligence-driven approaches. But DORA still only sets a minimum standard. True resilience requires institutions to move beyond regulatory expectations and embed cybersecurity into broader business strategy.

Strategic, Risk-Led Cybersecurity

A risk-led approach begins with understanding the threats that pose the greatest risk to operations and customers. Financial institutions remain priority targets for groups such as FIN7, TA505, Cobalt Group and various state-backed actors. Their tactics, such as credential harvesting, remote access tools, web-injection frameworks and lateral movement, are specifically designed to exploit the digital fabric of financial services.

This evolving threat profile puts identity and behaviour at the heart of cyber defence. With credential-driven and internal threats so prevalent, institutions must prioritise behavioural analytics, continuous authentication and zero-trust models that verify users and devices contextually rather than relying on static controls.

Strategic cyber resilience also needs to have continuous assurance. Traditional audits, annual testing and scheduled penetration exercises cannot keep pace with rapidly evolving threats. Leading institutions are shifting toward continuous control monitoring, automated attack simulation and persistent adversarial testing. These practices align with the Bank of England’s CBEST framework and demonstrate a sector-wide move toward ongoing, intelligence-led assurance.

Crucially, cyber risk must be treated as an operational issue, not just a technical one. Embedding cybersecurity into enterprise risk management, financial planning, product development and board oversight is essential. This integrated approach also mirrors the direction of FCA and PRA regulation, which increasingly emphasises governance, accountability, and resilience across the entire organisation.

Beyond Compliance

Financial services underpin national economies and public confidence. As digital ecosystems grow and adversaries become more sophisticated, the sector faces a dual challenge: meeting rising regulatory expectations while defending against complex, targeted attacks. It is clear that cybersecurity must evolve from compliance-driven activity to a strategic capability built on intelligence, continuous assurance and behavioural insight.

Institutions that embrace this risk-led model will be better positioned not just to meet regulatory requirements but to strengthen resilience, protect customers and uphold the trust that is so essential to the future of financial systems.

Learn more at obrela.com

  • Cybersecurity
  • Cybersecurity in FinTech
  • Digital Strategy
  • Fintech & Insurtech
  • InsurTech

Zach Burks, CEO of Mintology, examines the rise of Artificial General Intelligence (AGI) and explores what the future may hold for cash

Blockchain was built on the noble principle of creating a system of value that was fair, secure, decentralised, and incorruptible. Crypto promised to protect people from the volatility of human error, from reckless governments, greedy bankers, and the decay of trust that defines our financial institutions.

For a time, it worked. We built code that didn’t lie; we created ledgers that couldn’t be tampered with; and we proved that finance could run on quantitative logic rather than human bias.

But a new kind of intelligence is emerging, one that will allow malicious actors to execute on autopilot and generatively infiltrate innocent users, what will become known as Artificial General Intelligence (AGI).

AGI is still some way off, but predictions suggest it could be in use as early as 2027, or at least propagating outwards without human knowledge at that point. Once in the open world, AGI is impossible to predict, as a chimp could not predict what a human will do next, nor can a human predict what AGI will do. However, assume these possibilities: this technology will have the power to decrypt and unlock blockchain-based currencies, learn how to crack cryptographic puzzles, run other AGI agents and rinse and repeat.

Paradoxically, the safest asset in the world will no longer be Bitcoin; it will be physical currency or items deemed as currency.

The Age of the Codebreaker

It is estimated that 68–74% of all cyber-attacks involve a human element, error, manipulation, or social engineering. Our entire security architecture has been designed around that premise: defend against people.

Smart contracts, encryption, and consensus protocols depend on predictable, rational behaviour, or protect against irrational actions. They are designed to survive attacks from individuals or organisations that rely on either quantity (bot networks) or quality (human intelligence), not both, nor novel vectors (such as novel exploits in math breakthroughs).

A near-sentient system changes that equation. It fuses the scale of automation with the intent of human-like intelligence. If weaponised, it could probe billions of attack vectors in seconds, rewrite its own code to evolve around defences, and destroy a financial system from the inside out.

We’ve seen the first state actor sponsored AI Agentic cyber espionage recently, and that is just from normal AI, not even AGI. Further reinforcing the point that AI is a powerful intelligence, and AGI will be on another level, unfathomable from the human’s perspective.

Crypto’s strength has always been its demand for continuous codebreaking. It exploits the one finite human resource, time. But AGI will erase that constraint. Time ceases to be a defence in the age of autonomy.

The End of Digital Trust

Trust is the foundation of money. Without it, no currency, crypto or fiat can survive. Blockchain gave us a new kind of trust, trust in code and mathematical truth.

We told ourselves that decentralisation would make corruption of the network improbable by humans. But we didn’t anticipate machine corruption, the rise of autonomous systems capable of penetrating those same decentralised defences.

Academic research already shows that generative AI can autonomously discover one-day vulnerabilities. It can exploit them faster than existing patching cycles. Combine that with the commercialisation of state-sponsored scamming. A $1 trillion illicit economy, according to the World Economic Forum’s Global Cybersecurity Outlook 2025. And you have a perfect storm for simple AI, not accounting for what AGI’s intentions may be.

The moment AI becomes self-directing and amoral when neutral, and outright immoral when viewed from a human perspective, but not a binary perspective (in the computer sense), the concept of secure digital value collapses. No wallet is safe if an AGI can learn every exploit in existence before the first patch is written. Or a new mathematical proof that defeats the difficulty of PoW chains like Bitcoin. Or has implanted itself in every device it can reach and simply transfers your assets away like a hacker.

No Wallet, DeFi protocol, or even Blockchain is safe if AGI wants to take a path of gathering financial resources to enact whatever plan it may develop. As AI becomes omnipresent, the irony is that the very technologies designed to control us by centralised power, digital IDs, central-bank digital currencies (CBDCs), and government backed stablecoins, may become vectors of vulnerability.

A Warning for CBDCs

A report conducted by the Department of Homeland Security recently stated that CBDCs can be susceptible to high levels of cybercrime. These include phishing scams and mass exchange rate manipulation. In an era of AGI, the rate at which these vulnerabilities can be exploited becomes tenfold.

When your savings live entirely inside a system that can be hijacked faster than you can blink, society will retreat to the one haven it knows it can trust: physical cash or cash-like equivalents. But honestly, if this happens, there isn’t much of a society left over at that point.

Cash or Bartering Will Be King (Again)

It sounds absurd, the idea that in an era of automated economies, humanoid robots, and algorithmic wealth managers, the safest thing you could own is a paper banknote. Yet that’s exactly where we’re headed if we go down a path of ‘unplugging’. We move off the grid to combat the AGI release, assuming we are still alive to do so at that point.

Cash can’t be hacked or reprogrammed. It doesn’t depend on the uptime of a network or the integrity of a wallet provider. It is the last financial instrument that exists entirely outside the reach of code. Yet in the scenario of AGI going rogue and being released into the world, the most likely scenario I predict is that the markets will see a slight flicker, almost as if a single global hedge fund blew up, or maybe a bit worse… Within minutes, markets around the world will react as assets gathered by the AGI are dumped and transferred for the purpose of AGI.

Although, paradoxically, if the AGI crashes the markets so badly, hacks billions in Bitcoin and sells it, takes over bank accounts, the cascading effect of a global crash on this order, would impart the effect of all its efforts to gather resources moot. So it cannot crash the market spectacularly. If AGI wants to use its resources in some way. If that is its plan, that is. Why pay a human when you can control a humanoid robot?

The lesson is uncomfortable… The more intelligent our systems become, the more valuable it is to hold something that isn’t correlated to the status quo. Hence, cash (assuming the government hasn’t destroyed the value of the currency) and currency-like items via bartering will be the new status quo in this post AGI world.

Can We Stop It?

The survival of blockchain-based finance will depend on merging on-chain verification with off-chain intelligence. AI must be used not just as an optimisation tool but as a shield. An intelligent custodian that monitors for synthetic behaviour, agent-driven manipulation, and abnormal transaction patterns.

Research conducted by Boston Consulting Group proposes autonomous agents, which could be used to detect and counter adversarial machine behaviour in real time. It’s a promising start, but still reactive, not preventative.

To protect digital value, critical financial infrastructure must incorporate hardware kill-switches, air-gapped recovery procedures, and circuit breakers independent of algorithmic consensus.

In a future where AI moves capital faster than humans can think, there must still be something that can say stop, instantly and irrevocably. This is the first path forward, when we are talking about normal AI and agentic AI as we know it today in 2025. We must fight fire with fire, and use AI agents to protect and attack, otherwise we are knights in armour on a battlefield against drones. This is all before AGI is released; then it becomes an arms race (if there is a competitor AGI) for the two to fight it out or join forces, because at that point, humans are only along for the ride.

The New Definition of Wealth

In the AGI era, wealth won’t be measured by what you own, but by what you can protect. Digital capital will remain essential, but it will need a new architecture that assumes non-human adversaries and responds autonomously. Regulation will never be able to move quickly enough to stop AGI, and even if it did, there remains the challenge of understanding training vs intent and rationally policing the difference between the two. The term ‘agentic state’ has never been so poignant.

Cash will therefore – in either local currencies, new currencies, or bartered items – become king again, not for efficiency, but for situational sovereignty. The markets of the future will be defined less by access and more by security, control, and locality.

AGI could one day manage every trade, optimise every yield, and eliminate every inefficiency if aligned for the good of humanity, but if malaligned AGI grows, the technology will become humanity’s own worst enemy.

This dilemma means a changed society, if there is even one left, that in order to operate needs to keep something tangible in its hands, a note, a coin, a battery, a 5.56 caliber bullet,  a reminder that security isn’t always a guarantee.

With physical currency, you sometimes let your immediate environment in, with digital money, you invite the internet in, at the speed of beyond trillions of operations a second, faster than a blink of an eye.

About the Author

Zach Burks is an accomplished blockchain developer with over a decade of experience in the Ethereum ecosystem. He has progressed the governing principles of Ethereum first-hand through his collaboration with the Ethereum Foundation on improving the ERC-721 standard, the cornerstone standard for all NFTs, and by authoring ERC-2981, the industry-defining on-chain royalties standard. Zach is also the mastermind behind Gasless Minting, which revolutionized the NFT creation process.

Learn more at mintology.app

  • Artificial Intelligence in FinTech
  • Blockchain & Crypto
  • Cybersecurity in FinTech

Martin Petrov, Chief Technology Officer, Payments Compliance at Integrity360


It is tempting to view payments compliance as the finish line, a signal that a business is secure. But in practice, compliance is just the starting point. It provides a baseline security level, not a digital fortress. Standards are designed to raise the floor and eliminate obvious vulnerabilities, but they cannot cover every emerging threat or nuance – such as a supplier getting breached or a shortcut taken by an engineer at 2 a.m. That is where organisations risk becoming complacent or overly literal in their interpretations.

True security demands a harder question than “Are we compliant”?  It demands: “Would this stop an attacker today?” That demands understanding not just what a control requirements state, but why they exist. Multi-factor authentication (MFA), for example, is not just a checkbox; it is a concept rooted in stopping unauthorised access. Compliance must be interpreted in context: against the weakest vendor, the most exposed system, the riskiest business process, and the evolving threat landscape. Too many breaches have exploited gaps that audits never covered because compliance became the ceiling, not the floor.

Regional and cultural factors also play a part. In Northern Europe, payments compliance frameworks like PCI DSS are often seen as a baseline to exceed, with layered defences added beyond the minimum. In other regions, standards such as PCI DSS or ISO/IEC 27001 are treated more as a destination. Certification becomes the end goal – a badge to display, not a baseline to exceed. These differences matter because they determine whether compliance protects you or just protects your reputation.

The supplier slip-up that could cost you everything

One of the most urgent blind spots is the supply chain. You can harden and patch all of your own systems, mandate MFA, and lock down every endpoint. But a vendor’s default service account, an abandoned test tenant, or an over-permissioned API can undermine everything. As integrations and dependencies grow, so does the potential blast radius. And while many organisations know who their suppliers are, far fewer know what access they have, how often they are reviewed, or whether they follow the same standards. Supplier risk must now be managed as rigorously as internal operations; tiered, tested, and tightly controlled.

The three-body problem: when PCI-DSS, GDPR, and the EU AI Act collide

Then there is the pace of innovation, particularly in areas like AI. For European compliance officers, this creates a three-body problem: the EU AI Act, PCI-DSS, and GDPR orbiting each other with overlapping but misaligned requirements. And unlike physics, there is no elegant equation to solve it. Meanwhile, global response remains inconsistent, and the tension between innovation and oversight is only going to grow.

The organisations that succeed in this environment will not just meet standards; they will go further and question whether they are compliant on paper but vulnerable in practice. By treating compliance as a foundation, not a finish line, organisations will unlock new ways to stay secure and  trusted. The question is, what does that really look like?

What good is a lock if no one checks the door?

One of the easiest traps for modern security teams is assuming that tools alone provide protection. But no matter how advanced the platform or how rigid the policy, it is people and processes that hold it all together – or let it fall apart. This is especially true in payments compliance, where new platforms and integrations emerge faster than policies can adapt.

Organisations that treat compliance as a checklist often over-rely on technology, trusting automated scans, secure settings, or third-party certifications to keep them safe. But without context and human judgement, these defences can create a false sense of security and leave the business exposed.

In the best security teams, compliance is part of the culture. Risk and DevOps teams stay in sync through constant feedback. Procurement acts as a line of defence, with a clear view of which suppliers matter most and where the risks lie. These teams know when to push back, even if it means slowing things down. And across the business, people are empowered to speak up when something feels off, whether it is a shortcut, a setting, or a workaround that could open the door to risk

Compliance is not the end of the story

The gap between being compliant and being protected has never mattered more. Payments compliance standards offer a necessary starting point, but it cannot keep pace with every new integration, supplier dependency, or regulatory shift. Resilient organisations recognise this. They treat compliance as one layer in a broader strategy, one that includes cultural alignment, human awareness, and operational agility.

The difference shows up not in the paperwork, but in the response to real threats. While compliant organisations pass audits, protected ones prevent breaches. That is the shift the payments industry needs: from ticking boxes to asking better questions, and from chasing certification to building capability, resilience and responsiveness.

Because at the end of the day, it is not about being compliant. It is about being resilient.

Learn more at integrity360.com

  • Artificial Intelligence in FinTech
  • Cybersecurity in FinTech
  • Digital Payments

Dan Nichols, Chief Technology Officer at virtualDCS, on why cloud resilience in the financial services sector hinges on shared accountability and an assume-breach philosophy

A powerful catalyst for transformation, the cloud is reshaping how organisations compete in the financial services sector. Beyond significant cost savings and flexibility, leaders are eager to unlock the potential of AI-driven insights, intelligent automation, and real-time business modelling. And, in a space governed so strictly by data sovereignty and privacy policies, the cloud’s ability to localise, encrypt, and control data has made it a key enabler of compliance and customer confidence.

But as threats become more frequent and sophisticated – with attackers now targeting shared platforms and partner supply chains – organisations can no longer rely on their own defences alone. For true digital resilience, shared accountability, collective readiness, and clear governance across every cloud touchpoint are equally non-negotiable.

All Eyes on the Money

The industry sits at a valuable intersection of data, technology, and finance. A combination that makes it uniquely attractive to attackers. It holds some of the world’s most sensitive data, directly underpins the flow of global capital, and operates through deeply complex and interconnected systems. With every integration increasing the risk of exposure. Ultimately, the attack motivation is as simple and relentless as it is in most sectors: monetary gain. Cybercriminals target institutions precisely because of the value at stake and the speed at which disruption translates to loss.

How the Threat Landscape is Evolving

Ransomware groups may see insurers and payment providers as high-yield targets. They understand even seconds of downtime can induce multi-million pound losses. Under pressure to protect customer trust and avoid regulatory penalties, some firms may choose to pay in order to restore their service quickly. This dangerous perception only encourages repeat targeting and paves the way for damage to spread even further. Yet it remains a common response tactic among many.

At the same time, the rise of supply chain and third-party attacks has made it possible for criminals to bypass even the most well-defended cloud environments. By exploiting shared platforms, managed service providers, and cloud-hosted applications, perpetrators can move laterally across multiple organisations at once, amplifying both the reach and impact of their attacks. In other words, infiltrating one vendor’s weakness can cripple an entire network in one carefully coordinated strike. And, since some firms may overlook the cloud’s shared responsibility model – presuming end-to-end security sits solely with their cloud provider – multiple blind spots can inevitably emerge, creating easy openings to exploit.

In an environment where boundaries blur and dependencies multiply, traditional perimeter-based defences are no longer enough. Hybrid and multi-cloud infrastructures demand continuous visibility, faster detection, and coordinated response across every partner and provider. The goal is not simply to prevent breaches, but to withstand and recover from them collectively. It’s about recognising that in today’s ecosystem, no financial institution is secure in isolation.

Inside the Ransomware Economy

Evolving beyond the scattergun attacks of the past, ransomware now operates as a professionalised, profit-driven ecosystem, where malicious actors collaborate, trade intelligence, and lease attack tools much like legitimate software vendors. The rise of ransomware-as-a-service (RaaS) has even lowered the barrier to entry, giving less skilled affiliates access to ready-made payloads and automated encryption kits in exchange for a percentage of the ransom.

What makes it especially destructive is the precision and psychology behind the attacks. Rather than randomly striking, attackers conduct weeks of reconnaissance – learning behaviours, studying employee hierarchies, and identifying systems most critical to operations. They often infiltrate through phishing emails or compromised credentials, quietly moving laterally through the network to gain elevated access. Once embedded, they disable defences, exfiltrate sensitive data, and target backup repositories before finally encrypting production systems.

At that point, the goal shifts from technical control to financial coercion. Victims are locked out of their systems and presented with a ransom note demanding payment, sometimes in cryptocurrency, in exchange for a decryption key. Increasingly, the threat includes public exposure of stolen data – a tactic designed to pressure leadership into paying to protect their reputation and customer trust. Even when ransoms are paid, recovery is rarely clean: data may be incomplete, corrupted, or resold on the dark web, and repeat targeting is common once an organisation is identified as a payer.

It’s this blend of stealth, strategy, and human manipulation that makes ransomware so difficult to defend against. By the time the encryption begins, attackers have already spent weeks ensuring recovery options are limited. This background isn’t designed to scaremonger, but to highlight why resilience must start long before an attack ever reaches the endpoint.

The Foundations of Ransomware Resilience

Ransomware resilience isn’t achieved through a single product or policy – it’s the outcome of strategic, technical, and cultural alignment. Financial institutions, in particular, must approach it as a continuous process of readiness: Anticipating compromise, containing impact, and restoring normality quickly and transparently:

Assume-Breach Philosophy

The first step is shifting from a defensive mindset to an assume-breach philosophy. In practice, this means recognising that even the most sophisticated systems can and will be breached – and building architectures and response strategies designed to limit damage when this happens. It’s a pragmatic approach, grounded in the reality that attackers are increasingly sector agnostic. No organisation is too small or too secure to be targeted, but the financial sector remains a favourite because it offers both high disruption value and potentially significant monetary reward.

Building meaningful resilience, therefore, demands layered defence and disciplined execution. The goal is to slow attackers down at every stage – detecting them early, limiting lateral movement, and ensuring business continuity when systems are disrupted. Behavioural analytics and continuous monitoring can surface and neutralise subtle anomalies that would otherwise go unnoticed – such as phishing, spear phishing, and malware, with email still the number one entry point for ransomware.

Zero Trust & MFA

Meanwhile, zero trust policies and multi-factor authentication methods add a second layer of protection, blocking unauthorised access even if credentials are compromised.

When incidents do occur, a well-practised response framework ensures action is fast and coordinated, minimising disruption across critical systems, with the ability to switch to secure replica environments to keep operations running while remediation takes place. Secure, immutable, air-gapped backups underpin it all, providing a safety net that guarantees recovery can begin from a clean and uncompromised state.

Human readiness is equally critical. Technology can contain an attack, but only people can recover from one effectively. Regular simulation exercises, incident rehearsals, and cybersecurity awareness training help teams respond calmly and cohesively, transforming response from reactive to instinctive. This operational maturity is reinforced by strong governance. Frameworks such as DORA, NIST, and ISO 27001 provide the structure to align technical teams, compliance leads, and executive decision-makers around shared resilience goals. When combined with skilled practitioners and clear accountability, they embed security into ‘business as usual’ – moving resilience from a strategy to a sustained organisational capability.

Why Multi-Layered Backup is Critical

When ransomware strikes, the speed and integrity of data recovery determine whether disruption lasts minutes or days – and whether the impact cascades through wider global markets. As the last and most decisive line of defence when every other control fails, it’s also fundamental to customer trust and compliance. Yet too often, backup is treated as a static safeguard rather than a dynamic resilience layer.

Since modern ransomware often seeks out and encrypts traditional backups first, a single backup copy or centralised repository is no longer sufficient. True resilience today depends on a multi-layered approach – combining offsite or cloud-diverse storage, immutable data copies that cannot be altered or deleted, and isolated environments to protect against lateral movement.

How frequently these backups are tested is equally important. Too often, financial institutions only discover weaknesses when recovery is already underway, at which point strategies can’t be magically strengthened, and it becomes a race against the clock to minimise downtime and reputational fallout. Regular, automated recovery testing changes that dynamic. It not only confirms that files can be restored, but provides verifiable assurance that systems come back online in the correct order, data dependencies remain intact, and teams have the muscle memory to act quickly and confidently when the worst happens.

The Power of Shared Accountability

In a digital economy so deeply interconnected, no organisation operates in isolation. This is especially true in financial services, where supply chains and service providers form the backbone of day-to-day operations. While this interdependence is a strength in many ways, it also means resilience is no longer defined by how well a single institution can defend itself, but by how effectively every partner in its ecosystem upholds their part of the security chain.

This is where shared accountability becomes critical. It recognises that cloud providers, managed service partners, and financial institutions each have distinct but complementary roles to play in securing data, systems, and infrastructure. When accountability is clearly defined – and when partners collaborate rather than operate in silos – visibility improves, incident response accelerates, and the risk of systemic failure decreases.

Shared accountability also extends beyond contractual obligation. It’s about building a culture of collective readiness: sharing intelligence, rehearsing joint incident scenarios, and supporting smaller or less-resourced partners to raise their security baseline. The result is a unified entity capable of anticipating, absorbing, and recovering from disruption together.

Looking Ahead

To view cyberattacks as inevitable might seem pessimistic to some, but it’s an unfortunate truth that no amount of investment can eliminate risk entirely. In an era where threats are growing in both scale and sophistication, readiness becomes the true differentiator – particularly in such a high-stakes sector. For financial institutions, that means embedding security into culture, strengthening connections across supply chains, and continually testing their ability to withstand and recover as a united ecosystem. Only then can resilience become a strategic advantage rather than a defensive necessity, and unlock the cloud’s transformative potential with absolute confidence.

Learn more at virtualcds.co.uk

  • Artificial Intelligence in FinTech
  • Cybersecurity
  • Cybersecurity in FinTech
  • Data & AI
  • InsurTech

Ben Goldin, Founder and CEO of Plumery, explores the key banking trends for 2026 – from fraud and digital assets to stablecoins and AI applications

As we head into the second half of the decade, several emerging trends will come to the fore in 2026. The interconnectedness among these trends is also noteworthy. Artificial intelligence (AI) and progressive modernisation act as common threads.

A strong current throughout 2026 is the shift from customer-first banking to human-first banking. This relates to the concept of ethical banking. It focuses on creating financial services that have a positive social and environmental impact. 

Human-first banking aims to get even closer to the customer by understanding their actual human needs, rather than just consumer needs. For example, a bank should be acting as a coach to improve a customer’s financial health, not solely as an advisor on which products they should buy. Banks can build trust in a digital world through tailored and empathetic interactions, effectively simulating the experience customers formerly had with their personal banker.

To attain that level of hyper-personalisation, banks will need to be capable of processing vast amounts of transactional data, which can only be accomplished by deploying AI and big data tools. This requirement, in turn, will turbocharge progressive modernisation, another trend that has been bubbling under the surface for the past few years.

Traditional banks are using progressive modernisation to deal with legacy infrastructure that is not fit for purpose in a digital-first, AI-driven world. Instead of a big bang replacement of core banking systems, which is risky and can take years, banks are creating change from within existing architecture. Banking is leveraging technologies that support a multi-core strategy. With this approach, banks can add new cores for specific products that require greater agility and innovation. Modern cores are necessary for deploying the latest AI and big data tools because they provide a unified, real-time data foundation to deliver hyper-personalisation.

Fraud Threats

Fraud will remain a top concern throughout 2026. Adversaries use AI to expand the range of techniques, such as impersonation scams and identity theft, as well as accelerate and scale fraudulent activity.

According to the UK Finance Half Year Fraud Report 2025, £629.3 million was stolen by criminals in the first six months of this year, and there were 2.09 million confirmed cases across both authorised and unauthorised fraud. Card not present cases rose 22% to 1.65 million and accounted for 58% of all unauthorised fraud losses.

However, the good news is that there was a 21% increase in prevented card fraud in the first half of 2025. The £682 million which was stopped from being stolen is the highest-ever figure reported.

To combat fraud, new and improved tools to help banks identify, verify and onboard customers will come to market in 2026. The move away from paper-based identity (ID) and widespread adoption of digital ID will play a key role in the fight against fraud. Hence the UK government’s recently announced plans to roll out a new digital ID scheme.

In addition, I expect to see a fundamental shift in fraud detection using real-time behavioural analytics, data analytics for proactive risk identification, and other applications of AI and machine learning in this space.

Digital Assets and Stablecoins

Digital ID verification is also essential for fighting fraud in the digital assets and stablecoins space. Another hot topic at several banking and payments industry conferences last year.   

In 2026, digital assets and stablecoins will become much more mainstream. Banks have left the sidelines and are now actively engaged with running pilots. For example, in September a consortium of nine European banks, including CaixaBank, ING and UniCredit, announced an initiative to launch a euro-denominated stablecoin.

Central banks and regulators are developing a comprehensive agenda for digital assets. Banks will need to blend traditional fiat currencies and assets with their digital counterparts. This trend is also driving a progressive modernisation approach, as legacy core banking systems weren’t designed to manage digital assets, nor do they support moving money via blockchain-based rails. I expect to see more banks looking to deploy a multi-core strategy where digital assets are managed and stored elsewhere, but they can still provide a seamless and unified experience to customers.

AI

Last year, I predicted that the industry would adopt a ‘meet-in-the-middle’ approach to AI, with banks beginning to uncover the real value that the technology can deliver. I also predicted consolidation, recalibration and stabilisation in the market.

GenAI Banking Applications

My predictions held true, by and large. In 2025, institutions explored what is possible, relevant and achievable within the banking context, then specifically for each individual institution within its legacy architectures and technological environments.

This trend will evolve into more practical actions and initiatives over the next 12 months to provide greater clarity around where GenAI shines versus where it’s not applicable.

To gain clarity, it’s important to understand the difference between AI and GenAI. The latter is built on stochastic principles, which uses probability to model systems that appear to vary in a random manner. This means that the same input could potentially generate different outputs – this isn’t acceptable for automated financial operations, which requires much more determinism. Hence, I believe that GenAI will be used chiefly in scenarios where there’s human intervention.

One area where GenAI is applicable is in conversational applications. For example, banks will begin launching more interactive user interfaces. Customers will be able to interact with the bank as they would a human. Moving beyond simple, frequently asked questions to actual actions.

GenAI in the Back Office

Similarly in the back office, banks can leverage GenAI to provide guidance to their employees and accelerate certain tasks. Using the technology to improve efficiency and help staff do more will have a positive impact on customer experience. Processes will take much less time.

It will also help to bring unbanked segments or non-standard customers, which are difficult and costly to onboard because they require a bespoke assessment, into regulated financial services. Applying GenAI can make the bespoke process much more efficient by providing data-driven insights to support faster and smarter decision-making. This will make it much cheaper to serve these segments. Including smaller and medium-sized enterprises, which will drive financial inclusion and improve customers’ financial health.

Learn more at plumery.com

  • Artificial Intelligence in FinTech
  • Blockchain & Crypto
  • Cybersecurity in FinTech
  • Digital Strategy
  • Fintech & Insurtech
  • InsurTech

Mike Southgate, Co-founder of UK-based RegTech firm Ermi, on why artificial intelligence alone cannot replace human judgment in the creation of rules for automated transaction monitoring

In the drive to modernise and improve financial-crime detection, artificial intelligence (AI) has emerged as a powerful tool. Machine-learning models have the ability to process vast volumes of transactional data, identify patterns invisible to the human eye and flag anomalies at scale.

But despite these clear benefits, AI on its own cannot deliver the transparency, accountability, or contextual nuance that is needed for effective transaction monitoring. Human judgment (Human In the loop) remains absolutely essential.

The Autonomy Illusion

Rising financial crime, advances in laundering typologies and increased regulatory scrutiny, has put financial institutions under pressure to adopt AI-driven anti-money-laundering (AML) systems, with the promise that they will be more effective.

According to the IICFIP Global Financial Crimes Impact Report 2025, global losses from financial crime exceed US $8 trillion annually, including money laundering losses of between US $800 billion and $2 trillion, fraud losses of over US $5 trillion, and corruption losses around US $3.6 trillion. Yet INTERPOL reports that only one percent of illicit financial flows are ever intercepted, frozen, or recovered.

Transaction monitoring vendors are increasingly marketing AI-driven AML solutions, claiming that the algorithms are able to autonomously detect suspicious behaviour. But these capabilities are often vastly overstated. Machine-learning models suffer from multiple issues. They are only as effective as the data they are trained on and ensuring accurate (E.g. data relevant to the firm buying the tool) and up to date data is challenging. Not least because financial crime is a moving target. Criminals continually change their tactics, often faster than AI can be retrained. Because the system relies on patterns learned from historical data rather than anticipating new, adaptive strategies, subtle illicit activity, such as transactions that mimic legitimate behaviour, often go undetected. Similarly, data to train an AI must know whether past patterns were truly criminal, which we may not always know.

Understanding AI’s Shortcomings

Importantly, the line between criminal and normal behaviour will depend upon the client. Consider a scenario where a high-net-worth individual initiates a series of international transfers. An AI model may flag these transactions purely based on volume or geography. Without contextual understanding for the type of client, the alert is likely to be a false positive. Conversely, a sophisticated money laundering scheme could evade detection entirely by mimicking legitimate behaviour. In both cases, human insight is critical. AI lacks context of clients or in-depth knowledge of  of “normal” business models.

Opacity is another concern. Many machine-learning systems operate as black boxes, generating alerts without and meaningful explanation. Regulators are increasingly demanding transparency, for example under the EU AI Act and Financial Action Task Force (FATF) guidance on AI in AML (FATF, 2021). Institutions have an obligation to justify why a transaction was flagged (or not), what criteria were used and how decisions align with risk-based approaches.

Black-box models can also undermine internal governance. Compliance teams need to understand and trust the systems they rely on. And when an alert cannot be traced to a clear rule, confidence is undermined and investigations stall. Over-reliance on automation has the potential to overshadow critical human judgment.

Human Rule Design with Context

Effective transaction monitoring must still therefore have human-led contextual rule design. Unlike generic thresholds or static parameters, contextual rules take into account the full spectrum of customer behaviour, business models and risk exposure. Having defined rules will also allow transparency and traceability.

For example, a transaction exceeding £10,000 may trigger a review in retail banking but is routine in corporate financial operations. Contextual rules enable financial institutions to adapt the detection rule logic based on customer type and risk, transaction purpose, jurisdictional risk and historical patterns.

Contextual rule design also supports dynamic adaptation, so that systems are able to respond intelligently to changes in a client’s behaviour. For example, if a customer suddenly increases the volume or frequency of cross-border payments, the system evaluates these changes against historical patterns, business type, transaction purpose and associated risk factors. Alerts are then generated only when deviations are statistically or contextually significant, rather than for every fluctuation.

By incorporating this nuanced understanding, organisations are able to reduce false positives, prioritise genuinely suspicious activity and ensure compliance teams focus on actionable alerts rather than noise.

Contextual Rules

Importantly, contextual rules enhance explainability. Each rule can be traced to a specific rationale, for example, regulatory guidance, internal policy, or risk appetite. This strengthens audit readiness and helps with regulatory engagement. Transparency also supports continuous improvement as threats evolve or business priorities shift.

Financial crime detection is not just a technical challenge and is fundamentally about context. But AI struggles with nuance. It cannot distinguish between a legitimate seasonal spike and a layering attempt, in which illicit funds are moved through multiple accounts or jurisdictions to obscure their origin. It also cannot surmise intent, assess reputational risk, or weigh geopolitical implications, or above all… just be a sceptical compliance officer who doesn’t trust anyone.

Humans excel at contextual reasoning. They interpret indicators in light of customer behaviour and relationships, market dynamics and regulatory expectations. They ask the right questions, challenge assumptions and escalate concerns when needed. In short, humans bring vital judgment to transaction monitoring.

An example of this in action: in 2024, a European bank’s AI system flagged 80,000 transactions as “high risk.” Only 0.3 percent proved genuinely suspicious (IICFIP, 2025). Without human review, the bank would have wasted significant time chasing false positives, while potentially missing the subtler patterns of actual illicit activity.

Augmentation, Not Automation

The future of transaction monitoring is not about replacing humans but about strengthening them. AI should be used to support decision making by surfacing patterns and anomalies, while humans provide interpretation, oversight and context.

Forward-thinking financial institutions are getting ready for a regulatory landscape that will demand AI models are explainable and auditable. And by carefully combining machine efficiency with human judgment that organisations will reduce operational risk and strengthen compliance.

As financial crime grows more sophisticated, our transaction monitoring needs to evolve too. AI is a powerful tool but it is not a panacea. Effective transaction monitoring requires human insight and contextual awareness. Hybrid models that balance automation with human-led rule sets and interpretation will be essential.

While AI offers unparalleled speed and pattern recognition, it cannot replace the human ability to reason, contextualise and make judgment calls. Human-led transparency, explainability and context are not optional features for effective AML. Organisations that use AI to augment, not replace, human judgment will be best positioned to detect sophisticated threats, maintain regulatory trust and act decisively. In stopping financial crime, trust is essential and trust cannot be automated.

Learn more at ermitm.com

  • Artificial Intelligence in FinTech
  • Cybersecurity in FinTech
  • Digital Payments

Ben Francis, Insurance Lead at Risk Ledger, on navigating cyber threats by reinforcing security from the inside out

Cyber insurance has evolved from a straightforward risk transfer mechanism into an integral component of enterprise risk strategy. As a result, the conversation has shifted beyond simply securing coverage to embracing three foundational elements: transparency in risk exposure, accountability for security measures, and active collaboration throughout the digital ecosystem.

Rather than asking ‘are you covered?’, the more pertinent question has become ‘can you demonstrate measurable risk reduction?’. Insurers and insureds alike are recognising that what matters now is how well an organisation understands and manages its digital exposure, especially across its extended supply chain. Recent data reveals that 46% of organisations experienced at least two separate supply chain-related cyber incidents in the past year, a clear sign that exposure often lies beyond direct control. 

From Risk Transfer to Risk Visibility 

In recent years, the cyber insurance market has matured significantly. Once viewed as a reactive safety net to cushion the financial impact of attacks, it is now becoming a proactive tool for managing and mitigating risk. This shift is partly driven by insurers, who increasingly expect and work with organisations to demonstrate strong security practices and a nuanced understanding of their threat landscape, including risks deep within their digital supply chains; an area where many businesses still fall short.

At the same time, the industry faces a growing challenge from systemic cyber risk within their portfolios, as many businesses rely on the same cloud providers, payment systems and digital platforms, increasing the chance of a single point of failure. Insurers must gain visibility into how policyholders are connected, not only to suppliers but to each other. Tools and frameworks that map and monitor these interconnections will be essential to avoid underestimating the wider impact of seemingly isolated cyber events.

Mapping Beyond Third Parties

It is no secret that cyber attackers often target the weakest link in a supply chain. These are not always direct suppliers, but fourth, fifth or even sixth-tier vendors that have indirect but critical access to systems and data. Unfortunately, many organisations lack visibility beyond their first tier, creating blind spots that attackers can easily exploit. From an insurance perspective, this presents a clear challenge. If an organisation cannot account for who it is connected to, it cannot adequately quantify its risk and neither can its insurer. Mapping these extended connections is more than just a technical exercise; it means actively practiced risk governance and responsibility. Insurers increasingly want to know how their policyholders are identifying and managing indirect dependencies, particularly in sectors like financial services and retail where disruption can ripple across entire markets.

Collaboration as a Risk Strategy 

One of the more underappreciated aspects of cyber resilience is the role of peer collaboration. Unlike physical incidents, cyber threats rarely exist in isolation. A single compromised vendor can impact multiple organisations simultaneously, a fact that has been highlighted by high-profile supply chain attacks such as SolarWinds and MOVEit

As a result, businesses need to think beyond their own perimeters and adopt a more collective mindset. This includes building relationships with industry peers, sharing threat intelligence and participating in sector-wide initiatives aimed at improving visibility and preparedness. 

In highly regulated sectors, such as insurance, this collaboration is increasingly being encouraged by oversight bodies. Frameworks like the Digital Operational Resilience Act (DORA) in the EU and initiatives from the Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA) in the UK are pushing for more transparency around third-party risk. In this context, openness is no longer optional; it will be a regulatory expectation. 

For insurance providers, greater collaboration between policyholders also means better data on emerging threats and more accurate portfolio management. For businesses, it offers a chance to anticipate vulnerabilities that may not yet have hit their own networks but are affecting others in their industry. 

Proactive Transparency Builds Trust 

Organisations that take a proactive, transparent approach to cyber risk management are more likely to secure cover and potentially favourable terms, not just in terms of premiums, but also in access to additional services such as forensic support, incident response sources and legal counsel. 

Demonstrating a mature cyber posture is not about claiming perfection. No organisation is immune to breaches. What insurers are looking for is evidence of a structured approach: the existence of incident response plans, robust governance, effective supply chain risk management, and above all, an honest view of risk. 

A Shift in Mindset 

Ultimately, our understanding of cyber insurance must keep evolving. It should not be treated as a simple checkbox exercise, but as a collaborative relationship between insurers and the organisations they support – one built on shared insight, clear communication, and a drive for continuous improvement.

The organisations best equipped to navigate today’s threats will be those that prioritise transparency. Not only does it lead to stronger protection, but it also builds a culture of accountability that reinforces security from the inside out.

Learn more at riskledger.com

  • Cybersecurity
  • Cybersecurity in FinTech
  • Digital Strategy
  • Fintech & Insurtech
  • InsurTech

Neven Matas, Cybersecurity Team Director EU from Infinum, explores how FinTech companies can turn resilience into a source of innovation and business growth

FinTech companies are under constant pressure to innovate rapidly while maintaining deep and ongoing trust in their platforms. And as AI becomes embedded into everything from credit decisions to customer support, these pressures are intensifying. The future of digital finance will not just be defined by who deploys the most advanced technology first but by who implements systems that can withstand attack, scale efficiently, and evolve without compromising compliance or customer confidence.

Resilience cannot be a technical afterthought; it is a strategic requirement for FinTech. Modular platform architectures, responsible AI operations, and proactive security testing are becoming the foundations of sustainable FinTech growth. Together, they define an operating model where compliance supports innovation instead of obstructing it and where trust becomes a true competitive differentiator.

FinTech Resilience Begins with Architecture

Many FinTech platforms have evolved as tightly integrated but ultimately separate systems. While these can move quickly at first, they will often struggle under regulatory change, evolving security threats or simply the pressure of scale.

Modular, API-driven architectures will enable organisations to compartmentalise risk. They also make it easier to upgrade specific services without disrupting the others and adapt to new regulatory obligations without impacting the whole business. Shared platform capabilities, such as identity management, encryption, logging and access control, will give every new product or feature an inherited baseline of good security practice and governance.

This approach is especially important as operational resilience regulations tighten across global financial services. Requirements around third-party management, continuity planning, and incident reporting demand systems that are secure, observable, and controllable. When resilience is engineered into the platform rather than bolted on, organisations can adapt far more confidently.

Crucially, modularity accelerates innovation rather than slowing it down. Teams can experiment at the edge without placing core systems at risk. New fraud detection models, customer features or AI-driven services can be deployed, tested and refined in isolation. Resilience, therefore, is not simply about withstanding disruption, it is what allows organisations to safely embrace continuous change.

Scaling Digital Products Without Tripping Over Compliance

Digital FinTech products are no longer judged just on usability. They are also evaluated on how transparently they handle data, how well they communicate risk, and whether they meet regulatory expectations across markets. Compliance, which was once seen as a barrier to innovation, is increasingly becoming a fundamental product design input.

The most resilient organisations will embed regulatory thinking directly into product development from the outset. Rather than treating compliance as a late-stage sign-off, they feed regulatory principles into experience design and system behaviours. Consent flows, audit trails, authentication rules, and data retention logic become part of the product’s core architecture rather than something that has been retrofitted.

This approach significantly reduces the operational burden of growth. As FinTech companies enter new regions or launch new services, they avoid the potential of costly remediation triggered by regulatory scrutiny. Instead, they operate from consolidated, well-governed platforms that limit the attack surface and simplify oversight, while also limiting duplication. The outcome is a stronger security posture and faster expansion into new markets with clearer trust signals for customers and partners.

AI as a Trusted Partner Not a Black Box

AI has rapidly become central to the FinTech value proposition. Real-time fraud detection and automated operational processes, for example, depend on increasingly sophisticated models. However, AI also introduces new risks, including opaque decision-making, potential bias, and heightened regulatory exposure when automated systems influence financial outcomes.

The strategic shift now is from experimental AI adoption to accountable AI operations. This begins with defining precisely where AI adds value and where human oversight remains essential. High-impact use cases, such as lending decisions, transaction monitoring and identity verification, all need explainability as well as accuracy. Organisations must be able to demonstrate how decisions were reached, what data was used and how bias is monitored over time.

Clear ownership, review processes, escalation paths, model validation and human-in-the-loop controls will help make large-scale AI deployment viable in a regulated environment.

AI also has a strong defensive capability. Behavioural anomaly detection, predictive threat monitoring and intelligent authentication systems allow fintech platforms to detect and respond to risk faster than traditional rule-based approaches.

When used responsibly, AI can strengthen both customer experience and operational resilience.

Proactive Security Testing as a Continuous Discipline

Modern FinTech infrastructure assumes exposure. APIs are public, ecosystems are interconnected and supply chains are large and complex. Under these conditions, security based solely on perimeter defences or annual audits is not enough. This means continuous, adversarial testing has become essential for resilient fintech organisations.

Mature players are moving beyond compliance-driven testing into ongoing penetration assessments, red-team exercises and social-engineering simulations. These practices uncover technical vulnerabilities, as well as weaknesses in response coordination, escalation decision-making and recovery planning. They test the organisation as a living system rather than a collection of isolated applications.

Integrating security into everyday development is equally critical. Secure coding standards, continuous testing pipelines and regular threat modelling will enable earlier detection of vulnerabilities, when issues are cheaper and easier to resolve. The goal is not to eliminate risk entirely, which is impossible, it is to reduce the time between exposure, detection and response.

Security as a Growth Enabler

The reframing of security from cost centre to growth driver is the most significant strategic transformation in FinTech. Having a strong security posture is not just about ticking compliance checkboxes, it is increasingly a prerequisite for partnerships, institutional trust and international expansion.

Organisations that demonstrate operational resilience, responsible AI governance and proactive security assurance move through due diligence faster. They onboard enterprise clients more easily, integrate with partners with fewer barriers and launch advanced digital services with greater confidence.

In crowded markets, trust is a commercial advantage.

From the customer perspective, security and transparency are inseparable from experience. Clear communication around data usage, visible protections and consistent reliability directly impact adoption, retention and loyalty. Resilience becomes part of brand equity.

Looking ahead, FinTech leaders will not be defined by who adopts new technology first but by who builds systems capable of absorbing disruption, scaling responsibly and evolving continuously. Modular platforms, trustworthy AI and continuous security assurance form the backbone of this.

Learn more at infinum.com

  • Artificial Intelligence in FinTech
  • Cybersecurity in FinTech

Joe Jordan, co-founder at Adclear, on why FinTechs and other financial organisations need to find equilibrium between content and compliance

FinProm. It might sound innocent enough. But in reality, these two small syllables represent a mountain of risk for FinTechs, banks, trading platforms and other financial institutions. FinProm, short for financial promotions, is the catch-all term for how finance brands market their products to customers. That means everything from YouTube ads and TfL posters, to in-app nudges and influencer collaborations. Like most things in finance, it’s an area that’s heavily regulated. And, in today’s fast-moving marketing world, it’s something that’s starting to trip companies up. 

Navigating FinProm

Just this year, we’ve seen Robinhood fined $26M for regulatory breaches which included failure to properly oversee the influencers plugging their platform. And three UK “finfluencers” recently landed in court for falling foul of FCA FinProm rules. As the fly-wheel of content creation speeds up, fuelled by AI tooling, FinTech brands are facing a high-stakes conundrum: how can they keep pace with modern marketing strategies without running the risk of breaching the litany of rules set by bodies stretching from the FCA to the ASA?

Currently, fintechs and banks try to stay on the right side of the regulations by running all of their marketing content and promotions through their compliance teams. These experts review each image, video and piece of copy and suggest revisions. In the quest for compliance, this back and forth causes all sorts of friction. It slows down pace, waters down creativity, and burdens both teams with an admin-burden they’d rather do without. 

The results? A slow marketing process which can’t capitalise on trends, nor tap into the rapid content personalisation and iteration made possible by the AI era. This means less growth and customer acquisition in a highly competitive market. The alternative? Playing fast and loose with compliance procedures in order to maximise marketing output. This might drive sales, but it could also drive firms right into the arms of some unhappy regulators. 

Decision Time for FinTechs

This clash of priorities is creating the ultimate stress test for FinTechs and other financial organisations as they seek to find equilibrium between content and compliance in a world which demands more marketing output, delivered faster than ever before. 

And it’s a stress test they cannot afford to fail. Regulators like the FCA are cracking down and the consequences of enforcement action can be devastating. And, as brands expand to new markets, the risk will only grow as they find themselves having to contend with an expanded set of regulators and rulebooks across the globe. 

FinTechs can’t bury their heads in the sand on this issue. They must heed the cautionary tales we’ve seen in recent months and reset their FinProm blueprint. The AI-powered age of marketing can’t be capitalised on if it’s supported by old-school compliance processes. Nor can it afford to ignore the very real threat of a regulatory mis-step. To create a truly modern brand that is free to embrace the latest marketing strategies, compliance strategies need to be stepped up and modernised in tandem. Innovation on one side of the FinProm coin must be counter-weighted by innovation on the other.

FinTechs and finance platforms are used to pushing boundaries and disrupting the status quo. But to enable this to continue safely, effectively and on the right side of the law, the same energy and innovative zeal should now be applied to compliance. Without it, brands will be exposing themselves to risks and costs they likely cannot afford. 

Learn more at adclear.ai

  • Artificial Intelligence in FinTech
  • Cybersecurity in FinTech

Sam Kohli, CEO at PAYNT, on the need for continued innovation with biometric payments to enhance trust

For millions of people, biometric security, or the use of unique personal characteristics such as fingerprints or facial recognition to confirm a person’s identity, has become an everyday process. These technologies are now deeply integrated into a huge variety of activities. From unlocking smartphones to authorising mobile payments. It’s quick, efficient and, compared to many other methods, relatively secure.

The underlying principles are long established. Fingerprinting can be traced back to around 500 BC, when it was used on clay tablets as a form of signature. In more contemporary terms, by the 1970s and 1980s, biometric systems began appearing in government and defence environments. Although these nascent technologies were expensive and slow.

Commercial adoption only became viable in the last 30 years or so as computing power increased, when applications were focused on workplace access control rather than payments. The real breakthrough came with smartphone integration. This began with fingerprint sensors on consumer devices, such as Apple’s Touch ID and Face ID, which are now extremely popular.

A Growing Ecosystem

A quick glance at the underlying trends reveals just how rapidly the ecosystem is now expanding. According to Juniper Research, for example, by 2028, the total in-store transaction value for biometric payments is expected to reach $1.2 trillion across 46 billion biometric-enabled transactions globally. While that’s already impressive, there is still enormous growth potential.

The problem is, adoption is starting to outpace trust. A recent study published by the Identity Theft Resource Center (ITRC), revealed that while nearly 90% of respondents had been asked to provide a biometric to verify their identity in the past year, nearly two-thirds expressed serious concerns about doing so. Moreover, 39% went as far as to say that the use of biometrics should be banned for both identity verification and/or recognition.

So, what can be done to close this trust gap and help ensure biometrics are used across fintechs as a more secure alternative to passwords and PINs? One area that requires more emphasis is consent-based design. Whereby users are given clear and revocable permission regarding how their biometric data is collected, stored, and used.

In practical terms, a consent-first design could resemble a digital wallet that provides users with clear, active choices regarding the use of biometrics. During setup, biometric authentication is optional and switched off by default. The app explains what data is collected, where it is stored and how to disable it later. During the payment process, all matching occurs locally on the device, rather than in a central database, and independent certification confirms compliance with data protection standards.

These processes must also be designed so they continue to act in the best interests of users. For example, consent should be viewed as an ongoing decision, rather than a one-time formality. Users must be able to revisit and change biometric permissions at any point and without difficulty. Settings should not be buried under layers of menus and options. They should be readily available so that users understand they are in control at all times.

Biometric Authentication

For example, if a user decides they no longer want to use biometric authentication in their payment app, they should be able to switch that functionality off with a single action. In these circumstances, the app immediately reverts to PIN or password authentication, so access isn’t disrupted. At the same time, any biometric templates held on the device are securely deleted.

If the user chooses to close their account entirely, the deletion workflow should extend to all associated data, so nothing is retained unnecessarily. Users should then receive a notification that their biometric identifiers are no longer stored.

Even these relatively basic processes can help put users in a much stronger position to understand and control the use of their biometrics. And don’t forget, this isn’t just a nice-to-have; it is increasingly a regulatory requirement issued by the EU and other authorities worldwide. GDPR is a good example, as it classifies biometric data as a special category of data and prohibits processing it unless explicit consent or another lawful basis applies.

Closing the Trust Gap

Let’s be in no doubt: trust (or the lack of it) is a real problem across the payments ecosystem. Including those organisations that rely on biometrics. In many current environments, a persistent trust gap, uneven implementation and mixed user experiences show that compliance alone does not guarantee confidence. Better progress now depends on practical execution, clear communication at the point of use, and systems that make data handling visible and auditable. Collectively, these processes can help reassure people that organisations are doing the right thing consistently and for the right reasons.

As a result, transparency and education are now key to improving confidence, ensuring users understand how their biometric data is protected and how they can stay in control. For many FinTechs, this requires a shift in mindset, where transparency is seen as a core product feature, rather than an afterthought or compliance tick box. With consent first design principles in place, users should be regularly reminded about where their biometric data resides and how to delete it.

Additionally, regular external audits or certifications help demonstrate accountability and ensure FinTechs operate to recognised standards. Granted, relatively few consumers are likely to study the fine details, but the act of being credibly audited is an important contributor to the way consumers build trust.

Trust as a Competitive Advantage

In these circumstances, trust can actually evolve into a competitive advantage. Transparent payment systems and processes will always face fewer adoption barriers, fewer customer complaints and possess stronger reputational resilience in the event of incidents. Ultimately, the more open and consistent the provider, the more users adopt and stay engaged. In markets where penetration is still low, a consent-first design and a focus on trust will reassure users that they will always remain in control of their data. Encouraging increased adoption of newer, seamless payment methods.

Regardless of how you look at it, the need for change is becoming increasingly urgent. Biometric payments are evolving beyond single-factor models toward richer, multimodal processes that introduce a combination of fingerprints, facial recognition, voice patterns and behavioural signals. As these capabilities mature, they will be applied in a wider variety of payment contexts, ranging from in-store to remote authentication and open banking apps.

This will only serve to heighten expectations around transparency and user control. In this environment, consent-first design does more than support regulatory compliance; it lays the foundation for future adoption by building systems that are flexible enough to accommodate new biometric methods without compromising user trust. As consumers become more digitally savvy and accustomed to a culture where switching between service providers is relatively easy, building trust in biometrics will contribute significantly to FinTech success.

Learn more at paynt.com

  • Cybersecurity in FinTech
  • Digital Payments

With the rise of AI-enabled fraud in mind, Dave Rossi, Managing Director at National Hunter, argues the need for a radical rethink

AI is making financial fraud less predictable and far more damaging. With access to new tools like Fraud GPT, deep fakes, and large-scale automated, and agentic, autonomous decision making capabilities to supercharge methods such as spearphishing, fraudsters are now able to target their activity more accurately, convincingly, and at higher volumes than ever before. Add in use of AI to flood the industry with financial applications which increase phishing and identity theft, especially for vulnerable individuals, and the cost of financial fraud continues to explode.

As one recent report revealed, in the UK alone, banking fraud caused £417.4 million in losses across 21,392 reported cases over the past year, making it the third costliest fraud type. Combatting this explosion in financial crime requires a different approach. One that not only transforms identity checks through robust, multi-tiered tools but also includes assessment of behavioural signals, transaction monitoring and cross validation to highlight suspicious activity at any point in the customer lifecycle.

Critically, argues Dave Rossi, Managing Director, National Hunter, it demands a new mindset based on collaboration, information sharing and a culture that encourages people to raise concerns, call out suspicious activity and prioritise fraud detection at every stage of the customer journey.

Financial Fraud Explosion

Financial institutions are struggling to adopt the new mindset required to protect customers, reputation and the bottom line from financial fraud. The continued internal conflict between the need to add layers of verification and detection to deliver essential safeguards and a perception that such measures will lead to customer disengagement and loss is adding unacceptable risk in a new era of AI enabled, widescale financial fraud.

Financial fraud is no longer opportunistic and small scale. From individuals trafficked to dedicated fraud centres in the Far East to the systematic use of AI to build synthetic IDs at scale and deep fake voice and video calls used successfully for spearfishing activity, financial fraud is a global, organised crime.

The ease with which AI can be used to generate synthetic identities alone should prompt a radical overhaul of anti-fraud measures. According to Signicat, AI-driven identity fraud is up 2,100% since 2021. It is now outpacing many traditional forms of financial crime. Rather than stolen passports and forged documents, fraudsters are now using AI to create manufactured personas, ID documents and accounts created using digital footprints that appear legitimate but have been built to deceive. Adding defence measures – both technology and human – to the process may potentially add friction to the customer experience but failing to protect either the business or customers will, without any doubt, cost significantly more. 

Synthetic IDs

Organisations need to understand the sheer scale of AI-enabled financial fraud. LexisNexis Risk Solutions estimates that there are around 2.8 million synthetic identities in circulation in the UK, and hundreds of thousands more are created annually. They also claim 85% of synthetic IDs go undetected by standard models, creating a potential cost to the UK economy of £4.2 billion by 2027 unless companies adopt more stringent screening measures. 

The use of AI at this scale enables criminal gangs to play the long game, with the behaviour of synthetic accounts mirroring real customers over months or years to build a credit history before cashing out and leaving the business and bank to handle the write-off. And this tactic is being used to target business in every industry. According to Experian over a third (35%) of all UK businesses reported being targeted by AI-related fraud in the first quarter of 2025, an increase of more than 50% over the same time period last year.

The use of synthetic IDs is just one way in which AI has changed the familiar patterns of financial fraud. The sophistication of deep fake technology is another, with fake voice and video building on chat based social engineering messaging via real-time chat scripts for LinkedIn DMs and WhatsApp messages, to successfully facilitate incredibly sophisticated spearfishing attacks. Mimicking the persona of high value individuals, especially CEOs and CFOs, such attacks have led to devastating losses, including the UK-based fintech which lost £1.8 million in 2024 following an attack using a combination of spearphishing and generative AI to impersonate the company’s CFO.

Trust Issues

Organisations cannot afford the current levels of (over) trust. Indeed, the success of the majority of AI-enabled financial fraud can be tied to organisational culture. Synthetic IDs succeed when the focus is only on verification – which checks identity – rather than on-going monitoring of behaviour and transactions as well as cross validation, which highlight intent. Spearfishing leverages a culture of uncertainty, succeeding in environments where individuals do not feel confident or are not encouraged to question the veracity of the CFO’s payment orders, for example.

The reliance on credentials verification is inadequate in a world of Fraud GPT. With diverse sophisticated technologies now being deployed at scale, it is no longer acceptable to rely on traditional models of verification, such as document validation. Furthermore, organisations are losing trust in newer techniques, such as facial biometric authentication due to the sophistication of AI deepfakes. Concerns are growing about the risks associated with proposed national eIDs: when a digital ID appears to be verified by government there is a temptation to believe without additional, yet essential, scrutiny.

Organisations need to consider intention as well as identity. What are the behavioural signals that could indicate fraud? Which transactions are suspicious and what additional insight can be surfaced through continual cross-validation of activity? Adding layers of verification and flagging possibly suspicious activity may initially annoy the odd genuine customer, but the reality of AI-enabled fraud is devastating individuals, businesses and financial institutions. It is now vital to adopt a fraud-first culture, where individuals at every level of the organisation have both the tools and understanding to spot suspicious activity and are encouraged to call out concerns, especially if they relate to senior management requests.

Collaborative Model

Failure to shift from over-trust to low-trust will continue to play into the hands of criminal gangs. Gangs that are constantly sharing information about weak targets. Innovative, anti-fraud organisations are leading the fight back through intelligence sharing, cross-validation and next generation screening. Adopting both robust verification and validation technologies and culture that encourages suspicion and also fosters cross-industry insight is key to addressing this complex, evolving threat.

By proactively sharing the information surfaced through comprehensive verification as well as behavioural and device analytics, the industry can gain rapid understanding of the fast-changing tactics being deployed by these criminal gangs and take the appropriate remedial action to protect, customers, reputation and the bottom line.

Learn more about tackling fincrime at nhunter.co.uk/

  • Artificial Intelligence in FinTech
  • Cybersecurity in FinTech

At AWS, we’re obsessed with helping our customers harness the benefits of cloud and AI. While maintaining robust security, resilience…

At AWS, we’re obsessed with helping our customers harness the benefits of cloud and AI. While maintaining robust security, resilience and scalability. We believe the true value of he cloud is unlocked when seen as an end-to-end transformation opportunity. A chance for organisations across Asia Pacific and Japan, such as Techcombank (TCB), to seize the innovations Gen AI and Agentic AI can offer today.

According to a new AWS-Strand Partners 2025 report, AI adoption among businesses in Vietnam is growing rapidly at an annual rate of 39%. Close to 170,000 businesses in Vietnam have already adopted AI. And 77% of those businesses expect AI to increase their revenue within the next year.

Delivering Business Benefits

TCB’s journey with AWS exemplifies the transformative power of cloud and AI adoption. Spanning strategic planning and co-innovation, with a shared commitment to transformation:

  • Within six months, AWS helped TCB migrate retail and corporate banking systems to the cloud. This enabled on-demand scalability, reduced infrastructure costs, improved time to market and enhanced availability for TCB, cutting downtime.
  • By rapidly scaling infrastructure, reliably and securely, TCB has seen digital transactions grow by 38%.
  • Today, 55% of new customers now join via digital channels and 97% of transactions are processed digitally.

The AWS Data Migration Service is expected to generate projected cost savings of up to $10.4 million over five years. Driven by improved infrastructure efficiency and simplified operations.

Harnessing Gen AI & Agentic AI

Gen AI is delivering workplace transformations, including enabling contact centre agents to resolve customer concerns. TCB has established itself as a pioneer, becoming Vietnam’s first bank to develop proprietary applications using Amazon Bedrock. Initiatives include customer chatbots for employee use, advanced language translation tools, and SMARTIE – an AI personal assistant built on a custom Large Language Model (LLM).

AWS: A Trusted Partner for Cloud at Scale

AWS distinguishes itself as a transformation partner through its unique combination of global expertise, strong local partnerships, and proven implementation frameworks. This comprehensive approach enables organisations to achieve meaningful business transformation while staying at the cutting edge of technological innovation.

“By enabling financial institutions like Techcombank to innovate at scale, we’re helping create the foundation for Vietnam’s next phase of AI-driven economic growth.”

Eric Yeo, Country General Manager – AWS Vietnam

Discover more about the ways Techcombank is overcoming challenges on its transformation journey with AWS from Eric Yeo, Country General Manager – AWS Vietnam


  • Artificial Intelligence in FinTech
  • Blockchain & Crypto
  • Cybersecurity in FinTech
  • InsurTech

Johannes Kolbeinsson, CEO and Co-Founder of PAYSTRAX, on how retailers can protect themselves and their customers from fraud

According to Bloomberg, if cybercrime were a country, it would rank as the world’s third-largest economy. Behind only the United States and China. And it’s growing. By 2027, global scams are projected to cost the world $23 trillion annually, with one in three people likely to fall victim. Already in the UK, a financial scam occurs once every fifteen seconds on average.

It is within this backdrop that Black Friday and Cyber Monday have become an increasing focus point for both retailers and scammers. Every year, the digital shopping frenzy grows bigger, faster, and more sophisticated. And so do the criminals who exploit it.

Black Fraud-day

Behind the flashing banners of ‘limited-time offers’ and ‘doorbuster deals’ a quieter threat lurks in the shadows of the checkout page: digital payment fraud.

As customers rush to click ‘buy now’ fraudsters blend into the chaos, exploiting high transaction volumes and confusing customers with highly sophisticated fraud techniques. What was once a celebration of online convenience has, for many businesses, become a test of their cybersecurity resilience.

This year, the true cost of Cyber Monday and Black Friday may not be measured in discounts, but in data breaches, chargebacks, and lost trust.

The Warning Signs

While many expect issues like stolen cards or hacked accounts, one of the most easily overlooked threats actually comes from genuine customers who know how to game the system.

Friendly fraud, often called chargeback fraud, is when a customer makes a legitimate purchase but later disputes the transaction to claim a refund. High-volume periods like Black Friday create the perfect cover for this, as retailers process thousands of orders at speed and struggle to keep track of every proof of delivery. Because it is hard to prove intent, merchants often lose both the product and the refunded payment.

Another issue that rises sharply during major sales events is card-not-present (CNP) fraud, where stolen card details are used to make online purchases. With such a large jump in transactions during Black Friday and Cyber Monday, fraudulent activity becomes harder to identify because it blends into the surge of genuine spending. Without a physical card involved, it is easier for fraudsters to bypass standard security checks, especially if retailers remove friction to create a faster checkout experience.

Retailers also need to look out for account takeover (ATO) fraud, which has been increasing as more people shop through accounts and apps. Criminals use stolen login details to access customer profiles, change passwords, redeem loyalty points or use stored card information to make purchases. Beyond the financial loss, ATO attacks can seriously erode customer trust. Which is even harder to recover than the lost revenue.

How Retailers Can Protect Themselves Against Fraud

Protecting customers and safeguarding revenue does not have to come at the expense of a smooth shopping experience. The key is to strike the right balance between security and convenience, especially when order volumes surge over Black Friday and Cyber Monday.

A good starting point is tightening defences around online payments. Simple measures can go a long way. Strong Customer Authentication and Address Verification Services can help spot suspicious activity early, without placing unnecessary friction on genuine shoppers. For higher value orders or anything that feels ‘off’, a quick email or phone check with the customer can prevent a costly chargeback later.

Strengthening account security is equally important. Criminals often rely on weak passwords or reused login details to break into customer accounts and make purchases with stored cards or loyalty points. Encouraging customers to use strong, unique passwords and offering multi-factor authentication can dramatically reduce the chances of an account takeover. Retailers can also set up alerts for unusual behaviour, such as repeated failed logins or access from unfamiliar locations, so genuine customers can be protected before damage is done.

Friendly fraud is harder to prevent because it often comes from legitimate customers rather than malicious actors. That makes clear communication your best defence. Transparent returns and refunds policies, visible during checkout and in order confirmations, help avoid confusion that later turns into a dispute. Keeping thorough records of fulfilment, including delivery tracking and proof of receipt, gives retailers the evidence they need to challenge any questionable chargeback claims. Small touches, such as using a clear and recognisable store name on bank statements, can also reduce “I don’t remember this transaction” disputes.

Ultimately, the most effective approach is ongoing, not seasonal. Setting up a simple chargeback management process helps retailers learn from disputes, identify patterns, and ultimately reduce risk.

Where Now?

As the Cyber Five weekend continues to redefine global retail, it’s also redefining the tactics of digital criminals.

The same tools that make online shopping faster and more convenient, saved payment methods, one-click checkout, loyalty programs, have become new frontiers for exploitation.

For merchants, staying ahead means more than offering the best deals; it means securing every step of the digital customer journey. By investing in layered security measures, promoting account vigilance, and maintaining transparent communication with customers, businesses can turn the tide against fraudsters.

The goal isn’t just to survive Cyber Monday and Black Friday, it’s to build the kind of trust that lasts long after the sales are over. Because in the evolving world of e-commerce, security isn’t a seasonal strategy – it’s a year-round commitment.

Find out more at paystrax.com

  • Cybersecurity in FinTech
  • Digital Payments

Niamh Kingsley, Founder & CEO of the the post-digital consultancy firm ace, on the Quantum future for financial services

Just last week, I sat across from a head of engineering at a major city-based bank and asked about their quantum preparedness. His response? “As far as I’m concerned, that’s science fiction.”

From my perspective, this view is definitely misguided. But more concerning, it’s also really prevalent. Despite some senior leaders dismissing quantum as a distant concern, their organisations are already exposed to quantum-enabled threats, and their competitors are quietly positioning for advantage.

Breakthroughs from the likes of IBM, Google, Rigetti, and Quantinuum show the ten-year timeline is a mirage. The quantum threat is not future tense. It is present and accelerating. In the race for computational advantage, the largest institutions are already in the lab. In the race for security, the threat actors are already in your network.

The time for planning is over, and the time for migration is now.

The Security Imperative: Your Data is Already at Risk

When we talk about the quantum threat, we’re primarily talking about Shor’s Algorithm. On a sufficiently large, fault-tolerant quantum computer (CRQC), Shor would break the public-key cryptography (RSA and most ECC) that underpins many secure protocols and systems, including virtually every secure digital communication and transaction globally.

But here is the critical point: the impact doesn’t start on the day a CRQC goes live; it began years ago the with ‘Harvest/Store-Now, Decrypt-Later (HNDL/SNDL)’ attack vector, where adversaries record encrypted traffic today to decrypt it once quantum capabilities arrive. (Symmetric cryptography like AES is affected differently by Grover’s algorithm, and it is generally mitigated by larger key sizes.)

Why ‘Harvest Now, Decrypt Later’ is the Real Crisis

Think about your most sensitive, high-value data:

  • KYC and client records: Confidential information that must remain private for decades.
  • Proprietary trading strategies: Models and algorithms that define your competitive edge.
  • Intellectual property and M&A communications: Data whose confidentiality window extends well beyond the projected arrival of a CRQC.

Sophisticated adversaries, often state-sponsored, are already harvesting vast quantities of this currently encrypted data. They are storing it, bit by bit, waiting for the eventual arrival of a cryptographically relevant quantum computer, which they will then use to decrypt later.

This means that data encrypted today will be vulnerable to breach tomorrow. The shelf-life of your confidential information directly dictates the urgency of your response. Any financial institution that relies on current public-key cryptography to protect data with a retention requirement of five years or more is already compromised in principle.

Post-Quantum Cryptography Migration: Why it’s Non-Negotiable

A wholesale migration to Post-Quantum Cryptography (PQC), algorithms resistant to quantum attack, is the only defence. This isn’t a simple software patch; it’s a foundational re-architecture of your digital trust layer.

  • What institutions should prioritise: Any data requiring confidentiality beyond a ten-year horizon is at risk. The UK’s National Cyber Security Centre and G7 frameworks explicitly call out finance to begin migration planning now, with several guides targeting 2035 completion for critical sectors.
  • Inventory everything: You cannot protect what you don’t know you have. Conduct a rigorous, firm-wide audit to map every single instance of public-key cryptography, from TLS certificates and VPNs to digital signatures, PKI, and key management systems.
  • Focus on the long-lived: Prioritise the migration of systems protecting data with the longest necessary confidentiality (the HNDL targets) and those that are hardest to change (e.g., embedded systems, legacy code, or critical, highly-available infrastructure).
  • Mandate the standards: Adopt the new, standardised PQC algorithms, such as CRYSTALS-Kyber (for key establishment) and CRYSTALS-Dilithium (for digital signatures), as decreed by global bodies like the US NIST.

Capturing Computational Advantage

But here’s what the industry isn’t telling you: whilst you’re busy securing your systems, there’s a competitive dividend waiting for institutions willing to explore quantum’s computational capabilities.

I’m not talking about vague promises of exponential speedups. I’m talking about targeted, measurable advantages in specific use cases where quantum algorithms demonstrably outperform classical approaches.

Monte Carlo simulations for derivative pricing, XVA calculations, and Value-at-Risk models are obvious starting points. Amplitude Estimation provides a quadratic speedup over classical Monte Carlo, achieving the same error tolerance with exponentially fewer samples. That means shorter calculation windows, faster intraday rehedging, and material energy savings. For path-dependent options or rare-event tail scenarios, quantum approaches offer better resolution of low-probability events without exploding compute budgets.

Portfolio optimisation, collateral allocation, and limit setting are fundamentally combinatorial optimisation problems. Quantum heuristics may deliver quality and latency benefits under complex constraints, including funding requirements, capital adequacy, central counterparty margin rules.

HSBC made headlines deploying quantum algorithms for foreign exchange pricing optimisation. That wasn’t a marketing exercise; it was a proof point that the technology has crossed from research into application.

But, and this matters, we don’t yet have large-scale, fault-tolerant quantum computers. IBM’s roadmap targets approximately 200 logical qubits by 2029. We’re not there yet. Which means the smart play is running parallel tracks: migrate to PQC now for security; experiment with quantum algorithms in targeted pilots to understand future advantage.

The pilot framework should be rigorous. Choose use cases where runtime and tail-risk scenarios dominate P&L. Establish measurement frameworks comparing quantum approaches against equal-error, equal-time, and equal-energy classical baselines. Report outcomes honestly. Build institutional knowledge whilst the hardware matures.

The Competitive Landscape: The Window is Closing

The quantum era is a global, systemic shift. It is a dual-sided challenge, an existential security risk and an unprecedented performance opportunity.

We are entering a phase of hyper-competition. The market is already separating into two distinct groups:

  • The value capturers: These are the institutions that have already established quantum governance, initiated PQC pilots, and embedded crypto-agility into their DNA. They will be secure against HNDL, will meet regulatory mandates like DORA, and, crucially, will be the first to operationalise quantum speed-ups in pricing, risk, and optimisation. They will gain an insurmountable performance edge.
  • The vulnerable and disadvantaged: These are the firms facing “crypto-procrastination.” They risk massive compliance penalties, systemic data theft via HNDL, and the competitive disadvantage of relying on slower, less accurate classical models while competitors price derivatives and optimise collateral in real-time.

The quantum inflection point is not an event on a distant calendar; it is a process happening right now. The firms that act today are building an unbreakable digital fortress while simultaneously designing the algorithms that will define the next decade of finance.

Don’t wait for Q-Day. Secure your future, then innovate in it.

Learn more at aceadvantage.io

  • Blockchain & Crypto
  • Cybersecurity in FinTech
  • Digital Payments

Alan Jones, CEO and Co-Founder, of YEO Messaging, on the need for secure communications platforms with continuous identity verification

When it comes to cybersecurity, the financial sector is among the most heavily regulated globally. Yet even as banks invest billions in network protection and data encryption, they continue to fall at a surprisingly low hurdle: how their own people communicate.

In the last three years, global regulators have issued fines totalling more than $2.6 billion against financial institutions. For failures in record-keeping and the misuse of consumer messaging platforms. Behind those headlines sits a deeper systemic issue: the tools most employees use every day were never designed for regulated finance environments. 

Consumer messaging apps and collaboration tools excel at convenience. But this convenience and familiarity come at the cost of compliance. These platforms lack audit trails, administrative controls, and the data-sovereignty guarantees demanded by frameworks such as MiFID II, GDPR, and DORA. Messages can be stored across multiple jurisdictions, copied, forwarded, or deleted, usually beyond the institution’s knowledge or control.

For compliance officers, that creates an impossible paradox. A conversation that starts as an innocent customer query can instantly become a recordable financial interaction. If it happens outside the approved communication environment, the financial institution has already breached its obligations.

The Financial Conduct Authority (FCA) and the U.S. Securities and Exchange Commission (SEC) have both made it clear that ignorance is no defence. Whether the messages were business-related or personal, institutions are accountable for maintaining complete, retrievable records of communications by their staff. 

The Multi-Billion-Dollar Messaging Gap

The operational and reputational damage of these breaches goes far beyond fines. Investigations can cost millions in legal fees, divert resources for months, and erode customer trust overnight. 

Another avenue to consider is the increased impact of cyber incidents, especially ransomware. What’s needed, especially in the first 48 hours of any attack, is an out-of-band communications channel from which management and responders can crisis-communicate with confidence and prove responses after the fact. According to IBM Security’s 2024 Cost of a Data Breach report, the financial industry now suffers the highest remediation cost per incident, averaging $6.08 million. This is primarily due to the sensitivity and volume of information exposed through unmonitored channels. 

Meanwhile, legacy systems such as email and call centres offer little relief. They’re slow, fragmented, and vulnerable to both human error and social engineering. The result is a growing communications gap. Institutions are caught between regulatory risk on one side and the demand for instant, mobile-first customer interaction on the other.

From Data Protection To Identity Protection

The next phase of compliance will hinge on something more profound than encryption and identity verification. Knowing who is actually behind each message has become as important as securing the message itself. When consumer apps are used, only the device is verified, not the person. This is a critical distinction. Traditional platforms authenticate a user once, at login. After that, anyone with access to the device – whether a colleague, a contractor, or a cybercriminal – can read or forward sensitive data. It’s a blind spot that regulators increasingly view as an unacceptable risk.

By contrast, identity-verified messaging introduces a continuous layer of assurance. At YEO Messaging, we’ve developed patented Continuous Facial Recognition technology that biometrically validates the authorised user in real time. If the user steps away or an unauthorised face appears, messages blur instantly, preventing exposure even on a compromised device. Consider also, sadly, especially in London of late, the impact of device theft (80,000 iPhones were estimated to have been stolen in the last year alone and shipped to China to overcome their Internet firewall restrictions).

Combined with geofencing to restrict message access by location, screenshot blocking, and invite-only network controls, this approach ensures that compliance is enforced not just by policy, but by the technology itself.

Turning Compliance Into A Competitive Advantage

Forward-thinking financial institutions are already realising that regulatory resilience can be a differentiator. A secure, identity-verified communication channel not only prevents breaches but also builds confidence with clients and regulators alike.

Instead of chasing retrospective audit trails, banks can demonstrate proactive compliance: every interaction is automatically encrypted, archived, and attributable to a verified individual. For customers, that translates into trust, knowing that sensitive transactions and discussions are protected from interception, impersonation, and insider threat.

And for the business, it delivers tangible efficiency gains. Secure, unified messaging across teams and devices eliminates the sprawl of shadow IT while cutting operational costs associated with manual monitoring and data recovery.

The Regulator’s New Focus: Communication Integrity

The conversation within global financial oversight bodies is shifting. From London to Paris to Basel, regulators are converging on the same message: communication integrity is no longer optional. The Financial Conduct Authority (FCA) in the UK, the European Banking Authority (EBA) in France, and the Basel Committee on Banking Supervision (BCBS) in Switzerland are all broadening their guidance beyond data security to focus on proof of identity and control.

This emerging principle of communication integrity, the ability to verify, in real time, that every message originates from a legitimate, authorised source and remains under institutional control throughout its lifecycle, marks a significant evolution in compliance thinking. The message itself is no longer the sole concern; the continuity of trust around that message is what matters.

Identity-verified communication is rapidly becoming the benchmark for meeting this new expectation.

Bridging Security & Experience

Regulation doesn’t have to come at the expense of usability. The institutions that will thrive in this new landscape are those that integrate compliance into the user experience, not bolt it on afterwards.

Today’s banking and insurance customers, especially digital-native generations, expect to interact with their banks as easily as they do with friends on devices. The challenge for fintech leaders is to meet that expectation securely. Platforms that combine military-grade encryption with seamless biometric verification enable both.

A Closing Thought

Non-compliance is no longer a technical glitch; it’s a board-level risk with financial, reputational, and ethical dimensions. The good news is that the tools to close the messaging gap already exist.

By embedding identity verification, auditability, and privacy-by-design into every communication, financial institutions can transform compliance from a reactive burden into a proactive safeguard and in doing so, rebuild the foundation of trust upon which modern finance depends.

Alan Jones is the CEO and Co-Founder of YEO Messaging, a UK-based secure communications platform that is pioneering continuous identity verification for regulated industries.

  • Cybersecurity in FinTech

Osama Bari, Chief Technology Officer at D24 Fintech on the need for cybersecurity advancement to support the rise of crypto adoption

Cryptocurrency adoption has accelerated dramatically, rising in popularity in recent years. Yet the sector remains a prime target for cyberattacks. As digital assets grow in value and popularity, the stakes for both exchanges and users have never been higher. High-profile incidents, such as the CoinDCX breach in July, which saw hackers steal $44 million without touching user wallets, Phemex losing $69 million in a crypto heist, and WazirX losing $230 million, demonstrate the sophisticated tactics cybercriminals now employ.

Similarly, the Bybit hack exposed vulnerabilities in multi-signature authorisation and user interface (UI) spoofing. This highlights how even experienced professionals can be caught off guard.

These events underscore the urgent need for exchanges and financial institutions to prioritise security. They must implement robust protocols, and adopt comprehensive risk-management strategies. There are several core areas where crypto platforms can significantly reduce the risk of security breaches.

Strengthening Cybersecurity Protocols

It is vital for exchanges to implement multi-party approval systems for all transactions. By using threshold-based authorisation, combined with real-time monitoring of deposits and withdrawals, platforms can identify unusual activity and flag it for manual verification. Each withdrawal should undergo a transaction audit score assessment before processing. Such measures are critical for preventing attacks that exploit UI vulnerabilities or other operational oversights. This ensures that no single point of failure can compromise user assets.

Another essential safeguard is two-factor authentication (2FA). While a long-established security measure, its importance in protecting accounts and verifying users cannot be overstated. By requiring a second form of identification, exchanges can ensure only authorised personnel access accounts and manage balances. In practice, this simple but effective layer of protection increases the difficulty for hackers. It demonstrates an exchange’s commitment to protecting its customers’ funds. All financial providers should offer 2FA as a baseline security measure.

Custodians also play a vital role in mitigating risks. For many exchanges, especially those handling large volumes of assets, partnering with a trusted custodian provides additional security and oversight. Custodians safeguard digital assets on behalf of clients, reducing exposure to theft, loss, or mismanagement. In the aftermath of this year’s prominent hacks, the value of external support becomes clear. Custodians enable exchanges to focus on customer experience and platform innovation while ensuring that user funds remain secure.

A further innovation gaining traction is liveness verification, which confirms user identity through biometric measures such as facial recognition or fingerprints. With roughly 40% of banks having implemented this measure to counter fraud – up from 26% five years ago – crypto platforms have an opportunity to follow suit. Liveness checks provide an additional barrier to attackers who might otherwise exploit compromised passwords, keys, or devices. The uniqueness of biometric identifiers ensures that users’ accounts are better protected against increasingly sophisticated fraud attempts.

Centralised cryptocurrency exchanges (CEXs) continue to demonstrate resilience in the face of attacks. Security must be embedded into operational design. The recent incidents highlight the effectiveness of CEXs’ ability to freeze or recover stolen assets quickly. By collaborating with other platforms and utilising centralised oversight, these exchanges can mitigate the impact of breaches. As crypto continues to gain mainstream traction, balancing decentralisation with strong security infrastructure is essential to maintaining investor trust and market stability.

A Holistic Approach to Crypto Security

Beyond these specific measures, exchanges must also adopt holistic cybersecurity strategies. Key steps include thorough risk assessments to identify vulnerabilities. Rigorous protection of private keys through encryption and secure storage. Robust wallet security with multi-factor authentication. And secure transaction protocols including encryption and transaction signing. Regular updates to software and firmware, coupled with continuous network monitoring using intrusion detection systems and threat intelligence feeds, further strengthen a platform’s defence.

Data encryption and access control are critical to prevent unauthorised access. Furthermore, periodic security audits and assessments ensure protocols remain effective as threats evolve. Smart contract and token security, secure coding practices, and rigorous testing must also be prioritised to safeguard DeFi applications and other blockchain-based services. Importantly, exchanges should implement backup and recovery protocols to safeguard against potential data loss. And maintain clear incident response plans to mitigate the impact of any breach.

Educating users remains an underappreciated but crucial aspect of crypto security. Platforms should guide strong password practices, phishing awareness, software updates, and overall security hygiene. Well-informed users are an integral layer of defence, reducing the likelihood of successful social engineering attacks or credential theft.

Finally, regulatory compliance is indispensable. Exchanges operating within clear legal frameworks and adhering to anti-money laundering (AML), counter-terrorism financing (CTF), and data protection regulations significantly reduce risk exposure. Partnering with reputable security vendors and maintaining open lines of communication with regulators can enhance both operational security and market credibility.

Learning from Previous Incidents

The CoinDCX incident serves as a cautionary tale. By exploiting vulnerabilities without ever accessing individual wallets, attackers demonstrated high-value, sophisticated hacks can occur even in the absence of traditional breaches. This reinforces the point that centralised oversight, real-time monitoring, and rapid response protocols are crucial in mitigating damage and protecting customer assets. Exchanges that fail to implement these measures risk not only financial loss but also erosion of trust, which is arguably a more severe long-term consequence.

As cryptocurrencies increasingly integrate into institutional portfolios and mainstream finance, robust security is no longer optional; it is fundamental. Investors, funds, and enterprise clients require assurance that digital assets are safeguarded. And that exchanges and custodians adhere to industry-leading security standards. Platforms that prioritise security will not only protect their customers but also foster broader adoption and confidence in the market.

The Path Forward

The evolution of crypto security is a continuous process. While decentralised networks inherently resist certain forms of attack due to their distributed structure, the human, operational, and software layers of the ecosystem remain vulnerable. The combination of multi-party approval systems, 2FA, custodian partnerships, biometric verification, continuous monitoring, and regulatory compliance provides a robust framework for mitigating these risks.

The message is clear: security must be embedded into the DNA of every crypto platform. Only through a proactive, multi-layered approach can the industry protect its users, maintain trust, and continue to grow sustainably. As high-profile breaches like CoinDCX, WazirX, Phemex, and Bybit demonstrate, the cost of complacency is far too great. By prioritising security today, exchanges not only defend against current threats but also lay the foundation for the future of a resilient, trustworthy crypto ecosystem.

About D24 Fintech

D24 Fintech focuses on developing innovative technological solutions for the evolving digital and fintech landscape.

By leveraging innovation and emerging technologies, D24 Fintech engineers integrated solutions designed to enhance transactional security, streamline digital payments, and improve operational efficiency. With a global perspective and a customer-first approach, D24 Fintech aims to redefine industry standards and drive innovation into fintech ecosystems.

D24 Fintech’s digital solutions include developing advanced technological platforms and management tools, and more.

  • Blockchain & Crypto
  • Cybersecurity in FinTech

The Global FinTech Ecosystem. Connected.

This year marks the 10th anniversary of FinTech Connect. The UK’s largest FinTech conference and exhibition, bringing together over 5,000 global attendees from across the financial services and technology landscape.

FinTech Connect

For a decade, FinTech Connect has been the launchpad for the ideas, partnerships and technologies driving the evolution of digital finance. It’s where banks meet breakthrough platforms. Where startups connect with major buyers. And where leaders across digital transformation payments, regtech, financial security and blockchain converge to shape what’s next.

In 2025, we’re scaling up. With 100+ exhibitors, seven world-class conference tracks, live demos and the return of the Start-Up LaunchPad. This year’s event will deliver more connections, more innovation and more opportunity than ever before.

Join us to celebrate a decade of FinTech excellence. And experience the future of finance, powered by cutting-edge tech, real-world insights. And the partnerships that will define the next 10 years.

“FinTech connect is a great place to learn about the latest trends, concerns and enhancements in the FinTech space. Furthermore it is a fantastic opportunity to meet with up and coming companies; or names that you are already in contact with, in one convenient location.”

Nicholas Nicolaides, Associate Director, Barclays

Tokenize: LDN at FinTech Connect

In 2025, FinTech Connect is growing in scale and ambition. For the first time, it will be co-located with Tokenize: LDN, the UK’s leading event for blockchain, web3 and real-world asset tokenisation. Creating a powerful convergence of FinTech and digital asset innovation under one roof.

At Tokenize: LDN, you’ll dive into the latest developments in decentralised finance, custody solutions, tokenised infrastructure and emerging use cases across capital markets. The co-location opens the door to unparalleled cross-industry networking. Connecting FinTech professionals, institutional players and blockchain pioneers in one dynamic space.

Tokenize: LDN is the UK’s leading showcase of the technologies, projects and investment strategies shaping the future of tokenized real-world assets (RWAs). From tokenised treasuries and real estate to on-chain credit, funds, financial infrastructure and more.

Whether you’re navigating tokenisation for the first time or scaling existing strategies, Tokenize: LDN is where serious conversations turn into real-world innovation.

Join asset managers, banks, institutional investors, regulators, custodians, blockchain developers and fintech innovators shaping the future of global capital markets. 

Held in London and co-located with FinTech Connect, Tokenize: LDN is where the global conversation on liquidity, regulation, interoperability and institutional adoption comes to life. 

Together, these two events offer a unique opportunity to explore the future of finance from every angle. Technological, Regulatory, Decentralised and Institutional.

Register now for free tickets for general access. Join 5,000+ industry professionals for two days of talks, exhibitors and networking.

  • Blockchain & Crypto
  • Cybersecurity in FinTech
  • Digital Payments
  • Event Newsroom
  • Events

Richard May, director of product development at virtualDCS, on navigating cyber regulation, assessing risk, and building digital resilience in a cloud-first financial landscape

In 2025, financial services are deeply reliant on digital infrastructures. Cloud services, especially, are reshaping how the sector operates.

The cloud offers both established and challenger companies the ability to improve flexibility, efficiency, and analytics capabilities. When deployed properly, it can deliver integrated security across an organisation, but also introduces new vulnerabilities.

Due to the sensitive nature of financial data, the sector remains a target for cyberattacks. This, combined with strict regulatory oversight, means firms must continuously align with evolving legislation while enhancing service functionality.


Which regulations do financial services need to be aware of?

There are several specific regulatory requirements that financial institutions must follow. These pieces of legislation are designed to ensure customer data is protected from attackers:

Payment card information and PCI-DSS

For businesses that handle payment card information, PCI DSS requirements dictate security and operational requirements for protecting cardholder information during storage, processing, and transmission. In practice, these requirements are 12 mandatory security controls that cover network security, data protection, vulnerability management, access control, monitoring and logging, physical security, testing, and policy enforcement. Failure to comply with the 12 security controls can lead to severe financial penalties and even liability for compensation costs.

GDPR implications

GDPR regulations categorise financial data as sensitive personal data. This refers to bank details, transaction histories, assets, credit scores, and anything else that might concern the overall financial health of an individual. Firms must take measures to prevent unauthorised access or risk facing fines.

Basel III considerations

The third Basel Accord, Basel III, sets the international standards for capital requirements, stress tests, liquidity regulations, and leverage. It is designed to reduce the risks of phenomena such as bank runs and bank failures, as we saw in the 2008 financial crash. Due to this, most of Basel III focuses on financial requirements such as liquidity to ensure banks are more resilient to changes in the international financial markets. However, it still communicates standards in relation to information and communication technology (ICT),‍ cyber incident response and reporting, and‍ third-party risk management (TPRM).

Digital Operational Resilience Act (DORA)

Introduced in January 2025 by the European Union (EU), DORA addresses rising digital dependency in finance. It covers ICT risk management, third-party oversight, operational resilience, incident reporting, and information sharing.

Compliance with these regulations is essential. Beyond avoiding penalties or criminal charges, it strengthens protection against growing cyber threats.

Assessing Vulnerability and Risk in the Financial Services Industry

Risk assessments are critical to business continuity and reducing the impact of cybersecurity breaches. A task of identifying threats and vulnerabilities, and quantifying the consequences of threats if they were to materialise, enables firms to rank services and ensure the most critical systems are protected first.

The Financial Services Information Sharing and Analysis Center (FS-ISAC) identified several key threats to the global financial sector in its latest report, including: 

Supply Chain Incidents

Businesses should remain alert to the competencies and overall security of service providers they utilise. As reliance on external providers is increasingly integral to many core business strategies, firms cannot afford to overlook the cyber maturity of their partners. To mitigate potential security risks, organisations should ensure and verify that all service providers meet robust cyber-security standards.

Fraud

The universality of real-time payments has led to a surge in fraud action in all sectors for which financial channels and services are used. The immediacy of payment has also created a scenario where it is almost impossible to retrieve stolen funds. Online scammers are building complex operations to take advantage of this. Fraud prevention and detection are becoming more and more important to companies in the sector. Increasing friction for payments through two-factor authorisation, along with other strategic obstacles, reduces fraud risks. Without cross-border partnerships tackling this global issue, however, this is set to remain a growing threat for businesses.

Ransomware

Ransomware has long been a cybersecurity threat. Many victims are often opportunistically targeted by hackers, rather than chosen specifically. Incidents of spear phishing are also on the rise – attackers research individuals or organisations to create personalised messages to convince them to click on infected links. Creating barriers to stop or delay ransomware attacks is therefore essential to reduce the threat. Ransomware’s targeting of customer data also means detection and recovery protocols are critical for firms that want to reduce the threat from malicious actors.

Distributed Denial-of-Service

The FS-ISAC revealed that financial services accounted for a third of all distributed denial-of-service (DDoS) attacks in 2023. DDoS attackers bring down an area of a network or application and extort the affected organisation for financial gain. Motivations may also include political statement-making, competitor sabotage, and cyber vandalism, simply to cause chaos and disruption. The increasing use of application programming interfaces (APIs) in the sector means that denial of service can have a devastating effect on financial service businesses. Firms should implement mitigation strategies to protect customer trust and service availability. 

When, Not If: Building Cyber Resilience Through Disaster Recovery

While cybersecurity defences are essential, effective disaster recovery is vital to reduce the impact of incidents and maintain operations.

Speed of recovery has become the main point of difference for organisations attempting to recover from cyber incidents. Prolonged downtime can lead to reputational damage, regulatory penalties, and lost customers. Without effective disaster recovery, continuity efforts are undermined.

Firms should develop a ‘when’, not ‘if’, mindset when it comes to disaster recovery. A comprehensive disaster playbook provides a manual in the event of a cyber incident. This plan must incorporate tools to allow for early detection of malicious action. Your plan for disaster recovery should be printed as a hard copy or saved on an external device (to ensure it remains accessible if your primary system is compromised). It must consider the first steps of: documenting evidence for cyber insurance and law enforcement, identifying and isolating infected systems, and informing relevant stakeholders an attack has taken place. Furthermore, the plan should contain information around communication and key contacts, an agreed chain of command and designated person to lead the ransomware response, and assurance the plan comes under regular review with ‘fire drill’ rehearsals.

Financial institutions face some of the most severe cyber risks in the world. Abiding by regulatory requirements goes some way to protect against threats, but organisations must go further – by proactively assessing threats, incorporating security measures, and preparing for disruptions. Resilience isn’t just about avoiding breaches. It is about ensuring trust, safeguarding sensitive data, and maintaining the ability to deliver reliable services in a digital-first landscape.

Learn more at virtualDCS

  • Cybersecurity in FinTech
  • Risk & Resilience

Data from Mangopay’s global fraud detection solution Nethone shows UK online platforms among most frequently attacked countries, driving a 48% year-on-year rise in fraud checks

New data from Nethone, Mangopay’s global fraud detection solution, reveals online fraud pressure rising to record levels and breaking out of traditional holiday cycles. 

From January 2024 to July 2025, monthly inquiries (events assessed for fraud risk such as transactions, logins and sign-ups) grew from around 240 million to over 525 million. More than doubling in 18 months. Peaks landed outside classic shopping windows, notably Sep-Oct 2024 (480m) and set a new all-time high in July 2025 of 525m. 

The year-on-year picture tells the same story: between January and July 2025, Nethone processed an average of 470 million inquiries per month, compared to 300 million in the same period in 2024 – an increase of 48% year-on-year. 

Nethone’s full risk profiling analyses (“profilings”), which combine device fingerprinting, behavioural biometrics and account history checks, also rose from an average of 110 million per month (January-July 2024) to 170 million (January-July 2025), a 37% year-on-year increase, with an all-time high of 245 million in June 2025. 

Geographically, the UK emerges as one of the most targeted hubs for online fraud, alongside France, Germany and Spain. Sector patterns underscore the year-round threat. E-commerce accounts for the majority of fraud events detected across the year. This is consistently driving volumes well above 400 million monthly checks in 2025. Travel and mobility platforms bring in seasonal spikes during summer holidays, while FinTech platforms show sharp surges in specific months, reflecting event-driven criminal activity. Gaming platforms follow a similar pattern around promotional campaigns. 

Mark Burton, VP Engineering, Fraud Platform, Nethone

“Fraud is no longer a seasonal threat. Our data shows that criminal activity has become a year-round pressure on UK and European platforms. Fraudsters now exploit promotional cycles and refund windows just as much as traditional shopping peaks. They are becoming more persistent and opportunistic, driving higher costs for businesses and risks for consumers. Online marketplaces, travel providers, and FinTech platforms need to be prepared for a constant baseline of risk, not just one-off surges.”  

About Mangopay 

Founded in 2013, Mangopay powers a wallet-based payment infrastructure specifically designed for organizations with complex, multi-party fund flows. Our programmable wallet solution optimizes fund management, allowing platforms to regain control over payments, secure transactions, and automate payouts.  

By leveraging Mangopay’s end-to-end white-label infrastructure, clients generate additional revenue and enhance operational efficiency while remaining compliant and protected with 360° AI-driven fraud prevention. 

With over 250 million end users and more than €130 billion in processed transactions, Mangopay continues to lead in the fintech industry, providing flexible wallets designed to move money your way. 

About Nethone, a Mangopay solution 

Nethone, a Mangopay solution, is an AI-powered fraud detection system that offers the most in-depth user analysis and precise risk analysis for merchants and fintech companies.  The proprietary profiler analyzes thousands of data points for a 360° view of every user, detects fraudulent behavior with 130 signals combined with AI-based models, and keeps companies safe from account takeover, payment fraud, bots, and organized attacks.  

  • Cybersecurity in FinTech
  • Digital Payments

Our cover star Rebecca Fitzgerald, Director of Data & AI at Yorkshire Building Society, reveals a digital transformation journey meeting…

Our cover star Rebecca Fitzgerald, Director of Data & AI at Yorkshire Building Society, reveals a digital transformation journey meeting customers, wherever they are.

Read the latest issue of FinTech Strategy here

Yorkshire Building Society: Data, AI & Inclusive Leadership

Our cover story focuses on the data revolution taking place at Yorkshire Building Society (YBS)… Navigating this journey of change is Director of Data and AI, Rebecca Fitzgerald. Her ambitious vision is to transform the 160-year-old mutual through ethical, human-centred data strategies and AI innovation. In a rapidly evolving digital landscape, she aims to ensure YBS does not just keep up but leads from the front.

“I’m accountable for developing and implementing strategies to enhance data-centricity and drive value from data and AI for our customers and colleagues,” Rebecca states. This directive is grounded in strong governance, positive data culture, and the empowerment of people through data literacy and technological upskilling.”

Tyme Group: Scalable Global Digital Banking

Dietmar Bohmer, Chief Analytics Officer at Tyme Group, on operationalising innovation, cultivating a culture of empowerment and driving transformation from the inside out…

“It’s been wild ride from a technology point of view,” admits Dietmar… Today, that foresight is paying off. The cloud-native architecture has provided Tyme with the elasticity, resilience, and speed it needs to support its rapid growth across emerging markets. “With each new deployment, the organisation has evolved and refined its technological foundation,” notes Dietmar. “When the time came to launch GoTyme Bank in the Philippines, lessons learned from the rollout of TymeBank in South Africa enabled the team to rethink and redesign their stack, optimising for scale, performance, and localised feature delivery.”

ČSOB: A Digital Transformation Journey

ČSOB Slovakia is undergoing a major transformation aimed at future-proofing its technology, enhancing customer experience, and reinforcing its leadership in digital banking. Under the stewardship of its CIO Ludek Slegr, the bank’s IT team is navigating a major upgrade of its responsibility, overhauling core IT systems and implementing agile methodologies to meet its strategic goals. At the heart of this transformation is a focus on delivering value through technology, supporting people development, and fostering sustainable innovation.

“The next step for digital-first is continuous improvement of straight-through processing ratio, i.e. reducing involvement of manual work in our processes.”

Money20/20 Europe

FinTech Strategy also reports from the conference floor at Money20/20 Europe in Amsterdam. Bringing together the world’s leading innovators, institutions, investors, and influencers from across the FinTech and financial services spectrum, more than 8,000 delegates from over 2,300 companies were in attendance… We sat down with Standard Chartered’s Head of Digital Assets – Financing & Securities Services, Waqar Chaudry, to discuss how the bank is connecting traditional with digital, collaborating with FinTechs and taking a measured approach to entering the crypto market. And we spoke with Veritran’s CMO, Jorge Sanchez Barcelo, to find out more about the tech firm’s partnership with Manchester City which is reimagining CX to create a frictionless digital experience for fans.

Financial Transformation Summit

The Financial Transformation Summit at London’s ExCel is one of the most immersive and interactive events in the financial services calendar. As a media partner, FinTech Strategy took the temperature of industry innovation at our stand with on camera hot takes from the tech leaders pushing the boundaries at Hyland, Fidelity, HSBC, Citigroup and more…

Also in this issue, we keep you up to date with the key FinTech events across the globe; and read on for more insights from InsurTech disruptors Qover, lending innovators iwoca and investment experts Eastern Horizon…

Read the latest issue of FinTech Strategy here

  • Artificial Intelligence in FinTech
  • Blockchain & Crypto
  • Cybersecurity in FinTech
  • Digital Payments
  • Embedded Finance
  • InsurTech
  • Neobanking

Our cover story charts the rise of RAKBANK in the UAE driven by agile practices and a people-first culture delivering…

Our cover story charts the rise of RAKBANK in the UAE driven by agile practices and a people-first culture delivering banking with a human touch.

Read the latest issue of FinTech Strategy here

RAKBANK: A Banking Transformation in the UAE

Our cover story explores the digital transformation journey of RAKBANK in the UAE. Head of Digital Transformation, Antony Burrows, reveals the agile practices, enterprise-wide enablement and people-first culture delivering digital banking with a human touch.

“Culture is the cornerstone,” Antony stresses. RAKBANK codifies this into its Four Cs Framework – Connect, Communicate, Collaborate and Celebrate. “Here in the UAE, banks are pivoting from a model of ‘we know everything’ to recognising that one of the best ways to deliver continuous change and value to customers is through partnerships with startups and FinTechs. It’s no longer banks versus startups – it’s banks and startups, working together for the customer. This shift is especially meaningful as banks expand beyond traditional services to focus on customers’ broader financial lives.”

MTN MoMo: Empowering Africa Through FinTech

Hermann Tischendorf, Chief Information & Technology Officer at MTN MoMo (the telco’s mobile money division) reveals a bold roadmap for leveraging FinTech to drive financial inclusion across the African continent.

“MoMo is comparable in monthly active users to some of the top ten FinTechs globally. We’re playing in the same league as Revolut or Nubank – but in much more complex markets,” notes Hermann. “Access to financial services is fundamental. Without it, people are excluded from the global economy. Our services are the equaliser allowing individuals in frontier markets to participate in trade, store value, and ultimately improve their quality of life.”

Republic Bank: Building a Digital Bank

Republic Bank has been serving customers via its branches for over 185 years and now serves 16 different countries across the Caribbean and beyond. It’s “a regional bank with a growing global reach,” explains Group Chief Information & Digital Transformation Officer, Houston Ross.

His team is building a digital bank during a Year of Delivery and Accountability (YODA). “When we talk about digitalisation it’s a journey that never ends. And product is the vehicle to make sure we’re continuously improving.This is our digital pathway and we have to change minds in terms of going beyond the challenges to achieve what’s possible with the right frameworks, tools and processes for our people to serve our customers.”

Also in this issue, we keep you up to date with the key FinTech events across the calendar and read on for insights from Lloyds Banking Group, Recorded Future, AAZZUR, Ayre Group, Marqeta, SCOR and TerraPay.

Read the latest issue of FinTech Strategy here

  • Artificial Intelligence in FinTech
  • Blockchain & Crypto
  • Cybersecurity in FinTech
  • Digital Payments
  • Embedded Finance
  • InsurTech
  • Neobanking

The FinTech industry, sitting at the nexus of finance and technology, is a prime target for cybercriminals. With the growing…

The FinTech industry, sitting at the nexus of finance and technology, is a prime target for cybercriminals. With the growing prevalence of digital banking, mobile payments, and crypto-assets, cybersecurity has become a non-negotiable priority. In response, a new generation of tools has emerged to help FinTech companies stay ahead of threats. Here are the top five cybersecurity tools safeguarding the sector in 2025:

1. CrowdStrike Falcon – Endpoint Protection Powerhouse

CrowdStrike Falcon has become a leading choice for FinTech companies due to its advanced endpoint detection and response (EDR) capabilities. Powered by AI and cloud-native architecture, Falcon provides real-time monitoring and threat intelligence across endpoints, detecting suspicious behavior before it escalates. Its lightweight agent and scalable design make it ideal for rapidly evolving digital infrastructures.

2. Snyk – Securing FinTech DevOps

FinTech’s embrace of continuous development and integration demands security solutions built for speed. Snyk focuses on developer-first security, helping teams identify and remediate vulnerabilities in open-source dependencies, containers, and infrastructure as code. It integrates directly with GitHub, GitLab, and CI/CD pipelines, ensuring vulnerabilities are caught early—without slowing down development.

3. Fortinet FortiWeb – Web Application Firewall (WAF)

Web applications are the backbone of many FinTech platforms, and FortiWeb provides critical protection. This intelligent WAF defends against OWASP Top 10 threats, including SQL injection and cross-site scripting, while leveraging machine learning to tailor protections in real-time. FinTech platforms using APIs heavily benefit from FortiWeb’s deep learning inspection and bot mitigation features.

4. IBM Security QRadar – SIEM Intelligence

QRadar continues to lead as a top-tier Security Information and Event Management (SIEM) solution. It aggregates and analyzes data from across an organization’s digital ecosystem, detecting threats and providing actionable insights. FinTech firms rely on QRadar for compliance with financial regulations and for its ability to deliver fast, context-rich threat detection and response capabilities.

5. Auth0 – Identity and Access Management (IAM)

Auth0, a standout solution in identity and access management. In FinTech, controlling user access with precision is crucial. Auth0 provides secure, scalable authentication for apps and APIs, offering features like single sign-on (SSO), multi-factor authentication (MFA), and adaptive access policies. With rising threats targeting user credentials, IAM is no longer a back-office function—it’s frontline security.

Cybersecurity in FinTech requires agility, intelligence, and regulatory alignment. Tools like CrowdStrike Falcon, Snyk, Fortinet FortiWeb, IBM QRadar, and Auth) are not just protecting infrastructure. They’re enabling innovation in one of the world’s most dynamic industries. As threats grow more sophisticated, these platforms will continue to shape the future of secure financial technology.

  • Cybersecurity in FinTech

Solidarités International goes live with FinScan to strengthen AML compliance in global humanitarian operations

Solidarités International, a French-based humanitarian aid organisation, has gone live with FinScan. The Innovative Systems solution comes from a leading provider of advanced anti-money laundering (AML) compliance solutions. This will enhance screening processes across its global operations in a cloud-based environment.

As a nonprofit committed to providing life-saving assistance in areas affected by conflict and natural disasters, Solidarités International faces increasing regulatory expectations from public donors. These include the United Nations, the US Bureau for Humanitarian Assistance (BHA), and European funding bodies. These expectations include rigorous AML screening of suppliers, staff, and local partners to ensure accountability and transparency.

FinScan for AML

Solidarités International’s decision to adopt FinScan followed a thorough selection process involving external advisors and peer recommendations from within the NGO community. Criteria such as workflow flexibility, user delegation, audit history, and alignment with data privacy standards were central to the evaluation. FinScan is now fully operational at Solidarités International’s headquarters.

“With FinScan, we’re able to delegate screening responsibilities across field missions while maintaining centralised oversight and data privacy. The responsiveness of the FinScan team and the tool’s intuitiveness and configurability have been key positives,” said Pierre DeSoil, IT Project Lead at Solidarités International. “Our users picked up the system quickly and are more confident with the process.”

Designed to support complex compliance needs, FinScan helps organisations like Solidarités International meet donor due diligence requirements. It does this through customisable workflows, robust matching algorithms, and scalable deployment.

“We’re proud to support the mission of Solidarités International with a powerful, cloud-based AML solution that helps protect humanitarian aid from financial crime risk,” said Steve Maul, Chief Customer Officer at Innovative Systems. “Their dedication to both compliance and the communities they serve exemplifies how technology and purpose can align.”

About Solidarités International

Founded in 1980 and headquartered in Clichy, France, Solidarités International provides urgent humanitarian aid in conflict zones and disaster-stricken areas. Its core mission is to meet the vital needs of vulnerable populations—providing water, food, and shelter in life-threatening conditions. Learn more at https://www.solidarites.org/en/.

About FinScan

Trusted by hundreds of organisations worldwide, Innovative Systems, Inc.’s FinScan® offers advanced Anti-Money Laundering (AML) compliance technology and consulting solutions. Built on decades of experience in data management and proprietary matching technologies, FinScan provides a data-first, risk-based approach to ensure unparalleled accuracy and efficiency in identifying and reducing risk, accelerating AML compliance workflows, and optimising team productivity. FinScan’s comprehensive, integrated platform includes Know Your Customer (KYC), unparalleled sanctions screening, risk scoring, data quality, and advisory services for implementing a holistic compliance program. FinScan offers flexible deployment including SaaS, on-premise, and hybrid options. FinScan’s SaaS clients are screening more than 300 billion names a year. Learn more at www.finscan.com and follow us on LinkedIn.  

  • Cybersecurity in FinTech

Kristian Torode, Director & Co-Founder at Crystaline, on Closing the gap between digital convenience and regulatory compliance

As financial firms adopt more digital tools – from instant messaging to video calls – the challenge of capturing, storing and monitoring every conversation in line with regulatory expectations for comms has grown exponentially.

With regulators demanding stricter oversight of all business comms, financial firms must now rethink how they manage messaging across every level of the organisation. Unifiesd Communications (UC) software can help financial service providers remain compliant.

A recent Theta Lake survey revealed that over 70 firms were fined in 2024 for failing to comply with communications regulations. What is more, almost two-thirds of financial firms anticipate even more regulatory requirements on communications in the coming years.

Consequences of Non-Compliance

While fines for failure to comply with comms regulations are more prevalent in the US, there have been several cases affecting financial services firms in the UK.

In August 2023, Morgan Stanley was fined £5.4 million by Ofgem, the UK’s energy regulator, after the bank’s traders discussed wholesale energy prices over WhatsApp on private devices. Use of the platform does not meet regulatory standards for data retention and monitoring, as financial service providers are unable to record these messages concerning energy trading.

Despite industry speculation, the UK Financial Conduct Authority (FCA) has chosen not to implement an outright ban on WhatsApp for business use. Instead, the FCA expects firms to implement policies and monitoring tools to ensure compliance when using such platforms. While this provides some flexibility, it puts the onus on firms to maintain secure and auditable communication records across emerging technologies.

Balancing security and convenience

For financial businesses, the challenge lies in finding a comms solution that is both secure and convenient. WhatsApp appeals to many due to its familiarity and features like group chats, voice calls and file sharing. However, while convenient, it presents serious risks in data privacy, security and compliance, making it unsuitable as a primary communication platform for highly regulated industries like finance.

To address these concerns, many firms are turning to UC platforms that integrate multiple communication tools. These include voice, video, instant messaging and file sharing across a single, secure interface. These platforms provide the convenience of more familiar tools such as WhatsApp while addressing compliance concerns.

Several UC providers now offer platforms tailored to highly regulated industries like finance. Many include security features such as end-to-end encryption, centralised access management and real-time monitoring. This can detect potential compliance breaches, offer built-in archiving for regulatory adherence and consent management to meet data protection requirements.

Digital business communications will continue to play a key role in the financial services sector, but not at the expense of traceability and data security. Unified Communications offers a secure, compliant platform for financial services without sacrificing convenience.    

If your organisation is reassessing its communications strategy in light of evolving compliance demands, Crystaline can provide guidance on navigating the shift to unified communications.

  • Cybersecurity in FinTech

With the right approach, cybersecurity can be contagious argues Galeal Zino, Founder & CEO at NetFoundry – a provider of zero-trust connectivity solutions and originator of the open source tool OpenZiti

Modern financial services are composed of a digitally integrated secure ecosystem – networked together and codependent on ecosystem APIs, microservices and shared data. Complexity and ambiguity are high.

Sir Alex Younger, former head of the British Intelligence Service MI6 said recently that the job of the intelligence service is to dispel complexity and ambiguity.That would make a fine mission statement for the heads of information security in the financial sector.

Meeting a Complex Security Challenge

Most banks leverage core banking systems (CBS) from providers like Temenos, FIS and Finastra. This makes security complex. Connections are needed between the bank’s network and its CBS provider’s network. Traditionally, this necessitates nailing up VPNs. And managing permitted IP addresses in firewall ACLs, MPLS or dedicated circuit-based extranets. Also required are pre-shared certificates, shipping hardware, VDI and/or leaking routes. All of which have multiplied in complexity during digital transformation. And are about to multiply again with AI.

A different approach is secure-by-design. Rather than bolt-on the infrastructure described above, each session is strongly identified, authenticated and authorised. All before it is granted a virtual circuit on a network. This is similar to what the banks do internally with solutions for zero trust, but it is borderless. It works across their digital supply chains, including with their core banking platform and software providers.

One CBS leader, Euronet Worldwide, uses a third-party secure-by-design platform to enable their financial institution customers to connect to its core banking software. This is a great example of the supplier being proactive about their role in security. We’ll see this happen more as new legislation takes effect, the EU CRA. The Euronet example shows that it’s possible to remove some of the ambiguity from shared responsibility. Euronet’s secure-by-design system doesn’t just protect itself but makes every interaction with supply chain partners more secure.

Security designed-in for Financial Services

The same principles apply across financial services. Companies like Euronet can deploy their own zero trust supply chain connections, rather than putting the burden on their finance sector customers to figure it out. In large supply chain scenarios like CBS, this helps everyone. The reality now is that if the VPN of any one financial institution is compromised, then potentially all the banks who connect to the same CBS providers can be exploited. By removing complexity and ambiguity, Euronet is simplifying and securing the entire supply chain.

The big picture is that the WAN/SASE/firewall model is struggling in the post digital transformation, hyperconnected, soon to be AI- powered world. That model was built to secure the WAN. However, new workflows such as the financial supply chain are outside the borders of any single WAN. So, the precious SASE WAN gets connected to the internet via open firewall ports (ACLs) and vulnerable VPNs so the business can connect to supply chain partners. It’s like building a strong boat and then punching holes in it to get a better look at the water. 

AI is the nail in the WAN coffin because AI multiplies and accelerates these workflows. They have at least one leg outside the WAN and it makes them less predictable and more dynamic. More complexity and ambiguity. Good luck connecting AI agents via VPNs and firewall ACLs.

Secure-by-Design Supply Chain

So, what does a secure-by-design supply chain look like and how can financial services identify viable migration paths?

The main characteristics are:

  • Close all inbound “listening” ports on all network firewalls and servers to make your DMZ unreachable from the underlay networks.  Eliminate the reachable firewalls and VPN servers.  No more holes beneath the waterline!
  • End-to-end zero trust between supply chain participants, meaning least-privileged access not just to the network or firewall, but all the way through to applications, APIs, servers and devices. Nothing can connect to anything else without strong identity, authentication and authorisation. This includes end-to end-encryption – no sharing of encryption keys with cloud security providers (which also helps ensure data sovereignty).
  • Microsegmentation, the ability to define in granular detail who or what has access to which applications, and to limit lateral movement in the event of a breach. In effect, every application session becomes a private network-of-one, and it is quarantined by design.

Find out more at https://netfoundry.io/

  • Cybersecurity in FinTech

Rob Meakin, Director of Fraud & Identity at Creditinfo, on leveraging tech to tackle fraud

Financial fraud is increasing around the world, putting both mature and emerging digital economies at risk. The overall global economic impact of financial crime has been estimated to be $5 trillion. Furthermore, according to the 2024 Nasdaq global financial crime report, fraud losses totalled $485.6 billion worldwide. This from fraud scams and bank fraud schemes alone. As such, organisations face a series of challenges, from eroding profit margins to reputational risks to data breaches.

Many factors contribute to this growing wave of fraud. For example, digitisation in banking has created new opportunities for bad actors. With more identity data existing online, attack surfaces have expanded. Hackers now have more possible entry points to exploit vulnerabilities.

At the same time, new technologies, like machine learning (ML), artificial intelligence (AI), and automation are enabling bad actors to innovate faster and evade detection more effectively. AI, in particular, is a double-edged sword. While many businesses use the technology to improve efficiency and decision-making, it also gives bad actors a helping hand. Deepfakes and social engineering, for example, enable them to impersonate individuals with uncanny realism.

Additionally, cybercrime – especially financial crime – is becoming more sophisticated. Today, over two-thirds of financial institutions admitting they’re unprepared to defend against the rising wave of attacks.

Counting the many costs of fraud

Rising fraud creates challenges at local, national, and global levels. Financial loss is, obviously, a primary concern. But financial loss is only part of the total cost of cybercrime. Fraud also brings reputational damage, increased risk of data breaches, and potential legal consequences.

As organisations devise new strategies to tackle rising fraud, they must also heed regulatory requirements. Namely, Anti-Money Laundering (AML) registration, as well as other standards for privacy and consent. These regulations create further challenges for organisations as they aim to uphold rigorous compliance requirements without impacting sales, operating costs, or the customer experience.

It’s time for a different approach to fraud detection

On both local and global levels, mounting fraud threatens economic growth. In its Plan for Change, the UK government has recognised global co-operation will be necessary to tackle fraudsters. However, existing security strategies are too fragmented to suit the needs of diverse markets.

Emerging economies, for example, often lack mature controls, making them inherently vulnerable to hackers. Yet, with smaller digital infrastructures, they’re also less attractive targets for financial crime.

In contrast, more mature economies usually have stronger security defences. However, their larger digital ecosystems make them perhaps even more vulnerable to bad actors’ advances. After all, the more digital an economy becomes, the more fragmented and complex an individual’s identity and the more opportunities for bad actors to exploit or impersonate it.

Combatting fraud at a global scale requires going local

Considering the scale and sophistication of cybercrimes, combatting global fraud will require organisations to turn to localised data for more precise identity verification.

By integrating data from diverse, localised sources and tailoring fraud prevention strategies to market-specific risks, organisations can better detect fraud and establish identity trust. And in a way that both upholds the customer experience and promotes financial inclusion.

Combine credit, government, and digital data to enhance intelligence

Thwarting fraudsters begins with building intelligence to establish trust and verify presented identities. This is where localised data can help. By combining credit bureau data with government registries and digital signals, organisations can find a correlation across multiple digital identity attributes and digital risk signals to assess risk and enable real-time identity trust.

Credit bureau data associated with the presented identity can be used to determine risk and trust based on four vectors:

  • The bureau footprint: information comprising records from multiple contributing organisations
  • Activity history: evidence of recent and consistent payment activity
  • Data consistency: personal data stability
  • Application velocity: recent application history

Meanwhile, government information services and other registries can be incorporated to further cross-check the presented identity and strengthen verification.

By leveraging such a wide range of independent, localised data sources and correlating them with the presented identity attributes, organisations can significantly enhance intelligence to detect fraud without compromising the customer experience.

Tailor strategies to specific markets to support compliance and accessibility

It’s also important that organisations tailor their security and identity-verification strategies to the unique needs and maturity levels of specific markets. For example, in emerging economies, many people struggle to access financial services. This is often due to a lack of a formal credit history or other recognised financial records. Without this information, it can be a challenge for organisations to verify identity and reach trust decisions without inadvertently excluding legitimate users.

But by using localised data sources and market-specific strategies, organisations can make more informed decisions to bring more traditionally excluded parties into the financial system and promote broader financial inclusion without increasing risk or compromising security.

These targeted, market-specific fraud prevention strategies also help organisations with regulatory compliance. For example, for AML compliance, organisations must “identify, assess, and understand the money laundering and terrorist financing risk to which they are exposed.” Using localised data and market-specific strategies can help organisations meet this expectation by aligning fraud detection controls with region-specific threat intelligence.

Conclusion

Global financial crime continues to ramp up, creating new challenges for organisations to detect fraud, verify identities, and comply with regulations. But finding strategies to beat bad actors is made even more difficult by markets’ varying needs, maturity levels, and digital infrastructures.

To combat fraud and cyberthreats on a global scale, organisations should pivot to a localised approach. By combining credit, government, and digital data and tailoring fraud-prevention strategies to specific markets, they can enhance intelligence, maintain compliance, and better manage risk. In doing so, they can not only strengthen security but facilitate access to financial products and services for broader financial inclusion, worldwide.

  • Cybersecurity in FinTech

Mark Andreev, COO at Exactly, presents a practical guide to tackling e-commerce fraud with payment tokenisation

Tokenisation can solve a big problem… e-commerce fraud is a growing threat that continues to impact online businesses worldwide. According to recent figures from Statista (2025), global e-commerce losses due to online payment fraud are projected to exceed $100 billion by 2029. As fraudsters increasingly exploit IT vulnerabilities, it is imperative for online and brick-and-mortar businesses to fortify their cybersecurity posture.

Amidst the current security challenges, payment tokenisation emerges as a technology to future-proof business operations and is projected to reach USD 28.97 billion worth by 2033.

This guide explores the concept of payment tokenisation, emphasising its value and role in ensuring credit card payment processing standards for merchants.

What is Payment Tokenisation?

Tokenisation is the process of substituting sensitive data with non-sensitive values – tokens. It works as a key layer of protection for stored data by replacing card numbers with illegible, surrogate values.

During a transaction, payment details are securely transmitted to a trusted payment provider via hosted payment page or through direct API integration.

In the hosted payment page flow, the customer is redirected to a secure payment page operated by the payment provider. Here they can enter their payment information. The provider handles data collection, encryption, and transaction authorisation, keeping sensitive information off the merchant’s servers.

In the API integration flow, the merchant’s website collects payment details using secure client-side tools. In this case, the merchant is responsible for ensuring full PCI DSS compliance, as sensitive data passes through their systems.

Following a transaction, sensitive card data is substituted by a special character sequence. The translation of characters into randomised values refers to the tokenisation process.

For merchants who are not PCI DSS compliant, storing sensitive information on their side is not allowed. In these cases, the third-party payment provider retains the sensitive data and the tokens for future use, while merchants don’t retain any sensitive information.

This method is one of the key cybersecurity best practices to ensure payment providers remain compliant with PCI DSS and is also crucial for merchants using API integration to store sensitive data.

Different Types of Tokens

There are different types of tokens available to merchants, offering different levels of complexity and security. Simple tokens refer to randomised reference numbers that are unidentifiable and unrelated to customer data. They provide a high level of security when implemented correctly by a reputable payment provider.

On the other hand, token vaults represent a more complex system of payment security and data handling. Essentially, token vaults are encrypted repositories of original payment data associated with tokens from each customer transaction. Depending on the type of payment gateway integration, either the merchant or the payment provider may retrieve the payment information as needed. Token vaults can also be deployed in cloud environments, mitigating the need for extensive infrastructure.

The Value of Tokens

In an era where cybersecurity is paramount, failing to secure customer data can come at significant costs. Recently, the IT systems of the UK’s most prominent retailers suffered significant downtime following a series of cyberattacks. They were prevented from serving their customers as a result. As the consequences of these attacks continue to linger, affected UK retailers are working overtime to get back on track. In these situations, the use of tokenisation payment security has partly helped prevent what could have been a catastrophic breach. Reducing the risk of a lateral exploitation of customer data. In fact, using payment tokens, retailers avoid the need to encrypt and retain sensitive payment details. This lowers the risk of attacks, breaches, and noncompliance with ever-changing payment processing and data security policies.

Tokenisation also enables seamless customer experiences, addressing a crucial customer demand – convenience. In fact, with tokenisation enabling one-click checkouts, customers avoid re-entering card details and access a seamless shopping experience, meeting an important need for comfort and familiarity for consumers.

Finally, from a regulatory perspective, compliance with PCI DSS is mandatory for payment providers and merchants specifically using API integration within payment gateways to store sensitive information. In this regulatory context, tokenisation becomes a straightforward strategy to meet fundamental data handling legal requirements. In an era of rising cyber threats and increasing customer expectations, tokenisation offers merchants a scalable, effective, and future-ready approach to safeguarding sensitive data, building trust, and preserving business integrity.

  • Cybersecurity in FinTech
  • Digital Payments

The final day at Money20/20 Europe 2025 was packed with more insights on the future of FinTech, from banks to borderless innovation.

Money20/20 Conference Themes & Tracks

Money20/20 Europe 2025 is structured around four thematic content tracks:

  • Digital DNA – Exploring core infrastructure, platform strategies, and foundational technologies.
  • Embedded Intelligence – AI, machine learning, data strategies, and real-time analytics.
  • Beyond Fintech – Partnerships between fintechs and other sectors like retail, health, and climate.
  • Governance 2.0 – Regulation, digital identity, privacy, and ESG compliance.

Day three featured more impactful sessions across all four pillars, offering attendees more valuable insights and strategies for innovation.

Highlights from Key Sessions at Money20/20 Europe:

How to Create and Leverage FinBank Partnerships

The discussion focused on the evolution and success of FinTech partnerships with banks. Key points included the shift from transactional partnerships to more collaborative, value-driven relationships, emphasizing joint KPIs and product creation. 

Alex Johnson, Chief Payments Officer, Nium

“You really have to differentiate. You really have to stand out for a bank to say, ‘Yeah, I like what you offer enough to go through, six months of onboarding.’ Dare I say, maybe more.”

John Power, SVP, Head of JVs & AQaaS, Fiserv

“The legacy system, it’s a fact of life. They’re there. They’re pervasive. They’re going to be here for a long time, and banks historically have made huge investments in those platforms and systems. So I think both the challenge for the for the bank and the opportunity for the FinTech is, how do you at the front end of those legacy systems develop new products that can scale and that you can bring cross border easily and readily.”

Cecilia Tamez, Chief Strategy Officer, Dandelion Payments

 “It really is cutting the line to be able to deliver opportunity for customers and to be able to expand propositions for new customers.”

“The economic development supply chains shifting to low to middle income countries are incredibly important right now, and cross border payment rails have not been good in low middle income countries.”

Where Fintech goes Next: Tapping into Platforms and Verticals 

The discussion centred on the democratisation of financial services through embedded finance. The panel emphasised the importance of data quality, personalisation, and strategic partnerships in delivering seamless financial experiences – ultimately enhancing customer satisfaction and improving business efficiency.

Hiba Chamas, Growth Strategy Consultant – Independent

“Embedded finance is going to be defined by region and use cases.”

Amy Loh, Chief Marketing Officer – Pipe

“Small businesses don’t want to manage their business through a bunch of different tools that are stitched together. They’re looking to platforms to do everything for them and keep high end services.”

Zack Powers, VP Commercial & Operations – Mangopay

“Most platforms or merchants out there trying to diversify revenue, and they will get auxiliary revenue, or maybe get primary revenue through FinTech activity.”

The Neobanks Strike Back

​​In a dynamic exploration of neobanking’s evolution, Ali Niknam revealed bunq’s remarkable journey from a tech-driven startup to a sustainably profitable digital bank. By leveraging AI across every aspect of their operations, bunq has transformed traditional banking, reducing support times to mere seconds and creating a hyper-personalised user experience. Niknam emphasised the power of user-centricity, showing how innovative features like simple stock trading and multi-language support can democratise financial services.

The bank’s strategic approach – focusing on user needs rather than investor expectations – has enabled them to expand thoughtfully, with plans to enter the UK and US markets. By embracing technological change and maintaining a relentless commitment to solving real customer problems, bunq exemplifies the next generation of banking.

Ali Niknam, Founder & CEO, bunq


“Somewhere in the 70s, we let go of the gold standard, and now currencies are basically floating. The only reason why a dollar or a euro is worth what it’s worth is because of trust and perception. Philosophically, it’s very logical that we have found another abstraction layer by introducing stablecoin, which is not much else than a byte number that has a denomination currency as a backing asset that itself doesn’t have anything as a backing asset. A lot of people might ask, ‘Why would you need a stablecoin? We have euros. I go get a coffee, pay with Apple Pay or cash.’ But there are many countries on this planet where the local currency is not stable. If your country has an inflation rate of 30,000% like Zimbabwe, you would really love to use a different currency. The US dollar has been the currency of choice, but as a normal person, you cannot access the US dollar. A US dollar stablecoin that you can access by simply having a mobile phone – that’s going to be transformational for large groups of people.”

Innovating When Regulation Can’t Keep Up: Lessons from NASA 

Lisa Valencia covered an array of topics, from her 35 year career at NASA and Guinness World Record to the rise of private entities like SpaceX, which has launched 180 missions this year, and the increasing role of public-private partnerships in space exploration. The speaker also touched on international collaborations, particularly with the European Space Agency and the Italian Space Agency, and the potential for space tourism and colonization of the moon.

Lisa Valencia, Programme Manager/Electrical Engineer – Pioneering Space, LC (ex NASA)

“Back in the day, NASA got 4% of the national budget. Now it’s down to just 0.1%, so we’ve had to get creative with private partnerships. SpaceX is the perfect success story. They came to us in 2007 needing money after some rocket mishaps, and look at them now! From my balcony, I see their launches every other day. They’re planning 180 launches this year alone.Talk about a return on investment!” 

“We’re planning to colonise the South Pole on the moon. The idea is to extract water and hydrogen from the regolith—both for living there and for fuel.”

Scaling Internationally in 2025: Funding, Innovating, and Breaking into New Markets

The conversation focused on the growth and strategy of fintech companies, particularly those with a strong presence in Europe and the US. The panel featured Ingo Uytdehaage, CEO and co-founder of Adyen, and Alexandre Prot, CEO of Qonto. Both leaders expressed a preference for organic growth over acquisitions, emphasizing the importance of scaling efficiently before pursuing an IPO.

Ingo Uytdehaage, CEO and co-founder of Adyen

“I think an important part of scaling a company is not just thinking about your product, but also considering the markets you want to address, and how you ensure you become local in each country.”

“We realised over time that if we really want to bring the customers, we need to have the best licenses to operate. A banking license gives you a lot of flexibility.” 

“Being independent from other companies, other financial institutions, that gives you flexibility to build what your customers really want.”

“I think it’s very important, also in Europe, that we continue to be competitive. If you think about regulations and AI, we shouldn’t try to do things completely differently compared to the US.”

Alexandre Prot, CEO of Qonto

“We need to be very strict about tech integration and avoiding legacy which slows us down.”

“We still need to scale a lot before we have a successful IPO. A few team members are working on it and getting the company ready for it. But, the most important thing is just scaling efficiently in the business, and maybe an IPO would be welcome in a couple of years.”

Putting The F in Fintech

The panel discussion focused on the role of women in FinTech based on personal experiences.

Iana Dimitrova, CEO, OpenPayd

“At times, being underestimated is helpful, because if you’re seen as the competition, driving an agenda is becoming more difficult. So what I found, actually, over a period, is that bringing your emotional intelligence, leaving the ego outside of the outside of the room, and just focusing on execution is is incredibly helpful.” 

Megan Cooper, CEO & Founder, Caywood

“The moment we start defining ourselves as like a female leader or a female entrepreneur, you almost kind of put yourself in a bit of a box. And so I think just seeing yourself on an equal playing field and then operating it on an equal playing field and interacting in that way is quite advantageous.”

“We can’t just want diversity and hope it happens. We actually have to be intentional about creating it.”

Valerie Kontor, Founder, Black in Fintech

“Black women make up 1.6% over the FinTech workforce, but when we look at the financial reality of black women by the age of 60, only 53% of black women have enough money in their bank account to retire. We need to start marrying people in FinTech and the people that we need to serve.”

Money20/20 Europe 2025 closed its doors but the next edition of the conference will return to Amsterdam from June 2–4, 2026, promising to continue the tradition of shaping the future of financial services…

  • Artificial Intelligence in FinTech
  • Blockchain & Crypto
  • Cybersecurity in FinTech
  • Digital Payments
  • Embedded Finance
  • Host Perspectives
  • InsurTech
  • Neobanking

From June 9-13, London Tech Week gathers investors, enterprises, and startups from around the world to network, learn, and solve the most pressing challenges facing the IT sector.

London Tech Week 2025 is coming. The event will take place from June 9–13 at Olympia London, and is one of the world’s largest tech events, drawing over 45,000 attendees from across 90 countries. Designed to bring together the innovators creating the technologies of the future, the investors who fund them, and the enterprise tech leaders who adopt them, the event is one of the most impactful gatherings of tech professionals in the industry. 

“Innovators. Investors. Tech giants. The visionaries applying new tech to solve the world’s biggest problems. Enterprise tech leaders who are creating solutions to make work easier and life more fun,” according to the event website. “They all come to London Tech Week to see where tech will take them next.”

This year, London Tech Week is expanding, occupying double the space at Olympia, new features and a whole new experience. Keynote and expert speakers at this year’s event include: Dame Melanie Dawes, Chief Executive at Ofcom; Darren Hardman, Corporate VP & CEO at Microsoft UK; Dr Jean Innes, CEO of the Alan Turing Institute; Sir Tim Berners-Lee, inventor of the World Wide Web; renowned science educator and broadcaster, Professor Brian Cox; and many, many more. 

This year’s event targets key demographics across the tech space, including… 

Startups 

Attending this year’s event are future unicorns, top investors and the tech leaders of tomorrow. Attendees have the opportunity to connect with visionary founders from some of the UK and Europe’s most exciting startups, and learn how they’re approaching funding, scaling, and solving some of the world’s most pressing challenges.

Enterprise 

Attendees will also have the opportunity to learn how large corporates are pushing the boundaries of innovation by embracing emerging technologies. This year’s London Tech Week will feature insights from top industry leaders about how they are driving productivity, efficiency, and competitiveness across various sectors.

Investors 

London is home to a world class investment ecosystem, with VCs, CVCs and angel investors. Many will be attending this year’s event — on the lookout for their next venture. The London Tech Week 2025 enhanced app is designed to help startups and other investment-seekers find people with the right profile in order to maximise their time at the event.

“London Tech Week is THE gathering spot, not even in London or in the UK, but in Europe. You can meet wonderful tech companies here.” – Canva
Image courtesy of London Tech Week 2025.
Image courtesy of London Tech Week 2025

The Fringe 

The London Tech Week Fringe Event programme takes place from 9 – 13 June across London, featuring smaller organisations and niche topics you won’t find on the more mainstream technology conference circuits. The event’s partners cover a wide range of topics from emerging areas to established industry trends. This year the event it featuring fringe events covering SpaceTech, Healthcare, Areospace & Automotive, Investment, AI, Entrepreneurship, and more. 

Learning Labs 

Back for its second year at London Tech Week, the Learning Labs offer diverse content and learning opportunities. These sessions, presented by our leading event sponsors, cater to all experience levels. Learn about The Tech Lifecycle, AI and Data Integration, Natural Intelligence, Building a Strong Digital Core, and more.
Learn more about attending London Tech Week 2025 here.

  • Artificial Intelligence in FinTech
  • Cybersecurity in FinTech
  • Event Newsroom

Recorded Future’s CISO, Jason Steer, looks at how FinTechs can advance the maturity of threat intelligence programmes to strengthen the resilience of cybersecurity and deliver tangible ROI

Data from the UK government’s Cybersecurity breaches survey for 2025 paints a stark picture for FinTechs. 48% of finance or insurance businesses identified a cybersecurity breach or attack in the last 12 months. Similar numbers have been reported by Mastercard. A survey of 5,000 small and medium-sized businesses across four continents revealing that 46% have suffered a cyberattack. It’s increasingly becoming clear that it’s a case of ‘when’ and not ‘if’ a business will be targeted by cybercriminals.

The growing urgency surrounding cyberattacks is helping drive a strategic shift in how organisations approach threat intelligence. When everything becomes urgent, it becomes increasingly complex to determine what is and isn’t a priority. Taking decisive and impactful action can be challenging. Threat intelligence is helping to solve this problem. With the right intelligence provider, people and processes, threat intelligence can prove a crucial part of a cybersecurity programme. It enables FinTechs to create an understanding of the who, what, how, when and why of security risks. This is pivotal for managing, accepting and reducing risk, and delivering wider ROI.

Automated Intelligence for Cybersecurity

The effectiveness of a Cybersecurity programme ultimately depends on a combination of people, processes, products and policies. Threat intelligence can add value in each of these areas. Identifying and prioritising the threats which matter most to an organisation. Not all threats carry the same level of risk. By narrowing focus to the most relevant and probable attacks, FinTechs can strengthen their overall preparedness and resilience.

Threat intelligence can provide actionable insights to better anticipate potential attacks and address vulnerabilities. This can help to prevent a security breach, minimise the possible impact of an attack and improve overall responsiveness. It’s for these reasons that threat intelligence can deliver tangible ROI, in both the short and long term.

Without automated threat intelligence and context, Cybersecurity teams can be swamped with time-consuming manual workflows required to gather and analyse data. Alongside this, manual alert triage, investigation and response processes can prove time and resource intensive, as well as being slow. A recent report by Recorded Future shows how automated threat intelligence can overcome these challenges. Cybersecurity teams can save nearly 11 hours each week by streamlining threat detection. They can then move straight to responding to relevant alerts more quickly. A similar amount of time per week was also saved through more efficient threat analysis, hunting and reporting. This enables valuable security resources to shift to other meaningful tasks that expand and grow their skills. Moreover, improving the overall security posture of their organisation.  

Further findings from the report show examples of businesses automating 70% of manual security workflows, cutting investigation times by 50% and driving a 30% reduction in response times. Teams can work more efficiently and effectively to minimise downtime. Average billion-dollar businesses investing in threat intelligence recovered over $19,000 per month in revenue. This was due to reduced downtime, according to the Recorded Future report. That figure doesn’t account for the additional impacts of downtime, such as erosion of customer trust, productivity losses, and recovery expenses.

Protecting Brand Reputations

Threat intelligence also had a marked impact on cyber insurance costs, with organisations reporting reduced premiums of nearly $30,000 a year. Further ROI can be experienced through the mitigation of risks on brand reputation – something that’s particularly important in financial services, where customers want to be confident that their money and financial interests are being placed in safe hands. People need to be able to trust the FinTechs they do business with, and typosquats – illegitimate but similar-looking web domains – can quickly erode this trust.  

Typosquats can be quickly identified, whether it’s company logos or brands being abused, and removed through the comprehensive understanding of digital footprints provided by threat intelligence. This can prove crucial in minimising the risks of phishing and safeguarding customers from inadvertently disclosing personal information to cybercriminals. 

Cybersecurity Resilience

Cybersecurity resilience powered by threat intelligence can deliver cross-functional value across a whole organisation. It can help FinTechs to align their organisations and customers with real risks, rather than hypothetical ones, to effectively manage and mitigate the growing issue of cyberattacks. This starts by defining an organisation’s security priorities and assessing threats in the context of risk to the FinTech. It’s an important first step to determining that not all vulnerabilities will be exploited, and not all threat actors pose an immediate risk, creating opportunity to focus on addressing the actual issues that are genuinely urgent and could actually harm people, assets and business.

To find out more about how advanced threat intelligence solutions can deliver team productivity improvements and business and brand risk reduction impact, download Recorded Future’s ROI for Cybersecurity Teams report.

  • Cybersecurity in FinTech

Intergiro’s CEO, Nick Root, on how payments providers can meet the challenges for cybersecurity in the war on fraud

We operate in the trenches of FinTech – real-time, full-stack and fully exposed to the relentless tide of digital fraud. As an embedded payments provider across the EU, Intergiro lives at the bleeding edge where innovation meets exploitation. And let me be clear: fraud isn’t a back-office nuisance anymore. It’s an existential threat. One that every modern financial company, especially those bootstrapped like ours, must treat as core business, not a support function.

Right now, 30% of our headcount is dedicated to fraud prevention, compliance and cybersecurity. That’s not a vanity metric – that’s the reality of staying alive in a hostile digital environment. We spend millions annually not just on tooling and infrastructure, but on reimbursing innocent victims. For a company building its future on resilience, programmatic control, and capital efficiency, these costs are brutal. But necessary.

The Scamdemic is Here

Fraud is no longer a sideshow; it’s the main event. In the past 18–24 months, we’ve seen a sharp escalation. Sweden’s financial police reported an 80% spike in investment fraud between 2022 and 2023. Our internal metrics tell the same story. Spiking fraud attempts, more advanced attack vectors and a user base under siege.

And this isn’t abstract. It’s personal. For example, I got hit by a fake Uniqlo storefront. Nearly lost money. Only Intergiro’s own controls saved me. It was a sobering moment: even a FinTech founder can fall victim. For digital natives, that’s embarrassing. For the less tech-savvy – think your parents’ generation – it’s a nightmare. My own father won’t use Uber unless one of us physically adds his card to the app.

Understanding the Threat Landscape

To address this epidemic, we first need to clarify the categories of fraud. Payment fraud and ID theft are mostly on us – as FinTechs. If a system fails, or a tool is exploited, we own that and cover the loss. But social engineering and investment fraud? They’re tougher. These rely on psychological manipulation – human vulnerabilities we can’t patch with software updates. Still, that doesn’t mean we’re powerless. We just need to shift our lens.

Upstream, Not Downstream…Fighting social engineering with regulation is like mopping up the floor while the roof’s still leaking. Necessary, but ultimately reactive. We need to move upstream. Way upstream.

Social Media: The Root of the Fraud Problem

Over 75% of fraud starts on social platforms. That’s the front door. If we don’t lock it, we’re just chasing shadows. Meta’s FIRE partnership with UK banks is a baby step in the right direction. But let’s be honest – it shifts responsibility onto banks to clean up the mess, while platforms avoid real-time accountability.

What we need is a pan-European version of FIRE, backed by the teeth of the Digital Services Act and centralised enforcement. FinTech alone can’t drive this. We need regulators, platforms and providers rowing in the same direction.

Public Awareness: Borrowing the Pandemic Playbook

Think about this: between 2020–2022, fraud cost the EU €157 billion. That’s not far off the public health spend from COVID. And fraud doesn’t recede – it compounds.

In a pandemic, we responded with mass public education: masks, distancing, handwashing. We need the same for digital fraud. A real, coordinated public awareness campaign built around these pillars:

  • Basic operational security –  Email is not secure. Banks don’t ask for details over email. Wire transfers aren’t reversible like card transactions.

  • Social media hygiene –  If it smells like a scam; even from a verified blue tick – assume it is. “Stop. Think. Click.”

  • AI as defence –  The same AI used to create scams can help spot them. Let’s teach users how to turn the tools around – scan that investment pitch, audit that wallet address.

Delivery matters here. Dry leaflets won’t cut it. Interactive quizzes, short-form video explainers, browser plug-ins – a toolkit that reaches people where the scams do: in-feed and in-app.

Collective Action Against Fraud: Collaboration Over Competition

FinTech has a reputation for speed, innovation and competition. But when it comes to fraud, isolation is the enemy. No single firm can win this war alone.

We need a secure, privacy-conscious layer for FinTech collaboration. A shared fraud intelligence layer that goes beyond blacklists and blocked BINs. We’re not talking about turning FinTechs into police forces, but enabling programmatic detection through pooled data, shared signals and joint tooling.

At Intergiro, we’re already piloting private data-sharing models with other European players. It’s early – but promising.

Final Word: It Takes a Village

This war against fraud won’t be won in the back office of your local neobank. It needs a whole-of-society effort. Platforms must step up. Regulators must align. And consumers must be trained – not blamed.

Fraud isn’t going away. As AI evolves, so will the threat. But so will we – if we move fast, stay dynamic, and invest in people, tools, and partnerships. Not just for ROI – but for resilience.

At Intergiro, we’re all in. But we can’t do it alone. If FinTech is the infrastructure of modern commerce, fraud is the fault line beneath it. And we can’t build the future on a fault line.

  • Cybersecurity in FinTech

Husnain Bajwa, SVP Product – Risk Solutions at SEON, on KYC detection and verification to combat fraud in financial services

Many fraudsters today are no longer just criminals – they’re technologists wielding powerful artificial intelligence (AI) as their primary weapon. As fraud techniques evolve, businesses are becoming increasingly vulnerable to sophisticated adversaries. With the rising wave of AI-powered fraud, traditional fraud prevention methods, which heavily emphasise Know-Your-Customer (KYC) processes, are struggling to keep pace.

Fraudsters have learned to exploit the inherent delays in standard KYC processes. They use AI to generate synthetic identities and automate infiltration techniques at an unprecedented scale. By the time most verification processes kick in, significant resources have already been spent, and potential damage has been incurred. To gain the upper hand, companies must move beyond isolated identity checks and adopt a more integrated approach. This combines pre-KYC detection with advanced KYC verification. A dual-layered defence system that’s both proactive and agile enough to adapt to the evolving threat landscape.

Introducing Pre-KYC fraud detection

Since KYC processes are essential for businesses to meet regulatory requirements and maintain compliance, the solution isn’t to abandon KYC but to transform it. Organisations must adopt a pre-KYC detection layer that detects fraud before it reaches verification processes.

What does this look like in practice? It starts by analysing a user’s digital footprint. This includes key data points, such as the age of an email address, phone number history, IP address patterns and social media activity. These indicators help assess the authenticity of a user’s identity. For example, a newly created email or an IP address associated with a known VPN service can be red flags, signalling possible fraudulent intentions and enabling businesses to proactively intervene before harm occurs.

Device intelligence further strengthens the initial stages of pre-KYC user verification. This technology detects discrepancies in device integrity, such as emulators, proxies or device spoofing techniques. These are common tactics fraudsters employ to conceal their true identities. Advanced device fingerprinting tools are critical in identifying when a device’s profile does not match its user’s provided details or shows unusual behaviour, adding an extra layer of security.

Adding to this framework, behavioural analytics play a pivotal role by monitoring how users interact with platforms. Analysing navigation patterns, session durations and behaviours during account setup can expose irregularities that suggest fraudulent activities. Indicators such as repetitive account creation attempts with varied data points or abnormally quick typing and navigation speeds often point to bot-driven fraud. This provides businesses with opportunities to intervene early in the user engagement process.

Combining Pre-KYC Technology with traditional methods

While pre-KYC tools can identify potential threats early, KYC verification remains essential for ensuring that the users who pass initial screening are legitimate. Once a user reaches this stage, robust identity verification methods must be in place to confirm the authenticity of the individual’s information.

Modern KYC processes must combine several features: document verification, biometric checks and address verification. The first, document verification, involves using optical character recognition (OCR) and machine learning to scan government-issued IDs and detect forgeries in real time. Additional security in this realm can be attained via facial comparisons – matching a user’s selfie with the photo on their ID – to ensure that the person behind the camera is the same as the one in the presented documentation.

Next, advanced liveness detection aids in combating both deepfake technology and image-based fraud – two fraud vectors on the rise. By requiring users to perform specific actions or gestures during verification processes, liveness detection ensures that fraudsters can’t simply upload a static image or video to impersonate someone. Lastly, address verification provides further protection, confirming a user’s address against authoritative databases or recent utility bills. These checks are crucial for businesses in regulated industries, where proof of residency is often a compliance requirement.

The growing threat of AI-powered fraud

Now that fraudsters can access AI tools, the fraud game has entirely changed. Bad actors can generate synthetic identities, manipulate biometric data and even create deepfake videos to pass KYC processes. Additionally, AI enables fraudsters to test security systems at scale, quickly iterating and adapting methods based on system responses.

In light of these new threats, businesses need dynamic solutions that can learn and evolve in real time. Ironically, the same technology serving sophisticated fraud can be our most potent defence. Using AI to enhance both pre-KYC and KYC processes delivers the capability to identify complex fraud patterns, adapting faster than human-driven systems ever could. These AI-powered tools don’t just detect fraud – they predict and prevent it by continuously learning from each attempted breach.

At the pre-KYC stage, machine learning (ML) algorithms can identify patterns and anomalies across vast amounts of user data, providing more accurate and faster risk assessments. As fraudsters evolve, these systems can recognise emerging fraud patterns, preventing bad actors from bypassing security.

Similarly, AI-driven verification methods can detect increasingly sophisticated forgeries and manipulations in the KYC phase. At the same time, adaptive authentication systems can increase or decrease the level of verification required based on the user’s risk profile. This flexibility strengthens security and enhances the user experience by reducing friction for legitimate users.

The stakes are set to climb

The battle against AI-empowered fraud isn’t just about preventing financial losses. It’s about maintaining customer trust in an increasingly sceptical digital marketplace. Every fraudulent transaction erodes confidence, and that’s a cost too high to bear in today’s competitive landscape.

Businesses that take a multi-layered approach, integrating pre-KYC and KYC processes in a unified fraud prevention strategy, can stake one step ahead of fraudsters. The key is ensuring that fraud prevention tools – data-rich, AI-driven and flexible – are as adaptive as the threats they are designed to stop. The future of fraud prevention isn’t about building higher walls; it’s about creating smarter, more adaptive and intelligent systems to anticipate and neutralise threats before they materialise.

  • Cybersecurity in FinTech

Ayre Group founder Calvin Ayre stresses the power of Blockchain in helping to overcome security and transparency challenges in financial data

The financial services sector is built on trust. However, ongoing data breaches, security vulnerabilities, and inefficiencies have severely eroded confidence in the industry. In the past five years alone, 69% of financial institutions have experienced at least one data breach, exposing the sector’s ongoing Cybersecurity challenges.

Financial institutions handle vast amounts of sensitive customer data, including personal identification details, transaction histories, and confidential records. All of which are prime targets for sophisticated cyber criminals. Furthermore, in exploiting weaknesses in legacy systems, third-party integrations, and cloud infrastructures, attackers gain unauthorised access, manipulate data, and compromise financial integrity.

Leveraging Blockchain technology

Recently, studies have been testing and trialling data breach detection systems that leverage Blockchain technology. This includes utilising smart contracts, self-executing agreements with predefined rules, to generate alert notifiers. These studies underscore the potential of Blockchain to enhance the speed and accuracy of data breach detection. Improvements from the standard 200+ days can be made up to as little as 10 seconds.

However, external threats are only part of the problem. Internal risks such as human error, data mismanagement, and outdated compliance frameworks further exacerbate data integrity issues. Nearly a third (28%) of financial service organisations cite mistakes from manual processes as their biggest data reconciliation pain point. Another key issue is the continued reliance on legacy systems, which lack the automation, security, and scalability required to maintain accurate and tamper-proof records. This highlights the growing need to restore confidence in financial data.

These ongoing challenges have far-reaching consequences. Alarmingly, 40% of CFOs express doubts about the accuracy of their financial records. This raises serious concerns about governance, regulatory compliance, and financial stability. Insider fraud, unauthorised transactions, and data manipulation remain major risks; calling for institutions to implement immutable systems. One such solution is Blockchain technology. As a decentralised ledger that guarantees data integrity, Blockchain can play a crucial role in enhancing the reliability of data.

Many institutions hesitate to adopt new technologies due to high costs and operational disruption. A report by Duco and the Financial Technologies Forum revealed that 64% of financial institutions perceive the transformation of manual processes as too expensive or time-consuming. But Blockchain technology presents a new era of data resilience that. It can address these challenges head-on, enhancing security, and restoring trust in financial data.

Restoring resilience with the power of Blockchain

One of the most powerful features of Blockchain is its ability to create immutable records. Every transaction is securely logged, forming transparent and tamper-proof audit trails. By enabling real-time auditing and decentralised verification, Blockchain reduces the risks associated with human error, fraud, and outdated systems.

BSV Blockchain, with its focus on scalability and low-cost transactions, enhances these benefits by enabling high-volume data processing on-chain. It makes real-time auditing more efficient and cost-effective. Additionally, its data provenance capabilities allow institutions to track the origin, history, and any modifications of every data entry. Moreover, it offers complete accuracy, ensuring the creation of auditable and reliable records that help to eliminate discrepancies. This can also minimise information asymmetry across the financial ecosystem.

Accurate risk assessment is the cornerstone of financial services. Investors and institutions need reliable data to evaluate risk levels in specific markets and positions. Blockchain enhances this process by providing trustworthy data that can be verified and traced back to its source. It also reduces information asymmetry by ensuring wide accessibility to high-quality data. These features boost efficiency, making markets work more effectively and enabling money to flow to investments that are correctly priced according to their risk. Furthermore, because the data is always available and immutable, it allows for quick risk assessments. This helps individuals respond faster to market changes.

Blockchain also has the ability to revolutionise credit ratings, making assessments more transparent, automated, and fair. Further ensuring businesses and individuals gain more equitable access to financial services. Traditionally, credit assessments have been opaque, slow, and prone to biases. Blockchain enables automated credit scoring using real-time data and self-executing smart contracts. This approach can provide a more accurate and unbiased measure of creditworthiness.

For example, companies like Lendoit leverage blockchain-based platforms that use decentralised credit ratings to offer fairer access to financial services. This especially benefits individuals and businesses traditionally underserved by standard credit systems.

A new era of trust and efficiency in financial services

Financial institutions face an increase in sophisticated cyber threats and the challenge of managing vast data volumes. Adopting Blockchain-based solutions will be essential for long-term sustainability. With immutable records, real-time reconciliation, and automated auditing, the financial sector can reduce risks, lower operational costs, and rebuild trust among investors, regulators, and consumers. The adoption of Blockchain will be crucial in addressing the data integrity challenges highlighted earlier, helping to restore confidence in the industry.

By embracing Blockchain, financial institutions can future proof their operations. This can foster greater financial inclusion, and redefine trust in the financial ecosystem. Those who adopt these advancements will not only strengthen their competitive position but will also help shape a new era of transparency, security, and innovation in global financial markets.

For more Blockchain insights from Calvin Ayre visit Ayre Group

  • Blockchain & Crypto
  • Cybersecurity in FinTech

AccessPay CEO Anish Kapoor examines the positive impact of DORA on the digital payments industry

The EU’s Digital Operational Resilience Act (DORA) is a positive step for the payments industry and will help boost the resilience of an ecosystem that has changed radically over the last twenty years. Even so, the implications of this landmark regulation for payment service providers (PSPs) are complex and far-reaching. It will require investment in processes and infrastructure, which must also factor in the ongoing shift to real-time payments.

The technology backstory

Two decades ago, payment technology predominantly referred to back-end systems used by banks and PSPs to process electronic transactions. Online banking was still in its infancy, the smartphone hadn’t yet been launched, and traditional payment methods such as cash and cheques were much more prevalent.  

Today, it is a very different story. The number of electronic payments made via cards and digital wallets, credit transfers and direct debits has exploded. Technology is front and centre in payment service delivery, as individuals and businesses use online portals and mobile apps to manage accounts and initiate payments. While the rise of real-time payments, such as the EU’s SEPA Instant Credit Transfer (SCT Inst), means an increasing proportion of bank transfers are settled instantly rather than over several working days, which also means that anti-fraud measures and other compliance checks have to take place in real-time given the heightened fraud risk.

So, if there is a technological failure at any point in this new world of payments, it can have immediate and considerable ramifications for individuals and businesses. The now-infamous CrowdStrike outage in July 2024 affected several sectors, including banking, with some PSPs unable to process payments. More recently, an hours-long glitch at Bank of Ireland in December 2024 caused delays in processing payroll transactions for some employers, while a two-day outage at Barclays in February 2025  left customers unable to make bank transfers and use their debit cards. To catch up, Barclays had to process payments over the weekend and extend call centre operating hours.  

DORA’s goals

DORA aims to make the EU’s financial institutions (FIs) more resilient to information and communication technology (ICT) risks. It will minimise the potential for IT outages and require FIs to be back online as quickly as possible when they do occur. From a practical perspective, it will oblige them to create and implement ICT risk management frameworks. And meet new requirements for resilience testing, outage reporting, and information sharing.

Of course, the advent of DORA adds to the compliance burden for FIs, who will partly be spurred to comply to avoid fines for non-compliance and the associated negative press. Still, its rollout should be seen as positive for the industry. It should help to improve resilience across the ecosystem and boost customer confidence in the sector.

Improving infrastructure resilience with DORA

One angle that is less widely discussed when it comes to DORA is its implications for a PSP’s infrastructure. Whether developed in-house or outsourced, payment systems will need to have the capacity to accommodate peak loads following any outage. This will require PSPs to scale by multiples of their standard throughput.

For example, if a PSP’s average processing volume is 1,000 transactions per hour and its systems are down for three hours, it will need to have the capacity to process those 3,000 outstanding transactions once service resumes. And without impacting new transactions coming through the system. Additionally, if they are real-time payments, the delayed transactions must be settled as soon as possible. In this hypothetical example, such an outage would mean the system needs to handle 4,000 transactions in one hour, four times its usual capacity.

This requirement to recover quickly from IT outages will necessitate additional investment in infrastructure and automation. Especially given the move towards real-time settlement. In particular, it will likely drive interest in cloud-native technology, which can scale more readily on demand.

Third-party vendor relationships

DORA will also significantly impact how PSPs manage third-party IT vendor relationships. This development has been driven by the growing complexity of the financial ecosystem in the wake of digitisation and the rise of open banking. Research from McKinsey Digital highlights how the growth in the number of apps and vendors has increased the complexity and pressure on IT leaders.  

Under DORA, FIs are expected to monitor third-party providers, update supplier contracts to cover IT resilience, and establish an oversight framework for critical third-party providers. Consequently, conducting due diligence on third-party providers, particularly new vendors, and their approach to resilience is essential. Generally, we are likely to witness a flight to quality, with the providers that invest in controls and resilience set to fare best in the long term.

Adjusting to DORA

The arrival of DORA is a positive development for the payments industry. The sector has changed significantly in recent decades and relies heavily on technology for service delivery. Likewise, its customers depend on the PSPs to deliver their services so that they can conduct their business uninterrupted. However, the changes required by DORA are extensive and will require PSPs to invest in their infrastructure, processes and third-party relationships. As they adjust to the requirements of DORA, PSPs should ensure that infrastructure is resilient and flexible enough to handle surges in transaction flows. And factor in the shift to real-time settlement, which will only add to the demands made of payment systems.

  • Cybersecurity in FinTech
  • Digital Payments

Sejal Mehta, Karen Chiew, and Andrew Rodgers from Odgers Berndtson’s Global FinTech Centre of Excellence, look at five FinTech trends and how they will influence leadership hiring and assessment in 2025

In 2024, the UK FinTech sector experienced a significant surge in hiring, reflecting the industry’s robust growth and investor confidence. From January to April 2024, FinTech job vacancies increased by 61% year-on-year, with technology roles, particularly in development and engineering, leading this expansion.

Alongside this growth, we’re seeing a gradual blurring of boundaries between traditional finance, decentralised finance (DeFi), and technology. Moreover, this convergence is most evident at the executive leadership level. Here, movement between these sectors is becoming increasingly common – propelled by regulatory shifts and evolving global politics.

In light of these trends, here’s a look at the types of leaders UK FinTech firms are likely to prioritise in 2025…

Bridge Builders between Digital and Traditional Finance

The UK is pressing ahead with development in digital payments, including blockchain applications and Central Bank Digital Currencies (CBDCs). This signals growth in investments in digital asset companies. This aligns with the broader global trend, notably the pro-crypto stance of the new Trump administration.

We’re already seeing an uptick in DeFi players asking for professionals from established finance and banking backgrounds who can bridge traditional and digital asset knowledge. In particular, we anticipate demand for leaders who are adept in risk management, compliance, and client services. Those who can demonstrate the ability to navigate the complexities of digital assets.

As digital currencies and CBDCs open new possibilities in financial products, demand is rising for leaders in product development. Those who can design, test, and implement digital payment solutions that appeal to both institutional and retail users. Leaders who are agile and can thrive in an environment of ambiguity will be especially valuable in serving the overlapping needs of these different customers. 

Hyper-Personalised Financial Specialists driven by AI

FinTech is rapidly leveraging AI to pivot toward autonomous financial and predictive insights. In 2025, this will lead to the growth of hyper-personalised financial products and enhanced risk management.

To capitalise on the opportunities of this developing technology, FinTech companies will look for leaders with established capabilities in data analytics and AI. Particularly those who can drive data-informed strategies, emphasising efficiency and scalability.

Crucially, the growth of autonomous finance means FinTech firms will face significant demands on their data infrastructure and processing power. Furthermore, leadership expertise in cloud computing, AI architecture, and data scalability will be key as firms navigate these technical challenges.

Cybersecurity Leaders with Deep Specialisms

In 2025, cybersecurity leadership hiring in FinTech will emphasise specific skills beyond traditional cybersecurity. This is due to heightened regulatory scrutiny and evolving digital threats. With the rapid growth in digital payments, cryptoassets, and autonomous finance, we anticipate FinTech firms to prioritise leaders with expertise in digital identity verification to prevent unauthorised access and protect consumer data across platforms.

As transaction volumes rise, transaction security leaders who can oversee real-time monitoring, anomaly detection, and encryption protocols will become essential to safeguard against data breaches and financial losses. Likewise, fraud detection capabilities and leveraging AI and machine learning will be a key focus in cybersecurity leadership roles. These will proactively identify and mitigate fraud risks, especially with the increasing adoption of open finance and decentralised finance solutions.

Highly Adaptable Regulatory Leaders

Multiple regulatory developments affecting FinTech companies will come into effect in 2025. These include cryptoassets, cyber security, Buy Now Pay Later (BNPL) services, open finance, and enhanced safeguarding for payments and e-money firms. Moreover, these changes will introduce stricter compliance requirements, aiming to improve transparency, consumer protection, and resilience within the FinTech sector.

Additionally, we expect the recently published UK National Payments Vision, APP Fraud guidelines and Financial Promotions to drive payments and FinTech companies to seek leaders with expertise in compliance, cybersecurity, and risk management. As firms navigate stricter rules, demand will increase for executives who can build robust frameworks for regulatory compliance, safeguard digital assets, and ensure consumer protection. Leaders with experience in adapting to regulatory shifts, particularly in highly regulated sectors, will be essential to manage these new obligations efficiently.

This need for specialised knowledge will intensify competition for talent with both technical and strategic regulatory expertise. Making digital regulatory acumen a critical asset for leadership roles in FinTech.

Customer-Centric Innovators to Build Seamless Experiences

FinTech companies are prioritising leaders capable of harnessing Banking-as-a-Service (BaaS) to innovate in customer experience and streamline cross-sector collaborations. As BaaS becomes a cornerstone of FinTech innovation, firms will seek executives who are adept at using this model to create seamless, customer-centric solutions that simplify interactions and integrate financial services more deeply into everyday life.

This shift reflects a clear message from the industry: customer experience is no longer a single department’s responsibility; every leader is expected to bring a customer-first approach to the table.

Leaders who can foster strategic collaborations across sectors – such as retail, healthcare, and technology – will be valued, as these partnerships drive BaaS innovations that embed financial services within various digital ecosystems. Consequently, the demand for leaders with a balance of technical insight, strategic partnership skills, and a strong customer-focused ethos will shape hiring trends, with companies competing for leaders who can bridge the gap between FinTech capabilities and elevated, customer-centred experiences.

Shaping the Future: Agility and Insight in FinTech Leadership

As FinTech technologies and sectors continue to merge, FinTech leaders must demonstrate learning agility. Their ability to adapt past experience to new contexts will be crucial to their leadership effectiveness.  

Equally important will be their curiosity in understanding the evolving landscape. And their interpersonal savvy in navigating relationships with diverse stakeholders – both of which will significantly influence their impact in the FinTech space.

The most effective way to identify leaders with these capabilities is through leadership team competency profiling. This approach offers data-driven insights into team composition and critical skill gaps, aligning leadership competencies with the specific strategic objectives of the FinTech firm. By tailoring this process to the firm’s current phase of growth, FinTech companies can ensure they have the right leaders to successfully navigate the challenges of a highly disruptive market.

  • Blockchain & Crypto
  • Cybersecurity in FinTech
  • Digital Payments

Ben Hunter, Senior Director of Financial Services at Gigamon, on the impact of the Digital Operational Resilience Act (DORA) and what financial institutions can do to ensure lasting compliance

The Digital Operational Resilience Act (DORA) came into force on January 17th. It’s high time for financial institutions to refine their compliance and Cybersecurity efforts. This regulation isn’t just another box-ticking exercise. It represents a shift in the financial services industry that touches everyone in the ecosystem. And every corner of the organisations within it. From IT teams to the board, every department must pull together under a cohesive cyber strategy to meet the challenge. It’s not simply about systems and software. DORA demands a cultural shift toward organisation-wide cyber resilience.

At this stage, the big changes should already be in place. However, the focus now must be on the finer details. The overlooked pieces that could potentially make or break compliance and prove extremely costly. Organisations must tweak processes and ensure every element of their plan works seamlessly and aligns with the broader goal of operational resilience. Here are three areas of focus to perfect preparedness and ensure DORA compliance is not just a box checked but a new standard embraced by the whole organisation.

Criticality of third-party Cybersecurity management

One of DORA’s requirements is reducing reliance on single ICT service providers. This is designed to safeguard financial institutions against concentrated risk. By now, all structural changes should already be in place, with organisations diversifying their ICT providers. Or improving internal capabilities to reduce their external dependencies. However, compliance doesn’t end with restructuring. The focus must now shift from restructuring to managing these relationships effectively. Organisations should be looking to perfect their third-party risk assessment, monitoring, and due diligence strategies. They must ensure their processes for vetting ICT service providers are not just in place but are meticulously detailed. Contracts need to leave no room for ambiguity, with explicit terms outlining providers’ security and risk management strategies. These agreements must be revisited and stress-tested to confirm they align with DORA’s standards.

Equally critical is ironing out the specifics of ongoing monitoring and oversight. Institutions should be finalising the structure and frequency of their performance reviews and audits. Ensuring these mechanisms are robust enough to identify and address any emerging vulnerabilities. Moreover, by focusing on the details now, organisations can build a resilient operational framework that doesn’t just meet DORA’s requirements but builds resilience into their core operations for years to come.

Global efficiency through multi-cloud environments

Adopting a multi-cloud strategy has become essential for financial institutions operating on a global scale. It mitigates concentrated risk by avoiding dependence on a single provider and allows organisations to address the unique regulatory and operational challenges of different regions. However, the complexity of multi-cloud environments brings its own challenges. Particularly in ensuring the visibility and control required under DORA. This is why it’s crucial for organisations and their third parties to refine the tools and processes that support this level of visibility and allow the security teams to continuously monitor their environments.

According to recent data, 50% of CISOs say their confidence in risk management hinges on having full visibility into all data in motion, including encrypted and lateral traffic across both on-premises and cloud environments. This underscores the importance of advanced monitoring capabilities to effectively manage the complexities of multi-cloud infrastructures. While DORA mandates comprehensive visibility, the benefits go beyond just meeting compliance requirements. Deep observability strengthens organisations’ ability to detect vulnerabilities in real-time, ensuring seamless operations across regions and providers, and service continuity. For multi-cloud strategies to be effective, they must be paired with the right network-level monitoring capabilities. It’s important to build resilience from the inside out.

Organisational alignment to demonstrate Cybersecurity compliance

Demonstrating compliance isn’t just about avoiding fines and ticking regulatory boxes. It’s about preserving trust and protecting the organisation’s reputation. Reputational damage and financial penalties hit the top of the organisation hardest. This makes board-level engagement essential to ensuring Cybersecurity efforts are prioritised and aligned with broader business objectives. Boards must recognise that Cybersecurity is not a siloed function; it’s a key aspect of business resilience.

While security leaders are responsible for designing and implementing security strategies, their ability to deliver is directly tied to the board’s involvement. Board members control the decisions that shape an organisation’s Cybersecurity posture, from budget allocation to strategic priorities. Without their active engagement, security leaders may lack the resources, influence, or organisational buy-in necessary to implement comprehensive security measures. This can lead to significant gaps in compliance efforts and overall resilience.

To demonstrate compliance effectively, organisations need a unified approach to gathering, standardising, and presenting evidence to regulatory authorities. This includes aligning on consistent formats for documenting key areas like risk assessments, incident management, security testing, and third-party oversight. By finalising internal policies and leveraging automation tools, institutions can ensure their compliance evidence is regulator-ready and accessible. Such coordination not only satisfies DORA’s demands but also signals a strong, unified commitment to operational resilience. One that must come from the top and ripple throughout the entire organisation.

With penalties for non-compliance reaching up to 2% of global annual turnover, financial institutions cannot afford to be anything less than fully aligned on their compliance strategies going forward. Furthermore, as the broader compliance frameworks are now finalised, the focus must shift to perfecting the finer details that will ensure long-term resilience and success.

About Gigamon

Gigamon offers a deep observability pipeline that efficiently delivers network-derived intelligence and insights to your cloud, security, and observability tools. This eliminates security blind spots, optimises network traffic and reduces tool costs. Therefore, enabling you to better secure and manage your hybrid cloud infrastructure.

  • Cybersecurity in FinTech

Bharat Mistry, Director – Product Management at Trend Micro, on why attack surfaces are more difficult to mange than ever and the need for greater Cybersecurity controls to tackle the problem

Some surprising news emerged in mid-December. A Freedom of Information request sent to the Financial Conduct Authority (FCA) revealed that the number of c

Cybersecurity attacks reported to the regulator by large financial institutions fell 53% from the previous year. Reported data breaches also fell, by 29%. While welcome news, there are some big caveats.

The fall in reports could signify attacks are getting more sophisticated and harder to spot. The reporting periods also didn’t quite align, meaning two-and-a-half months of possible regulatory reports weren’t included in 2024’s figures. In fact, we’re seeing attacks and breaches at financial services industry (FSI) firms surging. In line with these organisations ramping up investment in digital transformation and IT modernisation projects.

Threat actors are grasping the opportunity with both hands. To keep them at bay, IT and cybersecurity leaders in the sector may need to rethink their approach to cyber risk management.

Cybersecurity controls are urgently required

Digital transformation is on an inexorable path. Driven by customer demand for seamless cross-channel experiences, and the quest for more streamlined business processes and productivity gains. Cloud adoption, mobile and app-centric services, remote workforces, and expansive supply chains are the result. However, this rapid change comes at a price. Research warns that half (49%) of global FSI leaders believe their attack surface is spiralling out of control.

Put simply, the ‘attack surface’ is the total expanse of all the IT and OT systems in a business that could theoretically be hacked. It includes everything from on-premises desktops and servers to cloud containers and even employees. Vulnerabilities and misconfigurations across these systems and services are inevitable. And the more assets there are, the more chance there is that a determined threat actor will find a weakness. This allows them to compromise the corporate network or a critical cloud account.

Heeding the warning

The likelihood of them doing so is increasing all the time. Not just because the typical FSI attack surface is increasing, but also because cybercriminals and nation-state operatives are getting better at using AI to their advantage. The National Cyber Security Centre (NCSC) warned back in January 2024 that AI “will almost certainly increase the volume and heighten the impact of cyber-attacks over the next two years”. It’s right. Generative AI in particular lowers the bar for budding threat actors by enabling them to create highly effective social engineering campaigns. And perform reconnaissance at scale to find weaknesses in organisations’ attack surfaces. In some cases, these weaknesses may exist in AI tools brought in by workers themselves. One report claims over a third of firms are struggling with shadow AI.

Our adversaries are also aided by the sheer complexity and interconnectivity of modern digital environments. APIs, microservices and third-party integrations -including frequently buggy or downright malicious open source components – expand the attack surface yet further.

Why it’s time for change

Managing risk across these environments should be a priority for obvious financial and reputational reasons. Open Banking rules and the growth of FinTech have made it easier for dissatisfied customers to jump ship. Furthermore, providing more options for those looking for a new provider. A serious breach could be the catalyst for a mass exodus. It’s also expensive in other ways. FSI is the second-top sector overall in terms of the average cost of a data breach. This is estimated to be over $6m per incident, assuming no more than 113,000 records are compromised.

However, there’s increasingly a regulatory imperative for FSI firms to rethink their Cybersecurity strategy. Any operating in the EU now has to comply with a rigorous new set of requirements in the EU Digital Operational Resilience Act (DORA). From January 1, 2025, those in the UK deemed to be critical third parties (CTPs) will be required to put in place a number of “technology and cyber risk management and operational resilience measures”.

A new mindset

So what does this mean in practice? Modern technology environments are dynamic, with new assets appearing and disappearing. Furthermore, new vulnerabilities are emerging and fresh misconfigurations surfacing on a daily or even hourly basis. Managing risk across this vast, incredibly volatile and highly distributed environment requires a new approach. Traditional perimeter defences are no longer sufficient.

Instead, FSI firms need continuous monitoring of risk across their entire attack surface. From endpoints and networks to servers and cloud workloads. Ideally, such a platform will flag areas of concern and either suggest improvements or automatically remediate. It could be something as simple as changing an insecure password, or patching a critical vulnerability newly published by a key vendor. This is the way to build resilience for the long term.

But there’s more. Some threats will always sneak through corporate defences. That’s why it’s also vital to expand security operations capabilities with AI-driven analytics and cross-layer detection and response (XDR). The goal is to correlate threat data across multiple layers and automatically prioritise alerts for stretched analyst teams. Robust incident response processes are also key here, to ensure no time is wasted in containing the threat and minimising any damage caused.

More broadly, it’s about fostering a culture of cyber resilience. Continuous improvement, proactive defence, and a willingness to adapt are ingrained in the corporate mindset. More Cybersecurity regulations are promised by the government in 2025. The clock’s ticking.

  • Cybersecurity in FinTech

Industry thought leaders from Marqeta, the global modern card issuing platform, offer a detailed outlook of the fintech industry for 2025, with predictions around personalisation, digitalisation and the evolving regulatory landscape

Payments will turn fully personal, with tailored credit, rewards, and BNPL at scale in 2025

In my opinion, a major global payment trend of 2024 has been hyper-personalisation. A new generation of customers is driving a shift toward personalisation at scale, expecting their FinTech services to be unique and tailored to individual needs. Modern consumers want a future where financial services integrate seamlessly into their digital lives and keep pace with their evolving needs. 

As a result, we are seeing trends, such as personalised credit offerings and rewards booming. In an industry with increasingly low consumer loyalty, brands and financial institutions must go beyond traditional interactions with FinTech. For example, the recent Marqeta State of Credit report found that of UK consumers who use more than one credit card, 43% confirmed that they would use a credit card more frequently if better rewards were offered. By moving to a dynamic, rather than set rewards structure, consumers can earn benefits tailored to their spending habits and preferences in real time. 

Increasingly with innovations like Buy Now Pay Later (BNPL), consumers are guided to credit options specifically suited to them and their needs. In 2025, we will increasingly see personalised BNPL payment plan options being offered in real time. Often within existing payment apps and products we already use daily. We are also seeing B2B payments emerging as a strong trend. Ensuring gig workers, sellers and partners get paid efficiently while offering robust expense management and financing. I anticipate we’ll see more demand for innovative B2B payment solutions that enable seamless money management across 2025.    

Marcin Glogowski, SVP Managing Director for Europe and UK CEO

2025 will be a year of rapid innovation in financial services  

In today’s digital-first world, traditional payment infrastructure is no longer enough to keep up with the demands of consumers. The front door of a bank is now an app, digital wallet usage is increasing. New, flexible services have a growing prevalence on the market. In 2025 and beyond, customers will continue to drive a shift toward modern services which keep up with the rate of digital and mobile innovation.

The ramifications of changing consumer trends could lead to the traditional roles of banks, such as ATMs and as physical branches, disappearing. To ensure continued customer loyalty, all financial service providers will be forced to innovate and offer consumers the embedded, seamless and instantaneous services that they desire. 

Consequently, across 2025, we are likely to see new technology and solutions being offered to reduce unnecessary friction for consumers trying to pay and get paid. We are already seeing increased demand for Accelerated Wage Access (AWA). A Marqeta study shows that 74% of gig workers ages 18-34 would be interested in an employer who offered an option to get paid immediately. As businesses and workers grow tired of cash flow restrictions and having to wait for monthly pay slips in an otherwise instant, digital world. As new services evolve, competition in Fintech will be enhanced and the financial industry will be forced to grow and evolve. 

Nicholas Holt, Head of Solutions and Delivery, Europe

Proactive compliance strategies will lay the foundation for fintech in 2025

With banking and FinTech partnerships under increasing regulatory scrutiny, the stakes around compliance have never been higher. In this environment, Fintechs can no longer afford a reactive approach to compliance. Instead, they should adopt proactive compliance strategies that go beyond simply seeking to avoid fines and that are embedded into the everyday makeup of their culture and product strategies, helping to build trust, ensure stability, and foster sustainable growth. 

At Marqeta, we’re committed to embedding compliance into our company’s culture, helping to mitigate risks and create a foundation for long-term success for us and our customers. Proactive compliance strategies allow organisations to leverage advanced tools and position themselves to adapt to shifting regulatory demands while showcasing a genuine commitment to transparency. 

Alan Carlisle, Chief Compliance Officer

  • Cybersecurity in FinTech
  • InsurTech

Martin Greenfield, CEO of Quod Orbis, on a troubling paradox within the cybersecurity landscape: despite substantial investments in security infrastructure, confidence levels and actual capabilities remain worryingly misaligned.

Financial institutions face concrete regulatory pressure on Cybersecurity with the European Union’s Digital Operational Resilience Act (DORA) coming into force in February. This landmark regulation demands robust ICT risk management and comprehensive security monitoring. Currently, many organisations continue to rely on disparate tools and spreadsheets that may leave them vulnerable to sophisticated threats. These include AI-powered deep fakes and targeted spear phishing campaigns.

This challenge transcends the financial sector as organisations across all industries face mounting pressure to demonstrate both security effectiveness and regulatory compliance. Our research reveals a stark reality. Organisations typically maintain an average of 19 security solutions per team. However, a surprising 41% still cite insufficient technology as the primary obstacle to maintaining a robust security posture.

This misalignment points to a fundamental issue. Organisations must recognise effective cybersecurity isn’t achieved through quantity of tools, but through strategic selection of the right solutions. Furthermore, perhaps most concerning is the false sense of security prevalent among IT decision-makers. While 93% express confidence in their infrastructure visibility tools, an alarming 95% acknowledge difficulties in accessing specific digital assets over the past year. This creates dangerous blind spots leaving organisations exposed to both security breaches and compliance shortfalls.

Understanding the Cybersecurity challenge

Today’s enterprise infrastructure resembles a tapestry of critical assets, connections and endpoints. To put this complexity into perspective: IT teams now manage an average of 31 endpoints per person across their organisation. For a company of 1,000 employees, this translates to more than 30,000 devices requiring constant monitoring and protection. This challenge intensifies with the widespread adoption of cloud services, hybrid working arrangements and an ever-growing ecosystem of connected devices.

Scale amplifies these difficulties markedly. Our research reveals organisations with more than 1,250 employees demonstrate the lowest confidence in their existing tools (88%) and face the greatest challenges in accessing critical assets (97%). Moreover, these larger enterprises typically wrestle with an unwieldy combination of legacy systems, bespoke solutions and modern platforms. This results in notably lower visibility rates (79%) compared to their smaller counterparts.

Perhaps most revealing is the stark confidence gap between technical and compliance teams. While 94% of information security directors express confidence in their system visibility, merely 66% of compliance directors share this outlook. This disparity exposes a crucial misalignment between technical capabilities and compliance requirements. One that poses serious operational risks as regulatory frameworks increasingly demand continuous monitoring. Organisations clinging to manual compliance processes face an unstable burden. Teams are stretched thin handling routine tasks while regulations grow more complex. Embracing automated technologies to handle routine monitoring requirements will allow compliance teams to pivot from being reactive box-checkers to strategic risk managers.

Moving from reaction to prevention

The impulse to combat emerging threats by rapidly acquiring new security solutions has led many organisations to create sprawling, inefficient systems. These often compound the very problems they aim to solve.

This reactive approach has trapped organisations in a costly cycle of diminishing returns. Despite substantial technology investments, nearly 40% of firms report a troubling lack of actionable intelligence, while 37% struggle with budget limitations. This paradox is increasingly drawing board-level scrutiny. And rightfully so. After years of approving emergency technology purchases to plug cybersecurity gaps, boards are now questioning the value of new investments. Furthermore, tthis creates a dangerous stalemate: organisations need smarter, not just more, technology investment.

However, a more strategic approach is gaining traction through integrated system monitoring platforms. These comprehensive solutions unite previously disconnected tools under a single dashboard. This can offer real-time visibility across the entire cybersecurity landscape. This unified approach enables teams to identify and address vulnerabilities before they evolve into security incidents. A capability that resonates with the 82% of organisations who recognise enhanced visibility would substantially strengthen their cybersecurity posture.

It’s encouraging that 72% of IT teams have secured increased budgets over the past three years. However, the path forward requires more than mere financial investment. Organisations must shift from reactive spending to strategic deployment. Although this presents its own challenge: convincing board members that additional tooling represents an investment in comprehensive visibility rather than merely plugging security gaps.

The path forward

The transformation from fragmented security to comprehensive oversight demands more than technological upgrades. It requires a fundamental reimagining of how organisations approach cybersecurity monitoring and compliance.

The advantages of this strategic shift are compelling and quantifiable. Our analysis reveals security teams anticipate multiple efficiency gains: 38% expect automation to streamline document creation, 37% foresee improved board pack preparation, and 36% anticipate dedicating more time to strategic security assessments. Perhaps most significantly, 35% predict a reduction in human error alongside enhanced data accuracy. The efficiency gains are substantial. Teams could reclaim up to 60 hours annually per member on board reporting alone, time better invested in strategic security initiatives.

With regulatory frameworks growing increasingly sophisticated across sectors, including the forthcoming DORA regulation, maintaining current practices is no longer viable. The disparity between perceived and actual security capabilities poses a tangible risk that organisations must address proactively.

About Quod Orbis

Quod Orbis is the single source of truth across security, risk and compliance, providing an orchestration layer for the entire tech stack whether in the cloud, on-premise, legacy or bespoke. Founded in 2018, Quod Orbis became part of Dedagroup, one of the leading Italian IT players, in 2024.

A pioneer in Continuous Controls Monitoring (CCM), Quod Orbis provides complete and constant visibility into a company’s cybersecurity, compliance and risk posture. Quod Orbis’ ability to connect with every piece of technology within a business, unrivalled automation capabilities and continual support enables the company to serve a global client base across a wide variety of industries.

  • Cybersecurity in FinTech

Bryan Daugherty, Global Public Policy Director at the BSV Association (BSVA) and Co-Founder at SmartLedger Solutions, on how blockchain technology provides the accountability and cybersecurity needed to prevent widespread IT catastrophes across sectors

By Embracing Blockchain, We Can Create a Safer Digital Future

The rapid increase in cyberattacks poses a severe threat to businesses. These attacks are becoming more sophisticated and costly by the day. The average cost of a data breach in the UK is £3.58 million, and in the US now $9 million. It typically takes 200 days for organisations to detect a breach, followed by another 70 days to contain it. These delays expose significant vulnerabilities in traditional data management systems. They rely heavily on third parties, making them prime targets for cybercriminals.

Blockchain technology offers a transformative solution to these challenges by creating a secure, decentralised model that can effectively mitigate risks. It provides an opportunity for both individuals and organisations to take control of their data. Therefore, improving cybersecurity and ensuring operational resilience.

The Problem with Centralised Systems

Traditional cybersecurity systems are built on centralised models, where data is stored in one location or through third-party intermediaries. This structure makes them attractive targets for cybercriminals, creating a “honeypot” of information that can be breached. A concerning statistic is that, for over a decade, organisations have taken an average of 200 days to detect breaches. Despite claims from cybersecurity vendors that they provide “instant detection,” real-world results show significant gaps in protection, putting data at risk for extended periods.

Blockchain: Game-Changing Cybersecurity Features

Blockchain’s decentralised model provides a powerful alternative. By distributing data across a global network of nodes rather than a central location, blockchain makes it exponentially harder for cybercriminals to compromise large datasets. Even if one node is breached, the entire system remains intact. This eliminates the single point of failure that centralised systems suffer from.

Another key feature of blockchain is its immutability. Once data is recorded on a blockchain, it cannot be altered or erased, making tampering nearly impossible. Therefore, this ensures any unauthorised access is immediately detectable, enabling quicker response times and minimising damage.

Real-Time Threat Detection with CERTIHASH

Blockchain’s potential in cybersecurity is already being realised through solutions like CERTIHASH’s Sentinel Node. A blockchain-based tool that provides real-time threat detection. Built on the BSV blockchain, CERTIHASH can detect breaches within 10 seconds or less, offering a proactive approach to cybersecurity. This is a significant improvement over traditional systems, which often take months to identify breaches, leaving organisations vulnerable to prolonged data exposure.

By leveraging blockchain, cybersecurity shifts from being reactive to proactive. This gives organisations the tools they need to stay ahead of evolving threats and safeguard data more effectively.

Overcoming Misconceptions About Blockchain

Despite the clear advantages of blockchain, many organisations remain hesitant to adopt the technology, often due to misconceptions. Furthermore, some still associate blockchain with cryptocurrencies like Bitcoin, which have been linked to ransomware. This outdated view overlooks blockchain’s real potential as a secure, decentralised data management tool.

Blockchain is not just about crypto; it’s about creating a new standard for data integrity and security. Moreover, it offers decentralised, tamper-proof records that give users control over their own identity and data, reducing reliance on vulnerable third-party systems.

A Decentralised, Secure Future

As global reliance on centralised systems grows, so do the vulnerabilities they present. A single point of failure can lead to widespread outages, as seen in numerous cyberattacks and technical malfunctions. Blockchain, with its decentralised architecture, offers a robust alternative that enhances the security and resilience of critical systems. By distributing data across multiple nodes, blockchain ensures continuity even during attacks or outages.

Conclusion

Investing in blockchain cybersecurity is no longer optional. With cyber-attacks growing in scale and sophistication, organisations must adopt cutting-edge technologies to protect their data, operations, and customer trust. Blockchain’s decentralised and tamper-proof architecture offers the key to building a safer, more secure digital future. One where businesses and individuals alike can operate with confidence, free from the constant threat of cybercrime.

  • Blockchain & Crypto
  • Cybersecurity in FinTech

Misplaced confidence in visibility tools leaves organisations vulnerable amidst record high data breaches, according to latest research

A new report from Quod Orbis highlights that 95% of businesses are at risk of a cybersecurity blindspot. A reported 93% of UK organisations have confidence in their system visibility. However, nearly all (95%) of them have struggled to access critical assets in the last year, according to the research.

Over a third (38%) actually rank lack of visibility as one of their biggest challenges, further highlighting the gap between respondents’ perceptions and the reality of their situation. This comes at a time when data breaches this year have already surpassed one billion stolen records.

Quod Orbis Cybersecurity Research

Martin Greenfield, Quod Orbis CEO, comments: “Businesses are suffering from a blind spot that’s leaving them exposed. Misplaced confidence in existing cybersecurity tools means these same organisations are susceptible to data breaches and non-compliance fallout. This results in potentially crippling financial and reputational consequences.”

Quod Orbis commissioned a research study with international research house, Censuswide, to poll 500 board executives and IT decision makers, across enterprises of 500+ employees in the UK.

Cybersecurity Tech Stacks

Cybersecurity tech stacks are growing exponentially in the face of rising threats. The average team manages 19 security solutions at any one time. However, 41% still report a lack of technology as being their biggest challenge when it comes to maintaining a robust cybersecurity posture.

As 72% of IT teams have had their IT budget increased in the past three years, Greenfield urges businesses to break free from the typical cycle of throwing money at a problem and hoping something sticks. “It’s not about the biggest investment, it’s about the right investment.”

A quarter (26%) of IT decision makers are yet to allocate budget to basic security tools like asset visibility technology. This is despite 40% reporting a lack of actionable data.

It’s clear though that businesses recognise the advantage of implementing the right technology. More than eight in 10 (82%) agree that greater visibility over digital assets will greatly improve business security. This is a huge leap from the 93% of respondents who believe their businesses already provide them with the necessary tools.

According to the data, most upcoming IT investments will be allocated to Continuous Controls Monitoring (32%), privileged and identity access management (30%) and zero trust (29%).

The Future

Greenfield concludes: “Digital infrastructure has reached a level of complexity that not only warrants, but demands, complete visibility. Now is not the time to gamble with your company’s security. Furthermore, organisations need to stop adding layers of unnecessary technology as a way of solving the immediate problem. Instead, they must take a step back and think holistically about how to resolve their issues.

“Tools like CCM, powered by automation, help teams see and understand their security and risk posture in real time. This offers peace of mind that all of their data is relevant and up to date. This level of insight provides early awareness of potential problems and empowers teams to take a proactive approach to security, instead of being forced back into the same reactive position they’ve been in for years.”

About Quod Orbis

Quod Orbis is the single source of truth across security, risk and compliance, providing an orchestration layer for the entire tech stack whether in the cloud, on-premise, legacy or bespoke. Founded in 2018, Quod Orbis became part of Dedagroup, one of the leading Italian IT players, in 2024.

A pioneer in Continuous Controls Monitoring (CCM), Quod Orbis provides complete and constant visibility into a company’s cybersecurity, compliance and risk posture. Quod Orbis’ ability to connect with every piece of technology within a business, unrivalled automation capabilities and continual support enables the company to serve a global client base across a wide variety of industries.

  • Cybersecurity in FinTech

Innovative Systems, a leading provider of enterprise data, compliance, and integration solutions, has launched FinScan Marketplace

The platform will serve as a one-stop shop for anti-money laundering (AML) compliance. It offers a streamlined approach to managing compliance risk and unified case management via a central hub for all related activities. FinScan Marketplace positions itself as a trusted partner for organisations navigating today’s complex, global regulatory landscape.

Removing the complexity of AML compliance

“Our goal with FinScan Marketplace is to remove the complexity of AML compliance. We bring everything organisations need into one unified platform,” said Deborah Overdeput, Chief Marketing Officer at Innovative Systems. “This launch reflects our commitment to delivering solutions that simplify processes. We empower compliance teams to work smarter, and ensure organisations remain vigilant. And fully aligned with evolving regulatory requirements in a rapidly changing landscape.”

FinScan Marketplace revolutionises how organisations manage their AML portfolio. It provides a single, easy-to-navigate interface. Customers can seamlessly access a comprehensive suite of tools. These include sanctions screening, KYC checks, adverse media screening, payment screening, and risk scoring, with additional features continually in development.

FinScan Marketplace

At the heart of FinScan Marketplace is its unified case management system. This integrates all critical AML processes into a cohesive workflow. From performing due diligence checks to monitoring transactions and investigating potential risks, customers can manage everything within a single platform. This integration saves time, reduces errors, and ensures compliance efforts remain seamless and effective.

FinScan Marketplace provides customers with a clear vision of the platform’s evolution. Its intuitive interface lets users view in-progress product developments, register interest in upcoming features. Furthermore, they can participate in design feedback sessions. This approach ensures future enhancements align closely with real-world compliance needs.

“We are not just delivering tools; we are creating partnerships with our customers by building solutions that adapt to their challenges,” Overdeput added. “Transparency and collaboration are key pillars of the FinScan Marketplace.”

Innovative Systems for AML

FinScan Marketplace reflects Innovative Systems’ dedication to becoming a trusted partner for a host of organisations. These include financial institutions, insurance companies, fintechs, casinos and gaming entities, charities and non-profits, government agencies, and other organisations it serves. By continuously delivering value, anticipating industry needs, and prioritising customers’ feedback in its development process, the company demonstrates its commitment to supporting effective and reliable AML compliance.

Innovative Systems delivers enterprise data, compliance, and integration solutions through the company’s leading FinScan®, Enlighten®, and PostLocate® brands. These solutions offer actionable insights and enable organizations to identify the hidden opportunities or risks in their data. We have pioneered best-in-class data quality, data management, and risk and compliance solutions in thousands of applications across more than 65 countries. Our cloud-based (SaaS), on-premise, and hybrid offerings deliver dramatic, measurable improvements in accuracy, cost, and time to production over alternatives. Learn more at innovativesystems.com

About FinScan


Trusted by hundreds of organisations worldwide, Innovative Systems, Inc.’s FinScan offers advanced Anti-Money Laundering (AML) compliance technology and consulting solutions. Built on decades of experience in data management and proprietary matching technologies, FinScan provides a data-first, risk-based approach to ensure unparalleled accuracy and efficiency in identifying and reducing risk, accelerating AML compliance workflows, and optimising team productivity. FinScan’s comprehensive, integrated platform includes Know Your Customer (KYC), unparalleled sanctions screening, risk scoring, data quality, and advisory services for implementing a holistic compliance program. FinScan offers flexible deployment including SaaS, on-premise, and hybrid options. FinScan’s SaaS clients are screening more than 300 billion names a year. Learn more at finscan.com


  • Cybersecurity in FinTech

Alex Mosher, Chief Revenue Officer at Armis, on why businesses are prioritising their cybersecurity budgets, ensuring they have the resources needed to counteract emerging threats

Cybersecurity is no longer optional. In 2025, we expect a significant uptick in overall spending. With threats becoming more sophisticated, organisations recognise the imperative to invest adequately in cybersecurity measures. This trend is driven by the growing awareness that the cost of a cyber-attack far outweighs the investment required to prevent it.


Shift Toward Comprehensive Cybersecurity Solutions

In 2025, there will be a marked shift toward comprehensive security solutions that offer integrated functionalities. Companies will increasingly seek platforms that provide threat detection, incident response, and compliance management within a single solution. This trend arises from the need to simplify security management and reduce complexity. Siloed solutions are ineffective, expensive and reduce the efficiency of security teams with finite resources. Furthermore, by consolidating various security functions into a unified platform, businesses can streamline their processes and enhance their overall security posture. Integrated solutions offer a holistic approach to cybersecurity, addressing multiple aspects of an organisation’s security needs. The move toward comprehensive solutions also reflects a broader understanding of the interconnectedness of cybersecurity elements. A unified solution that addresses multiple areas provides a more robust defence against potential breaches.

Emphasis on Automation and AI

Automation and artificial intelligence (AI) are revolutionising the cybersecurity landscape. Organisations increasingly prioritise spending on AI-driven security solutions to enhance threat detection and response capabilities. The focus will be on tools that streamline incident response, reduce manual workloads, and enable security teams to focus on more strategic initiatives. Moreover, the trend will also include spending on analytics tools that help organisations understand and mitigate risks based on the current threat landscape. Threat intelligence and analytics play a pivotal role in enhancing an organisation’s security posture.

AI technologies offer a proactive approach to cybersecurity, allowing organisations to identify and mitigate threats in real-time. By leveraging machine learning algorithms and data analytics, businesses can gain deeper insights into potential vulnerabilities and respond swiftly to emerging threats. The emphasis on automation and AI is driven by the need to enhance efficiency and effectiveness in cybersecurity operations. By automating routine tasks and employing AI for advanced threat detection, businesses can optimise their resources and achieve a more robust security posture.

Investment in Cloud Cybersecurity Solutions

The migration to cloud environments continues to accelerate, driving the need for robust cloud security solutions. Key investment areas will include cloud security posture management (CSPM) and cloud workload protection platforms (CWPP). The emphasis on cloud security reflects the growing reliance on cloud services for business operations. Moreover, organisations recognise that securing their cloud environments is paramount to safeguarding digital assets and ensuring regulatory compliance. Investments in cloud security solutions also align with the broader trend toward digital transformation. Businesses are leveraging the cloud to drive innovation and agility. This neessitates a strong security framework to protect their evolving digital ecosystems.

Enhanced Budgeting for Compliance and Regulatory Needs

Data protection and privacy regulations are becoming increasingly stringent worldwide. Also, this necessitates enhanced budgeting for compliance-related cybersecurity solutions. I expect organisations to allocate more resources to auditing tools, risk management platforms, and solutions that help them meet regulatory requirements such as GDPR, CCPA, and HIPAA.

The emphasis on compliance reflects a growing awareness of the legal and reputational risks associated with non-compliance. Investing in compliance-related solutions also aligns with the broader trend toward data-driven decision-making. Moreover, by implementing tools that ensure alignment with regulatory requirements, organisations can demonstrate their commitment to ethical data practices and build trust among stakeholders.

Growth in Cybersecurity Insurance Expenditures

Cyber insurance is becoming an essential component of an organisation’s risk management strategy. The growth in cybersecurity insurance expenditures reflects a broader awareness of the financial implications of cybersecurity threats. Investing in cyber insurance aligns with the emphasis on accountability in cybersecurity spending. By securing coverage for potential losses, businesses can demonstrate their commitment to protecting their assets and ensuring business continuity in the face of unforeseen events.

By understanding the key cyber spending patterns outlined here, businesses can make informed decisions. They can enhance their security posture to protect their valuable assets and ensure business continuity as we move into 2025.

  • Cybersecurity in FinTech
  • InsurTech

Seth Ruden, Director of Global Advisory at BioCatch, on how the UK’s financial institutions can be better prepared to deal with authorised push payment (APP) scams

The focus on authorised push payment (APP) fraud scams – where scammers impersonate reputable individuals or institutions – has increasingly shifted to whether banks should reimburse customers for funds stolen by scammers. We can gain valuable insights from the approaches taken by financial institutions in the UK. They are leading the way with their cybersecurity efforts compared to their counterparts in other regions.

First, British banks established a standardised reporting system and typology. This is a fundamental first step that every financial institution should take to grasp the full scope of how financial fraud affects banking consumers. Banks may disclose the type of fraud, the amount of money stolen, and the bank measures used to prevent the scam from occurring. This centralised view brings the true scope of the totality of scams into focus.

Three ways the UK’s financial institutions are leading in the fight against fraud

Second, the UK has developed strategies to identify specific scams and reduce their losses. The regulator added a slew of new controls to banks, including confirmation of payee, scam and transaction-specific interventions, and money mule account controls for those receiving the illicit funds. Before regulation, not every financial institution had implemented these controls, providing an uneven playing field and allowing scams to flourish. Banks outside the UK should not wait for regulators to mandate controls like these. They should do it on their own accord to prove they realise the magnitude of the scam problem and the severity of its impact on bank customers.

Improved consumer financial scam controls should be a minimum requirement for financial institutions in 2024. These controls should cover: authorised push payment behavioural analysis, money mule behaviour around both account opening and account activity, and analysis of both inbound and outbound transactions. Furthermore, detecting and then closing money mule accounts – used by fraudsters as an intermediate stop between the victim’s account and the final destination for the stolen funds – is absolutely critical, as they serve as the backbone for every consumer-based financial scam.

The third? Getting involved. Banks need to integrate themselves and participate with industry and trade associations – such as the FS-ISACs and GASA (Global Anti Scam Alliance). These associations provide opportunities to network with peer institutions and others in the fraud value chain to share scam information and learn from each other.

Effective Fraud Prevention: A practical assessment of Key Strategies

Many banks today use precision anomaly detection and behavioural biometrics to notify them when a fraudulent transaction takes place. Financial institutions in the UK often issue actionable alerts to clients in real-time. Santander UK, for example, now asks customers if they have seen the item in person before approving a payment through Facebook Marketplace. For online account opening, there are good solutions for bot-detection to prevent automated bots from opening new accounts, behavioural biometrics to detect suspicious patterns of data entry, and solutions that can analyse the customer KYC data. A secondary benefit of strong account opening controls is the reduction of operational costs to close bogus accounts.

For detecting existing money mule accounts, traditionally it required tracking the circulation of funds, both the inbound and outbound transaction activity and looking for anomalies (e.g. high value in and then immediately transferred out). Now, user behaviour anomalies – such as changes in the user’s input/output device activity or navigation preferences – may indicate a change in account control before the suspicious transactions take place.

Protecting Customers: What the future holds for Financial institutions

Since the UK’s introduction to faster payments, the region has become a centre of research for the rest of the world. However, eliminating threats to UK customers and their money has remained difficult despite an increase in regulation. While Governments and international groups are starting to identify and take down some of these organisations there are still hundreds of thousands of scammers and coerced individuals involved in these intricate schemes. A key challenge for financial institutions is understanding how scammers get their customers to initiate authorised payment. However, these challenges can be combatted by understanding the psychology behind how scammers work which can be a prominent factor in tackling the problem. Financial institutions must ensure that, in a few years’ time, they can confidently answer ‘yes’ to the question: Did we do enough to help eliminate consumer financial scams?

  • Cybersecurity in FinTech

Other key findings include surge of info-stealers and botnets, an increase in evasive malware and a rise in network attacks across the Asia Pacific

WatchGuard® Technologies, a global leader in unified Cybersecurity, today released the findings of its latest Internet Security Report. The quarterly analysis details the top malware, network, and endpoint security threats observed during the second quarter of 2024. 

Among the report’s key findings was that 7 of the Top 10 malware threats by volume were new this quarter. Furthermore, this indicates threat actors are pivoting toward new techniques. The new top threats included Lumma Stealer. This advanced malware is designed to steal sensitive data from compromised systems. Also, a Mirai Botnet variant, which infects smart devices and enables threat actors to turn them into remotely controlled bots. And a LokiBot malware, which targets Windows and Android devices and aims to steal credential information. 

Cybersecurity fears for Blockchain

WatchGuard’s Cybersecurity Threat Lab also observed new instances of threat actors employing “EtherHiding”. A method of embedding malicious PowerShell scripts in blockchains such as Binance Smart Contracts. In these instances, a fake error message linking to the malicious script appears on compromised websites, prompting victims to “update your browser”. Malicious code in blockchains poses a long-term threat. As blockchains are not meant to be changed, theoretically, a blockchain could become an immutable host of malicious content. 

“The latest findings in the Q2 2024 Internet Security Report reflect how threat actors tend to fall into patterns of behaviour. Certain attack techniques become trendy and dominant in waves,” said Corey Nachreiner, CSO, WatchGuard Technologies. “Moreover, the report illustrates the importance of routinely updating and patching software and systems to address security gaps and ensure threat actors cannot exploit older vulnerabilities. Adopting a defence-in-depth approach, which can be executed effectively by a dedicated managed service provider, is a vital step toward combating these cybersecurity challenges successfully.”

Additional key findings from WatchGuard’s Report include: 

  • Malware detections were down 24% overall. This drop was caused by a 35% decrease in signature-based detections. However, threat actors were simply shifting focus to more evasive malware. Moreover, in Q2 2024, the Threat Lab’s advanced behavioural engine that identifies ransomware, zero-day threats, and evolving malware threats, found a 168% increase in evasive malware detections quarter-over-quarter. 
     
  • Network attacks increased 33% from Q1 2024. Across regions, the Asia Pacific accounted for 56% of all network attack detections, more than doubling since the previous quarter.
     
  • An NGINX vulnerability, originally detected in 2019, was the top network attack by volume in Q2 2024. It had not appeared in the Threat Lab’s Top 50 network attacks in previous quarters. The vulnerability accounted for 29% of total network attack detection volume, or approximately 724,000 detections across the US, EMEA, and APAC. 
     
  • The Fuzzbunch hacking toolkit emerged as the second-highest endpoint malware threat detected by volume. The toolkit serves as an open-source framework that can be used to attack Windows operating systems. It was stolen during The Shadow Brokers’ attack of the Equation Group, an NSA contractor, in 2016. 
     
  • Seventy-four percent of all browser-initiated endpoint malware attacks targeted Chromium-based browsers, which include Google Chrome, Microsoft Edge, and Brave.
     
  • A signature that detects malicious web content, trojan.html.hidden.1.gen, came in as the fourth most-widespread malware variant. The most common threat category caught by this signature involved phishing campaigns. These gather credentials from a user’s browser and deliver this information to an attacker-controlled server. Curiously, the Threat Lab observed a sample of this signature targeting students and faculty at Valdosta State University in Georgia. 
  • Blockchain & Crypto
  • Cybersecurity in FinTech

UnaFinancial study identifies cybersecurity as most influential factor driving FinTech growth

A recent study from UnaFinancial has identified cybersecurity as the most influential factor driving the development of FinTech worldwide, with a 63% significance. The second most impactful factor is the average hourly wage rate, with a 13% significance.

The study showed that FinTech growth in Europe, America, and globally has the strongest correlation with the size of the cybersecurity market, with correlation coefficients of 0.8714, 0.9762, and 0.8607, respectively.

In Asia, however, FinTech growth was more closely tied to the size of the consumer electronics market (0.9403). Meanwhile in Africa, it correlated with consumer spending volumes (0.7427). Therefore, globally, cybersecurity emerges as the most significant driver of FinTech growth. More vital protection facilitates a more robust FinTech environment.

Economic Disparities with Cybersecurity: High Income vs Low Income Economies

Economic status also plays a crucial role in shaping FinTech dynamics. High-income countries display pronounced correlations with various factors. Notably, the size of the cybersecurity market (0.6923), consumer electronics market (0.5839), average wage rates (0.6237), and consumer spending volumes (0.6971) are all significantly linked to FinTech growth.

Conversely, low-income economies exhibit no substantial correlations with these factors, highlighting a disparity in FinTech development influenced by financial resources and technological infrastructure.

Middle-income countries show a more nuanced relationship, with FinTech volumes correlating with nominal GDP (0.5373), the cybersecurity market (0.5727), consumer electronics (0.5637), fintech hubs (0.5409), and consumer spending volumes (0.6136). This suggests that while multiple factors impact middle-income countries, cybersecurity remains a vital component.

Quantifiable Cybersecurity Impact on FinTech

Furthermore, another interesting finding was the measurable impact of various factors on FinTech transactions. For example, for every $1 million increase in the global cybersecurity market, FinTech transactions per adult are expected to rise by $31.6. Similarly, a $1 increase in the average hourly wage could boost FinTech transactions by $67.5. The establishment of just one more FinTech hub could increase global FinTech transactions per capita by $839.

Remarkably, as a country’s income grows, the correlation between FinTech growth and two factors—cybersecurity market size and average wage rates—becomes stronger. This means these factors may indeed influence the development of FinTech across a country.

A deeper non-linear analysis further validated the significance of these factors. It revealed that the cybersecurity market is the most influential driver of FinTech growth, with 63% of significance, followed by the average wage rate (13%). As we advance into an increasingly digital future, the investment in and enhancement of cybersecurity will remain a cornerstone of FinTech innovation and expansion.

UnaFinancial Study

The UnaFinancial study considered data from 2022 for 146 countries, which were grouped into four regions: Asia, Europe, Africa and America. The potential factors under consideration included gender ratio, nominal GDP per capita, Internet penetration, cybersecurity market volumes per capita, consumer electronics market volumes, number of FinTech hubs per 100,000 people, average hourly wages, consumer spending per capita, direct investment as a share of GDP, unemployment rates, trade volume relative to GDP, and share of urban population.

The study not only illuminates the integral role of cybersecurity but also provides a roadmap for understanding how various factors interplay to influence the global FinTech landscape. In this digital age, safeguarding financial transactions and technologies is as critical as ever. Moreover, ensuring that FinTech continues to flourish amidst evolving challenges and opportunities.

  • Cybersecurity in FinTech

Gabe Hopkins, Chief Product Officer at Ripjar, on how GenAI can transform compliance

Generative AI (GenAI) has proven to be a transformational technology for many global industries. Particularly those sectors looking to boost their operational efficiency and drive innovation. Furthermore, GenAI has a range of use cases, and many organisations are using it to create new, creative content on demand – such as imagery, music, text, and video. Others are using the new tools at their disposal to perform tasks and process data. This makes previously tedious activities much more manageable, saving considerable time, effort, and finances in the process.

However, compliance as a sector has traditionally shown hesitancy when it comes to implementing new technologies. Taking longer to implement new tools due to natural caution about perceived risks. As a result, many compliance teams will not be using any AI, let alone GenAI. This hesitancy means these teams are missing out on significant benefits. Especially at a time when other less risk-averse industries are experiencing the upside of implementing this technology across their systems.

To avoid falling behind other diverse industries and competitors, it’s time for compliance teams to seriously consider AI. They need to understand the ways the technology – specifically GenAI – can be utilised in safe and tested ways. And without introducing any unnecessary risk. Doing so will revolutionise their internal processes, save work hours and keep budgets down accordingly.

Understanding and overcoming GenAI barriers

GenAI is a new and rapidly developing technology. Therefore, it’s natural compliance teams may have reservations surrounding how it can be applied safely. Particularly, teams tend to worry about sharing data, which may then be used in its training and become embedded into future models. Moreover, it’s also unlikely most organisations would want to share data across the internet. Strict privacy and security measures would first need to be established.

When thinking about the options for running models securely or locally, teams are likely also worried about the costs of GenAI. Much of the public discussion of the topic has focussed on the immense budget required for preparing the foundation models.

Additionally, model governance teams within organisations will worry about the black box nature of AI models. This puts a focus on the possibility for models to embed biases towards specific groups, which can be difficult to identify.

However, the good news is that there are ways to use GenAI to overcome these concerns. This can be done by choosing the right models which provide the necessary security and privacy. Fine-tuning the models within a strong statistical framework can reduce biases.

In doing so, organisations must find the right resources. Data scientists, or qualified vendors, can support them in that work, which may also be challenging.

Overcoming the challenges of compliance with AI

Despite initial hesitancy, analysts and other compliance professionals are positioned to gain massively by implementing GenAI. For example, teams in regulated industries – like banks, fintechs and large organisations – are often met with massive workloads and resource limits. Depending on which industry, teams may be held responsible for identifying a range of risks. These include sanctioned individuals and entities, adapting to new regulatory obligations and managing huge amounts of data – or all three.

The process of reviewing huge quantities of potential matches can be incredibly repetitive and prone to error. If teams make mistakes and miss risks, the potential impact for firms can be significant. Both in terms of financial and reputational consequences.

In addition, false positives – where systems or teams incorrectly flag risks and false negatives – where we miss risks that should be flagged, may come from human error and inaccurate systems. They are hugely exacerbated by challenges such as name matching, risk identification, and quantification.

As a result, organisations within the industry quite often struggle to hire and retain staff. Moreover, this leads to a serious skills shortage amongst compliance professionals. Therefore, despite initial hesitancy, analysts and other compliance professionals stand to gain massively by implementing GenAI without needing to sacrifice accuracy.

Generative AI – welcome support for compliance teams

There are numerous useful ways to implemented GenAI and improve compliance processes. The most obvious is in Suspicious Activity Report (SAR) narrative commentary. Compliance analysts must write a summary of why a specific transaction or set of transactions is deemed suitable in a SAR. Long before the arrival of ChatGPT, forward thinking compliance teams were using technology based on its ancestor technology to semi-automate the writing of narratives. It is a task that newer models excel at, particularly with human oversight.

Producing summarised data can also be useful when tackling tasks such as Politically Exposed Persons (PEP) or Adverse Media screenings. This involves compliance teams performing reviews or research on a client to check for potential negative news and data sources. These screenings allow companies to spot potential risks. It can prevent them from becoming implicated in any negative relationships or reputational damage.

By correctly deploying summary technology, analysts can review match information far more effectively and efficiently. However, like with any technological operation, it is essential to consider which tool is right for which activity. AI is no different. Combining GenAI with other machine learning (ML) and AI techniques can provide a real step change. This means blending both generalised and deductive capabilities from GenAI with highly measurable and comprehensive results available in well-known ML models.

Profiling efficiency with AI

For example, traditional AI can be used to create profiles, differentiating large quantities of organisations and individuals separating out distinct identities. The new approach moves past the historical hit and miss where analysts execute manual searches limiting results by arbitrary numeric limits.

Once these profiles are available, GenAI can help analysts to be even more efficient. The results from the latest innovations already show GenAI-powered virtual analysts can achieve, or even surpass, human accuracy across a range of measures.

Concerns about accuracy will still likely impact the rate of GenAI adoption. However, it is clear that future compliance teams will significantly benefit from these breakthroughs. This will enable significant improvements in speed, effectiveness and the ability to respond to new risks or constraints.

Ripjar is a global company of talented technologists, data scientists and analysts designing products that will change the way criminal activities are detected and prevented. Our founders are experienced technologists & leaders from the heart of the UK security and intelligence community all previously working at the British Government Communications Headquarters (GCHQ). We understand how to build products that scale, work seamlessly with the user and enhance analysis through machine learning and artificial intelligence. We believe that through this augmented analysis we can protect global companies and governments from the ever-present threat of money laundering, fraud, cyber-crime and terrorism.

  • Artificial Intelligence in FinTech
  • Cybersecurity in FinTech

Gunnar Már Gunnarsson, Co-founder & CTO of PAYSTRAX on the potential for tokenisation to improve digital payments

The forward to the Bank of England’s most recent report on innovation in payments begins with the words:

“The concept at the heart of money is trust – a trust which is hard won but easily lost.”

In today’s financial climate, where digital transactions have become the norm, trust and security are more crucial than ever. However, 84% of consumers don’t completely trust online payments, and many drop out before they complete a purchase online due to safety concerns and a lack of payment options.

Tokenisation presents a way forward, offering an increased level of trust and efficiency that could tackle the concerns of consumers. And offer business increased security in the payments process. By replacing sensitive payment card information with unique identifiers (tokens), this technology provides a safe way to handle payment data from seller to consumer.

As the future of payments continues to evolve, safety, simplicity and global alignment will be essential. Tokenisation stands at the forefront of this with the potential to not only reduce fraud but also improve the customer experience.

An extra safeguard against cybercrime with tokenisation

The issue many businesses and customers face is that their data remains exposed during transactions. This increases the risk of fraud and company liability issues in the event of data breaches. Tokenisation technology replaces sensitive data with a unique, randomly generated string of symbols that cannot be easily interpreted. This provides an extra safeguard against cybercrime. This added level of security benefits both consumers and businesses. It can reduce vulnerabilities in everything from online purchases to mobile payments.

For merchants, this is particularly beneficial. By keeping sensitive information, such as customers’ card details, outside their own systems, they minimise the risk of security breaches. Tokenisation also helps businesses meet compliance standards, such as PCI-DSS (Payment Card Industry Data Security Standard). With no need to store or transmit sensitive data, companies can lower their security management responsibilities and reduce the overall costs of compliance. Tokenisation facilitates this easier compliance by deferring regulatory requirements across regions. Businesses can then rely on tokenised data instead of managing the security of the original PAN (Primary Account Number).

Enhancing the payment experience with tokenisation

Friction during transactions has long been an issue in finance, costing the industry $2 billion dollars a year in lost payments. Consumers increasingly expect faster and more seamless payments in all aspects of their life, from in store shopping to online purchases.

With tokenisation technology, the payment process becomes faster. Sensitive information no longer needs to be re-entered or verified externally during each transaction. This reduction in data exposure reduces the risk of fraud while maintaining the rapid pace of real-time payments. Overall this creates a secure and safe payment process for businesses while not interrupting the real-time user experience.

Frictionless payments aren’t the only benefit of tokenisation. With customers being more likely to complete purchases when a tokenisation system is in play, with Visa reporting that authorisation rates improve by 2.1% using the technology. This is mostly due to the dynamic card-on-file information that tokenisation provides. It reduces payment failures and ensures a smoother purchase process, with failed payments no longer an issue.

A final example for how tokenisation enhances payment experience both user and provider side can be found in B2B Cross-Border payments. The market is projected to grow significantly, with estimates indicating a 43% increase to reach $56.1 trillion by 2030. The risk of fraud grows with this, alongside increasingly in depth and complex international laws and national regulations, companies need both security, and to be customer facing in their plans. Technologies that secure payments and provide seamless transactions, like tokenisation, are pivotal in supporting this growth by reducing risks and improving efficiency.

The future of payments

As alternative payment methods and RTP networks continue to rise, tokenisation will be crucial in creating a global payments ecosystem that is both secure and frictionless. Visa has issued over 9.5 billion tokens globally, with Mastercard reporting over 50% year-over-year growth in tokenised transactions. This rapid adoption highlights the importance of tokenisation in building secure, efficient payment networks.

By reducing fraud, simplifying security management, and improving the overall customer experience, tokenisation is set to play a leading role in shaping the future of payments. Especially as digital and cross-border transactions become increasingly important.

It’s more than just a security measure. It’s a critical technology that enhances the entire payment ecosystem, making transactions faster, safer, and more efficient for all parties involved.

Gunnar Már Gunnarsson, Co-founder & CTO of PAYSTRAX

  • Cybersecurity in FinTech
  • Digital Payments

Cullen Zandstra, CTO at FloQast on mitigating the risks of AI to deliver benefits to financial services

There’s a lot of buzz around Generative AI (GenAI). What’s not always heard beneath the noise are the very real and serious risks of this fast-developing AI tech. Let alone ways to mitigate these emerging threats.

Currently, one quarter (26%) of accounting and bookkeeping practices in the UK have now adopted GenAI in some capacity. That figure is predicted to grow for many years to come.

With this in mind, and as we hit the crest of the GenAI hype cycle, it’s critically important that leaders focus closely on the potential risks of AI deployment. They need to proactively prepare to mitigate them, rather than picking up the pieces after an incident.

Navigating the risky transition to AI

The benefits of AI are well-proven. For finance teams, AI is a powerup that unlocks major performance and efficiency boosts. It significantly enhances their ability to generate actionable insights swiftly and accurately, facilitating faster decision-making. AI isn’t here to take over but to augment the employees’ capabilities. Ultimately improving leaders’ trust in the reliability of financial reporting.

One of the most exciting aspects of AI is its potential to enable organisations to do more with less. Which, in the context of an ongoing talent shortage in accounting, is what all finance leaders are seeking to do right now. By automating routine tasks, AI empowers accountants to focus on higher-level analysis and strategic initiative, whilst drawing on fewer resources. GenAI models can help to perform routine, but important tasks. These include producing reports for key stakeholders and ensuring critical information is effectively and quickly communicated. It enables timely and precise access to business information, helping leaders to make better decisions.

However, GenAI also represents a new source of risk that is not always well understood. We know that threat actors are using GenAI to produce exploits and malware. Simultaneously levelling up their capabilities and lowering the barrier of entry for lower-skilled hackers. The GenAI models that power chatbots are vulnerable to a growing range of threats. These include prompt injection attacks, which trick AI into handing over sensitive data or generating malicious outputs.

Unfortunately, it’s not just the bad guys who can do damage to (and with) AI models. With great productivity comes great responsibility. Even an ambitious, forward-thinking, and well-meaning finance team could innocently deploy the technology. They could inadvertently make mistakes that cause major damage to their organisation. Poorly managed AI tools can expose sensitive company and customer financial data, increasing the risk of data breaches.

De-risking AI implementation

There is no technical solution you can buy to eliminate doubt and achieve 100% trust in sources of data with one press of a button. Neither is there a prompt you can enter into a large language model (LLM).

The integrity, accuracy, and availability of financial data are of paramount importance during the close and other core accountancy processes. Hallucinations (another word for “mistakes”) cannot be tolerated. Tech can solve some of the challenges around data needed to eliminate hallucinations – but we’ll always need humans in the loop.

True human oversight is required to make sure AI systems are making the right decisions. We must balance effectiveness with an ethical approach. As a result, the judgment of skilled employees is irreplaceable and is likely to remain so for the foreseeable future. Unless there is a sudden, unpredicted quantum leap in the power of AI models. It’s crucial that AI complements our work, enhancing rather than compromising the trust in financial reporting.

A new era of collaboration

As finance teams enhance their operations with AI, they will need to reach across their organisations to forge new connections and collaborate closely with security teams. Traditionally viewed as number-crunchers, accountants are now poised to drive strategic value by integrating advanced technologies securely. The accelerating adoption of GenAI is an opportunity to forge links between departments which may not always have worked closely together in the past.

By fostering a collaborative environment between finance and security teams, businesses can develop robust AI solutions. They can boost efficiency and deliver strategic benefits while safeguarding against potential threats. This partnership is essential for creating a secure foundation for growth.

AI in accountancy: The road forward

The accounting profession stands on the threshold of an era of AI-driven growth. Professionals who embrace and understand this technology will find themselves indispensable.

However, as we incorporate AI into our workflows, it is crucial to ensure GenAI is implemented safely and does not introduce security risks. By establishing robust safeguards and adhering to best practices in AI deployment, we can protect sensitive financial information and uphold the integrity of our profession. Embracing AI responsibly ensures we harness its full potential while guarding against vulnerabilities, leading our organisations confidently into the future.

Founded in 2013, FloQast is the leading cloud-based accounting transformation platform created by accountants, for accountants. FloQast brings AI and automation innovation into everyday accounting workflows, empowering accountants to work better together and perform their tasks with greater efficiency and accuracy. Now controllers and accountants can spend more time delivering greater strategic value while enjoying a better work-life balance.

  • Artificial Intelligence in FinTech
  • Cybersecurity in FinTech

Henry Balani, Global Head of Industry & Regulatory Affairs at Encompass Corporation, on meeting the demand for improved risk management, operational efficiency, and customer service with pKYC

The traditional banking and finance industry is evolving. Processes are experiencing a digital transformation as a result of perpetual Know Your Customer (pKYC). The pKYC approach enables modern banks to continuously update and verify customer information in real time. Banks are moving away from the reliance on periodic reviews. This change is driven by technological advancements. And the increasing demand for dynamic and responsive regulatory compliance mechanisms.

Perpetual KYC

Conventional KYC processes commonly involve periodic reviews of customer information at fixed intervals. These reviews are typically conducted every one, three, or five years. While these reviews are thorough and comprehensive, they are also static. This can result in outdated information, potentially overlooking changes in customer risk profiles or new compliance requirements.

On the other hand, perpetual KYC is dynamic and event driven. Through its continuous and automated approach, pKYC enables financial institutions to address risks and compliance needs in real-time. These risks can be determined by continuously monitoring customer activities. Furthermore, automatically updating profiles in response to specific triggers, including changes in personal information, significant transactions, or alterations in beneficial ownership.

Gaining a competitive advantage with pKYC

By leveraging pKYC, banks, and other regulated financial institutions can take advantage of a range of benefits. These are crucial in the modern digital era to gain a competitive edge. Through continuous monitoring, pKYC enables financial institutions to identify and address potential risks promptly. This real-time approach helps mitigate risks associated with financial crimes. Moreover, it ensures compliance with the latest regulatory standards.

pKYC will lead to operational efficiency and cost reduction. By automating many of the manual processes involved in KYC, pKYC significantly reduces the time and resources needed for compliance. This allows financial institutions to focus their efforts on high-risk cases, rather than conducting blanket reviews for all customers, resulting in substantial cost savings.

This process also enables many banks to improve their customer service and management. It also enhances the customer’s experience. With pKYC, customers are not subjected to frequent, intrusive reviews if their profiles remain stable. This results in a smoother and more positive customer experience, potentially increasing overall customer satisfaction and loyalty. Additionally, automated systems minimise human error and ensure consistency in applying KYC policies. This enhances overall regulatory compliance and reduces the risk of non-compliance penalties.

Perpetual KYC implementation: Challenges and considerations

Implementing a pKYC operating model is not straightforward. It requires the right blend of infrastructure and operating process. Every firm’s pKYC journey and ecosystem will be unique and cut across people, processes and technologies.

Data is central to the success of pKYC as reviews based on event changes (aka event driven triggers) will not be effective if client information is outdated, missing or incorrect. Without consistent access to relevant and accurate client information, pKYC is impossible. Corporate Digital Identity (CDI) is fast emerging as a foundation for ensuring valid customer information is collected for successful pKYC operations.

Being able to leverage this data requires an ecosystem of technology, which may be developed in house, utilising third-party RegTech providers, or a combination of both. This technology should drive how data is stored, structured and accessed so that pKYC triggers can be comprehensively managed. Customer lifecycle management systems (CLMs) are particularly relevant to pKYC as they connect all components along the workflow processes.

Importantly, overarching executive sponsorship is needed to ensure a successful outcome in transformation initiatives. Recognising the structural and cross departmental challenge, influential sponsors will align the multiple stakeholders involved in driving this change and will champion a firm’s pKYC strategy and approach to regulators and other key stakeholders.

Ultimately, pKYC must be future-proof and scalable, ready to adapt in line with business strategy and regulation to keep firms competitive.

The future of pKYC

The adoption of pKYC is growing, driven by regulatory pressures and the increasing complexity of financial crimes. Financial institutions are recognising the benefits of a proactive, real-time approach to compliance and risk management. The move towards pKYC is seen as a necessary evolution to stay ahead in a highly regulated and competitive financial environment.

As the technological landscape continues to evolve, integrating advanced technologies such as blockchain and further developments in AI and ML will likely enhance pKYC systems’ capabilities. Ensuring higher levels of compliance and risk mitigation, these technologies are able to provide more robust and secure mechanisms for customer verification and monitoring.

Blockchain technology can be utilised to further improve the initial customer authentication and validation process. As a result, we can expect improvements and advancements in the quality of customer data collected during initial customer onboarding processes. Financial institutions can then leverage AI-enhanced tools that can identify and collect the necessary attributes during document processing stages. This ensures that pKYC will utilise relevant, accurate, and up-to-date data. Perpetual KYC represents a significant departure from traditional, periodic KYC, as it offers a wide range of benefits in real-time risk management, operational efficiency, and customer experience. Although the implementation of pKYC poses certain challenges, it also provides numerous advantages, making it an increasingly attractive solution for financial institutions aiming to enhance their compliance and risk management frameworks and maintain a competitive edge in a rapidly evolving regulator landscape.

  • Cybersecurity in FinTech

Mayank Sharma, Senior Product Marketing Manager, FinScan on managing the changing face of risk in financial services

Today, companies are expected to have a holistic view of financial crime risk. They must consider the entire ecosystem of their counterparty relationships including suppliers, vendors, employees, and customers. Failure to do so can result in organisations breaching regulatory requirements, leading to fines and reputational damage. Assessing complex ownership structures, expanding overseas operations, and managing increasing amounts of data places strain on limited resources and capabilities.

Many businesses grapple with multiple systems housing different data and information. Without an integrated view or calculation of risk or the ability to dynamically obtain data to update risk ratings, compliance and onboarding teams are operating ineffectively. What obstacles do businesses face in reaching a comprehensive view of their risk exposure? And how can technological advances help companies take a more proactive approach to financial crime risk management?

The changing face of risk

The last decade has seen a notable shift in how companies are expected to understand and manage risk. Traditionally, the focus was on performing due diligence on new customers during onboarding and at discrete intervals over the customer lifecycle. Today, companies are expected to adopt a more comprehensive perspective and take into account their entire network of counterparty relationships. This includes assessing extended relationships, encompassing customers, beneficial owners, customer’s customers, suppliers, employees, and other stakeholders. This includes distributors and other counterparties.

It also entails understanding the nature of the geographies reached, the products and services used, and from whom they send and receive funds. For example, a community bank might have domestic customers with clear backgrounds but are exposed to indirect sanctions and money laundering risks through the customers’ supplier or vendor relationships based on sanctioned geographies or beneficial owners.

Organisations must monitor sanctions and suspicious activity risk for direct and indirect client relationships. Failure to do so can result in large financial penalties. As seen in the high-profile examples of companies receiving fines for having customer or vendor relationships in sanctioned jurisdictions, and from overall weaknesses in their AML controls. However, the larger issue, from a risk perspective, especially in the context of geo-political changes and complex ownership structures, is even beyond AML and sanctions that bleeds over to reputational risk, i.e., who you are doing business with.

Companies need to develop their financial crimes analysis and risk assessment processes across all risk monitoring systems. They need to make sure they identify all the parties down to the level necessary to determine the compliance risk of doing business. Such an analysis “future proofs” the organisation from undue reputational damage. It also keeps them proactively compliant with sanctions and AML failures.

Process and technology challenges

From a technological standpoint, AML and sanctions risk from customers, vendors, employees, and supply chains are typically distributed across multiple processes. These include onboarding, due diligence, screening, and monitoring, which use different systems that are not integrated. This makes it difficult to get a holistic overview of the risk exposure.

Furthermore, many models are not sufficiently robust and fail to consider the relevant elements at the appropriate times. Most due diligence is performed at the point of onboarding. This presents a snapshot in time but does not accommodate dynamic updates such as alerts to situational changes, potentially impacting a customer’s risk score. There may be periodic Know Your Customer (KYC) updates or event-driven triggers, which influence the risk rating. However, these are typically retrospective, driven by customer interactions, and prioritised by the current rating. As such, low-risk customers who start displaying high-risk activity, which is not part of the trigger events, would not even be subject to an updated review based on that activity. Rather, they would only be reviewed at the next scheduled update for that batch of low-risk customers. This could be some years after they were first onboarded or last reviewed.

Consequently, risk ratings may misclassify customers, pushing up operating costs. A study from McKinsey & Co found that banks changing approaches to reviewing low-risk customers based on trigger events, rather than a schedule, reduced KYC operating costs by 20 percent.

Adopting an integrated and dynamic approach

As the understanding and expectations surrounding risk change, so does the technology supporting risk scoring. Integrated risk scoring dynamically calculates a score from all critical source systems used by compliance and business functions. These include external sources such as news outlets and social media. This provides a robust approach more valuable for financial institutions as it uncovers scenarios not driven by interactions with the customer. This also has an impact, perhaps a more significant one, on a customer risk rating. Adverse media or changes in beneficial ownership, for example, will not necessarily be items brought to the financial institution by the customer. But these can impact the nature of the ongoing customer relationship.

Artificial intelligence (AI) and machine learning (ML) are also likely to play an increasingly important role. As regulators become more open to innovative approaches and technologies, AI and ML will be used to enable real-time checks, such as integrated adverse media or identification checks. However, caution must be exercised regarding explainability, and the decision-making process must be understandable to human operators. Organisations must maintain clear documentation of how AI models work and the criteria they use for risk scoring. They must also monitor for and mitigate any biases in the AI models. They must enusre deployment doesn’t lead to unfair treatment of any ethnic or racial groups. Ultimately, new technology should realise a net reduction in residual risk.

Facilitating a proactive approach to risk

Companies are faced with an increasingly complex risk landscape. Today, they are expected to have a detailed understanding of their business relationships and assess the risks these relationships present. With geopolitical turmoil increasing, a wave of new sanctions, and the resulting implications for AML checks, companies need to ensure they have robust profiling processes and systems. To enable this, businesses should look for integrated solutions that bring together the various indicators and allow for dynamic updates of risk profiles.

FinScan offers advanced Anti-Money Laundering (AML) compliance technology and consulting solutions. Built on decades of experience in data management and proprietary matching technologies, FinScan provides a data-first, risk-based approach to ensure unparalleled accuracy and efficiency in identifying and reducing risk, accelerating AML compliance workflows, and optimising team productivity.

  • Cybersecurity in FinTech

Digital banking offers increased convenience and accessibility. However, this growth also exposes banks to heightened cybersecurity risks. Protecting data and…

Digital banking offers increased convenience and accessibility. However, this growth also exposes banks to heightened cybersecurity risks. Protecting data and information is crucial to maintaining customer trust and preventing financial loss.

Cybercrime poses a significant threat to the digital banking industry. According to Cybercrime Magazine, cybercrime costs will increase by 15% over the next five years and reach $10.5 trillion by 2025. These attacks target sensitive information and funds, causing substantial damage to banks.

To mitigate these risks, banks must implement robust cybersecurity measures to safeguard digital systems and data.

1. Strong Authentication

The Payment Services Directive (PSD2) mandates strong customer authentication (SCA) to reduce fraud and enhance online payment security. This directive imposes specific requirements on market participants to meet new obligations. The European Banking Authority (EBA) developed regulatory technical standards (RTS) based on the Commission’s authority under PSD2. 

The RTS aims to protect consumers and create a level playing field within the evolving financial technology market. To achieve this, the RTS establishes security measures for payment service providers — including banks and other financial institutions — when processing payments or offering payment-related services. 

2. Encryption

Unencrypted data is a common cyber threat. Hackers can easily access this data type and give severe consequences for banks. According to Statista, the average cost of a data breach worldwide is $4.45 million dollars. However, data breaches not only cause substantial financial loss for recovery and ransom payments but also damage a bank’s reputation.

To prevent these issues, all digital banking data must be encrypted. This safeguards information and makes it difficult for cybercriminals to access even if stolen. Encryption transforms data into a coded format that requires a specific key to decipher. Only individuals with the correct key can view the original data. 

Encryption involves using an algorithm and a key to convert plain data into encrypted data. The original data can only be recovered by decrypting the ciphertext with the correct key.

3. Regular Cybersecurity Audit

A security audit is a thorough examination of an organisation’s IT infrastructure. This process verifies the effectiveness of security policies and procedures. Security audits assess how well an institution’s cybersecurity program operates. This includes reviewing policies, testing controls, and checking compliance with industry standards and regulations.

Banks and financial institutions face increasingly complex cyber threats. Regular security audits help identify vulnerabilities in systems. By discovering weaknesses, banks can strengthen defences with firewalls, antivirus, and antimalware software. A cybersecurity audit should be conducted by an independent expert to ensure objectivity.

4. Employee Training

The World Economic Forum reports that 95% of cyberattacks involve human error. This means hackers often exploit employee mistakes. They use tactics like phishing to deceive employees into revealing sensitive information. This can lead to data breaches and financial loss. For example, employees might click on malicious links, disclose confidential data, or leave devices unattended.

Therefore, bank employees must have training to recognize that cyberattacks are a constant threat. Moreover, the consequences of a breach can be severe for employees, customers, and the bank’s reputation. Cybercriminals operate in a lucrative industry, for that reason, it is imperative to equip employees with the knowledge to safeguard against these threats.

5. Incident Response Planning

An incident response plan is a formal document approved by bank leadership to guide the organisation before, during, and after a potential or confirmed security incident. The plan aims to reduce the impact of security events, limiting operational, financial, and reputational damage.

A successful incident response plan should be established before a security attack occurs and assigned to specific team members. IBM research shows companies with well-developed and tested response plans save an average of $2.66 million compared to those without such protocols. 

To create an effective incident response plan, banks can reference established frameworks. For specific incident handling steps, The National Institute of Standards and Technology’s SP-800-61 and SANS’s Incident Handlers Handbook provide detailed blueprints. Aligning the incident response plan with these resources ensures a focused and effective approach to managing cybersecurity incidents.

Importance of Cybersecurity Measures 

The increasing reliance on digital platforms exposes individuals and organisations to growing cybersecurity risks. Malicious actors exploit security weaknesses to steal personal information and compromise digital assets. Forbes reported a staggering increase in cyberattacks in 2023, impacting over 343 million people, with data breaches soaring by 72 percent from 2021 to 2023. These striking figures highlight the urgent need for state-of-the-art cybersecurity in digital banking.

  • Cybersecurity in FinTech

WatchGuard’s Threat Lab cybersecurity research team forecast headline-stealing hacks involving LLMs, AI-based voice chatbots and VR/MR headsets. They also assess…

WatchGuard’s Threat Lab cybersecurity research team forecast headline-stealing hacks involving LLMs, AI-based voice chatbots and VR/MR headsets. They also assess the impact of the war on talent, AI spear phishing and QR codes.

Watchguard leading on Cybersecurity

WatchGuard Technologies, a global leader in unified cybersecurity, offers an annual batch of predictions covering the most prominent attacks and information security trends that the WatchGuard Threat Lab research team believes will emerge each year. This year, these include malicious prompt engineering tricks targeting large language models (LLMs), managed service providers (MSPs) doubling down on unified security platforms with heavy automation, ‘Vishers’ scaling their malicious operations with AI-based voice chatbots, hacks on modern VR/MR headsets, and more…

“Every new technology trend opens up new attack vectors for cybercriminals,” said Corey Nachreiner, chief security officer at WatchGuard Technologies. “In 2024, the emerging threats targeting companies and individuals will be even more intense, complicated, and difficult to manage. Therefore, with an ongoing cybersecurity skills shortage, the need for MSPs, unified security, and automated platforms to bolster cybersecurity and protect organisations from the ever-evolving threat landscape have never been greater.”

Cybersecurity predictions

The following is a summary of the WatchGuard Threat Lab team’s top cybersecurity predictions for 2024:

Prompt Engineering Tricks Large Language Models (LLMs)

Companies and individuals are experimenting with LLMs to increase operational efficiency. However, threat actors are learning how to exploit LLMs for their own malicious purposes as well. During 2024, the WatchGuard Threat Lab predicts that a smart prompt engineer ‒ whether a criminal attacker or researcher ‒ will crack the code and manipulate an LLM into leaking private data.

MSPs Double Down on Security Services Via Automated Platforms

There are approximately 3.4 million open cybersecurity jobs, and fierce competition for available talent. More SMEs will turn to trusted managed service and security service providers, known as MSPs and MSSPs, to protect them in 2024. To accommodate growing demand and scarce staffing resources, MSPs and MSSPs will double down on unified cybersecurity platforms with heavy automation using artificial AI and Machine Learning.

AI Spear Phishing Tool Sales Boom on the Dark Web

Cybercriminals can already buy tools on the underground that send spam email, automatically craft convincing texts, and scrape the Internet and social media for a particular target’s information and connections. However, a lot of these tools are still manual and require attackers to target one user or group at a time. Well-formatted procedural tasks like these are perfect for automation via AI and machine learning. This makes it likely that AI-powered tools to combat cybersecurity will emerge as best sellers on the dark web in 2024.

AI-Based Vishing Takes Off in 2024

Voice over Internet Protocol (VoIP) and automation technology make it easy to mass dial thousands of numbers. Once a potential victim has been baited onto a call, it still takes a human scammer to reel them in. This system limits the scale of vishing operations. But in 2024 this could change. The combination of convincing deepfake audio and LLMs capable of carrying on conversations with unsuspecting victims will greatly increase the scale and volume of vishing calls. What’s more, they may not even require a human threat actor’s participation.


VR/MR Headsets Allow the Recreation of User Environments

Virtual and mixed reality (VR/MR) headsets are finally beginning to gain mass appeal. However, wherever new and useful technologies emerge, criminal and malicious hackers follow. In 2024, cybersecurity researchers forecast that either a researcher or malicious hacker will find a technique to gather some of the sensor data from VR/MR headsets to recreate the environment users are playing in.


Rampant QR Code Usage Results in a Headline Hack

Quick response (QR) codes provide a convenient way to follow a link with a device such as a mobile phone. They have been around for decades, but mainstream usage has exploded in recent years. Furthermore, Threat Lab cybersecurity analysts expect to see a major, headline-stealing hack in 2024 caused by an employee following a QR code to a malicious destination.

  • Cybersecurity in FinTech

As digital payments continue their rapid ascent, understanding the accompanying cybersecurity challenges has never been more critical. Furthernore, with Statista…

As digital payments continue their rapid ascent, understanding the accompanying cybersecurity challenges has never been more critical. Furthernore, with Statista forecasting a robust 9.52 percent annual growth rate for digital payments from 2024 to 2028, the urgency to address these security concerns intensifies.

While this growth brings unparalleled convenience, it also introduces new security vulnerabilities that must be addressed. Cybersecurity is fundamental in safeguarding confidential data against hacking, fraud, and data breaches. Implementing effective cybersecurity measures can also maintain trust between businesses and clients while preventing financial loss. To optimise cybersecurity, identifying the current threats to digital payment systems is a must for businesses and consumers.

Current Cybersecurity Threats

Digital banks face various threats that continually evolve as technology advances. By addressing these challenges head-on, banks can protect their users and continue the growth of digital payment.

Many types of cyber threats can disrupt digital payment systems:

Phishing attacks: These attacks use deceptive emails, phone calls, or texts to trick victims into revealing personal information, such as login credentials and financial details. The scam can lead to other types of cyber threats.

Malware: Malicious software that infiltrates systems to steal data, monitor activities, or lock accounts. Various forms of malwares have different functions, such as Trojans, Worms, and Spyware.

Man-in-the-Middle (MitM) Attacks: intercept communications between the user and the bank allowing attackers to steal sensitive information or funds.

Data breaches: Unauthorised access to digital bank databases exposes vast amounts of sensitive information, including personal and financial data.

Ransomware: It is an attack that employs malware to infiltrate computer systems to steal data, monitor activities, or lock accounts. The attackers then demand payment and keep disrupting the devices/websites until they are paid.

Credential stuffing: Attackers use stolen usernames and password combinations from other breaches to gain unauthorised access to accounts.

DDoS and DoS attacks: Distributed Denial-of-Service (DDoS) attacks overwhelm the bank’s servers, making online services unavailable to customers. Unlike the Denial-of-Service (DoS) attack where a single source is used to flood the target, DDoS use multiple sources of compromised devices (botnets).

Insider threats: Employees or contractors with access to sensitive information may intentionally or unintentionally cause data breaches or other security incidents.

Social engineering: Manipulating individuals into divulging confidential information through psychological manipulation.

Zero-Day Exploits: Attacks that exploit previously unknown vulnerabilities in software or hardware before patches are available.

Cybersecurity Measures

Encrypting data is essential to convert the personal information into a secure format. This encrypted data can only be accessed with the correct key or description. This ensures that the data remains secure and unreadable after interception.

Multi-Factor Authentication (MFA) adds a layer of security by requiring some form of verification before granting access to the platform. Tokenisation replaces critical payment data with a unique or random token that cannot be hacked once intercepted.

Biometric verification, such as fingerprint and facial recognition, provides additional security by utilising unique physical characteristics. These include the shape of the face and the outline of a fingerprint, both of which are difficult to replicate.

Financial institutions have also innovated to improve cybersecurity by implementing artificial intelligence (AI). For example, JPMorgan Chase has implemented an AI-driven fraud detection system. This application is used for monitoring transaction activity in real-time. It can also detect potential threats or fraudulent transactions using the data analytics tool.

Regulatory Requirements

Financial companies are obligated to meet regulatory compliance. It is important to build customers’ trust and avoid legal or financial penalties. For global financial institutions, regulatory issues might be more complex as each country has its version of rules. As cyber threats evolve, regulators continuously update and enforce these requirements to address new challenges in digital payment systems.

For instance, UK regulations have set strict rules to ensure the security of digital payments. These include data protection measures, and companies that do not prioritise cybersecurity will face substantial fines. Similar regulations have been implemented across European Union (EU) Member States, compelling financial institutions to enhance cybersecurity to create a safe digital payments environment for consumers.

  • Cybersecurity in FinTech
  • Digital Payments

With the growing popularity of digital payments, cybercriminals have found a lucrative target. Cybersecurity data breaches rose sharply by 72%…

With the growing popularity of digital payments, cybercriminals have found a lucrative target. Cybersecurity data breaches rose sharply by 72% in 2023 compared to the previous record-breaking year. This shows the need for financial technology companies to implement strong banking security.

While digital payments offer benefits, businesses must protect themselves and their customers from cyber threats. Understanding the common cyber threats and implementing effective countermeasures are key to long-term success.

The Importance of Cybersecurity for Digital Transactions

With the increasing reliance on online platforms for financial activities, the risk of cyberattacks has grown exponentially. These attacks can lead to significant financial losses, damage to reputation, and erosion of customer trust. From identity theft to data breaches, the consequences of compromised security can be severe.

To prevent such consequences, cybersecurity measures are required for every financial institution. By applying cybersecurity best practices such as encryption, strong authentication, and regular security audits, organisations can protect customer data, prevent fraud, and maintain operational resilience.

Threat Landscape

Cybercriminals employ various tactics to exploit vulnerabilities in digital systems. Phishing attacks, a common method, deceive users into divulging sensitive information through fraudulent emails or websites. Another prevalent threat is ransomware, where cybercriminals encrypt a victim’s data and demand payment for decryption.

Additionally, unauthorised access to accounts through stolen credentials can lead to financial loss. These cyber threats highlight the need for a security framework to protect digital transactions against malicious activities.

Best Practice 1: Encryption

Cybercriminals can easily exploit vulnerable systems, leading to substantial financial losses and reputational damage. A data breach can cost millions of dollars to rectify, including expenses for recovery and ransom payments. A recent IBM report indicates that the average global cost of a data breach exceeds $4.45 million. 

Encryption safeguards sensitive information by transforming it into an unreadable format, accessible only to authorised parties possessing the correct decryption key. This cryptographic process employs complex algorithms and keys to safeguard data integrity and confidentiality.

Best Practice 2: Multi-Factor Authentication

Cybercriminals can easily steal passwords and pins through brute-force attacks, systematically testing numerous combinations until successful. Multi-factor authentication (MFA) offers a robust defence against this threat.

Requiring users to provide multiple forms of identification strengthens account security. This authentication combines different types of verification. This includes information only the user knows, like passwords, items the user possesses, such as security tokens, and unique physical traits, like fingerprints.

By requiring multiple verification steps, banks and financial institutions create a formidable barrier against unauthorised access to sensitive information and funds. Additionally, multi-factor authentication enhances user account management by requiring unique authentication factors for each individual.

Best Practice 3: Employee Training

Organisations with regular cybersecurity training experience a 40% reduction in security incidents compared to those without, according to  This emphasis on employee education is justified as human error remains a primary target for cybercriminals.

Hackers frequently exploit employee vulnerabilities through tactics like phishing, social engineering, and other deceptive methods. By training employees to recognize these threats, financial institutions can mitigate the risk of data breaches and financial losses.

Such incidents can result in substantial financial losses and damage to an institution’s reputation. Consequently, comprehensive cybersecurity training is essential for all bank employees to mitigate these risks.

Best Practice 4: Regular Security Audits

A security audit is an evaluation of an organisation’s digital infrastructure, designed to identify vulnerabilities that could compromise digital transactions. This process involves examining security policies, testing safeguards, and ensuring compliance with industry regulations.

Given the escalating complexity of cyber threats, financial institutions must prioritise regular security audits. Banks can uncover weaknesses before malicious actors exploit them by scrutinising systems and processes.

Regular security audits empower organisations to proactively strengthen defences by implementing essential safeguards such as firewalls, antivirus software, and antimalware solutions. To ensure impartiality and objectivity, it is essential to engage an independent expert to conduct these assessments.

Best Practice 5: Incident Response Planning

As the frequency and sophistication of cyber threats continue to rise, the need for robust defences becomes increasingly critical. Safeguarding digital transactions requires a proactive approach, including a well-defined incident response plan.

An incident response plan is a crucial component of any organisation’s cybersecurity strategy. This formal document outlines strategies for preventing, detecting, and responding to security breaches that could compromise financial data. By establishing clear protocols and assigning specific responsibilities, banks can minimise the impact of cyberattacks and protect both their reputation and customers’ assets.

To be effective, an incident response plan must be established in advance and assigned to specific teams. By following established frameworks, such as those provided by the National Institute of Standards and Technology (NIST) and SANS, organisations can develop comprehensive plans. These resources offer detailed guidance on handling various types of security incidents to ensure a coordinated and efficient response.

Conclusion

Protecting digital transactions requires a multi-faceted approach. Implementing cybersecurity measures is essential for protecting sensitive financial data and maintaining customer trust.

Encryption and multi-factor authentication are foundational elements of a strong security posture. Encryption safeguards data by rendering it unreadable to unauthorised individuals, while multi-factor authentication adds an extra layer of protection by requiring multiple forms of verification. These are just two examples of critical best practices financial institutions should adopt.

Financial institutions must prioritise cybersecurity to maintain customer trust and protect their bottom line. By investing in advanced security measures and staying vigilant against emerging threats, organisations can effectively mitigate risks and ensure the integrity of digital transactions.

  • Cybersecurity in FinTech

From AI to multi-factor authentication, here are 7 cybersecurity solutions keeping financial institutions’ critical data secure.

Data belonging to 20.4 million UK citizens was affected by cyberattacks made against financial institutions at the end of 2023. This represents a 143% increase from the 8.4 million individuals affected in the previous year. The demand for robust cybersecurity is ever-increasing in financial institutions.

Financial Institutions encompass a wide range of businesses dealing with financial and monetary transactions, including banks, insurance companies, and brokerage firms. These institutions are pivotal for a functioning capitalist society, simplifying transactions, enabling individuals and entities to seek investment or lend money, and assisting in managing assets.

The increasingly digitalised nature of the economy, including the rise of online-only financial institutions like challenger banks, has accelerated the development of financial technologies and their adoption in the market. As a result, Software as a Service (SaaS) for finance, such as digital banking, electronic payment, online investment, and other online-based services, makes financial services more accessible to the consumer. But, with the ease of access technologies provided, new challenges have also emerged, especially regarding cybersecurity.    

Financial institutions are enticing targets for cybercriminals. Therefore, cybersecurity has become integral to banking security in protecting data from malicious attacks. 

Here are seven top cybersecurity solutions to secure data from online threats.

1. AI-Powered Threat Detection

The ability for AI models to perform pattern recognition on large amounts of unstructured data is opening up an exciting new frontier in threat detection for cybersecurity teams. AI tools can potentially flag subtle differences, anomalies, and patterns that could point to a zero-day threat or the presence of a bad actor in the system. 

Some industry experts believe that AI-powered threat detection will be pivotal in helping cybersecurity teams respond to rapidly evolving cyberattack strategies that are increasingly difficult to combat — somewhat ironically, this uptick in the frequency and sophistication of attacks is at least partially due to the availability of AI tools, which hackers are also putting to use. 

AI’s adaptive learning and advanced recognition capabilities enable automated responses to threats and can predict future risks by analysing past patterns. This helps reduce false positives and saves security teams time on assessments.

2. Multi-Factor Authentication

Multi-factor authentication has quickly become the standard in security and identity protection as more and more people bank, shop, and administer their lives entirely online. Put simple, it’s a multistep account login in which more information besides username and password must be provided. 

Typically referred to as “something you have, something you know”, multi-factor login procedures drastically reduce account hacking, allowing security teams to detect suspicious activity that occurs in the logging processes. 

3. DDoS Mitigation

Distributed Denial of Service (DDoS) is a coordinated cyberattack that overwhelmingly sends a request to the server simultaneously, which makes the server slow down or even go offline. DDoS mitigation is important for banking service security to prevent the interruption of vital services. 

Cynersecurity teams can perform DDoS mitigation by implementing a load balancer, restricting requests from certain places, and blocking communication from outdated or unused ports, protocols, and applications.

4. Compliance

Compliance is vital to both ensure the security of systems and organisations against cyber attack, but also to prevent legal penalties and repercussions if an organisation is found to be in breach of existing regulations. These regulations ensure that an organisation’s cybersecurity set up is in line with the security and data protection laws in the countries where it operates, with the end goal of mitigating risk to the consumer — or just people in general whose data is collected and kept by the company. 

There can be serious legal and financial risks associated with non-compliance — tied to both finance and cybersecurity. For example, in 2021, Natwest was fined over £264 million by the FCA for its extended failure to identify and prevent money laundering. Since the FCA was established, there has not been a year when its total fines issued have been less than £1 million. In the UK, other financial and cybersecurity compliance regulations are DPA 2018, UK GDPR, NIS regulations, and the Computer Misuse Act 1990.

5. Database Activity Monitoring

Database Activity Monitoring refers to any set of tools that monitors and analyses database activity. The goal of this monitoring is to flag and report deceptive, illegal, or undesired behaviour taking place within a system. Ideally, these tools run and operate without any serious impact on user experience.

Because most databases don’t monitor or flag suspicious activity by default, unless you have a tool that handles activity monitoring, making third party solutions a necessity in many cases. According to monitoring software solutions vendor Cyral, most systems also don’t collect enough data to enable “a full forensic investigation of historical breach events.” Also, databases that do often log and store this information inside the database itself. Any attacker that gains access to the database can then, supposedly, have write access to the full collection of tables (as is often the case), meaning they can easily delete any activity rows associated with their presence and theft of data.

6. SQL Injection Prevention

SQL injection is a code injection technique attackers use to steal, spoof, and manipulate data. An effective SQL injection attack can result in attackers gaining unapproved access to sensitive data like including credit card information, PINs, or other private information. In banking security, a failure to prevent SQL injection can result in attackers altering balances, voiding transactions, and even transferring money to their bank accounts. 

Cyberattackers inject malicious SQL code into the backend of a target system when they discover defenceless user inputs in a web application or web page. The hackers can then use this opening to locate the IDs of other users within the database, impersonating these users — usually those with data privileges such as the database administrator — to run malicious code within the system. 

7. Regular Risk Assessment and Training

Perhaps most importantly, the best defence against the rising tide of cybercrime is a cybersecurity conscious culture. Financial institutions should conduct regular risk assessments manually to identify potential vulnerabilities and threats to their systems and networks. 

They should regularly evaluate and revise systems and networks based on analytics and assessments to prioritise cybersecurity initiatives and protect vital assets. Security teams shouls also conduct periodic security awareness training, which can strengthen cyber-readiness among finance personnel. This is particularly important given the rise in generated AI-driven phishing campaigns and other technologically democratised forms of cyber crime.  

Case Study – Cybercriminals in UK Businesses

An investment article from IFA magazine reported 300,000 cybersecurity breaches in finance institutions across the UK in 2022 alone, making them the second-highest number of data breaches from all industries after the IT sector. Reports estimate losses in the region of £27 billion per year, with small businesses in the UK affected the most by cyberattacks, usually phishing. 

The UK authority encourages its citizens to be more aware of the possibility of cyberattacks, especially phishing and fake charity emails, as online threats are growing exponentially. Ledi Sallilari from the SEO consulting firm Reboot also suggested that more complex passwords can help prevent account breaches. 

The rapid expansion of internet usage brings new challenges for cybersecurity. Proper knowledge and awareness about cyber criminals should become mandatory for all Internet users to protect their online data.

Financial institutions, responsible for managing customer funds, need to implement strong cybersecurity measures. With more secure backend systems, they can protect assets and maintain customer trust in an increasingly digital world.

  • Cybersecurity in FinTech

AI, real-time monitoring, and machine learning are helping fintech firms stay ahead of growing cyber threats.

The financial sector faces a growing threat—cybercrime.

Cybersecurity Ventures predicts a significant rise in cybercrime costs, with the total impact of hacks, breaches, and data theft potentially reaching as high as $10.5 trillion a year by 2025. As attacks become more common and more severe, mitigating these risks and preventing fraud is paramount for financial institutions and financial technology companies alike.

Luckily, ongoing advancements in technology offer fintech organisations a powerful arsenal of weapons to combat cybercrimes. Adaptive fraud prevention systems use artificial intelligence (AI) to detect and prevent fraudulent activity in real-time. These intelligent systems continuously learn from new data, allowing them to identify evolving patterns and improve cybersecurity.

Introduction to cyber fraud protection

Cybersecurity is crucial in the financial services industry, where sensitive financial data and transactions are a prime target for cybercriminals. Moreover, cyber attacks can inflict significant financial losses, not just through direct theft but also via hefty regulatory fines, legal costs, and reputational damage.

Financial institutions have a responsibility to safeguard customer trust by implementing robust cyber fraud protection measures. This includes advanced technologies like network security, intrusion detection systems, and malware protection.

By securing financial transactions and customer data, these measures not only deter cyberattacks but also mitigate their impact, fostering customer confidence in the bank’s security posture.

Common types of Cyber fraud

The financial sector occupies a bull’s-eye for cybercriminals, ranking second only to healthcare in global cybercrime costs according to the IBM Cost of a Data Breach Report 2023. Financial institutions face an average loss of $5.9 million per cyber incident, highlighting the critical need for robust cyber fraud protection measures.

These attacks come in various forms. One of the most common isphishing scams. These are attempts to trick people into surrendering sensitive information. Meanwhile, ransomware attacks aim to disrupt operations or extort money by encrypting critical data. Distributed Denial-of-Service (DDoS) attacks overwhelm systems with traffic, making essential services unavailable to legitimate customers.

Advanced cybersecurity technologies

The fight against cyber fraud necessitates sophisticated tools, and advanced technologies like AI and machine learning (ML) are playing an increasingly crucial role.

AI fraud detection uses ML algorithms to identify fraudulent activities within vast datasets. These algorithms are trained to recognise patterns and anomalies that deviate from typical user behaviour and transaction patterns. Once the patterns are identified, attackers can be purged from the system before they have a chance to steal anything of value. Cybersecurity systems powered by ML can drastically reduce the amount of time bad actors spend inside a system.

ML algorithms excel at identifying patterns and trends that might signal potential fraud. Also, by analysing big data, these algorithms can adapt quickly to evolving fraud tactics.

They can detect and alert security teams within seconds of suspicious behaviour, such as unusual purchases or login attempts from unfamiliar locations. Thanks to continuous data analysis, businesses can gain an immediate advantage, allowing them to swiftly identify and respond to suspicious activity, ultimately minimising potential losses.

Case studies

The financial sector is actively exploring the potential of AI to combat cyber fraud. Mastercard’s Decision Intelligence technology exemplifies this trend. By analysing historical spending habits, this AI solution creates a personalised baseline for each cardholder’s behaviour.

This approach is a significant improvement over traditional, one-size-fits-all methods, which often lead to false declines. AI’s contextual analysis of transactions allows it to bypass common triggers for false positives, ultimately enhancing fraud detection accuracy.

Future prospects

The future of cyber fraud protection hinges on the continued evolution of technology. One promising area lies in adaptive technologies, such as behavioural biometrics. Additionally, these systems move beyond static passwords or fingerprints, creating a unique user profile based on a person’s interaction patterns.

These patterns are ‘behavioural fingerprints’ that include typing style, mouse movements, and even how an individual holds their phone. Over time, the system learns user habits, building a digital identity that can detect deviations indicative of unauthorised access.

This approach is particularly effective because it’s nearly impossible for hackers to replicate one’s unique behavioural traits, even if they steal the password. This adds a crucial layer of security that traditional methods cannot provide.

  • Cybersecurity in FinTech

The digital banking industry faces cybersecurity challenges. A Statista report shows a 10 percent jump in global malware attacks in…

The digital banking industry faces cybersecurity challenges. A Statista report shows a 10 percent jump in global malware attacks in 2023, reaching 6.06 billion incidents.

Cybercriminals are growing more skilled, leading to more frequent data breaches that expose vulnerabilities in banking security. Moreover, effective risk management and strong network protocols are essential to securing digital banking operations.

Introduction to Cybersecurity in digital banking

As online transactions become the norm, strong cybersecurity measures become more crucial. Banks keep sensitive financial data and handle high-value transactions, making them prime cyberattack targets.

Effective cybersecurity is a multi-layered approach. Also, it combines advanced technology, strict policies, and constant monitoring to fight cyber threats. These security measures shield not only a bank’s finances but also customer personal information.

For that reason, cybersecurity is the foundation of trust and reliability in finance. Without strong security protocols, the balance between innovation and managing risk is disrupted, potentially shaking customer confidence in digital banking.

Early Cybersecurity practices

The rise of the internet gave birth to a new genre of malicious activity. Cybercriminals emerged to target this new frontier. They launched worms, malware, and phishing attacks.

In response to these escalating threats, the 1990s saw the introduction of firewalls and antivirus software. Additionally, these early security measures acted as barriers between networks to protect systems from unauthorised access.

Cybercriminals constantly develop new viruses and threats. Likewise, antivirus companies continuously create new software patches and signature updates to stay ahead. Despite that, the possibility of new threats slipping through these defences remains a challenge.

Technological advancements

Fraud is a major challenge for financial institutions. Artificial intelligence (AI) has emerged as a powerful weapon in the fight against this threat.

This technology excels at detecting various types of fraud. AI algorithms can detect suspicious activity in real time, helping prevent fraud before it happens.

AI solutions go beyond simple detection. By creating detailed profiles of each customer and tracking their activities, AI can predict potential risks and prevent fraud proactively.

Current Best Practices

A strong foundation is critical to banking security. This includes constantly checking for weaknesses through risk assessments. Digital banks must update their security protocols regularly to keep pace with changing risks. Collaborations with other financial institutions and government agencies help banks stay informed about the latest threats and how to respond.

Data classification is also essential. Banks need strict controls on who can access sensitive information. Employee security training must be regular to make them aware of threats.

Case Studies

The digital bank Starling Bank partnered with cybersecurity firm HackerOne in 2019. This partnership created a streamlined system for anyone to report weaknesses found in its apps and website.

The initiative initially focused on specific areas and common vulnerabilities. This collaboration revealed valuable insights into weaknesses often missed during standard testing. The project’s findings allowed Starling to develop automated detection tools that proactively prevent security issues.

A report by Statista predicts the global cybersecurity market will hit $271.90 billion in 2029, highlighting the growing need for strong defences in digital banking. While still new, quantum computing presents a future hurdle. Its ability to crack current encryption methods means new, quantum-resistant cryptography needs to be developed for banking security.

However, machine learning and AI are expected to be adopted more widely in cybersecurity. Beyond just reacting to threats, financial institutions will also increasingly focus on proactive threat hunting. This means identifying and stopping potential vulnerabilities before they can be exploited.

  • Cybersecurity in FinTech

The FinTech sector has changed how we manage our money. From mobile banking apps to robo-advisors, FinTech offers a new…

The FinTech sector has changed how we manage our money. From mobile banking apps to robo-advisors, FinTech offers a new level of convenience and efficiency. But with this convenience come challenges and cybersecurity responsibilities: safeguarding the vast amount of sensitive financial data entrusted to these platforms.

Cybersecurity is no longer an afterthought for FinTech companies; it’s an essential foundation for their success. Breaches exposing financial information can have devastating consequences, not just for the companies involved but for their users as well.

Understanding these cyber threats is crucial for FinTech companies aiming to safeguard their operations and customer data. Here are the top 10 cybersecurity risks FinTech firms must be aware of in 2024.

1. Phishing Attacks

Phishing attacks trick people into divulging personal information. Cybercriminals often pose as legitimate companies through emails, texts, or phone calls. They llure victims into clicking malicious links or revealing passwords.

Phishing attacks significantly threaten financial companies because they target the human element rather than technological weaknesses. Hackers impersonate trusted sources like banks or colleagues to trick employees into revealing sensitive information or clicking malicious links. It can lead to data breaches, financial losses, and account takeovers.

2. Ransomware

Ransomware attacks involve cybercriminals holding sensitive data hostage and demanding a ransom from the victim. FinTech companies are particularly vulnerable to ransomware attacks because they rely on digital systems and customer financial data.

These attacks can impair operations, damage reputations, and lead to significant financial losses. They can be devastating, as there is no guarantee that paying the ransom will result in the safe return of the data.

3. Insider Cybersecurity Threats

FinTech companies may face a unique cybersecurity threat from their employees, known as insider threats. These insiders can be malicious, accidentally negligent, or even tricked into compromising sensitive data. Malicious insiders might steal financial information or sabotage systems for personal gain. Negligent insiders could leave data exposed or fall victim to phishing scams, unintentionally giving away access.

4. DDoS Attacks

Distributed Denial of Service (DDoS) attacks overwhelm online systems with traffic, making them inaccessible to legitimate users. FinTech firms are attractive targets for these attacks because they offer multiple entry points (banking systems, online accounts) and prioritise constant service availability.

DDoS attacks can severely hurt a FinTech company’s reputation and finances by causing downtime, raising security concerns among customers, and potentially leading to data breaches during the distraction.

5. Malware

FinTech companies are prime targets for malware attacks, accounting for 19 percent of all attacks and suffering nearly US$18.3 billion in losses in 2017. While the number of traditional banking malware strains is decreasing, it doesn’t represent a decline in overall threat. Instead, attackers are developing more sophisticated malware that uses techniques like obfuscation and slow, staged attacks to bypass antivirus detection.

6. Data Breaches

FinTech companies are under fire due to data breaches exposing sensitive financial information. Hackers exploit security flaws to steal user data, leading to financial losses, identity theft, and damaged trust. To combat this, strong encryption methods like end-to-end encryption and tokenisation can scramble data, making it useless to attackers.

7. Mobile Security Risks

Despite offering convenient access to financial services, mobile apps are a double-edged sword for FinTech companies. These apps are vulnerable due to their popularity, making strong security practices essential. Regular security updates, secure coding from the start, and robust data encryption during transmission are crucial to patching weaknesses.

8. Third-Party Cybersecurity Risks

The reliance on third-party vendors for services and integrations creates a security blind spot for FinTech firms. To address this, thorough vetting through due diligence and vendor risk assessments is crucial before forming partnerships.

9. API Vulnerabilities

FinTech companies rely heavily on Application Programming Interfaces (APIs) to enhance customer interfaces and share information across systems. While APIs are essential for data exchange, they also open doors for cyberattacks.

To fortify their defences, FinTech companies need to focus on secure API design with solid authentication methods (like OAuth or API keys), constant monitoring, and regular security assessments to identify and fix weaknesses before they become exploited.

10. Artificial Intelligence & Machine Learning Risks

The use of artificial intelligence (AI) and machine learning (ML) has increased in FinTech for decision-making processes. While beneficial, these systems also present risks if they make inaccurate decisions based on incorrect data. Rigorous testing and monitoring of AI and ML systems are necessary to minimise these risks.

Steps to mitigate threats

The cybersecurity threats facing FinTech in 2024 are varied and complex. FinTech firms must prioritise cybersecurity to protect customer data and maintain trust. By researching technology usage, training employees on cybersecurity, regularly monitoring suspicious activity, and building advanced security systems, FinTech companies can improve their defences against these evolving threats.

  • Cybersecurity in FinTech

With more financial transactions shifting to digital platforms, having proper cybersecurity measures becomes a priority.

Moreover, data is at the heart of every fintech company, which makes them attractive targets for hackers and malicious actors.

Financial technology has created new opportunities for customers and businesses in the finance industry. Individuals can now borrow, transfer, save, and invest from the convenience of their homes. Also, the growth of the industry is massive, with fintech revenues projected to grow sixfold from $245 billion to $1.5 trillion by 2030.

However, following that growth are security risks associated with it. Accounting services firm BPM predicts that cybersecurity attacks aimed at fintech companies will only continue to grow in 2024 and beyond. Furthermore, these attacks can end in monetary losses, reputational damage, and brand erosion.

To prevent such cases, fintech security leaders globally have implemented cybersecurity measures.

1. Stripe

Founded in 2010 by Patrick and John Collison, Stripe specialises in payment processing software and application programming interfaces (APIs).

Based in South San Francisco, California, the company offers top-tier encryption and secure transmission protocols. The protocols, which adhere to the PCI DSS standards, are in place to ensure the security of credit and debit card data.

Launched in 2018, Stripe’s innovative tool Radar detects and blocks fraudulent transactions. After its 2.0 update in 2018, the company claimed it helped reduce fraud rates by an additional 25% for its users.

With other services like Stripe Terminal, Stripe Tax, and Stripe Capital, Stripe has become a trusted name in online payment processing. It powers payments for major companies like Amazon, Google, and Shopify, all of which demand high-security standards.

2. Square

Owned by Block, Inc., Square was launched in 2009 by CEO Jack Dorsey and co-founder Jim McKelvey. Square offers an all-in-one financial services platform, including customer booking, e-commerce, payroll, shifts, loan financing, and banking.

In 2021, Square received FDIC approval from the Utah Department of Financial Institutions. Additionally, with end-to-end encryption, regular vulnerability assessments, and secure data storage, Square reached Level 1 PCI DSS certification. This is the highest level for payment processor certification.

3. PayPal

Launched in 2000 from the merger of Confinity and X.com, PayPal is a leader in secure online transactions.

Acquired by eBay in 2002, PayPal became the leading global payment application after eBay discontinued its Billpoint service. It has arguably outpaced competitors like Citibank C2IT, Yahoo! PayDirect, and BidPay from Western Union.

PayPal uses advanced encryption technologies and multi-factor authentication to protect user data. With its continuous monitoring and fraud prevention mechanisms, the company is compliant with industry standards.

According to the company, its fraud detection tools are informed by data from 1 billion monthly transactions. It claims that the tool gets smarter with each transaction.

4. Ant Financial (Alipay)

Ant Financial’s Alipay, is the second-largest international payment processor after Visa.

Founded in 2014 by Jack Ma as an affiliate of Alibaba, Ant Financial offers a range of products. Available services include electronic payment processing, banking, and mobile payments through brands like Yu’ebao, Huabei, and Xianghubou.

Ant Financial combines advanced cybersecurity measures such as AI-driven fraud detection, biometric authentication, and data encryption. Alipay itself also holds the internationally recognized ISO/IEC 27001 cybersecurity certification.

Used by more than 1.2 billion users, Ant Financial is protected by its AI-powered risk engine AlphaRisk. With the tool, Alipay’s fraud loss rate has been kept under 0.64 in 10 million, way lower than the industry average.

5. Plaid

Established in 2013 by Zack Perret and William Hockey, Plaid is an embedded financial platform. It facilitates secure online payments and transactions by connecting users’ bank accounts to finance applications.

Plaid ensures authorised access to bank data through secure bank portals, which eliminates the need for user credentials. In October 2020, Plaid introduced “Plaid-Link,” a service that enables real-time payments for loans, insurance, and wages. It securely connects 12,000 US financial institutions, plus many more in Canada, the UK, and Europe.

6. Chime

Founded in 2012 by Chris Britt and Ryan King, Chime partners with regional banks to offer fee-free mobile banking services. Chime uses encryption, access protocols, continuous monitoring, and proactive fraud prevention to keep its payment processes secure.

In April 2020, Chime launched the fee-free overdraft product “SpotMe.” It successfully processed $375 million in Economic Stimulus Payments one week from the scheduled government disbursement.

7. Adyen

Adyen, listed on Euronext Amsterdam, is a Dutch FinTech company founded in 2006 by Arnout Schuijff and Pieter van der Does. Primarily catering to businesses, Adyen offers e-commerce, mobile, and POS payment solutions. The company successfully achieved 1.3 billion euros in revenue in 2022.

Adyen’s cybersecurity measures include encryption, tokenization, secure data storage, and regular security assessments, all backed by Level 1 PCI DSS certification.

8. Sift

Founded in 2011, Sift is one of the cybersecurity companies providing AI-powered fraud platform. It uses machine learning combined with data network scoring 1 trillion events per year to offer security solutions.

The company notices that online fraud is a growing problem, especially for retailers and financial institutions. Therefore, Sift’s algorithm distilled over hundreds of millions of user actions to create fraud pattern recognition tool.

Sift has received several accolades, including being named a leader in 2023 Forrester Wave for Digital Fraud Management and G2’s Momentum Leader in Spring 2024.

9. Darktrace

Cybersecurity company Darktrace, established in 2013, uses AI to respond to cyber threats in real time. Since its inception, the tools it created has been deployed over 9,000 times.

With its Enterprise Immune System technology, Darktrace is able to handle Industrial Operational Technology, email, SaaS, cloud, network, and endpoint safety. More than 9,400 organisations, including major financial institutions, rely on its advanced solutions.

The company was included in The Cyber Award’s AI Product of the Year in 2020 and Fast Company’s top 10 most innovative AI companies for 2022.

10. Netskope

Cloud-based cybersecurity company Netskope was founded in 2012 to help organisations apply zero trust principles. The company’s solutions protect data across cloud services and apps, which makes it pivotal for fintech institutions relying on such technologies.

The California-based firm helps financial services companies meet compliance requirements such as FINRA, PCI-DSS, GLBA, and GDPR. Not only that, it provides necessary protection, such as SWG, CASB, ZTNA, DLP, Cloud Firewall and SD-WAN.

In 2024, Netskope is recognized as a leader in the Gartner Magic Quadrant for Cloud Access Security Brokers (CASBs).

What makes these a success

These top cybersecurity firms in fintech have set high standards in cybersecurity. Their efforts have significantly contributed to a safer digital landscape for fintech.

They have also demonstrated collaboration with fellow financial or cybersecurity experts. Collaboration means having access to specialised knowledge that may not be available in-house. This includes latest threat intelligence, security tools, and tailored audits.

Additionally, it is imperative that companies adhere to industry standards and regulations. Compliance is the first step in building trust with users and stakeholders alike.

With 64% of financial services institutions falling victim to ransomware attacks last year, finance organisations should follow best practices from these companies.

  • Cybersecurity in FinTech

Digital transformation has introduced new challenges in financial cybersecurity.

The banking industry has shifted towards online transactions, leaving behind the days of brick-and-mortar branch visits for check cashing or deposits. As more and more sensitive data is transferred through internet banking technology, ensuring its security becomes paramount.

According to a 2023 survey by the Financial Services Information Sharing and Analysis Centre, 89% of financial institutions are increasing their cybersecurity budgets in 2024. This investment underscores the need for advanced internet banking security measures despite the existence of various security protocols.

In this article, we’ll explore the latest trends in internet banking security, examine real-world cases of cyberattacks, and provide valuable insights into securing your financial institution’s technological infrastructure.

Introduction to Internet Banking Security

As online banking becomes increasingly prevalent, financial institutions must prioritise cybersecurity – implementing specific measures to safeguard their systems and networks from cyberattacks.

Cybersecurity challenges in internet banking are multifaceted. Hackers employ a variety of techniques, including hacking attempts, data breaches, identity theft, malware, and viruses, to gain unauthorised access to sensitive customer data and financial assets.

A successful cyberattack can not only compromise sensitive information but also disrupt critical bank operations, causing significant inconvenience for customers and potentially leading to financial losses.

Common Cybersecurity threats

A 2021 report by IBM highlights the high cost of data breaches in the financial sector, placing it second only to healthcare. This vulnerability stems from the immense value of economic data, which can be exploited for fraud and other cyberattacks.

Beyond data breaches, financial institutions must also be vigilant against ransomware infections, phishing scams, and account takeover attempts. These threats carry the potential for data loss, operational disruption, and significant financial consequences.

In phishing attacks, cybercriminals impersonate bank representatives via emails, calls, or SMS messages. Their objective is to deceive customers into divulging sensitive information such as login credentials or credit card details.

Meanwhile, malware attacks take various forms, including worms, viruses, spyware, ransomware, and Trojans. These malicious programs can infiltrate devices, servers, or networks. If a customer’s infected device connects to the bank’s network, it poses a significant threat to overall financial cybersecurity.

Impact on consumers and banks

Cybersecurity breaches create huge consequences for both consumers and financial institutions. Consumers directly impacted by a breach may find their personal information exposed on the black market, thereby increasing their risk of identity theft.

The impact on banks, however, extends far beyond immediate financial losses from stolen funds. Beyond the initial financial blow, banks face the additional challenge of a potential erosion of customer trust. When customers fear their money is at risk, their confidence in the bank’s ability to protect them diminishes.

Mitigation Strategies

The first line of defense in ensuring robust financial cybersecurity lies within a well-trained workforce. Equipping employees with cybersecurity best practices empowers them to identify potential threats like phishing attempts or suspicious software. Regular training ensures awareness remains high and employees are prepared to act appropriately.

Organisations should also implement comprehensive cybersecurity policies and procedures. These policies should clearly outline acceptable online behaviour, data handling practices, and incident response protocols. Regularly reviewing and updating these policies ensures they remain relevant against evolving cyber threats.

Case Studies

One such case involved a social engineering attack on Experian’s South African office. A cybercriminal impersonated a representative from one of Experian’s clients and tricked an employee into releasing sensitive internal data.

Although Experian downplayed the information’s sensitivity, the South African Banking Risk Information Center reported that the breach affected a staggering 24 million customers and nearly 800,000 businesses. The compromised data eventually surfaced on a dark web forum in 2021. Fortunately, with law enforcement assistance, the data was promptly removed before widespread exploitation occurred.

The second case involves a data breach at Flagstar Bank, a major US financial institution. In 2022, the bank suffered a significant breach exposing the social security numbers of nearly 1.5 million customers. While Flagstar initiated incident response protocols and stated no evidence of data exploitation, they still advised customers to closely monitor their credit and promptly report any suspicious activity.

The cybersecurity landscape for banks is constantly shifting, demanding ongoing vigilance and adaptation. Advanced persistent threats (APTs) remain a major concern, as these actors employ sophisticated techniques to infiltrate networks and steal sensitive data.

Furthermore, the growing number of Internet of Things (IoT) devices introduces new vulnerabilities, potentially leading to large-scale breaches and botnet attacks. Emerging technologies like AI and quantum computing pose further challenges. 

While these technologies hold promise for enhancing security, they could also be exploited by malicious actors to launch more potent cyberattacks. Therefore, staying ahead of the evolving threat landscape will be a key focus for the future of cybersecurity in banking.

  • Cybersecurity in FinTech

Because digital banking involves sensitive personal and financial information, it has unique cybersecurity needs to protect against hackers and fraud.

Cybersecurity is a vital component of digital banking. Customers need to trust systems to manage their money online through apps or websites, without visiting a physical bank. This offers convenience, allowing users to check balances, transfer money, pay bills, and even apply for loans from their computers or smartphones.

Because digital banking involves sensitive personal and financial information, it has unique cybersecurity needs to protect against hackers and fraud. One key security measure is encryption, which scrambles data so that only authorised users can read it.

Another important measure is two-factor authentication, which requires users to provide two forms of identification, such as a password and a code sent to their phone, to access their accounts. These measures help ensure that digital banking remains safe and secure for users.

Cybersecurity Risks and Preventative Measures

One of the biggest concerns in the banking industry today is the security of mobile banking apps. As more people use these apps for financial transactions, weak security measures can make them vulnerable to hacks.

Additionally, banks face threats from third-party organisations, as hackers often target less secure shared banking systems. Third-party networks cab also be hijacked to gain unauthorised access. The growing field of cryptocurrency also presents new cyber threats… The unstable nature of cryptocurrency and limited understanding of securing these digital assets make them attractive targets for cybercriminals.

To protect against cyber attacks, banks are implementing various preventative measures. Conducting thorough security audits helps find system weaknesses. Setting up strong firewalls while updating antivirus and anti-malware software creates a solid defence against cyber threats. Multi-factor authentication (MFA) and biometrics add extra security layers, making it harder for unauthorised users to access accounts.

Automatic logout features end user sessions after inactivity. Meanwhile, banks are educating customers about secure practices like avoiding public Wi-Fi for banking and regularly updating passwords. These combined efforts enhance the overall cybersecurity of the banking sector.

The Importance of Regulatory Compliance

Regulatory compliance is crucial in digital banking cybersecurity for several reasons. First, it ensures the protection of customer data. Regulatory standards include guidelines that help banks protect sensitive information. This reduces the risk of data breaches and identity theft. Compliance also builds and maintains customer trust. When customers know that a bank follows security standards, they feel more confident about the safety of their financial information.

Following regulations helps banks avoid legal problems, including fines and sanctions, which can be costly and harm their reputation. Regulations provide a framework for consistent security practices across the industry. This ensures all banks meet a basic level of security to prevent gaps that hackers might exploit. Additionally, compliance requires banks to conduct regular risk assessments and audits, helping to identify weaknesses and strengthen their cybersecurity measures.

Regulatory compliance also ensures that banks are prepared to maintain operations and protect customer data, even during cyber attacks or other disruptions. This includes having disaster recovery and business continuity plans in place.

Lastly, compliance can drive innovation by encouraging banks to adopt new technologies and practices that enhance security. This proactive approach helps banks stay ahead of emerging threats and continuously improve their cybersecurity measures.

Case Study: Revolut

Revolut is known for its strong cybersecurity measures. The bank uses advanced encryption to ensure that data shared between users and the bank is secure, protecting personal details, transaction histories, and account balances from being intercepted by hackers.

Additionally, Revolut requires users to enable two-factor authentication (2FA), adding an extra layer of security by requiring a second form of verification, such as a code sent to their phone. The bank also employs biometric verification, such as fingerprint or facial recognition, to further secure user accounts.

Revolut also uses machine learning to detect and prevent fraudulent activities in real-time, ensuring that suspicious transactions are quickly identified and blocked.

Case Study: Chime

Chime is another digital bank that prioritises cybersecurity. Chime protects user data through encryption, ensuring that communication channels are secure. The bank also offers two-factor authentication to enhance account security, requiring users to verify their identity with a second form of verification.

Chime provides real-time transaction alerts, notifying users of any account activity immediately. This allows users to quickly identify and respond to any suspicious transactions. Additionally, Chime employs measures such as automatic logout after periods of inactivity to prevent unauthorised access. These security features help Chime maintain a secure banking environment for its users.

Looking ahead, cybersecurity trends in digital banking are likely to focus on several key areas to stay ahead of emerging threats. One trend could involve increased adoption of artificial intelligence (AI) and machine learning to enhance threat detection and response capabilities. AI can analyse vast amounts of data in real-time to identify unusual patterns or behaviors that may indicate potential security breaches.

Staying ahead of cybersecurity threats requires a combination of technological innovation, proactive defense strategies, and ongoing education. Digital banks that prioritise cybersecurity and adapt to these future trends will be better equipped to protect their customers’ data and maintain trust in an increasingly digital banking landscape.

  • Cybersecurity in FinTech

Increasing digitalisation is making financial services cybersecurity a crucial issue for banking technology.

Here are the most trends that affect it the most:

A growing reliance on banking technology as the industry digitalises has naturally brought both cybersecurity and financial services security into the limelight.

Digitalization will always come with cyber risks, and financial services will always come with security concerns. Banking is among the industries most vulnerable to cyber threats. A lack of financial services security is a gap cybercriminals can exploit, especially as banking goes through a digital transformation. 

Financial companies face much more challenging cyber threats in 2024. Cyber risks boomed as the world shifted online during the Covid-19 pandemic. This trend is getting amplified by the implementation of AI in financial services, as well as the proliferation of AI-enabled cyber-criminality broadly.

This period of innovation is creating a greater array of possible vulnerabilities for criminal groups to exploit  – a much bigger attack surface.

This extends to much bolder targets – the International Monetary Fund (IMF) said in March it was hit by a cyber attack. This is happening worldwide and continues the trend established last year, with Indonesia’s State Cyber Agency (BSSN) recording 350 million cyberattacks occurred in 2023. That includes a ransomware attack on its National Data Centre (PDN).

In previous years, the banking technology security system was linear. In an era with hundreds of interconnected devices, banks have a much more complex challenge to keep their networks secure. Cyber risks are intense and varied, including data breaches, Botnets, and DDoS attacks.

These attacks will hit consumer financial services, through temporary outages, the theft of personal data, and impacting company performance assessments.

Cyber security, biometric security to access financial transaction. Businessman use fingerprint scanning online connect to investment platform global network connecting, financial technology.

Trend 1: AI in Cybersecurity

Artificial intelligence (AI) technology has already created huge changes in business behaviour. It has also encouraged a shift from reactive to proactive approaches in detecting cyber-attack patterns.

As businesses are forced to respond to the widespread arrival of this revolutionary technology.

A simple example of threat increases due to AI is the use of generative AI to increase phishing attacks. It is easier to generate a lot more spam than it was before.

A better piece of news is that AI also brings more precision to recognizing cyber-attack patterns. Machine-learning can study cyber threats in depth and both identify them and identify vulnerabilities in financial services security, This ultimately helps fast and effective responses to evolving cyber threats.

Trend 2: Zero Trust Architecture

The “Zero Trust” security model will continue to evolve. This is where every user and devices is considered untrustworthy by default, until proven otherwise.

That means that testing and validation processes will apply for every user or device login. This approach helps mitigate the risk of internal and external threats.

Basically, every user and device has to continually verify that they are legitimate.

Trend 3: Cloud Security:

An increase in cloud adoption through 2024 will also mean a corresponding growth in cloud security solutions.

More integrated cloud security solutions are a natural part of protecting the cloud environment. They are also an important facet of banking technology security strategy, and will continue to be.

Trend 4: Blockchain-based Security

Adopting blockchain technology as a security solution will help ensure data integrity and transparency.

Blockchain effectively shuts off the tap for interference in the creation of the data records that underpin a given process. The lock security system will ensure optimal protection from unauthorised changes.

Trend 5: Increasing Mobile Security

Mobile devices are now an important player in digital financial transactions. That’s why financial services security is also focused on enhancing stronger mobile security.

Banking technology platforms are designed with strong encryption protocols. These will ensure data sent between devices is protected from unauthorised access. That includes bringing multi-factor authentication features, biometrics, and passcodes.

Trend 6: Biometric Authentication

As above, verifying the individual at the point of digital contact is a storing guaerantee of authenticity.

Authentication methods liike facial recognition and fingerprint scanning offer stronger security. This includes multi-modal biometric authentication that is also used to prevent forgery. There are banking apps that require occasional video recordings to authenticate by appearance and voice recognition to approve large transactions.

Trend 7: Changes in Privacy and Data Protection Regulations

Privacy rule changes will continue to evolve following as data protection requirements get stricter.

Banking companies will also follow global regulations that focus on consumer data privacy. Their clients will also have higher expectations of data security.

Trend 8: IoT Cybersecurity

The IoT (Internet of Things) ecosystem requires better security standards and device management in general.

Because IoT functions through the connection of physical infrastructure with the digital realm, penetrations of that infrastructure – especially through physical devices, require tough security measures.

Reducing the risks associated with unsecured IoT devices will be such a widespread trend that financial services security can rely on a huge body of evidence and best practice to control what attack surface is presented,

Trend 9: 5G Network Cybersecurity

The launch of 5G networks worldwide bring with them the network security expectations that any major shift in networking will create.

That  requires an emphasis on network security. Faster network speeds with lower latency creates new challenges that need to be solved. For financial services security, protecting IoT devices connected to the 5G network, ensuring infrastructure support, and mitigating the risk of vulnerabilities appearing where network breaks happen during authentication procedures are all areas of concern.

Trend 10: Cyber ​​Insurance

The cyber insurance market will see significant growth in the future.

Because cybersecurity threats evolve so quickly, assessing how to insure for will require totally new approaches across Insurtech, client-side decisions, and consumer protection.

This falls neatly into concert with the need for financial protection from cyber threats. Insurance will adjust to banking technology risks and the changing compliance environment that maintaining financial service security will now require.

Conclusion

Cybersecurity trends encourage banks to improve their security architecture. Old methods used to secure banking technology systems will most likely be ineffective as the demands on banking technology to evolve are inescapable.

Financial companies will need better financial services security capabilities – but they will be able to get them.  The industry will respond with more sophisticated security solutions to the increasing threat from cyberspace.

  • Cybersecurity in FinTech