sb-nz logo
Story image

Let's not forget that RegTech is also about cybersecurity

26 Jul 2016

Regulatory Technology (RegTech) is becoming more of a tool to help organisations comply with automation and regulatory requirements, but Palo Alto Networks believes that they should be aware of how it will affect cybersecurity and the implications on busines operations.

“RegTech is a subset of FinTech, which refers to the use of new technologies in the financial services industry to improve operational and customer engagement capabilities. RegTech ultimately helps firms automate the more mundane compliance tasks and reduce operational risks associated with meeting compliance and reporting obligations," says Sean Duca, vice president and chief security officer, APAC at Palo Alto Networks.

The disruptive nature of RegTech provides benefits such as dataset agility, faster report speeds and integration, and analytics that are capable of mining large and complex datasets, the company says.

However, there are downsides including the effects on cybersecurity because it is so powerful, Duca says.

“RegTech, however, is an attractive target for cybercriminals because it also provides the technology to pull, consolidate, and manipulate existing systems and data, and produce and report regulatory data in a more cost-effective, flexible, and timely manner. This means security will need to become as dynamic as the processes it is protecting. Businesses must consistently consider the value of their data, where the data resides, how well is it protected, who is protecting it, and who has access to it," Duca explains.

The faster speeds and complex data analytics mean businesses must take a real-time visualisation approach to cyber attacks. How well organisations do this will be a differentiating factor in their security posture, Duca believes.

Palo Alto Networks provides six considerations for RegTech systems:

  • What is the value of your data to your organisation and competitors?
  • Is a third party protecting your organisation? Do they know who can access sensitive data and what they have access to?
  • How and where is the data stored? If security controls can be focused on one area, it may reduce acquisition and utilisation costs.
  • What is the possibility of a data leak in the event of a hacking? Measuring the risk associated with keeping sensitive data lets you implement technologies and processes that will reduce both the risk and the cost associated with protecting sensitive data.
  • How secure is your data? What makes data sensitive, what is the content and value of that data, how do you audit your data and are you hoarding it when it may not be necessary? Shrinking the sensitive data footprint reduces cost.
Story image
Global attack volume down, but fraud and cyber threats still going strong
“The move to digital, for both businesses and consumers, has been significant. Yet with this change comes opportunity for exploitation. Fraudsters look for easy targets: whether government support packages, new lines of credit or media companies with fewer barriers to entry."More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
SMBs seeking service providers in face of rising cyber threats
SMBs are struggling with their cybersecurity solutions, with three quarters worried about being the target of a cyberattack in the next six months, and 91% considering using or switching to a new IT service provider if offered a better option.More
Story image
5 ways to use data science to predict security issues - Forcepoint
Data science enables people to respond to problems in a better way, and to also understand those problems in a way that would not have been possible 50 years ago.More
Story image
Report: Rushing into cloud migration directly related to security issues
A new report from Radware highlights the impact of COVID-19 on organisations compelled to digitally transform in order to maintain business continuity. More
Download image
74% of APAC IT leaders say security culture is essential to business success
You can join these leaders in designing security awareness and training with your employees in mind.More