post quantum
play

Post-Quantum Protecting the worlds information Cyber Security - PowerPoint PPT Presentation

Post-Quantum Protecting the worlds information Cyber Security Issues to be considered when Implementing Fintech Solutions Contents Four Major Threats When Communicating Online


  1. Post-Quantum Protecting the world’s information Cyber Security Issues to be considered when Implementing Fintech Solutions 實施金融科技方案時 需考慮的網絡安全問題

  2. Contents Four Major Threats When Communicating Online • Key Considerations for Systems Implementation • Most Fundamental Control in Cyber Security • Fintech Implementation Triangle • Why Hong Kong? • www.post-quantum.com 2

  3. Four Major Threats When Communicating Online www.post-quantum.com 3

  4. Man-In-The-Middle Attacks www.post-quantum.com 4

  5. Four Major Threats When Communicating Online www.post-quantum.com 5

  6. Insider Threats www.post-quantum.com 6

  7. Insider Threats www.post-quantum.com 7

  8. Four Major Threats When Communicating Online www.post-quantum.com 8

  9. Transaction Authentication & Non-Repudiation www.post-quantum.com 9

  10. Transaction Authentication & Non-Repudiation www.post-quantum.com 10

  11. Transaction Authentication & Non-Repudiation www.post-quantum.com 11

  12. Four Major Threats When Communicating Online www.post-quantum.com 12

  13. Encryption Cracking www.post-quantum.com 13

  14. Encryption Cracking www.post-quantum.com 14

  15. Four Major Threats When Communicating Online www.post-quantum.com 15

  16. So Should We Give Up Then? Far from it! www.post-quantum.com 16

  17. Key Considerations for Systems Implementation Completeness • Accuracy • Validity • Timeliness • www.post-quantum.com 17

  18. Most Fundamental Control in Cyber Security Segregation of duties www.post-quantum.com 18

  19. Segregation of Duties A. Encrypted data has a master key B. The key is split and the fragments are which can be lost, stolen or abused shared between stakeholders C. A quorum of stakeholders D. After use the key is immediately is needed to unlock the data broken into fragments again for security www.post-quantum.com www.post-quantum.com 19 19

  20. Segregation of Duties Approver Approver Approver 1 2 3 3. Quorum request sent to Approvers 1. Need to 2. Request access sent encrypted Approver Approver Approver document 1 2 3 Requestor 1. Individual approvals given by Approvers 2. Quorum approval 3. Document access given given Requestor www.post-quantum.com 20

  21. Fintech Implementation Triangle www.post-quantum.com 21

  22. Why Hong Kong? www.post-quantum.com 22

  23. Why Hong Kong? www.post-quantum.com 23

  24. Why Hong Kong? Leading financial services, logistics and technology centre • Supportive government policies • World class physical and technology infrastructure • Flexible demographics • Highly adaptable workforce • Willingness to learn best practices • Welcoming in importing fintech and blockchain expertise • Close proximity to all major cities in Asia • www.post-quantum.com 24

  25. Is it Too Late for Hong Kong? Late but not too late • Minimum wasted costs so far • Learn from other people’s mistakes • Absorb world class expertise and knowledge transfer • Introduce best technologies and practices • Choose most ready technologies to implement NOW • Leapfrog directly into execution • www.post-quantum.com 25

  26. Thank you! Contact: Andersen Cheng, CEO 鄭毓輝 行政總裁 ac@post-quantum.com www.post-quantum.com 26

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend