SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
RISK FACTORS FOR THE SAUDI CONSUMER
CENTRAL BANKS
?
Credit Card
Survey sheds light on
SaudiArabia’s evolving online
& mobile banking risks
FINANCIAL INSTITUTIONS
Financial services are the most lucrative target for cyber criminals.
A financially motivated attack is reported every 14 seconds in the GCC
countries alone, according to the Saudi Arabian Monetary Agency.
Regulators have launched new coordinated efforts in the battle against
cyber criminals targeting critical assets in the Kingdom of Saudi
Arabia. Booz Allen Hamilton believes these kinds of joint efforts,
driven by new regulatory policies, are essential to raise
awareness and make users more vigilant about security.
A survey of 350 people in Riyadh, Jeddah and Dammam
identified potential vulnerabilities and some ways to
protect financial services from hackers.
Booz Allen Hamilton works with institutions and
governments throughout the Middle East to help
identify and neutralize the growing cyber threat.
www.boozallen.com/international
Collaborative Action. Regulators, banks,
employees and customers all have a role to play
in forming the first line of defense against the
sophisticated cyber criminal. Enterprise Risk
Management and robust controls are needed
along with greater cyber awareness and
vigilance across all participants and channels
in the Kingdom of Saudi Arabia.
THREAT ACTORS
How to
embrace
the evolving
security
realities?
Insider State ActorsAffinity GroupsHacktivistCriminals
ACCESS
#OOOOO
People Practices Technology
Online
Banking
Mobile
Banking
Phone
Banking
Core
Banking
Encountered
Cyber Crime in
Past 12 Months
30%!
Backup Data
Frequently
12%
Have Installed
Anti-Virus Software
45%
PC Malware
ONLINE RISK:
Unsecure Access
SMART PHONE RISK:
Lost Device
TABLET/LAPTOP RISK:
Shared Account Info
TELEPHONE RISK:
Lack PC Hygiene
UnderstandingSURVEYED
SURVEYED
SURVEYED
SURVEYED
SURVEYED
SURVEYED
SURVEYED
SURVEYED
SURVEYED
SURVEYED
SURVEYED
SURVEYED
SURVEYED
SURVEYED
40%
Use Internet Daily70%
More Women Use
PCs than Men
60%
Seriously Concerned
with Malware on PCs
35%
Use Smart Phones
to Access
Use Public Network,
for Access
83%
47%
Use for Online
Banking
64%
Use for Social
Media & Email
90%
More Concerned with
Loss of Private Data
65%
Misuse of
Personal Data
25%
Prefer two Factor
Authentication
80%
Password Theft6%
SAUDICONSUMER
CONCERNS&INSIGHTS

Mais conteúdo relacionado

Destaque

Destaque (20)

Sais.34.1
Sais.34.1Sais.34.1
Sais.34.1
 
Reform Infographic
Reform InfographicReform Infographic
Reform Infographic
 
The Next Gen Program Analysis Infographic
The Next Gen Program Analysis InfographicThe Next Gen Program Analysis Infographic
The Next Gen Program Analysis Infographic
 
The Biggest Bang Theory
The Biggest Bang TheoryThe Biggest Bang Theory
The Biggest Bang Theory
 
When Disaster Strikes
When Disaster StrikesWhen Disaster Strikes
When Disaster Strikes
 
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
Enabling Big Data with Data-Level Security:The Cloud Analytics Reference Arch...
 
RightIT™ Maximizing Government IT Efficiency
RightIT™ Maximizing Government IT EfficiencyRightIT™ Maximizing Government IT Efficiency
RightIT™ Maximizing Government IT Efficiency
 
Reform Playbook
Reform PlaybookReform Playbook
Reform Playbook
 
Predicting Mission Success through Improved Data Collection, Reuse and Analysis
Predicting Mission Success through Improved Data Collection, Reuse and AnalysisPredicting Mission Success through Improved Data Collection, Reuse and Analysis
Predicting Mission Success through Improved Data Collection, Reuse and Analysis
 
Technology Injection
Technology InjectionTechnology Injection
Technology Injection
 
The Defense Industry Under Attack
The Defense Industry Under AttackThe Defense Industry Under Attack
The Defense Industry Under Attack
 
The Vigilant Enterprise
The Vigilant EnterpriseThe Vigilant Enterprise
The Vigilant Enterprise
 
Strategic Information Management Through Data Classification
Strategic Information Management Through Data ClassificationStrategic Information Management Through Data Classification
Strategic Information Management Through Data Classification
 
Cyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber AnalystsCyber Training: Developing the Next Generation of Cyber Analysts
Cyber Training: Developing the Next Generation of Cyber Analysts
 
Mission Engineering Solution Infographic
Mission Engineering Solution InfographicMission Engineering Solution Infographic
Mission Engineering Solution Infographic
 
Improving Intelligence Analysis Through Cloud Analytics
Improving Intelligence Analysis Through  Cloud AnalyticsImproving Intelligence Analysis Through  Cloud Analytics
Improving Intelligence Analysis Through Cloud Analytics
 
Using Advanced Analytics for Data-Driven Decision Making
Using Advanced Analytics for Data-Driven Decision MakingUsing Advanced Analytics for Data-Driven Decision Making
Using Advanced Analytics for Data-Driven Decision Making
 
Rethinking Mega-Region Air Travel
Rethinking Mega-Region Air TravelRethinking Mega-Region Air Travel
Rethinking Mega-Region Air Travel
 
3-D Program Management
3-D Program Management3-D Program Management
3-D Program Management
 
Digital Forensics: Digital Evidence That Endures
Digital Forensics: Digital Evidence That EnduresDigital Forensics: Digital Evidence That Endures
Digital Forensics: Digital Evidence That Endures
 

Semelhante a Bah risk-ecosystem-survey[1]

State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
IJSRED
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
hallettfaustina
 
Harnessing the Fintech Revolution - IIC Oliver Wyman
Harnessing the Fintech Revolution - IIC Oliver WymanHarnessing the Fintech Revolution - IIC Oliver Wyman
Harnessing the Fintech Revolution - IIC Oliver Wyman
Greg Da Re
 

Semelhante a Bah risk-ecosystem-survey[1] (20)

Transparency in banking comes into spotlight
Transparency in banking comes into spotlightTransparency in banking comes into spotlight
Transparency in banking comes into spotlight
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
SABRIC Annual Crime Stats 2019
SABRIC Annual Crime Stats 2019  SABRIC Annual Crime Stats 2019
SABRIC Annual Crime Stats 2019
 
Sabric annual crime stats 2019
Sabric annual crime stats 2019   Sabric annual crime stats 2019
Sabric annual crime stats 2019
 
NAT-16-133 AML Benchmarking-FINAL
NAT-16-133 AML Benchmarking-FINALNAT-16-133 AML Benchmarking-FINAL
NAT-16-133 AML Benchmarking-FINAL
 
GT_AML_Benchmarking_Report
GT_AML_Benchmarking_ReportGT_AML_Benchmarking_Report
GT_AML_Benchmarking_Report
 
Considerations for Legal Practitioners on De-risking in the Caribbean
Considerations for Legal Practitioners on De-risking in the CaribbeanConsiderations for Legal Practitioners on De-risking in the Caribbean
Considerations for Legal Practitioners on De-risking in the Caribbean
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdf
 
aman sharma mini project.pdf
aman sharma mini project.pdfaman sharma mini project.pdf
aman sharma mini project.pdf
 
Harnessing the Fintech Revolution - IIC Oliver Wyman
Harnessing the Fintech Revolution - IIC Oliver WymanHarnessing the Fintech Revolution - IIC Oliver Wyman
Harnessing the Fintech Revolution - IIC Oliver Wyman
 
ADOPTION OF MOBILE BANKING IN SAUDI ARABIA: AN EMPIRICAL EVALUATION STUDY
ADOPTION OF MOBILE BANKING IN SAUDI ARABIA: AN EMPIRICAL EVALUATION STUDYADOPTION OF MOBILE BANKING IN SAUDI ARABIA: AN EMPIRICAL EVALUATION STUDY
ADOPTION OF MOBILE BANKING IN SAUDI ARABIA: AN EMPIRICAL EVALUATION STUDY
 
Adoption of Mobile Banking in Saudi Arabia : An Emprical Evaluation Study
Adoption of Mobile Banking in Saudi Arabia : An Emprical Evaluation StudyAdoption of Mobile Banking in Saudi Arabia : An Emprical Evaluation Study
Adoption of Mobile Banking in Saudi Arabia : An Emprical Evaluation Study
 
ADOPTION OF MOBILE BANKING IN SAUDI ARABIA: AN EMPIRICAL EVALUATION STUDY
ADOPTION OF MOBILE BANKING IN SAUDI ARABIA: AN EMPIRICAL EVALUATION STUDYADOPTION OF MOBILE BANKING IN SAUDI ARABIA: AN EMPIRICAL EVALUATION STUDY
ADOPTION OF MOBILE BANKING IN SAUDI ARABIA: AN EMPIRICAL EVALUATION STUDY
 
19-Weekly Tech in KSA.pdf
19-Weekly Tech in KSA.pdf19-Weekly Tech in KSA.pdf
19-Weekly Tech in KSA.pdf
 
Covid 19 fraud environment
Covid 19 fraud environmentCovid 19 fraud environment
Covid 19 fraud environment
 
Offshore Payment Services Mitigating Risks.pptx
Offshore Payment Services Mitigating Risks.pptxOffshore Payment Services Mitigating Risks.pptx
Offshore Payment Services Mitigating Risks.pptx
 
Risk based approach
Risk based approachRisk based approach
Risk based approach
 
How to upgrade bangladesh’s banking almanac
How to upgrade bangladesh’s banking almanacHow to upgrade bangladesh’s banking almanac
How to upgrade bangladesh’s banking almanac
 
EMV BT May 2009
EMV BT May 2009EMV BT May 2009
EMV BT May 2009
 

Mais de Booz Allen Hamilton

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
Booz Allen Hamilton
 

Mais de Booz Allen Hamilton (20)

You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest ChallengesYou Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
You Can Hack That: How to Use Hackathons to Solve Your Toughest Challenges
 
Examining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working MomsExamining Flexibility in the Workplace for Working Moms
Examining Flexibility in the Workplace for Working Moms
 
The True Cost of Childcare
The True Cost of ChildcareThe True Cost of Childcare
The True Cost of Childcare
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Inaugural Addresses
Inaugural AddressesInaugural Addresses
Inaugural Addresses
 
Military Spouse Career Roadmap
Military Spouse Career Roadmap Military Spouse Career Roadmap
Military Spouse Career Roadmap
 
Homeland Threats: Today and Tomorrow
Homeland Threats: Today and TomorrowHomeland Threats: Today and Tomorrow
Homeland Threats: Today and Tomorrow
 
Preparing for New Healthcare Payment Models
Preparing for New Healthcare Payment ModelsPreparing for New Healthcare Payment Models
Preparing for New Healthcare Payment Models
 
The Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile CoachingThe Product Owner’s Universe: Agile Coaching
The Product Owner’s Universe: Agile Coaching
 
Immersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is HereImmersive Learning: The Future of Training is Here
Immersive Learning: The Future of Training is Here
 
Nuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving PerformanceNuclear Promise: Reducing Cost While Improving Performance
Nuclear Promise: Reducing Cost While Improving Performance
 
Frenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join ForcesFrenemies – When Unlikely Partners Join Forces
Frenemies – When Unlikely Partners Join Forces
 
Booz Allen Secure Agile Development
Booz Allen Secure Agile DevelopmentBooz Allen Secure Agile Development
Booz Allen Secure Agile Development
 
Booz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat BriefingBooz Allen Industrial Cybersecurity Threat Briefing
Booz Allen Industrial Cybersecurity Threat Briefing
 
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey ReportBooz Allen Hamilton and Market Connections: C4ISR Survey Report
Booz Allen Hamilton and Market Connections: C4ISR Survey Report
 
CITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICESCITRIX IN AMAZON WEB SERVICES
CITRIX IN AMAZON WEB SERVICES
 
Modern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military NetworksModern C4ISR Integrates, Innovates and Secures Military Networks
Modern C4ISR Integrates, Innovates and Secures Military Networks
 
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
Agile and Open C4ISR Systems - Helping the Military Integrate, Innovate and S...
 
Women On The Leading Edge
Women On The Leading Edge Women On The Leading Edge
Women On The Leading Edge
 
Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science Booz Allen Field Guide to Data Science
Booz Allen Field Guide to Data Science
 

Bah risk-ecosystem-survey[1]

  • 1. RISK FACTORS FOR THE SAUDI CONSUMER CENTRAL BANKS ? Credit Card Survey sheds light on SaudiArabia’s evolving online & mobile banking risks FINANCIAL INSTITUTIONS Financial services are the most lucrative target for cyber criminals. A financially motivated attack is reported every 14 seconds in the GCC countries alone, according to the Saudi Arabian Monetary Agency. Regulators have launched new coordinated efforts in the battle against cyber criminals targeting critical assets in the Kingdom of Saudi Arabia. Booz Allen Hamilton believes these kinds of joint efforts, driven by new regulatory policies, are essential to raise awareness and make users more vigilant about security. A survey of 350 people in Riyadh, Jeddah and Dammam identified potential vulnerabilities and some ways to protect financial services from hackers. Booz Allen Hamilton works with institutions and governments throughout the Middle East to help identify and neutralize the growing cyber threat. www.boozallen.com/international Collaborative Action. Regulators, banks, employees and customers all have a role to play in forming the first line of defense against the sophisticated cyber criminal. Enterprise Risk Management and robust controls are needed along with greater cyber awareness and vigilance across all participants and channels in the Kingdom of Saudi Arabia. THREAT ACTORS How to embrace the evolving security realities? Insider State ActorsAffinity GroupsHacktivistCriminals ACCESS #OOOOO People Practices Technology Online Banking Mobile Banking Phone Banking Core Banking Encountered Cyber Crime in Past 12 Months 30%! Backup Data Frequently 12% Have Installed Anti-Virus Software 45% PC Malware ONLINE RISK: Unsecure Access SMART PHONE RISK: Lost Device TABLET/LAPTOP RISK: Shared Account Info TELEPHONE RISK: Lack PC Hygiene UnderstandingSURVEYED SURVEYED SURVEYED SURVEYED SURVEYED SURVEYED SURVEYED SURVEYED SURVEYED SURVEYED SURVEYED SURVEYED SURVEYED SURVEYED 40% Use Internet Daily70% More Women Use PCs than Men 60% Seriously Concerned with Malware on PCs 35% Use Smart Phones to Access Use Public Network, for Access 83% 47% Use for Online Banking 64% Use for Social Media & Email 90% More Concerned with Loss of Private Data 65% Misuse of Personal Data 25% Prefer two Factor Authentication 80% Password Theft6% SAUDICONSUMER CONCERNS&INSIGHTS