The aim of this contribution to the debate is to combine historical insights into the meaning of money with the latest technological developments in the digital age, to compare visions with realities and to develop options for action for shaping the digital transformation of money.
The 10 most successful bank robberies in human history, in which the equivalent of US$1.62 billion was taken at sometimes massive expense, seem like the work of amateurs compared to the US$3.78 billion taken by cybercriminals in 2020 alone. In a world where tech companies are spearheading campaigns to create a new cryptocurrency and bitcoin is surpassing the US$50,000 mark because a visionary electric car maker wants to recognise the cryptocurrency as a means of payment, some fundamental questions arise: How must money be defined in a digital world to reliably fulfil the characteristics of a universally recognised store of value and medium of exchange? And what changes will result if so-called stablecoins challenge the banks’ classic deposit business and their traditional business models?
SAVE THE DATE: 29 September 2021 – 11.30 a.m. Berlin Time
It‘s a great pleasure giving a keynote at the VÖB-Service GmbH #VSK2021 Conference and to discuss with financial industry experts fundamental questions about the FUTURE OF MONEY
The ten most successful bank robberies in human history, in which the equivalent of US$1.62 billion was captured at great expense, seem almost like the work of amateurs compared to the US$3.78 billion captured by cybercriminals in 2020 alone. In a world where tech companies are spearheading campaigns to create a new #cryptocurrency, where bitcoin is surpassing the US$50,000 mark because a visionary electric car maker wants to recognise cryptocurrency as a means of payment, Jochen Werne, Member of the Executive Board Prosegur Germany, asks some fundamental questions. “How must money be defined in a digital world in order to fulfil the characteristics of a generally recognised and reliable store of value and medium of exchange?” Or also: “What changes are coming to the financial industry when #Stablecoins spread and challenge the classic deposit business of banks?”
In our stream Digitalisation at #VSK2021, Jochen Werne presents possible answers to these and other questions.
Be there and register today for the #Kreditwirtschaft congress on Wednesday, 29 September! 👉 https://lnkd.in/gMe2g59
Published: Werne, Jochen (2019, December 1). The nature of society: Are certain cultures less predisposed to cyberthreats than others? An examination using the example of Germany. In the Cyber Security: A Peer-Reviewed Journal, Volume 3, Issue 2.
Successful ransomware attacks and thefts of data and passwords have unequivocally demonstrated that technical defensive measures are to be considered as merely basic moves in the protection against cyberattacks, and that security concepts, if to be effective, must take ever greater account of the human factor. Several examples prove that attack vectors which belong to the area of ‘social engineering’ are menacingly successful. Employees of enterprises, especially SMEs, frequently underestimate their importance when assessing security risks and the defence against them. As a consequence of these findings, a company-wide risk management should respect cultural and psychological peculiarities. Another promising approach are AI-based concepts, both as a technical defence against cyberthreats and in respect of processes specific to the company, as well as culture-specific characteristics of its employees. Both approaches are based on understanding human behaviour in its sociocultural context. Within the scope of this paper, this cultural aspect of cyber security is examined with regard to whether certain cultures may be less predisposed to cyberthreats than others. This is analysed using the example of Germany and also considers the question whether more or less authoritarian company cultures play a role in this context. How can phenomena such as German angst and similar cultural peculiarities be adequately taken into account? The remarks are mainly targeted at an audience which is concerned with organisational and technical countermeasures again cyberthreats. They focus on the importance of incorporating findings from psychology and social sciences when designing and realising such measures.
Jochen Werne is the Chief Development and Chief Visionary Officer (CDO/CVO) and executive committee member of PROSEGUR Cash Services Germany Ltd. Prior to that he was director and authorised officer of the Bankhaus August Lenz & Co. AG. Jochen is also member of the Federal Ministry of Education and Research Initiative ‘Learning Systems’ — a platform for artificial intelligence, member of the expert board of Management Circle, as well as a member of one of the most important think tanks worldwide: Chatham House, the Royal Institute of International Affairs. Jochen is a keynote speaker at various banking, innovation and executive conferences as well as an author and co-author of several textbooks and professional articles.
ABOUT Cyber Security: A Peer-Reviewed Journal
Cyber Security is the major peer-reviewed journal publishing in-depth articles and case studies written by and for cyber security professionals. It showcases the latest thinking and best practices in cyber security, cyber resilience, cyber crime and cyber warfare, drawing on practical experience in national critical infrastructure, government, corporate, finance, military and not-for-profit sectors.
Each quarterly 100-page issue analyses significant current and emerging cyber security threats and the latest strategies, techniques and technologies available to detect, manage and react to them, helping to uncover potential weaknesses in your current systems which could be open to attack. Its detailed articles and case studies – all of which are peer-reviewed by an Editorial Board of leading cyber security experts – provide in-depth, actionable advice and ‘lessons learned’ from fellow professionals, showing how cyber security programmes have been specified, designed, implemented, tested and updated in their organisations, as well as how data breaches and exercises have been managed in practice.
Cyber Security does not publish advertorial or advertising but rather in-depth articles on key topics including:
Cyber security risk assessments, platforms and frameworks
Building cyber response programmes
Threat surface analysis and detection
Incident response and mitigation
Training ‘red’ teams
Crisis and reputation management
Recovering from a data breach
Employee and customer awareness, education and training
Workforce analysis and programmes
Reporting to senior executives and getting sufficient funding
Scenario planning, penetration testing and cyber security exercises
Reducing insurance premiums
Cyber security in the supply chain
Cloud security risk
Cyber warfare, cyber terrorism and state-sponsored attacks
Safe disposal of sensitive data
Cyber security investigations and digital/analogue forensics
WHAT HAS IAM & CYBERSECURITY TO DO WITH A FAMOUS CAR CRASH OF A SOVIET LEADER ?
It was a perfect Friday morning over the clouds on the way to give a speech at the famous Steigenberger Hotels and Resorts Grand Hotel Petersberg. In 1973 the Soviet head of state and party stayed for a few days in the luxury hotel and the visit became legendary because Brezhnev had an accident with his guest gift, a sports car, on the curving driveway.
What could be a better place to discuss safety and security with thought leaders in a speech about “#AI and it’s impact on #IAM & #Cybersecurity” at the Executive-Insights IAM Exchange Conference
Identity Recovery Services – The smart idea in Cyber Security and Access Management: More to come on this topic soon
Cyber crime has become a serious threat to business, politics and private individuals since a long time. New technologies based on the use of artificial intelligence might offer more security.
The fight against cyber threats has become significantly more complex for global government organisations, businesses, and individuals in recent years. Technical protection of IT systems and infrastructures and thus data security in the narrower sense are no longer the only issues. Companies, for example, need to address the much broader concept of information security.
Solutions based on artificial intelligence could prove helpful in the fight against cybercrime. According to a study by the IBM Institute for Business Value, the spread of intelligent, AI-based security solutions will increase significantly in the coming years.
Technical protective measures have long since been based on machine learning, for example, to identify spam or phishing e-mails or to record trends and anomalies in large amounts of data – both in data traffic within the corporate network and in its external connections.
AI systems for the identification of cyber attacks
In future, for example, systems might also be able to identify hidden channels in the corporate network through which cyber criminals attempt to acquire data. AI’s greatest strength, pattern recognition, enables automated detection of a wide range of anomalies and security incidents. For this purpose, however, AI-based systems must also learn to distinguish between common IT failures and cyber attacks. In addition, self-learning algorithms need to take internal corporate processes into account to come up with precise results.
In the near future, according to a forecast by Christian Nern, former Head of Security Software DACH at IBM Germany and today Partner at the Consulting firm KPMG, AI-based security analysis systems will be able to detect and fend off attacks proactively. Then, according to the former IBM security software chief, the confrontation between cyber criminals and security officers could possibly take place directly between the AI systems they use.
Germany as a pioneer country
Germany, which considers itself a pioneer country in the fields of learning systems and artificial intelligence, has already launched a platform for artificial intelligence on this topic initiated by the Federal Ministry of Education and Research (BMBF): “Learning Systems”. The platform with its 200 members brings together leading experts from science, business and society and deals with technological, economic and social issues relating to the development and introduction of learning systems on an interdisciplinary and cross-sector basis.
As often in cyber security topics, there is no patent solution for the numerous questions and challenges. A company-wide risk management system, which establishes appropriate technical and organisational measures and also takes into account findings from psychology and cultural studies, seems to be a sensible way forward.
The right balance between security awareness and security, individual freedom paired with increased personal responsibility as well as support through technology and organisational structure is probably the most promising approach in the current state of research and technology to effectively meet the challenges for information and IT security.
The number of cyber attacks on businesses, governments and individuals is increasing worldwide. The human being in his cultural environment is an important element. Different cultures seem to be associated with different susceptibilities.
In its annual management report “The Situation of IT Security in Germany 2018”, the Federal Office for Information Security records a threatening scenario: The number of cyber attacks on the federal government, German industry and private individuals is increasing at an alarming rate. Germany, in particular, is being massively targeted by criminal hackers.
One thing is certain: almost 90 percent of all cyber attacks have a criminal background. Approximately ten percent of all cyber attacks are caused by state cyber warriors. The goal of criminals is either personal data (account connections, credit card numbers, passwords, etc.) or capturing the computer for new attacks via bot network or to extort ransom money for the renewed release of the computer. The ransomware “Wannacry” is an equally prominent and frightening example of this. If state systems become the target of hackers, this usually results in sabotage, espionage and the spying out of trade secrets. The BSI discovered 800 million malicious programs for computer systems last year. In the previous year, the figure was 600 million – around 400,000 malware variants are added daily.
Cyber Security and the Human-Cultural Factor
The view must be directed to an important dimension of the human factor: The influence of different cultures on the handling of technology and in particular on the behaviour of individuals in the context of cyber security. Cultural peculiarities influence preferences, prejudices and behaviours. In his renowned book “The Culture Code”, anthropologist and marketing expert Dr. Clotaire Rapaille explores how members of different nationalities have developed very different codes for the image of products, companies or countries.
These findings come from client assignments in which Dr Rapaille conducted extensive interviews with focus groups to identify cultural preferences, prejudices, idiosyncrasies and behaviors. In more in-depth analyses, a piece of generalized psycho-cultural characteristics is then derived from representatives of the countries studied.
Country-specific aspects of cybercrime
Questions arise as to what protective concepts and guidelines might look like that take this background into account appropriately? And what role do cultural and country-specific aspects play here, such as the famous “German Angst” and corporate cultural aspects, such as the comparison of a classical hierarchical system versus Holacracy models, which have become increasingly en vogue in times of digital transformation?
Some concise examples from the findings of Dr. Rapaille: Americans define themselves strongly through their work. In this culture, professional activity largely determines the image of one’s own identity. The importance of money in this culture is proof of diligence and success.
The author sees completely different meanings in European countries. In France, for example, work and money are regarded more as “necessary means to an end” – those who can afford it expect at least a certain amount of entertainment and comfort from their job there. According to Dr. Rapaille, quality and technical perfection play an important and in some cases even absolute role in Germany or Japan, while US-Americans, according to his analyses, in many cases content themselves with “It just works” and are even sceptical about excessive perfection.
The author recognizes the Germans’ tendency towards perfectionism, which is partly exaggerated from a foreign point of view, as decisive for the quality of “German Engineering” and the global economic success of the Germans in this field. Dr. Rapaille is convinced that US culture, on the other hand, is characterized by a widespread refusal to grow up, which in turn leads to a great competitive advantage in the field of innovation.
Conclusions for more cyber security
This raises the question what are the appropriate protection concepts in an increasingly complex threat situation. A classic approach is the definition and enforcement of policies, both on a technical and organizational level, which are intended to guarantee compliance with security measures. The more hierarchically and authoritatively a corporate culture is aligned, the more restrictive the corresponding guidelines usually become.
However, the approach of establishing security primarily through bans and restrictions on user freedoms has proven to be double-edged in practice. The more the possibilities of an individual user are restricted, the more this encourages the tendency to escape the corset of safety-related rules.
A typical consequence is the “Bring Your Own Device” (BYOD) problem with which many company IT departments have been confronted for years – if the functions and authorizations of their work equipment are too limited, users bring private end devices with them to the workplace. These are then often not integrated at all into the protection and security concepts of the company. If the BYOD escape route is also suppressed, such measures often result in a refusal attitude à la “The desired is not possible with the means available – if the IT department wants it that way, then this task cannot be solved”.
Flat hierarchies and personal responsibility as a solution?
Is the better way, then, in holacracy models, in flat hierarchies, or in “loose reins” in terms of security and a strengthening of employees’ personal responsibility?
For the reasons derived in the preceding sections, this approach is by no means a guarantee for higher IT and information security. A healthy middle course could lie in adequate risk management. Technical and organisational security measures take into account the hazard level of specific data and applications. Sensitive areas and particularly sensitive data are subject to more stringent security measures, business areas or processes with less sensitivity are also protected, but assign employees a higher degree of personal responsibility. All protective measures take into account the above-mentioned psychological and cultural-historical findings.