Hackers of India

Digital Identity In The Age Of Fintech

By  Sheetal Joseph  , Alessandro Avagliano  , Guido Reismueller  , Benoit Flippen  , Travis Carelock  on 08 Apr 2022 @ Nullcon


Presentation Material

AI Generated Summarymay contain errors

Here is a summary of the content:

The speaker, A expert in fintech security discusses the importance of securing production infrastructure from insider threats. They emphasize the need for a robust security process, including short-lived tokens, to access production systems and four-eyes principle to ensure accountability.

To mitigate insider threats, speaker suggests:

  1. Contracts with clear requirements based on role-specific risks.
  2. Understanding system processes through threat modeling to identify potential internal threats.
  3. Implementing an internal bug bounty program to incentivize employees to report vulnerabilities and weaknesses in the system.

Additionally, they highlight the importance of understanding business processes before conducting threat modeling and implementing multiple security layers, including 2FA and monitoring, to minimize risks.

Overall, the speaker emphasizes that securing production infrastructure requires a multi-faceted approach, involving contractual requirements, threat modeling, bug bounty programs, and robust security measures.