APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Capital Market
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Tech Strategy for Capital Markets and Other

    Jeff Roberts, CIO, HFF

    Transformations in Financial Technologies

    Jacob Sorensen, CIO, Bank of the West

    Innovations in Market Surveillance and Monitoring

    Dr.John Bates, CTO, Intelligent Business Operations & Big Data, Software AG

    From the Chief Information Officer to the Chief Innovation Officer : Leading the Digital Transformation

    Bjoern Goerke, CIO, SAP AG

    Interconnected Trust - The Digital Economy's Renewable Energy

    Rocky Scopelliti, Director at Optus Futurologist & Author, Youthquake 4.0

    Five Benefits of Open APIs + Marketing Automation

    Mark Bantique, Vice President, Head of E-Commerce, Security Bank Corporation

    Digitisation of Capital Markets

    David Heathcote, Global Head of Debt Advisory, KPMG

    Digital Disruption and the Future of Capital Markets

    Kenneth Lee, Head of Primary Bond Markets, Natixis Asia Pacific

    right

    Capital Markets Firms Looking for Low Friction Solutions

    Vic Winkler, CTO, Covata

    Tweet
    content-image

    Vic Winkler, CTO, Covata

    In capital markets, information is as much a currency as money is. Yet this fact is not reflected in how we protect sensitive data or IT-enabled conversations. Why is this?

    In the capital markets, the most obvious factor is that the profit motive dominates all activities. Because of this, some decisions and sharing of sensitive data are made despite the risks. Secondly, in capital markets the IT sphere is complex. It is difficult to design “right”, it is difficult to implement “right”, and it is harder yet to keep things secure. The difficulty starts with underlying technologies and it extends up through user-facing solutions. Even when you get all that right inside your business, you still have to interact with others outside your business. And then it is just convenient and expedient to assume that the information you share with them will be protected. As we know, digital information is not like paper documents.

    In the digital world, when you share content you effectively surrender control over it

    You still have the original file, but  you now also have identical copies of that file in locations that are outside your control. And, any copy of your file is likely to be duplicated due to backup regimes. But other programs can also make copies—for instance, when you email a file to  a single individual you multiply from that one original file to a minimum of four new copies! (One in your email client, one on your email server, one on your recipient’s email client and one on their server and all that before these are backed up. Data is at risk to any compromise on any system in which any copy is stored.

    When you process, store or share “sensitive information“ you need to trust every computer, every network connection and every person from the point that the information leaves your care and for as long as it or any copies exist

    There have been several efforts in the financial community to address the question of whether you can trust another party in terms of their security practices and the controls they enforce.

    For example, “Shared Assessments” has real traction in this. But going beyond establishing metrics to trusting other parties is more difficult.

    Getting to the protection of information, it is important to understand that while there are regulations around much capital markets data, the IT world is still fairly naive about the nature of the relationship of data to owners, custodians, stewards, consumers, or  subscribers. We still do not have a matchup between technology controls and the right grammar to properly describe roles and responsibilities in a manner that is clear to the CEO, database administrator, to the invested third party, or the person whose information is at stake.

    Regulations require that some sensitive data be protected, and then there is information that if exposed would lead to financial or reputational damage. In both cases, systems and persons interact with the data in some role or capacity. Inside an organization, data governance is either forgotten or comes in various stages of immaturity. Too often we falsely depend on the permeable perimeter that enterprises feel safe within. Firewalls, VPNs and security within the IT sphere of an organization are only as good as the proverbial weakest link—for instance your compromised BYOD or corporate laptop. The firewall has minimal value since we demand access to so many services. It is regular sport for hackers to subvert these services so now the firewall is more like a screen door.

    In most cases, governance ignores that the information sphere is really a multidimensional spectrum where different information demands different rules around its protection and control. Recognizing that not all your information needs to be protected or even backed up is an important starting point toward effective information security.  The sheer volume of information that is used or created by any organization makes for an unnecessarily bigger problem when you do not have a clear understanding what needs protection and control.

    "By combining encryption with access controls, we can wrap sensitive data at the moment we create it and protect it through its life cycle"

    To start, you can undertake a modest effort to define your enterprise’s requirements for what kinds of information are sensitive or demand access controls. Not everything needs equal treatment in terms of the security triad which is: Confidentiality, Integrity and Availability. Security is expensive, and the expense propagates more and more if you apply equal security to everything. For instance, cryptography is computationally expensive—why encrypt everything if you do not  need to do so? But it is not only expense, it is the false sense of security you have if you just lump everything behind the enterprise and require people to badge  into physical spaces and authenticate into virtual ones to do their work. Remember, Snowden worked for an especially paranoid organization and in a very secure facility, yet he was able to abscond with the equivalent crown jewels. If you have crown jewels, don’t let the admin clean them without supervision.

    What you really want is real control over your data. You own it, you want to control it. Sharing information inside the organization or on an ad hoc basis shouldn’t require the IT department to go into food or sleep deprivation. What we want are low friction solutions and that require no substantive changes to our IT infrastructure.

    What we really want is protection and control of our data

    What does that look like? Lets start by saying that encryption alone is not the answer. But if we combine encryption with access controls, we can wrap sensitive data at the moment we create it and protect it through its life cycle. The goal is that we want to be able to control access to the data even after we share it. These technologies exist today, solutions using these technologies are available and you may recognize that this sounds like Digital Rights Management.

    tag

    Financial

    Firewall

    Information Security

    Weekly Brief

    loading
    Top 10 Capital Market Tech Solution Companies - 2019
    ON THE DECK

    Capital Market 2019

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Artificial Intelligence - Myths And Truths

    Artificial Intelligence - Myths And Truths

    Geraldo Pereira Junior, Chief Information Officer, Ypê
    Sustainable Future through Innovative Technology Solutions

    Sustainable Future through Innovative Technology Solutions

    Faisal Parvez, Director, BT Business CIO
    The Future Relies on Augmented AI

    The Future Relies on Augmented AI

    Laurent Fresnel, CIO, The Star Entertainment Group
    Digitalization with the use of digital technologies/Improving business through digital technologies

    Digitalization with the use of digital technologies/Improving business through digital technologies

    Wilbertus Darmadi, CIO, Toyota Astra Motor
    How Marco's Pizza Leaned On Technology To Succeed Amid The Pandemic By Quickly Pivoting To Contact-Free Delivery And Curbside Carryout

    How Marco's Pizza Leaned On Technology To Succeed Amid The Pandemic By Quickly Pivoting To Contact-Free Delivery And Curbside Carryout

    Rick Stanbridge, VP & Chief Information Officer, Marco’s Pizza
    Bunnings  Diy Digital Transformation

    Bunnings Diy Digital Transformation

    Leah Balter, Chief Information Officer, Bunnings
    For a Smarter City: Trust the Data, Ignore the Hype

    For a Smarter City: Trust the Data, Ignore the Hype

    Brad Dunkle, Deputy CIO, City of Charlotte
    Smart Community Innovation for the Post Pandemic

    Smart Community Innovation for the Post Pandemic

    Harry Meier, Deputy Cio for Innovation, Department of Innovation and Technology, City of Mesa
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://capital-market.apacciooutlook.com/ciospeaks/-capital-markets-firms-looking-for-low-friction-solutions-nwid-887.html?utm_source=google&utm_campaign=apacciooutlook_topslider