JP Cavanna, Director of Cybersecurity at Six Degrees, on balancing the risks and benefits of AI in cyber defence strategies

Undeniably, AI is here to stay. Having become part of day-to-day life, it’s hard to remember what life was like without it. But when it comes to cybersecurity, is it causing more harm than good?

Recent research outlines that 73% of organisations have already integrated AI into their security posture. The technology is clearly becoming a cornerstone of modern cybersecurity. Organisations are turning to AI not just as a tool, but as a partner in security operations, leveraging its capabilities to identify malicious activity faster, guide investigations, and automate repetitive tasks.

For it to be truly effective, though, AI must be paired with human expertise – but this is where organisations are starting to become complacent. Given the growing sophistication of cyber-attacks, and even AI-powered attacks, many are removing the human element while expecting AI tools to do all the work for them, leaving them even more vulnerable to threats. This overreliance risks creating blind spots, where critical thinking, contextual understanding, and instinct are overlooked. Without the balance of human judgement, AI can amplify mistakes at scale, turning efficiency into exposure.

The Cybersecurity Paradox

This situation puts many organisations in a potentially difficult position. On the one hand, AI can significantly improve the efficiency of security operations. In the typical SOC, for example, AI technologies can process alerts in around 10-15 minutes. This represents a significant improvement over human analysts, who can easily require twice as long for the same task.

Aside from the obvious efficiency gains, applying AI to these repetitive, time-pressured processes can also significantly reduce the scope for human error. And in turn, take considerable pressure off security analysts. Going some way to battling alert fatigue, an increasingly well-documented and persistent problem. In these circumstances, valuable human experience and specialist expertise can instead be more effectively applied to complex investigations, strategic decision-making, and other higher-value priorities.

On the flipside, however, AI remains prone to generating inaccurate or misleading insights, and users may not realise they are applying the wrong information to potentially serious security issues. Similarly, habitual blind trust in AI outputs can easily erode performance levels and even introduce new vulnerabilities. There is also scope for sensitive data to enter public environments, with the potential to cause compliance issues. This kind of information can also reappear in future versions of the AI model in question, therefore resulting in further data exposure risks.

Parallels with IoT Adoption

The situation mirrors that seen in the early days of IoT adoption, where the rush to innovate would often override security considerations. In this current context, therefore, human oversight and vigilance are extremely important. Clear governance frameworks, defined accountability, and continuous monitoring must underpin any AI deployment. Therefore ensuring that innovation does not outpace risk management or compromise long-term resilience.

A Growing Arms Race

If that wasn’t challenging enough, threat actors are also in on the AI boom in what has already been described as an ‘arms race’. In practical terms, AI tools are already widely used to create more convincing phishing attacks free from some of the more obvious traditional tell-tale signs of criminal intent, such as imperfect grammar or a suspicious tone.

Deepfake technology has also raised the stakes. We’ve all seen how convincing AI-generated video has already become. This is now finding its way into real-world examples, with one fake video reportedly causing a CFO to authorise a large financial transfer as a result.

At the same time, technology infrastructure is constantly under attack by AI-powered tools. They can be used to analyse defensive systems and identify weaknesses faster than humans. The net result of these developments is that defenders constantly play catch-up, as they can only respond to new attack vectors once discovered. The underlying takeaway is that at present, AI cannot be trusted to operate autonomously. Instead, human intuition, scepticism and contextual understanding remain essential to spotting emerging tactics.

As attackers refine their methods at machine speed, organisations need to resist the temptation to match automation with automation alone. They must double down on strategic thinking and continuous skills development.

Balancing Benefits and Risk

So, where does this leave security leaders who are looking to balance the benefits and risks? Firstly, and to underline a fundamental point, while AI offers scale and speed, it cannot replace critical human oversight. Organisations should view AI as an enhancer, not a replacer. Success lies in promoting partnership, not substitution.

Strong governance is vital. This should start with clear AI usage policies that define what can and cannot be shared with AI tools, while proper data classification and access control ensure that sensitive information is protected. In addition, regular validation of AI outputs can help to prevent inaccurate or misleading results from being unnecessarily acted upon.

Then there are the perennial challenges associated with employee awareness training, which is vital for avoiding complacency and understanding the limitations of generative AI tools. Cyber leaders should also monitor how AI is being used inside and outside the corporate environment, as staff often experiment with tools on personal devices.

Get this all right, and security teams can put themselves in a very strong position to embrace AI, safe in the knowledge that they have the guardrails and processes in place to balance innovation and efficiency with effective human-led oversight. Ultimately, success will depend not on how much AI is deployed, but on how intelligently it is governed and refined alongside the people responsible for securing an organisation.

Learn more at Six Degrees

  • Artificial Intelligence in FinTech
  • Cybersecurity
  • Cybersecurity in FinTech
  • Data & AI
  • Digital Strategy

Lasse Fredslund, CMS Product Owner at Umbraco, examines the carbon footprint of our digital lives and offers advice on how to shrink it

Our digital lives have a carbon footprint. The energy consumed to power and cool the data centres at the heart of ecommerce, online banking, social and streamed media, already emits as much greenhouse gas as the aviation industry. This is expected to increase to 8% of GHG emissions in 2025.

While hyperscale data centre operators, including Microsoft, Alphabet, and Amazon, have made big strides towards adopting renewable energy sources, they still need fossil fuel-powered backup systems to meet the 24×7 demand for power and cooling.

Ballooning Demand

Since the Paris Agreement, internet traffic has quadrupled and the average web page weight has increased by 85% on desktop and 165% on mobile. Adding to this, the rapid adoption of generative AI is massively increasing data centres’ computational load.

To meet the predicted 606 Terawatt hours of electricity needed to power datacentres by 2030, three mothballed nuclear plants have been recommissioned in the US, and major investment is going into building new nuclear plants. However, building will take years and until then, fossil fuel combustion will continue.

How Can we Shrink our Digital Carbon Footprint?

The good news is that we can all do our bit to lighten the load. Even turning off autoplay on our smartphones and turning down the screen brightness can contribute to an overall reduction in energy consumption on our digital devices. Web designers and developers can do even more: making multiple optimisations that reduce web page weight and lower energy consumption and associated GHG emissions.

How We’re Reducing Digital Carbon Footprints

As the provider of the world’s most widely-used open-source content management system (CMS) built on Microsoft .NET, we have both a responsibility and a great opportunity to drive positive change on a larger scale.

For our own part, we’re focusing on ways to make our operations more sustainable and our software more energy-efficient. Running our CMS platform on Microsoft .NET9 has introduced features such as HybridCache that aid carbon-conscious web developers in building sites that load content more efficiently.

We’re also working closely with our global open-source community and digital agency partners to show how to reduce the CO2 emitted by business websites built on the Umbraco CMS platform. The Umbraco community Sustainability Team, formed in March 2023, has published documentation that provides practical steps for reducing web page weight and optimising data transmission.

Sharing Responsibility and Best Practices

By sharing sustainable best practices, and the measurable ROI that our partners’ clients have achieved as a result of carbon-conscious web design, we hope to amplify these changes across the industry. Together we can make a much bigger difference to our collective carbon footprint.

Prominent members of our open-source community Sustainability Team worked with us and implemented the Green Web Foundation’s CO2.js tool. We now have a Sustainability Dashboard, which helps businesses monitor and reduce the environmental impact of their websites running on Umbraco Cloud.

Ten tips to reduce Cloud Carbon Footprint

Members of the Umbraco Sustainability Team have published the following practical steps that organisations can take, and free tools that they can use, to measurably reduce the energy consumption and CO2 emissions of websites and digital experiences.

  1. Lose weight

Just as the aviation industry has been introducing lighter aircraft to help reduce fuel consumption and emissions, carbon-conscious web designers can also help organisations to reduce web page weight.

The Sustainability Team recommends using tools such as www.Ecograder.com and www.Websitecarbon.com which show grams of CO2 emitted per web page. This is the simplest way to check a web page’s energy-efficiency, so that improvements can be made.

Neil Clark, Service Design Lead, at TPX Impact, observes, “Every piece of website software and code must minimise the data transfer it causes. We must start to consider data transfer as a constraint in all of our digital projects.”

Thomas Morris, Tech Lead at TPX Impact advises, “A useful first step is to set page weight budgets and stick to them. This helps to create a culture of optimisation with realistic targets. The HTTP Archive suggests a maximum of 1 Megabyte.”

  1. Reduce Images

To reduce web page weight, Rick Butterfield, Lead Software Engineer at Wattle, emphasises, “Be ruthless about images.  Make sure they’re sized well and avoid using stock images, which can sometimes be massive files.”

Thomas Morris agrees, “One of the biggest impacts you can have, with fairly minimal effort, is to use appropriately-sized images on your website, or consider whether images are needed at all. Using modern image compression formats, such as WebP, or AVIF helps reduce file sizes by up to 70% compared to JPEGs, without your users noticing any difference. Optimise images before upload, to reduce the extra compute effort of resizing images. Where appropriate, consider using SVG icons, logos or illustrations, since these often result in smaller image file sizes and also scale easily without compromising image quality.”

  1. Compress fonts

Thomas Morris advises, “We suggest using system fonts to reduce extra server requests. If you do have to use custom fonts then compression tools, such as WOFF2, will help to minimise the data weight of those assets. WOFF2 is supported across all modern browsers.”

Minimising text assets, including HTML documents, JavaScript files and CSS files is a really good practice. Google’s Brotli is a lossless compression tool supported by 96% of browsers that makes this a lot easier and reduces text-based files by around two thirds.

  1. Choose colours wisely

Rick Butterfield advises that web designers can even reduce carbon footprint by changing the colours selected for a website: “Blue shades use up more energy than reds and greens when they’re displayed on screens.”

  1. Default to Dark Mode

“Dark mode is very simple to set up and can be built on incrementally,” enthuses Rick Butterfield. As with a lot of the best practices outlined by the Sustainability Team, these changes benefit end users too. “A university study found that switching from light mode to dark mode at 100% screen brightness can save an average of 40% battery power, so users don’t have to charge devices as often,” adds Rick.

  1. Keep software updated

James Hobbs, Head of Technology at aer Studios, says, “Simply by keeping libraries, frameworks and the rest, up to date, your organisation is likely to benefit from enhanced efficiency, which means doing more work with the same or fewer resources, which is better for the planet. When Umbraco moved to .NET Core it made a massive difference to the efficiency of the CMS. Staying on top of this can deliver sustainability and efficiency benefits and an improved security posture.

  1. Load web content efficiently

To make data transfers of images, videos and iframes more efficient, the Sustainability Team recommends implementing lazy loading on clients’ sites. “Lazy loading limits what is loaded within the viewport and is supported in modern browsers,” explains Thomas Morris.

However, web designers should avoid applying lazy loading to hero images which are always visible at the top of a page, as this will cause the website to load slowly and impact user experience.

  1. Make your Site Carbon-Aware

Rick Butterfield is a strong advocate for building carbon-aware websites. “The Green Software Foundation’s Carbon Aware software development kit allows developers to create software that does more when the electricity is from renewable sources and less when the electricity is from fossil fuels. Open APIs allow us to create this type of service for clients. Functionality of the site can be altered based on current grid usage, where your servers are located, or where your users are. As an example, images can be disabled if the server load is too high, or they could be stripped back to display illustrations instead.”

  1. Choose carbon-efficient infrastructure

Andy Eva-Dale, CTO at Tangent, advises that running digital services from the cloud has both environmental and financial benefits for organisations, “All the major cloud providers have carbon commitments. Take advantage of PAAS features like auto-scaling, to ensure you’re only using and paying for the computing memory you need, and this is optimised for ‘business as usual’ traffic, from a carbon perspective. Then, when you have spikes in traffic, we can auto-scale those applications. Furthermore, when we start looking at microservice architecture, we can scale independently and set resource plans on individual services rather than whole applications, giving us more control.

Andy Eva-Dale continues, “The next thing to consider is serving content geographically close to your audience. Hosting static files or caching your API responses on the edge can significantly reduce the amount of carbon your systems produce.”

Thomas Morris agrees, saying, “Serving static assets via a content delivery network (CDN) will ensure that requests are treated efficiently.”

  1. Switch off after use

Andy Eva-Dale also advises turning off cloud-based resources after use, “When you’ve moved to a relatively stable business as usual cycle, turn off your non-production environment and turn them on only when you need to make a patch, or update a particular feature. If you’re in a continuous programme of work, look at switching off environments at weekends. Applications like Kubernetes give you increased control over that. An auto event-driven autoscaler was announced by The Cloud Native Computing Foundation that allows infrastructure to be adjusted, based on carbon metrics.”

Taking our own advice:

The Sustainability Team is committed to working with peers, clients and even competitors to share these best practices and collectively reduce the environmental impact of digital experiences. This includes Umbraco listening to our digital partners and making the necessary changes to our core CMS platform and website.

Neil Clark comments, “By having us as a Sustainability Team, we can really push change at all levels of Umbraco which means that the impact of those changes is going to be amplified and not restricted to a few developers or agencies changing the way that they work.”

This is not just a nice-to-have. Our digital agency partners tell us they are seeing more client briefs and RFPs that stipulate sustainable web design. In the face of new legislation such as the Corporate Sustainability Reporting Directive, there is an increasingly strong business case for carbon-conscious web design.”

Learn more at umbraco.com

  • Sustainability Technology

Dan Nichols, Chief Technology Officer at virtualDCS, on why cloud resilience in the financial services sector hinges on shared accountability and an assume-breach philosophy

A powerful catalyst for transformation, the cloud is reshaping how organisations compete in the financial services sector. Beyond significant cost savings and flexibility, leaders are eager to unlock the potential of AI-driven insights, intelligent automation, and real-time business modelling. And, in a space governed so strictly by data sovereignty and privacy policies, the cloud’s ability to localise, encrypt, and control data has made it a key enabler of compliance and customer confidence.

But as threats become more frequent and sophisticated – with attackers now targeting shared platforms and partner supply chains – organisations can no longer rely on their own defences alone. For true digital resilience, shared accountability, collective readiness, and clear governance across every cloud touchpoint are equally non-negotiable.

All Eyes on the Money

The industry sits at a valuable intersection of data, technology, and finance. A combination that makes it uniquely attractive to attackers. It holds some of the world’s most sensitive data, directly underpins the flow of global capital, and operates through deeply complex and interconnected systems. With every integration increasing the risk of exposure. Ultimately, the attack motivation is as simple and relentless as it is in most sectors: monetary gain. Cybercriminals target institutions precisely because of the value at stake and the speed at which disruption translates to loss.

How the Threat Landscape is Evolving

Ransomware groups may see insurers and payment providers as high-yield targets. They understand even seconds of downtime can induce multi-million pound losses. Under pressure to protect customer trust and avoid regulatory penalties, some firms may choose to pay in order to restore their service quickly. This dangerous perception only encourages repeat targeting and paves the way for damage to spread even further. Yet it remains a common response tactic among many.

At the same time, the rise of supply chain and third-party attacks has made it possible for criminals to bypass even the most well-defended cloud environments. By exploiting shared platforms, managed service providers, and cloud-hosted applications, perpetrators can move laterally across multiple organisations at once, amplifying both the reach and impact of their attacks. In other words, infiltrating one vendor’s weakness can cripple an entire network in one carefully coordinated strike. And, since some firms may overlook the cloud’s shared responsibility model – presuming end-to-end security sits solely with their cloud provider – multiple blind spots can inevitably emerge, creating easy openings to exploit.

In an environment where boundaries blur and dependencies multiply, traditional perimeter-based defences are no longer enough. Hybrid and multi-cloud infrastructures demand continuous visibility, faster detection, and coordinated response across every partner and provider. The goal is not simply to prevent breaches, but to withstand and recover from them collectively. It’s about recognising that in today’s ecosystem, no financial institution is secure in isolation.

Inside the Ransomware Economy

Evolving beyond the scattergun attacks of the past, ransomware now operates as a professionalised, profit-driven ecosystem, where malicious actors collaborate, trade intelligence, and lease attack tools much like legitimate software vendors. The rise of ransomware-as-a-service (RaaS) has even lowered the barrier to entry, giving less skilled affiliates access to ready-made payloads and automated encryption kits in exchange for a percentage of the ransom.

What makes it especially destructive is the precision and psychology behind the attacks. Rather than randomly striking, attackers conduct weeks of reconnaissance – learning behaviours, studying employee hierarchies, and identifying systems most critical to operations. They often infiltrate through phishing emails or compromised credentials, quietly moving laterally through the network to gain elevated access. Once embedded, they disable defences, exfiltrate sensitive data, and target backup repositories before finally encrypting production systems.

At that point, the goal shifts from technical control to financial coercion. Victims are locked out of their systems and presented with a ransom note demanding payment, sometimes in cryptocurrency, in exchange for a decryption key. Increasingly, the threat includes public exposure of stolen data – a tactic designed to pressure leadership into paying to protect their reputation and customer trust. Even when ransoms are paid, recovery is rarely clean: data may be incomplete, corrupted, or resold on the dark web, and repeat targeting is common once an organisation is identified as a payer.

It’s this blend of stealth, strategy, and human manipulation that makes ransomware so difficult to defend against. By the time the encryption begins, attackers have already spent weeks ensuring recovery options are limited. This background isn’t designed to scaremonger, but to highlight why resilience must start long before an attack ever reaches the endpoint.

The Foundations of Ransomware Resilience

Ransomware resilience isn’t achieved through a single product or policy – it’s the outcome of strategic, technical, and cultural alignment. Financial institutions, in particular, must approach it as a continuous process of readiness: Anticipating compromise, containing impact, and restoring normality quickly and transparently:

Assume-Breach Philosophy

The first step is shifting from a defensive mindset to an assume-breach philosophy. In practice, this means recognising that even the most sophisticated systems can and will be breached – and building architectures and response strategies designed to limit damage when this happens. It’s a pragmatic approach, grounded in the reality that attackers are increasingly sector agnostic. No organisation is too small or too secure to be targeted, but the financial sector remains a favourite because it offers both high disruption value and potentially significant monetary reward.

Building meaningful resilience, therefore, demands layered defence and disciplined execution. The goal is to slow attackers down at every stage – detecting them early, limiting lateral movement, and ensuring business continuity when systems are disrupted. Behavioural analytics and continuous monitoring can surface and neutralise subtle anomalies that would otherwise go unnoticed – such as phishing, spear phishing, and malware, with email still the number one entry point for ransomware.

Zero Trust & MFA

Meanwhile, zero trust policies and multi-factor authentication methods add a second layer of protection, blocking unauthorised access even if credentials are compromised.

When incidents do occur, a well-practised response framework ensures action is fast and coordinated, minimising disruption across critical systems, with the ability to switch to secure replica environments to keep operations running while remediation takes place. Secure, immutable, air-gapped backups underpin it all, providing a safety net that guarantees recovery can begin from a clean and uncompromised state.

Human readiness is equally critical. Technology can contain an attack, but only people can recover from one effectively. Regular simulation exercises, incident rehearsals, and cybersecurity awareness training help teams respond calmly and cohesively, transforming response from reactive to instinctive. This operational maturity is reinforced by strong governance. Frameworks such as DORA, NIST, and ISO 27001 provide the structure to align technical teams, compliance leads, and executive decision-makers around shared resilience goals. When combined with skilled practitioners and clear accountability, they embed security into ‘business as usual’ – moving resilience from a strategy to a sustained organisational capability.

Why Multi-Layered Backup is Critical

When ransomware strikes, the speed and integrity of data recovery determine whether disruption lasts minutes or days – and whether the impact cascades through wider global markets. As the last and most decisive line of defence when every other control fails, it’s also fundamental to customer trust and compliance. Yet too often, backup is treated as a static safeguard rather than a dynamic resilience layer.

Since modern ransomware often seeks out and encrypts traditional backups first, a single backup copy or centralised repository is no longer sufficient. True resilience today depends on a multi-layered approach – combining offsite or cloud-diverse storage, immutable data copies that cannot be altered or deleted, and isolated environments to protect against lateral movement.

How frequently these backups are tested is equally important. Too often, financial institutions only discover weaknesses when recovery is already underway, at which point strategies can’t be magically strengthened, and it becomes a race against the clock to minimise downtime and reputational fallout. Regular, automated recovery testing changes that dynamic. It not only confirms that files can be restored, but provides verifiable assurance that systems come back online in the correct order, data dependencies remain intact, and teams have the muscle memory to act quickly and confidently when the worst happens.

The Power of Shared Accountability

In a digital economy so deeply interconnected, no organisation operates in isolation. This is especially true in financial services, where supply chains and service providers form the backbone of day-to-day operations. While this interdependence is a strength in many ways, it also means resilience is no longer defined by how well a single institution can defend itself, but by how effectively every partner in its ecosystem upholds their part of the security chain.

This is where shared accountability becomes critical. It recognises that cloud providers, managed service partners, and financial institutions each have distinct but complementary roles to play in securing data, systems, and infrastructure. When accountability is clearly defined – and when partners collaborate rather than operate in silos – visibility improves, incident response accelerates, and the risk of systemic failure decreases.

Shared accountability also extends beyond contractual obligation. It’s about building a culture of collective readiness: sharing intelligence, rehearsing joint incident scenarios, and supporting smaller or less-resourced partners to raise their security baseline. The result is a unified entity capable of anticipating, absorbing, and recovering from disruption together.

Looking Ahead

To view cyberattacks as inevitable might seem pessimistic to some, but it’s an unfortunate truth that no amount of investment can eliminate risk entirely. In an era where threats are growing in both scale and sophistication, readiness becomes the true differentiator – particularly in such a high-stakes sector. For financial institutions, that means embedding security into culture, strengthening connections across supply chains, and continually testing their ability to withstand and recover as a united ecosystem. Only then can resilience become a strategic advantage rather than a defensive necessity, and unlock the cloud’s transformative potential with absolute confidence.

Learn more at virtualcds.co.uk

  • Artificial Intelligence in FinTech
  • Cybersecurity
  • Cybersecurity in FinTech
  • Data & AI
  • InsurTech

Katja Hakoneva, Product Manager at Tuxera, on delivering tomorrow’s data storage security today

Smart meters are no longer just data endpoints. They’re intelligent, connected nodes embedded into the national infrastructure. As energy networks undergo rapid digital transformation, the focus has largely been on secure communications and real-time data transmission. But beneath the surface lies the local data storage, which often becomes a critical blind spot.

Smart meters store large volumes of sensitive data from energy usage profiles to firmware logs and grid event histories on embedded memory. If this information is accessed, altered, or deleted, it can trigger billing inaccuracies, regulatory breaches, and customer mistrust. With meters expected to operate in the field for up to 20 years, data-at-rest security is a critical requirement.

Storage Vulnerabilities: The Silent Cyber Threat

These embedded systems face multifaceted risks. Attackers may gain access to stored data by physically tampering with a meter or exploiting software vulnerabilities that bypass weak authentication. Malicious actors could manipulate logs to alter billing records, mislead consumption analytics, or mask larger cyberattacks on grid infrastructure.

In many cases, such intrusions go undetected until tangible damage, such as lost revenue or reputational fallout. With increasing dependence on smart infrastructure, utilities can no longer afford to treat embedded storage as a passive component.

Counting the Real Costs of Cybersecurity

Securing smart meters comes with technical requirements, as well as, operational and resourcing demands. For many UK manufacturers and utilities, managing cybersecurity internally means building and retaining specialist teams, often requiring three to five full-time professionals to handle vulnerability monitoring, patch management, and threat response throughout the year.

Aligning with regulatory frameworks frequently demands hardware upgrades to handle stronger encryption and secure configurations, impacting Bill of Materials (BOM) costs and development timelines. Many existing software stacks require optimisation to support modern security protocols within resource-constrained devices. These efforts are necessary, with a single undetected cyberattack costing companies an average of $8,851 (≈£6,900) per minute, and the consequences extending beyond financial loss to potential regulatory fines and service disruptions.

The CRA and the new Era of Cyber Regulation

The Cyber Resilience Act (CRA), set to come into force across the EU by 2027, will reshape how connected devices are designed, developed, and supported. For UK-based vendors serving the European market, or collaborating with EU counterparts, compliance with CRA is becoming a strategic imperative.

Key CRA requirements include:

  • Security by design: Devices must be secure from the outset, not retrofitted post-deployment.
  • No known vulnerabilities at market launch: Products must undergo security validation prior to release.
  • Default secure configurations: Devices should avoid insecure settings out of the box.
  • Lifecycle management: Vendors must support patching and vulnerability resolution throughout the device’s operational lifespan.

For smart meters, which often run in the field for two decades or more, the CRA introduces accountability that extends well beyond product launch. Compliance with the CRA will become part of the CE marking process, meaning global manufacturers must align if they wish to sell into the EU energy market.

Engineering Security: Confidentiality, Integrity, and Authenticity

Designing resilient smart meters starts with three pillars:

  • Confidentiality protects sensitive user data from unauthorised access. This includes encrypting both data and encryption keys, restricting user access levels, and securing communication channels.
  • Integrity ensures stored data remains unaltered and trustworthy. Power failures, for instance, can corrupt memory. Using flash-optimised file systems and secure boot processes can prevent such vulnerabilities.
  • Authenticity confirms that firmware and data updates come from trusted sources. Techniques like digital signatures and update validation prevent attackers from injecting malicious code into meters.

Together, these pillars enable smart meters to meet regulatory expectations while protecting both users and grid operations.

Future-proofing Data Storage

Cybersecurity for smart meters is not just a feature; it requires organisational readiness. Frameworks like the CRA, NIST, and IEC 62443 emphasise secure processes, documentation, and people alongside secure products.

For companies looking to prepare, it is smart to start with common pillars such as maintaining up-to-date Software Bills of Materials (SBOMs), conducting regular supply chain and risk assessments, keeping detailed test reports, and establishing clear incident response plans. Internally, training staff on cybersecurity best practices, setting clear data retention policies, and defining access controls and responsibilities are critical steps to ensure cybersecurity is embedded within the culture of the organisation. This approach ensures security is not a one-off compliance task but a sustainable practice that protects smart infrastructure long-term.

Smart meters deployed today could still be operating in the 2040s. This timeline intersects with the anticipated emergence of quantum computing, which may break today’s encryption standards. Though post-quantum cryptography is still evolving, vendors must prepare now to ensure systems remain secure in a post-quantum world. Smart meter software should be designed with cryptographic agility to allow it to adapt and upgrade algorithms as threats evolve.

Lessons from Long-Term Deployment

Smart meters are designed for longevity, but memory wear remains a primary failure point. Meters that lack flash-aware storage systems face early data loss, increasing the cost of maintenance, replacements, and warranty claims.

Utilities and OEMs that embed file systems capable of wear levelling, garbage collection, and secure boot processes have extended meter lifespans by more than 50%, even in challenging conditions. One example showed meters surviving over 15,000 power interruptions without any data loss.

Integrating secure storage delivers operational and commercial benefits. It ensures compliance with CRA and other evolving global frameworks, reduces maintenance and warranty costs, minimises carbon impact through fewer replacements, enhances brand credibility and trust with procurement teams, strengthens the business case for longer-term contracts and partnerships. As the smart energy market matures, these benefits are becoming differentiators, especially as digital infrastructure grows in complexity.

Delivering Tomorrow’s Data Storage Security Today

The next generation of smart infrastructure will be fast and connected, as well as, secure, resilient, and regulation-ready. For vendors and utilities alike, embedding data protection deep into the meter architecture is a business-critical move.

By preparing for the CRA today, smart meter manufacturers will position themselves as forward-thinking, trustworthy partners in tomorrow’s energy ecosystem, delivering technology that’s not only built to last but built to protect today and tomorrow.

Learn more at tuxera.com

  • Cybersecurity
  • Data & AI
  • Digital Strategy

Fawad Qureshi, Global Field CTO, Snowflake, on realising possibilities for innovation in this new AI era

Without cloud migration, businesses face the end of innovation. In this new AI era, businesses operating within the closed architectures of legacy systems do not have the flexible, data-driven foundation to engage with these new technologies and ensure a strong pipeline of necessary innovation. And as AI continues to evolve, those not able to keep pace with innovation risk being left behind. 

Cloud migrations are the foundation to modernise and drive business growth over the long term. When organisations migrate to a cloud-based environment, it’s crucial to focus on the tangible business value a migration will deliver, rather than simply shifting from one system to another. Moving a company’s customer-facing applications and all of their data to a cloud-based environment has the benefits that are increasingly real and measurable.

Migration isn’t just a Plug and Play approach – Which migration fits your needs?

There are two approaches to cloud migration, broadly speaking: horizontal and vertical, each with their own benefits and potential challenges. A vertical approach sees organisations migrating applications one by one: this approach is a good choice if certain systems have to be prioritised, or if the applications being migrated do not have many interdependencies. Vertical migration allows for focused efforts and risk management on individual systems, and requires fewer resources. Horizontal migration moves entire system layers at the same time. This is the best solution when businesses have tight deadlines to retire legacy systems, or if their systems are tightly integrated. Horizontal migrations tend to be faster by allowing for parallel work streams, but they require more technical expertise. 

Organisations often adopt a mixture of the two approaches, for example, horizontally migrating important systems such as data platforms, while taking a vertical approach to customer-facing applications. Whatever approach an organisation takes, it’s vital that the migration also includes a culture shift, preparing employees to adapt to new, consumption-based models and the possibilities of the new technology. Migration is also just the start of the journey, unlocking the potential of AI-driven use cases and seamless data collaboration, including new ways to achieve business value. 

Before diving straight in, ensure it’s with a Data-First Mindset

When migrating to the cloud, a data-first approach is essential. For those acting as the catalyst for change, whether that be IT managers or even CIOs, data must be front of mind before planning any successful migration.  Understanding how data is used within the organisations, including its structure, governance needs, and how it delivers value and business outcomes, is imperative. This applies doubly when it comes to large, complex systems with many interconnected applications. 

Before migrating, businesses must comprehensively assess their current ecosystem. It’s imperative that the end-to-end business product survives the migration, intact. Organisations should maintain internal control over core competencies around data, such as business process knowledge, data governance and change management. These areas include institutional knowledge that external parties may not grasp. Businesses should also maintain direct oversight over compliance requirements and risk management. 

Technical activities such as cloud infrastructure optimisation, performance testing, and specialised migration tooling are something, by contrast, that can be handled by external expertise. Code conversion can also benefit from purpose-built tools that use technologies including AI. Technical parts of the immigration tend to evolve rapidly and require specialist knowledge, so are ripe for outsourcing. While doing so, those steering the migration need to ensure clear governance around outsourced activities, including regular knowledge transfer sessions. 

Different parts of the business all have a role to play: IT and engineering lead on technical implementation, handling the technical side of business requirements, while finance will identify ROI opportunities and manage cloud costs. It helps to create a cross-functional steering committee with representation from every department to ensure that different areas of the business are aligned and ready to address challenges. 

Adaptability and Flexibility is the key to business longevity 

Migration is never one-size-fits-all, and business leaders should be prepared to be flexible and adapt. There are multiple kinds of horizontal migration, from a simple ‘lift and shift’ focused on moving systems as they are to a ‘move and improve’ where migration is followed by optimisation to reduce technical debt. They should be ready to adapt at their own pace, choosing data platforms which offer agnostic architecture and the freedom to choose between data models and tools to ensure minimal disruption.

Flexibility is also important in choosing the tools used for migrations. Flexible data platforms will offer the support businesses need to deal with collaboration and governance frameworks. For businesses operating in EMEA, where different countries can have varying policies, pay close attention to issues around data quality, security and compliance, particularly when it comes to data sovereignty and issues around European data residency. 

A Shared Destiny

The shift to the cloud fundamentally changes security. The traditional cloud ‘shared responsibility’ model clearly demarcated duties between the provider and the customer. However, a more advanced approach is emerging: the ‘shared destiny’ model. This model recognises that in the event of a breach, reputational damage affects both parties. This shared risk incentivises the cloud provider to be a more proactive partner, actively helping customers strengthen their security posture rather than simply managing their own side of the demarcation line.

As ‘destinies’ intertwine, you help eliminate the vulnerability created due to password simplicity. Put simply, in a ‘shared responsibility’ model, the cloud provider is only responsible for securing infrastructure, while the customer remains responsible for securing data and apps in the cloud, as well as for configuration. In a ‘shared destiny’ model, the cloud provider plays a more proactive role to ensure that their customers have the best possible security posture. 

Taking a ‘shared destiny’ approach allows businesses to be more proactive in securing data, using approaches such as multi-factor authentication, secure programmatic access and more comprehensive cloud monitoring services. Choosing a modern, AI-driven data platform offers the best security foundations here, offering security controls across cloud service providers and the entire data ecosystem. 

A Pathway to Growth

In today’s world, the bigger risk is standing still. Nothing changes if nothing changes.

If organisations are holding back on innovation due to technological limitation, then the time to migrate is clear. There is no need to face an end to possibilities when the path towards success lies in reach, offering an opportunity to bring businesses up to date with modern requirements, and pave the way for the adoption of technologies such as AI. 

However, as we’ve seen, it’s not just a case of plug and play. Organisations must ensure a flexible, data-driven approach to migration, while keeping security front of mind via a ‘shared destiny’ approach. To deliver this, the right choice of a modern, flexible data platform will ensure the whole organisation can work together effectively and deliver a path to future innovation and growth. 

Learn more at snowflake.com

  • Data & AI
  • Digital Strategy
  • Infrastructure & Cloud

Robert Cottrill, Technology Director at digital transformation company ANS, explores how businesses can harness the potential of AI while mitigating the growing risks to cybersecurity and privacy

AI can transform businesses, but is it also opening the door to cyber risks? Fuelled by competitive pressure and rising government support through the UK’s Industrial Strategy, it’s no surprise that more and more businesses are racing to adopt AI.

But there’s a catch. The more businesses scale their AI adoption, the bigger their attack surface becomes. Without a proactive and structured approach to securing AI systems, organisations risk trading short-term efficiencies for long-term vulnerabilities.

The AI Boom

AI investment is skyrocketing. Businesses are deploying generative AI tools, machine learning models, and intelligent automation across nearly every function, from customer service and fraud detection to supply chain optimisation. Platforms like DeepSeek and open-source AI models are now part of the mainstream tech stack.

Initiatives like the UK’s AI Opportunities Action Plan are fuelling experimentation and adoption. AI is now seen not just as a productivity tool, but as a critical lever for digital transformation.

However, the rapid pace of AI deployment is outpacing the development of the security frameworks required to protect it. When integrated with sensitive data or critical infrastructure, AI systems can introduce serious risks if not properly secured. These risks include data leakage through AI prompts or model training, as well as AI-generated phishing and social engineering attacks

So, it’s no surprise that ANS research found that data privacy is the top concern for businesses when adopting AI. As these threats evolve, businesses must treat AI not just as an enabler, but also as a potential vector for attack.

The Governance Gap

While technical threats often take centre stage, businesses also can’t forget the increasing regulatory requirements surrounding AI. As AI systems become more powerful, enabling businesses to extract valuable insights from vast datasets, they also raise serious ethical and legal challenges. 

Regulatory frameworks like the EU AI Act and GDPR aim to provide guardrails for responsible AI use. But these regulations often struggle to keep up with the rapid advancements in AI technology, leaving businesses exposed to potential breaches and misuse of personal data.

The Need for Responsible AI Adoption

To build resilience while embracing AI, businesses need a dual approach: 

1. Prioritise AI-specific training across the workforce

Cybersecurity teams are already stretched. Introducing AI into the mix raises the stakes. Organisations must prioritise upskilling their cybersecurity professionals to understand how AI can both protect and threaten systems.

But this isn’t just a job for the security team. As AI tools become embedded in daily workflows, employees across functions must also be trained to spot risks. Whether it’s uploading sensitive data into a chatbot or blindly trusting algorithms, human error remains a major weak point.

A well-trained workforce is the first and most crucial line of defence.

2. Adopt open-source AI responsibly

Another key strategy for reducing AI-related risks is the responsible adoption of open-source AI platforms. Open-source AI enhances transparency by making AI algorithms and tools available for broader scrutiny. This openness fosters collaboration and collective innovation, allowing developers and security experts worldwide to identify and address potential vulnerabilities more efficiently.

The transparency of open-source AI demystifies AI technologies for businesses, giving them the confidence to adopt AI solutions while ensuring they stay alert about potential security flaws. When AI systems are subject to global review, organisations can tap into the expertise of a diverse and engaged tech community to build more secure, reliable AI applications.

To adopt responsibly, businesses need to ensure that the AI they are using aligns with security best practices, complies with regulations, and is ethically sound. By using open-source AI responsibly, organisations can create more secure digital environments and strengthen trust with stakeholders.

Securing the Future of AI

AI is a transformative force that will redefine cybersecurity. We’re already seeing AI being used to automate threat detection and response. But it’s also powering more advanced attacks, from deepfake impersonation to large-scale automated exploits.

Organisations that succeed will be those that embed cybersecurity into every stage of their AI journey, from innovation to implementation. That means making risk management part of the innovation conversation, not a downstream fix.

By taking a responsible approach, investing in training, leveraging open-source AI wisely, and embedding cybersecurity into every layer of the business, organisations can unlock AI’s potential while defending against its risks.  

AI is a double-edged sword, but with thoughtful adoption, businesses can confidently navigate the complex landscape of AI and cybersecurity.

Learn more at ans.co.uk

  • Cybersecurity
  • Data & AI
  • Digital Strategy

Ben Francis, Insurance Lead at Risk Ledger, on navigating cyber threats by reinforcing security from the inside out

Cyber insurance has evolved from a straightforward risk transfer mechanism into an integral component of enterprise risk strategy. As a result, the conversation has shifted beyond simply securing coverage to embracing three foundational elements: transparency in risk exposure, accountability for security measures, and active collaboration throughout the digital ecosystem.

Rather than asking ‘are you covered?’, the more pertinent question has become ‘can you demonstrate measurable risk reduction?’. Insurers and insureds alike are recognising that what matters now is how well an organisation understands and manages its digital exposure, especially across its extended supply chain. Recent data reveals that 46% of organisations experienced at least two separate supply chain-related cyber incidents in the past year, a clear sign that exposure often lies beyond direct control. 

From Risk Transfer to Risk Visibility 

In recent years, the cyber insurance market has matured significantly. Once viewed as a reactive safety net to cushion the financial impact of attacks, it is now becoming a proactive tool for managing and mitigating risk. This shift is partly driven by insurers, who increasingly expect and work with organisations to demonstrate strong security practices and a nuanced understanding of their threat landscape, including risks deep within their digital supply chains; an area where many businesses still fall short.

At the same time, the industry faces a growing challenge from systemic cyber risk within their portfolios, as many businesses rely on the same cloud providers, payment systems and digital platforms, increasing the chance of a single point of failure. Insurers must gain visibility into how policyholders are connected, not only to suppliers but to each other. Tools and frameworks that map and monitor these interconnections will be essential to avoid underestimating the wider impact of seemingly isolated cyber events.

Mapping Beyond Third Parties

It is no secret that cyber attackers often target the weakest link in a supply chain. These are not always direct suppliers, but fourth, fifth or even sixth-tier vendors that have indirect but critical access to systems and data. Unfortunately, many organisations lack visibility beyond their first tier, creating blind spots that attackers can easily exploit. From an insurance perspective, this presents a clear challenge. If an organisation cannot account for who it is connected to, it cannot adequately quantify its risk and neither can its insurer. Mapping these extended connections is more than just a technical exercise; it means actively practiced risk governance and responsibility. Insurers increasingly want to know how their policyholders are identifying and managing indirect dependencies, particularly in sectors like financial services and retail where disruption can ripple across entire markets.

Collaboration as a Risk Strategy 

One of the more underappreciated aspects of cyber resilience is the role of peer collaboration. Unlike physical incidents, cyber threats rarely exist in isolation. A single compromised vendor can impact multiple organisations simultaneously, a fact that has been highlighted by high-profile supply chain attacks such as SolarWinds and MOVEit

As a result, businesses need to think beyond their own perimeters and adopt a more collective mindset. This includes building relationships with industry peers, sharing threat intelligence and participating in sector-wide initiatives aimed at improving visibility and preparedness. 

In highly regulated sectors, such as insurance, this collaboration is increasingly being encouraged by oversight bodies. Frameworks like the Digital Operational Resilience Act (DORA) in the EU and initiatives from the Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA) in the UK are pushing for more transparency around third-party risk. In this context, openness is no longer optional; it will be a regulatory expectation. 

For insurance providers, greater collaboration between policyholders also means better data on emerging threats and more accurate portfolio management. For businesses, it offers a chance to anticipate vulnerabilities that may not yet have hit their own networks but are affecting others in their industry. 

Proactive Transparency Builds Trust 

Organisations that take a proactive, transparent approach to cyber risk management are more likely to secure cover and potentially favourable terms, not just in terms of premiums, but also in access to additional services such as forensic support, incident response sources and legal counsel. 

Demonstrating a mature cyber posture is not about claiming perfection. No organisation is immune to breaches. What insurers are looking for is evidence of a structured approach: the existence of incident response plans, robust governance, effective supply chain risk management, and above all, an honest view of risk. 

A Shift in Mindset 

Ultimately, our understanding of cyber insurance must keep evolving. It should not be treated as a simple checkbox exercise, but as a collaborative relationship between insurers and the organisations they support – one built on shared insight, clear communication, and a drive for continuous improvement.

The organisations best equipped to navigate today’s threats will be those that prioritise transparency. Not only does it lead to stronger protection, but it also builds a culture of accountability that reinforces security from the inside out.

Learn more at riskledger.com

  • Cybersecurity
  • Cybersecurity in FinTech
  • Digital Strategy
  • Fintech & Insurtech
  • InsurTech

Neven Matas, Cybersecurity Team Director EU from Infinum, explores how FinTech companies can turn resilience into a source of innovation and business growth

FinTech companies are under constant pressure to innovate rapidly while maintaining deep and ongoing trust in their platforms. And as AI becomes embedded into everything from credit decisions to customer support, these pressures are intensifying. The future of digital finance will not just be defined by who deploys the most advanced technology first but by who implements systems that can withstand attack, scale efficiently, and evolve without compromising compliance or customer confidence.

Resilience cannot be a technical afterthought; it is a strategic requirement for FinTech. Modular platform architectures, responsible AI operations, and proactive security testing are becoming the foundations of sustainable FinTech growth. Together, they define an operating model where compliance supports innovation instead of obstructing it and where trust becomes a true competitive differentiator.

FinTech Resilience Begins with Architecture

Many FinTech platforms have evolved as tightly integrated but ultimately separate systems. While these can move quickly at first, they will often struggle under regulatory change, evolving security threats or simply the pressure of scale.

Modular, API-driven architectures will enable organisations to compartmentalise risk. They also make it easier to upgrade specific services without disrupting the others and adapt to new regulatory obligations without impacting the whole business. Shared platform capabilities, such as identity management, encryption, logging and access control, will give every new product or feature an inherited baseline of good security practice and governance.

This approach is especially important as operational resilience regulations tighten across global financial services. Requirements around third-party management, continuity planning, and incident reporting demand systems that are secure, observable, and controllable. When resilience is engineered into the platform rather than bolted on, organisations can adapt far more confidently.

Crucially, modularity accelerates innovation rather than slowing it down. Teams can experiment at the edge without placing core systems at risk. New fraud detection models, customer features or AI-driven services can be deployed, tested and refined in isolation. Resilience, therefore, is not simply about withstanding disruption, it is what allows organisations to safely embrace continuous change.

Scaling Digital Products Without Tripping Over Compliance

Digital FinTech products are no longer judged just on usability. They are also evaluated on how transparently they handle data, how well they communicate risk, and whether they meet regulatory expectations across markets. Compliance, which was once seen as a barrier to innovation, is increasingly becoming a fundamental product design input.

The most resilient organisations will embed regulatory thinking directly into product development from the outset. Rather than treating compliance as a late-stage sign-off, they feed regulatory principles into experience design and system behaviours. Consent flows, audit trails, authentication rules, and data retention logic become part of the product’s core architecture rather than something that has been retrofitted.

This approach significantly reduces the operational burden of growth. As FinTech companies enter new regions or launch new services, they avoid the potential of costly remediation triggered by regulatory scrutiny. Instead, they operate from consolidated, well-governed platforms that limit the attack surface and simplify oversight, while also limiting duplication. The outcome is a stronger security posture and faster expansion into new markets with clearer trust signals for customers and partners.

AI as a Trusted Partner Not a Black Box

AI has rapidly become central to the FinTech value proposition. Real-time fraud detection and automated operational processes, for example, depend on increasingly sophisticated models. However, AI also introduces new risks, including opaque decision-making, potential bias, and heightened regulatory exposure when automated systems influence financial outcomes.

The strategic shift now is from experimental AI adoption to accountable AI operations. This begins with defining precisely where AI adds value and where human oversight remains essential. High-impact use cases, such as lending decisions, transaction monitoring and identity verification, all need explainability as well as accuracy. Organisations must be able to demonstrate how decisions were reached, what data was used and how bias is monitored over time.

Clear ownership, review processes, escalation paths, model validation and human-in-the-loop controls will help make large-scale AI deployment viable in a regulated environment.

AI also has a strong defensive capability. Behavioural anomaly detection, predictive threat monitoring and intelligent authentication systems allow fintech platforms to detect and respond to risk faster than traditional rule-based approaches.

When used responsibly, AI can strengthen both customer experience and operational resilience.

Proactive Security Testing as a Continuous Discipline

Modern FinTech infrastructure assumes exposure. APIs are public, ecosystems are interconnected and supply chains are large and complex. Under these conditions, security based solely on perimeter defences or annual audits is not enough. This means continuous, adversarial testing has become essential for resilient fintech organisations.

Mature players are moving beyond compliance-driven testing into ongoing penetration assessments, red-team exercises and social-engineering simulations. These practices uncover technical vulnerabilities, as well as weaknesses in response coordination, escalation decision-making and recovery planning. They test the organisation as a living system rather than a collection of isolated applications.

Integrating security into everyday development is equally critical. Secure coding standards, continuous testing pipelines and regular threat modelling will enable earlier detection of vulnerabilities, when issues are cheaper and easier to resolve. The goal is not to eliminate risk entirely, which is impossible, it is to reduce the time between exposure, detection and response.

Security as a Growth Enabler

The reframing of security from cost centre to growth driver is the most significant strategic transformation in FinTech. Having a strong security posture is not just about ticking compliance checkboxes, it is increasingly a prerequisite for partnerships, institutional trust and international expansion.

Organisations that demonstrate operational resilience, responsible AI governance and proactive security assurance move through due diligence faster. They onboard enterprise clients more easily, integrate with partners with fewer barriers and launch advanced digital services with greater confidence.

In crowded markets, trust is a commercial advantage.

From the customer perspective, security and transparency are inseparable from experience. Clear communication around data usage, visible protections and consistent reliability directly impact adoption, retention and loyalty. Resilience becomes part of brand equity.

Looking ahead, FinTech leaders will not be defined by who adopts new technology first but by who builds systems capable of absorbing disruption, scaling responsibly and evolving continuously. Modular platforms, trustworthy AI and continuous security assurance form the backbone of this.

Learn more at infinum.com

  • Artificial Intelligence in FinTech
  • Cybersecurity in FinTech

CoreX, a high-growth Elite Consulting and Implementation Partner of ServiceNow and NewSpring Holdings platform company, has announced the successful completion…

CoreX, a high-growth Elite Consulting and Implementation Partner of ServiceNow and NewSpring Holdings platform company, has announced the successful completion of its acquisition of InSource’s ServiceNow business unit. InSource is a fellow Elite Partner recognised for deep delivery expertise and an unwavering commitment to client success. The transaction officially closed in late December 2025.

This agreement unites two high-performing ServiceNow partners in the ecosystem. Together, CoreX and InSource now operate as a single, purpose-built organisation designed to scale with intent, elevate enterprise transformation outcomes, and meet the accelerating demand for AI-enabled, end-to-end ServiceNow solutions worldwide.

InSource integration into CoreX delivering value for ServiceNoe customers

With InSource’s 1,500+ successful implementations and a 4.76 CSAT rating, the combined organisation, more than doubling its US-based employee headcount, now operates at a level of scale and technical depth that firmly positions CoreX among the top-tier Consulting and Implementation Partners in the global ServiceNow ecosystem. The acquisition doubles the firm’s ServiceNow certifications and brings together advanced platform specialisation and a people-first culture grounded in long-term client success.

“This is not growth for growth’s sake, but rather a strategic, deliberate move of scale,” said Rick Wright, Head of CoreX. “By fully integrating InSource into CoreX, we have created a focused consultancy built for scale, execution, and long-term value for ServiceNow customers.”

Reflecting on the integration, Mark Lafond, former President & CEO of InSource, added, “InSource was built on delivery strength, trust, and long-term client relationships. Joining forces with CoreX allows us to take everything we do best and amplify it on a much larger stage. This is the right home for our people, the right platform for our customers, and the right partner to accelerate the next chapter of growth.”

By unifying CoreX’s innovation roadmap and AI readiness with InSource’s long-standing operational delivery excellence, the combined organisation now offers a truly integrated model for enterprise transformation across industries. This integration enables clients to move faster from strategy to execution while maintaining the governance, resilience, and scalability required for modern enterprises.

Just as importantly, the acquisition strengthens CoreX’s geographic footprint and delivery capacity across key global delivery hubs, including North America and Latin America, enabling the firm to serve enterprise clients with greater speed, continuity, and depth.

“Our acquisition of InSource fundamentally changes the scale of impact we can deliver for customers,” Wright added. “CoreX is now purpose-built to lead the next era of ServiceNow-powered transformation.”

A Unified Approach to Enterprise Transformation

The acquisition significantly enhances CoreX’s capabilities across Strategic Portfolio Management (SPM)IT Asset Management (ITAM)IT Operations Management (ITOM)Integrated Risk ManagementOperational Technology integration, and AI-ready enterprise architecture. The combined strengths allow CoreX to solve more complex, mission-critical challenges across industries, including manufacturing, healthcare, financial services, and the public sector.

With this transaction, CoreX is now among the top global ServiceNow Elite Partners, distinguished not just by certifications or scale, but by consistent delivery of measurable, enterprise-level outcomes on the ServiceNow AI Platform.

About CoreX

Founded in 2023, CoreX is a global ServiceNow consultancy specialising in business-focused transformation that unlocks hidden value from the Now Platform. Backed by unmatched industry leadership, extensive functional experience, and the most seasoned ServiceNow team in the ecosystem, CoreX delivers strategic guidance and AI-enabled innovation to power sustained success. Learn more at corexcorp.com

About NewSpring Holdings

NewSpring Holdings, NewSpring’s majority investment strategy, focused on control buyouts and sector-specific platform builds, brings a wealth of knowledge, experience, and resources to take profitable, growing companies to the next level through acquisitions and proven organic methodologies. Founded in 1999, NewSpring partners with the innovators, makers, and operators of high-performing companies in dynamic industries to catalyze new growth and seize compelling opportunities. Having completed over 250 investments, the Firm manages approximately $3.5 billion across five distinct strategies covering the spectrum from growth equity and control buyouts to mezzanine debt. Partnering with management teams to help develop their businesses into market leaders, NewSpring identifies opportunities and builds relationships using its network of industry leaders and influencers across a wide array of operational areas and industries.

  • Data & AI
  • Digital Strategy

After a turbulent few years, the crypto sector looks on the cusp of another period of boom. Yet, according to Anthony Yeung, Chief Commercial Officer at CoinCover, the success of this next phase will hinge on embedding responsibility and accountability at its core.

A few years ago, the crypto sector found itself grappling with a profound image crisis. A series of high-profile scandals, widespread misconceptions about its place within the broader financial system, and a glaring absence of regulatory oversight led many to dismiss the space as a haven for tech-savvy opportunists peddling dubious tokens in a never-ending cycle of ‘get-rich-quick’ schemes.

Fast forward to 2025, and while some of that baggage lingers, public understanding of crypto and its underlying value has matured considerably. Endorsements from major governments, coupled with rising levels of institutional investment, have helped to temper concerns about crypto’s legitimacy and long-term role in the financial ecosystem. Nevertheless, questions around trust and transparency continue to cast a shadow over its progress.

A Collective Effort

It’s clear that crypto remains a hotbed of innovation, much of it focused on attracting more individuals and businesses into the ecosystem. However, alongside the development of cutting-edge solutions, the sector must also dedicate time and effort to rebuilding and strengthening its public image. As we enter this next phase of growth, reinforcing trust and public confidence is just as vital as technological progress.

At CoinCover, we believe that tackling this trust deficit could be the key to unlocking the next billion users of cryptocurrency. Driving such a shift will require more than just our efforts. As an industry, crypto must urgently find more effective ways to tell its story showcasing not only its value but also its security. A collective, coordinated effort from stakeholders across the ecosystem is essential to reshape public perception and build lasting confidence.

The Path to the Next Billion Crypto Users

That sentiment is unlikely to raise eyebrows. From my experience, there’s broad agreement that crypto must do more to manage how it’s perceived by those outside the space. Yet, when it comes to charting a path forward, consensus becomes far more elusive. Chief among the contentious issues is the role of external regulation; a topic that continues to divide opinion across the sector and spark lively debate.

Unlike just a few years ago, when regulation in the crypto space was minimal, businesses today face a growing list of compliance demands. Moreover, expectations are mounting that regulatory oversight will only become more stringent in the months and years ahead. For many within the sector, this external scrutiny sits uneasily alongside the original ethos and mission of cryptocurrencies.

Evolution, Not Revolution

Many crypto OGs acknowledge that the space was born out of a desire for decentralisation, autonomy, and freedom from traditional financial systems. Yet, as with many movements, that founding mission has evolved over time. Today, crypto no longer exists as a siloed alternative but is increasingly integrated into the broader financial ecosystem that supports the modern global economy.

While for some the merits of this evolution remain up for debate, its reality is undeniable. For those of us committed to broadening access to the benefits of cryptocurrency, this moment presents more opportunity than challenge. In terms of user access, the crypto space has reached heights few could have expected. The ideology that shaped the sector’s early days need not be discarded, but elements of it must evolve to reflect the times we live in.

Responsible Regulation

At present, regulation represents the key tension point between these two opposing worldviews. For some, external oversight undermines the very essence of crypto. For others, the wave of incoming compliance offers much-needed validation, a chance for the sector to shed its chequered reputation and re-emerge as a more trusted, credible, and accessible solution for the next billion global users.

As a long-time crypto enthusiast, I appreciate the merits of both sides of the debate. At the same time, I’m realistic enough to acknowledge that the genie is well and truly out of the bottle. There’s no turning back the clock on regulation – and perhaps nor should there be. While few within the sector would advocate for overly stringent measures, there is a clear and pressing need for measures to be introduced and upheld that incentivise good behaviour across the board.

Unlocking the Next Wave of Users

Embracing responsible compliance, and viewing its introduction as an opportunity rather than a threat would mark a positive step forward for the sector. Additionally, it would help initiate the much-needed process of reshaping crypto’s public image: one that reflects a commitment to accountability, long-term growth, and sustainable progress. It could prove crucial as the sector looks to unlock the next billion global users.

At CoinCover, we’re committed to helping shape the conversation around this issue. In the months ahead, we aim to engage openly with all sides of the debate; from regulators to crypto companies. By fostering dialogue across the ecosystem, we believe we can play a constructive role in helping the sector reach a more balanced, sustainable equilibrium — one that serves the interests of all stakeholders, and most importantly, its users.

Find out more at coincover.com

  • Blockchain & Crypto

Paul Clarke, Chief Growth Officer at Cashdflows, on how payments infrastructure can support both trust and scale

The UK’s game of skill, competition and raffle sector is undergoing rapid transformation. While data on the sector is limited, UK Government analysis indicates that 14% of UK adults collectively spend a total of £1.3 billion per year. For comparison, 44% of adults spend an estimated £8.2 billion annually on the National Lottery.

The same report shows an upward market trajectory with 60% of operators anticipating an increase in ticket sales over the next three years, while only 5% expect a decline. When it comes to the players themselves, 22% have increased their spending in the past year, outpacing the 17% who have reduced theirs.

Against this backdrop of sustained engagement, fair access to effective payment solutions is essential to support competition among merchants.

The Payments Layer of Trust and Scale

As operators mature, they must balance commercial growth with strong operational integrity. Unlike purely entertainment-driven apps, these platforms are rooted in real-money participation, whether through entry fees, prize payouts, or both. This heightens expectations for merchants and consumers around security, compliance, and player protection.

Payments infrastructure therefore becomes a fundamental line of defence. Tools such as Strong Customer Authentication (SCA) and two-factor authentication (2FA) provide robust safeguards against fraud, account compromise, and unauthorised transactions, reinforcing trust with both consumers and regulators.

Enhanced checkout features also play a significant role. Pre-populated payment details and secure card-on-file capabilities streamline repeat purchases, reducing manual errors and checkout abandonment. Click to Pay and network tokenisation support secure one-click transactions, improving conversion performance while ensuring PCI compliance.

Real-time fraud analytics, velocity checks, and dynamic transaction routing help maintain strong approval rates and minimise friction, ensuring legitimate users enjoy a smooth and reliable payment experience.

From Back-Office Burden to Brand Advantage

Payments were once viewed purely as a back-end process, a necessary function behind the scenes. Today, they are a frontline driver of user experience and commercial differentiation. Deposits and withdrawals bookend the player journey, so speed, transparency, and seamless execution boost satisfaction, reduce churn, and can become pivotal to brand advocacy.

In a high-volume environment where microtransactions dominate, even brief delays or failed payments can quickly damage trust. Conversely, efficient transactions turn reliable payments into a competitive advantage – one that encourages repeat play and referrals.

Powering the Platform Economy of the Future

The broader creator and competition economy is still in its infancy, with new formats emerging at pace but what unites them is a reliance on secure, scalable, and accessible payment systems. What those that succeed will have in common is whether those payment systems can support growth while maintaining compliance and safeguarding trust. As investment continues to flow into the sector, the platforms that thrive will be those that view payments not just as operational plumbing but as a strategic asset.

Paul Clarke, Chief Growth Officer at Cashflows, has a wealth of experience successfully leading product, business strategy, and innovation functions in the payments, eCommerce, and digital sectors. He was previously Executive Vice President for Product and Innovation at international payments solutions provider: Network International. Prior to this, Paul held leadership positions at key payment organisations, such as Barclaycard, Elavon, and Worldpay. Having joined Cashflows in 2021, Paul is responsible for leading the product proposition, strategy, go to market and delivery functions of the business. 

About Cashflows 

Cashflows is a new breed of FinTech payments company that makes it easy for small corporates and SMEs to accept card and digital payments – online, in store and on the move. 

Through its own acquiring platform and gateway, Cashflows provides a safe, secure ecosystem for processing payments right across Europe. Cashflows products and services are built with the latest technology and the future in mind, always to meet the specific needs of partners and customers. 

Learn more at www.cashflows.com  

  • Digital Payments
  • Neobanking

The Card & Payments Awards Middle East will be taking place on Thursday 5th April 2026 at Atlantis – The Palm in Dubai. Entries are open now and close in December.. Book your table for the Awards now!

The Card & Payments Awards is among the leading networking events of the year for the Middle East card and payments industry. With over 1,100 guests attending on the night, from over 300 different companies, and with a compelling list of blue-chip sponsors. Enter here and book your tables now.

Recognising Excellence and Innovation in Payments

For two decades, The Card & Payments Awards has stood as the premier networking event for the UK and Irish card and payments industry. The event was founded 20 years ago by Michael Harty.

Building on this legacy of success, 2025 marked an exciting expansion with the inaugural Card & Payments Awards Middle East. Hosted in Dubai on April 17th, 2025, at the prestigious Ritz-Carlton, DIFC, this highly successful event celebrated best practice, innovation, and excellence within the region’s dynamic card and payments sector. It provided an invaluable networking platform, connecting key players and fostering new partnerships and collaborations to drive continued innovation across diverse verticals.

The Card & Payments Awards Middle East welcomes entries from credit, debit, prepaid, and charge card issuers, co-brands, merchant acquirers, payment processors, retailers, and other payments companies worldwide offering programs or initiatives within the Middle East. With a range of categories covering essential disciplines, the awards offer organizations a significant opportunity to showcase their achievements and contribute to a vital industry platform that recognizes and rewards the best in the Middle East.

Why Enter

Entering your company for an Awards Programme is a fantastic opportunity to showcase your achievements to the industry, while benchmarking against your competitors. Ultimately success at the Awards can be leveraged on consumer facing communications.

Some of the many reasons to consider an entry are listed below.

  • A mark of quality assurance from the leading & longest-standing Awards in the industry
  • Increase your brand exposure through media & PR coverage
  • Increase your profile with top industry blue chip companies
  • Increase your credibility and gain trust from consumers
  • Differentiate your brand
  • Gain a competitive edge
  • Benchmark against others in the industry
  • Drive best practice
  • Receive recognition, network & celebrate with others in the industry.

Putting together an entry can seem a daunting task, so if you aren’t sure where to begin, get in touch with us and we will be able to advise.

Enter here and book your tables now to celebrate the industry’s biggest achievements, whilst meeting the key players from across the sector in the Middle East.

Osama Bari, Chief Technology Officer at D24 Fintech on the need for cybersecurity advancement to support the rise of crypto adoption

Cryptocurrency adoption has accelerated dramatically, rising in popularity in recent years. Yet the sector remains a prime target for cyberattacks. As digital assets grow in value and popularity, the stakes for both exchanges and users have never been higher. High-profile incidents, such as the CoinDCX breach in July, which saw hackers steal $44 million without touching user wallets, Phemex losing $69 million in a crypto heist, and WazirX losing $230 million, demonstrate the sophisticated tactics cybercriminals now employ.

Similarly, the Bybit hack exposed vulnerabilities in multi-signature authorisation and user interface (UI) spoofing. This highlights how even experienced professionals can be caught off guard.

These events underscore the urgent need for exchanges and financial institutions to prioritise security. They must implement robust protocols, and adopt comprehensive risk-management strategies. There are several core areas where crypto platforms can significantly reduce the risk of security breaches.

Strengthening Cybersecurity Protocols

It is vital for exchanges to implement multi-party approval systems for all transactions. By using threshold-based authorisation, combined with real-time monitoring of deposits and withdrawals, platforms can identify unusual activity and flag it for manual verification. Each withdrawal should undergo a transaction audit score assessment before processing. Such measures are critical for preventing attacks that exploit UI vulnerabilities or other operational oversights. This ensures that no single point of failure can compromise user assets.

Another essential safeguard is two-factor authentication (2FA). While a long-established security measure, its importance in protecting accounts and verifying users cannot be overstated. By requiring a second form of identification, exchanges can ensure only authorised personnel access accounts and manage balances. In practice, this simple but effective layer of protection increases the difficulty for hackers. It demonstrates an exchange’s commitment to protecting its customers’ funds. All financial providers should offer 2FA as a baseline security measure.

Custodians also play a vital role in mitigating risks. For many exchanges, especially those handling large volumes of assets, partnering with a trusted custodian provides additional security and oversight. Custodians safeguard digital assets on behalf of clients, reducing exposure to theft, loss, or mismanagement. In the aftermath of this year’s prominent hacks, the value of external support becomes clear. Custodians enable exchanges to focus on customer experience and platform innovation while ensuring that user funds remain secure.

A further innovation gaining traction is liveness verification, which confirms user identity through biometric measures such as facial recognition or fingerprints. With roughly 40% of banks having implemented this measure to counter fraud – up from 26% five years ago – crypto platforms have an opportunity to follow suit. Liveness checks provide an additional barrier to attackers who might otherwise exploit compromised passwords, keys, or devices. The uniqueness of biometric identifiers ensures that users’ accounts are better protected against increasingly sophisticated fraud attempts.

Centralised cryptocurrency exchanges (CEXs) continue to demonstrate resilience in the face of attacks. Security must be embedded into operational design. The recent incidents highlight the effectiveness of CEXs’ ability to freeze or recover stolen assets quickly. By collaborating with other platforms and utilising centralised oversight, these exchanges can mitigate the impact of breaches. As crypto continues to gain mainstream traction, balancing decentralisation with strong security infrastructure is essential to maintaining investor trust and market stability.

A Holistic Approach to Crypto Security

Beyond these specific measures, exchanges must also adopt holistic cybersecurity strategies. Key steps include thorough risk assessments to identify vulnerabilities. Rigorous protection of private keys through encryption and secure storage. Robust wallet security with multi-factor authentication. And secure transaction protocols including encryption and transaction signing. Regular updates to software and firmware, coupled with continuous network monitoring using intrusion detection systems and threat intelligence feeds, further strengthen a platform’s defence.

Data encryption and access control are critical to prevent unauthorised access. Furthermore, periodic security audits and assessments ensure protocols remain effective as threats evolve. Smart contract and token security, secure coding practices, and rigorous testing must also be prioritised to safeguard DeFi applications and other blockchain-based services. Importantly, exchanges should implement backup and recovery protocols to safeguard against potential data loss. And maintain clear incident response plans to mitigate the impact of any breach.

Educating users remains an underappreciated but crucial aspect of crypto security. Platforms should guide strong password practices, phishing awareness, software updates, and overall security hygiene. Well-informed users are an integral layer of defence, reducing the likelihood of successful social engineering attacks or credential theft.

Finally, regulatory compliance is indispensable. Exchanges operating within clear legal frameworks and adhering to anti-money laundering (AML), counter-terrorism financing (CTF), and data protection regulations significantly reduce risk exposure. Partnering with reputable security vendors and maintaining open lines of communication with regulators can enhance both operational security and market credibility.

Learning from Previous Incidents

The CoinDCX incident serves as a cautionary tale. By exploiting vulnerabilities without ever accessing individual wallets, attackers demonstrated high-value, sophisticated hacks can occur even in the absence of traditional breaches. This reinforces the point that centralised oversight, real-time monitoring, and rapid response protocols are crucial in mitigating damage and protecting customer assets. Exchanges that fail to implement these measures risk not only financial loss but also erosion of trust, which is arguably a more severe long-term consequence.

As cryptocurrencies increasingly integrate into institutional portfolios and mainstream finance, robust security is no longer optional; it is fundamental. Investors, funds, and enterprise clients require assurance that digital assets are safeguarded. And that exchanges and custodians adhere to industry-leading security standards. Platforms that prioritise security will not only protect their customers but also foster broader adoption and confidence in the market.

The Path Forward

The evolution of crypto security is a continuous process. While decentralised networks inherently resist certain forms of attack due to their distributed structure, the human, operational, and software layers of the ecosystem remain vulnerable. The combination of multi-party approval systems, 2FA, custodian partnerships, biometric verification, continuous monitoring, and regulatory compliance provides a robust framework for mitigating these risks.

The message is clear: security must be embedded into the DNA of every crypto platform. Only through a proactive, multi-layered approach can the industry protect its users, maintain trust, and continue to grow sustainably. As high-profile breaches like CoinDCX, WazirX, Phemex, and Bybit demonstrate, the cost of complacency is far too great. By prioritising security today, exchanges not only defend against current threats but also lay the foundation for the future of a resilient, trustworthy crypto ecosystem.

About D24 Fintech

D24 Fintech focuses on developing innovative technological solutions for the evolving digital and fintech landscape.

By leveraging innovation and emerging technologies, D24 Fintech engineers integrated solutions designed to enhance transactional security, streamline digital payments, and improve operational efficiency. With a global perspective and a customer-first approach, D24 Fintech aims to redefine industry standards and drive innovation into fintech ecosystems.

D24 Fintech’s digital solutions include developing advanced technological platforms and management tools, and more.

  • Blockchain & Crypto
  • Cybersecurity in FinTech

ClearBank research finds half of large firms say embedded finance will drive new revenue, but concerns over outdated systems, implementation challenges, integration and customer trust loom

New research from ClearBank reveals that large UK businesses now view embedded financial services as a strategic boardroom decision and business growth driver.

The research, The embedded economy: Why brands are embracing financial services as a driver for innovation and growth’ explores the attitudes of 200 senior business leaders at large UK-based corporates towards embedded finance and the potential for payments, accounts, and lending to enable new services, new revenue streams, and enhanced customer loyalty.

It found that despite growing enthusiasm for embedded finance’s potential to deliver these services, many companies are still held back by fears of regulatory requirements, technical complexity, and ongoing concerns around finding the right partner to deliver at scale.

A Boardroom Priority: Nearly Half of Corporates see Embedded Finance as a Revenue Driver

Implementing embedded finance has rapidly moved from a niche innovation to a strategic boardroom decision. Survey results found that 38% of C-suite leaders cite embedded finance as important for their company’s growth, reflecting the shift in mindset from viewing it as a back-office payments tool to a driver of competitive advantage.

Crucially, nearly half (48%) of corporates surveyed see embedded finance as a way to improve payments and launch new revenue-generating services. These services range from offering own brand accounts to saving tools and lending services. For many, the potential increase in revenue is compelling, with more than a quarter (28%) of the view that embedded finance could help drive double-digit revenue growth for their business. 67% believed growth would be at least 5% and just over a third (39%) suggest between 5-10% of revenue growth.

“Embedded banking allows businesses to integrate payments, lending and account services directly into their customer propositions. For corporates, this is a real opportunity to create stronger relationships with customers while also building new and potentially significant revenue streams for the business. We believe we’re on the cusp of the embedded economy.

“For any business looking to remain competitive in the digital age, these services can no longer be seen as ‘add-ons’. They are becoming essential infrastructure to deepen customer loyalty and open new revenue streams.

“We see this shift first-hand through the financial services clients already embedding our infrastructure. That experience gives us a clear view of how the same approach can be applied to corporates more widely and why embedded finance is such a significant opportunity across industries.”

Emma Hagan, ClearBank UK CEO

Cross-Sector Growth:  Companies Across Consumer Products & Services, Retail and Healthcare Have Biggest Appetite for Embedding Financial Services

Although embedded finance has often been associated with the retail sector, interest is broadening across other sectors. Research found that appetite was highest in consumer products and services (23%), retail (20%) and healthcare (18%), with the likes of the payroll and travel industries increasingly seeing the potential to integrate financial services into their customer journeys.

Of those companies surveyed that said they are actively considering offering embedded financial services within their own platforms, payment services were most considered (16%), followed by insurance (13%) and lending (13%). This signals a structural change in non-financial companies as they look to add layers of value and deepen engagement and loyalty with customers.

Untapped Potential: Only 19% Have launched Embedded Finance Services – Challenges Slowing progress

While appetite for embedded finance is growing rapidly, adoption is still maturing. Three-quarters (75%) said they would offer embedded finance today if it were easy to implement. This gap between ambition and reality underlines the perception that embedded finance is still typically difficult to employ and highlights the need for a new type of partner to tackle practical obstacles before broader uptake can occur.

When asked about the challenges corporates faced, some firms pointed to the technicalities of setting up such an offering in terms of integration challenges (61%), regulatory compliance (49%) and lack of technical expertise (44%)

Beyond the technical barriers, businesses also flagged reputational and regulatory risks such as greater regulatory scrutiny (57%), a loss of customer trust (52%) with reputational damage if the service fails (65%).

Taken together, these figures highlight that while embedded finance is seen as a major growth opportunity, corporates remain cautious. Success will depend not only on demonstrating the revenue potential but also on reducing risks during implementation through providing trusted infrastructure, regulatory clarity, and a smooth integration path that allows businesses to move from intent to action with confidence.

The Benefits & Motivations: Convenience & Customer Loyalty

For many corporates, embedded finance is first and foremost about strengthening customer relationships. Over half of firms 63% highlighted the opportunity to deliver a more seamless and convenient experience, positioning embedded finance as a customer service differentiator as much as a commercial driver. A further (57%) saw offering embedded services as a way of improving customer loyalty through creating more frequent and valuable touch points.

“Traditional banks we have found, give you a good brand halo and risk expertise but the cycles are killing us. They are slow, the integrations are not really bespoke and the slower cycle of development and keeping up to track with regulation has been the problem consistently.” (spokesperson from consumer industries)

About the Report

Ronin conducted interviews with  30 Senior Business Leaders at UK-based organisations across technology, healthcare, consumer, retail, travel, energy, and utilities sectors, along with surveying 200 Senior Business Leaders on the evolving nature of payment strategies, with a particular focus on the role of embedded finance in enabling new services and revenue streams. The interviews took place over August and September 2025.

  • Embedded Finance
  • Neobanking

Richard May, director of product development at virtualDCS, on navigating cyber regulation, assessing risk, and building digital resilience in a cloud-first financial landscape

In 2025, financial services are deeply reliant on digital infrastructures. Cloud services, especially, are reshaping how the sector operates.

The cloud offers both established and challenger companies the ability to improve flexibility, efficiency, and analytics capabilities. When deployed properly, it can deliver integrated security across an organisation, but also introduces new vulnerabilities.

Due to the sensitive nature of financial data, the sector remains a target for cyberattacks. This, combined with strict regulatory oversight, means firms must continuously align with evolving legislation while enhancing service functionality.


Which regulations do financial services need to be aware of?

There are several specific regulatory requirements that financial institutions must follow. These pieces of legislation are designed to ensure customer data is protected from attackers:

Payment card information and PCI-DSS

For businesses that handle payment card information, PCI DSS requirements dictate security and operational requirements for protecting cardholder information during storage, processing, and transmission. In practice, these requirements are 12 mandatory security controls that cover network security, data protection, vulnerability management, access control, monitoring and logging, physical security, testing, and policy enforcement. Failure to comply with the 12 security controls can lead to severe financial penalties and even liability for compensation costs.

GDPR implications

GDPR regulations categorise financial data as sensitive personal data. This refers to bank details, transaction histories, assets, credit scores, and anything else that might concern the overall financial health of an individual. Firms must take measures to prevent unauthorised access or risk facing fines.

Basel III considerations

The third Basel Accord, Basel III, sets the international standards for capital requirements, stress tests, liquidity regulations, and leverage. It is designed to reduce the risks of phenomena such as bank runs and bank failures, as we saw in the 2008 financial crash. Due to this, most of Basel III focuses on financial requirements such as liquidity to ensure banks are more resilient to changes in the international financial markets. However, it still communicates standards in relation to information and communication technology (ICT),‍ cyber incident response and reporting, and‍ third-party risk management (TPRM).

Digital Operational Resilience Act (DORA)

Introduced in January 2025 by the European Union (EU), DORA addresses rising digital dependency in finance. It covers ICT risk management, third-party oversight, operational resilience, incident reporting, and information sharing.

Compliance with these regulations is essential. Beyond avoiding penalties or criminal charges, it strengthens protection against growing cyber threats.

Assessing Vulnerability and Risk in the Financial Services Industry

Risk assessments are critical to business continuity and reducing the impact of cybersecurity breaches. A task of identifying threats and vulnerabilities, and quantifying the consequences of threats if they were to materialise, enables firms to rank services and ensure the most critical systems are protected first.

The Financial Services Information Sharing and Analysis Center (FS-ISAC) identified several key threats to the global financial sector in its latest report, including: 

Supply Chain Incidents

Businesses should remain alert to the competencies and overall security of service providers they utilise. As reliance on external providers is increasingly integral to many core business strategies, firms cannot afford to overlook the cyber maturity of their partners. To mitigate potential security risks, organisations should ensure and verify that all service providers meet robust cyber-security standards.

Fraud

The universality of real-time payments has led to a surge in fraud action in all sectors for which financial channels and services are used. The immediacy of payment has also created a scenario where it is almost impossible to retrieve stolen funds. Online scammers are building complex operations to take advantage of this. Fraud prevention and detection are becoming more and more important to companies in the sector. Increasing friction for payments through two-factor authorisation, along with other strategic obstacles, reduces fraud risks. Without cross-border partnerships tackling this global issue, however, this is set to remain a growing threat for businesses.

Ransomware

Ransomware has long been a cybersecurity threat. Many victims are often opportunistically targeted by hackers, rather than chosen specifically. Incidents of spear phishing are also on the rise – attackers research individuals or organisations to create personalised messages to convince them to click on infected links. Creating barriers to stop or delay ransomware attacks is therefore essential to reduce the threat. Ransomware’s targeting of customer data also means detection and recovery protocols are critical for firms that want to reduce the threat from malicious actors.

Distributed Denial-of-Service

The FS-ISAC revealed that financial services accounted for a third of all distributed denial-of-service (DDoS) attacks in 2023. DDoS attackers bring down an area of a network or application and extort the affected organisation for financial gain. Motivations may also include political statement-making, competitor sabotage, and cyber vandalism, simply to cause chaos and disruption. The increasing use of application programming interfaces (APIs) in the sector means that denial of service can have a devastating effect on financial service businesses. Firms should implement mitigation strategies to protect customer trust and service availability. 

When, Not If: Building Cyber Resilience Through Disaster Recovery

While cybersecurity defences are essential, effective disaster recovery is vital to reduce the impact of incidents and maintain operations.

Speed of recovery has become the main point of difference for organisations attempting to recover from cyber incidents. Prolonged downtime can lead to reputational damage, regulatory penalties, and lost customers. Without effective disaster recovery, continuity efforts are undermined.

Firms should develop a ‘when’, not ‘if’, mindset when it comes to disaster recovery. A comprehensive disaster playbook provides a manual in the event of a cyber incident. This plan must incorporate tools to allow for early detection of malicious action. Your plan for disaster recovery should be printed as a hard copy or saved on an external device (to ensure it remains accessible if your primary system is compromised). It must consider the first steps of: documenting evidence for cyber insurance and law enforcement, identifying and isolating infected systems, and informing relevant stakeholders an attack has taken place. Furthermore, the plan should contain information around communication and key contacts, an agreed chain of command and designated person to lead the ransomware response, and assurance the plan comes under regular review with ‘fire drill’ rehearsals.

Financial institutions face some of the most severe cyber risks in the world. Abiding by regulatory requirements goes some way to protect against threats, but organisations must go further – by proactively assessing threats, incorporating security measures, and preparing for disruptions. Resilience isn’t just about avoiding breaches. It is about ensuring trust, safeguarding sensitive data, and maintaining the ability to deliver reliable services in a digital-first landscape.

Learn more at virtualDCS

  • Cybersecurity in FinTech
  • Risk & Resilience

Robert Cottrill, Technology Director at digital transformation company ANS, explores how businesses can harness the potential of AI while mitigating the growing risks to cybersecurity and privacy

AI can transform businesses, but is it also opening the door to cybersecurity risks?

Fuelled by competitive pressure and rising government support through the UK’s Industrial Strategy, it’s no surprise that more and more businesses are racing to adopt AI.

But there’s a catch. The more businesses scale their AI adoption, the bigger their attack surface becomes. Without a proactive and structured approach to securing AI systems, organisations risk trading short-term efficiencies for long-term vulnerabilities.

The AI Boom

AI investment is skyrocketing. Businesses are deploying generative AI tools, machine learning models, and intelligent automation across nearly every function, from customer service and fraud detection to supply chain optimisation. Platforms like DeepSeek and open-source AI models are now part of the mainstream tech stack.

Initiatives like the UK’s AI Opportunities Action Plan are fuelling experimentation and adoption. AI is now seen not just as a productivity tool, but as a critical lever for digital transformation.

However, the rapid pace of AI deployment is outpacing the development of the security frameworks required to protect it. When integrated with sensitive data or critical infrastructure, AI systems can introduce serious risks if not properly secured. These risks include data leakage through AI prompts or model training, as well as AI-generated phishing and social engineering attacks

So, it’s no surprise that our research found that data privacy is the top concern for businesses when adopting AI. As these threats evolve, businesses must treat AI not just as an enabler, but also as a potential vector for attack.

The Governance Gap

While technical threats often take centre stage, businesses also can’t forget the increasing regulatory requirements surrounding AI. 

As AI systems become more powerful, enabling businesses to extract valuable insights from vast datasets, they also raise serious ethical and legal challenges. 

Regulatory frameworks like the EU AI Act and GDPR aim to provide guardrails for responsible AI use. But these regulations often struggle to keep up with the rapid advancements in AI technology, leaving businesses exposed to potential breaches and misuse of personal data.

The Need for Responsible AI Adoption with Cybersecurity

To build resilience while embracing AI, businesses need a dual approach: 

1. Prioritise AI-specific training across the workforce

Cybersecurity teams are already stretched. Introducing AI into the mix raises the stakes. Organisations must prioritise upskilling their cybersecurity professionals to understand how AI can both protect and threaten systems.

But this isn’t just a job for the security team. As AI tools become embedded in daily workflows, employees across functions must also be trained to spot risks. Whether it’s uploading sensitive data into a chatbot or blindly trusting algorithms, human error remains a major weak point.

A well-trained workforce is the first and most crucial line of defence.

2. Adopt open-source AI responsibly

Another key strategy for reducing AI-related risks is the responsible adoption of open-source AI platforms. Open-source AI enhances transparency by making AI algorithms and tools available for broader scrutiny. This openness fosters collaboration and collective innovation, allowing developers and security experts worldwide to identify and address potential vulnerabilities more efficiently.

The transparency of open-source AI demystifies AI technologies for businesses, giving them the confidence to adopt AI solutions while ensuring they stay alert about potential security flaws. When AI systems are subject to global review, organisations can tap into the expertise of a diverse and engaged tech community to build more secure, reliable AI applications.

To adopt responsibly, businesses need to ensure that the AI they are using aligns with security best practices, complies with regulations, and is ethically sound. By using open-source AI responsibly, organisations can create more secure digital environments and strengthen trust with stakeholders.

Securing the Future of AI

AI is a transformative force that will redefine cybersecurity. We’re already seeing AI being used to automate threat detection and response. But it’s also powering more advanced attacks, from deepfake impersonation to large-scale automated exploits.

Organisations that succeed will be those that embed cybersecurity into every stage of their AI journey, from innovation to implementation. That means making risk management part of the innovation conversation, not a downstream fix.

By taking a responsible approach, investing in training, leveraging open-source AI wisely, and embedding cybersecurity into every layer of the business, organisations can unlock AI’s potential while defending against its risks.  

AI is a double-edged sword, but with thoughtful adoption, businesses can confidently navigate the complex landscape of AI and cybersecurity.

  • Cybersecurity
  • Data & AI

Anna Collard, SVP Content Strategy & Evangelist KnowBe4 – Africa, on leveraging AI-driven cybersecurity systems to fight cybercrime

Artificial Intelligence is no longer just a tool. It is a game-changer in our lives, our work as well as in both cybersecurity and cybercrime. While businesses leverage AI to enhance defences, cybercriminals are weaponising AI to make these attacks more scalable and convincing​.  

In 2025, research shows AI agents, or autonomous AI-driven systems capable of performing complex tasks with minimal human input, are revolutionising both cyberattacks and cybersecurity defences. While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants. They function as self-learning digital operatives that plan, execute, and adapt in real time. These advancements don’t just enhance cybercriminal tactics, they may fundamentally change the cybersecurity battlefield. 

How Cybercriminals Are Weaponising AI: The New Threat Landscape 

AI is transforming cybercrime, making attacks more scalable, efficient, and accessible. The WEF Artificial Intelligence and Cybersecurity Report (2025) highlights how AI has democratised cyber threats. Thus enabling attackers to automate social engineering, expand phishing campaigns, and develop AI-driven malware​. Similarly, the Orange Cyberdefense Security Navigator 2025 warns of AI-powered cyber extortion, deepfake fraud, and adversarial AI techniques. And the 2025 State of Malware Report by Malwarebytes notes, while GenAI has enhanced cybercrime efficiency, it hasn’t yet introduced entirely new attack methods. Attackers still rely on phishing, social engineering, and cyber extortion, now amplified by AI. However, this is set to change with the rise of AI agents. Autonomous AI systems are capable of planning, acting, and executing complex tasks—posing major implications for the future of cybercrime. 

Here is a list of common (ab)use cases of AI by cybercriminals:  

AI-Generated Phishing & Social Engineering 

Generative AI and large language models (LLMs) enable cybercriminals to craft more believable and sophisticated phishing emails in multiple languages. Without the usual red flags like poor grammar or spelling mistakes. AI-driven spear phishing now allows criminals to personalise scams at scale, automatically adjusting messages based on a target’s online activity. AI-powered Business Email Compromise (BEC) scams are increasing. Attackers use AI-generated phishing emails sent from compromised internal accounts to enhance credibility​. AI also automates the creation of fake phishing websites, watering hole attacks and chatbot scams. These are sold as AI-powered ‘crimeware as a service’ offerings, further lowering the barrier to entry for cybercrime​. 

Deepfake-Enhanced Fraud & Impersonation 

Deepfake audio and video scams are being used to impersonate business executives, co-workers or family members to manipulate victims into transferring money or revealing sensitive data. The most famous 2024 incident was UK based engineering firm Arup that lost $25 million after one of their Hong Kong based employees was tricked by deepfake executives in a video call. Attackers are also using deepfake voice technology to impersonate distressed relatives or executives, demanding urgent financial transactions.  

Cognitive Attacks  

Online manipulation—as defined by Susser et al. (2018)—is “at its core, hidden influence, the covert subversion of another person’s decision-making power”. AI-driven cognitive attacks are rapidly expanding the scope of online manipulation. By everaging digital platforms, state-sponsored actors increasingly use generative AI to craft hyper-realistic fake content. They are subtly shaping public perception while evading detection. These tactics are deployed to influence elections, spread disinformation and erode trust in democratic institutions. Unlike conventional cyberattacks, cognitive attacks don’t just compromise systems—they manipulate minds, subtly steering behaviours and beliefs over time without the target’s awareness. The integration of AI into disinformation campaigns dramatically increases the scale and precision of these threats, making them harder to detect and counter.  

The Security Risks of LLM Adoption 

Beyond misuse by threat actors, business adoption of AI-chatbots and LLMs introduces significant security risks. Especially when untested AI interfaces connect the open internet to critical backend systems or sensitive data. Poorly integrated AI systems can be exploited by adversaries. This enables new attack vectors, including prompt injection, content evasion, and denial-of-service attacks. Multimodal AI expands these risks further, allowing hidden malicious commands in images or audio to manipulate outputs.  

Moreover, many modern LLMs now function as Retrieval-Augmented Generation (RAG) systems. Dynamically pulling in real-time data from external sources to enhance their responses. While this improves accuracy and relevance, it also introduces additional risks, such as data poisoning, misinformation propagation, and increased exposure to external attack surfaces. A compromised or manipulated source can directly influence AI-generated outputs. Potentially leading to incorrect, biased, or even harmful recommendations in business-critical applications. 

Additionally, bias within LLMs poses another challenge. These models learn from vast datasets that may contain skewed, outdated, or harmful biases. This can lead to misleading outputs, discriminatory decision-making, or security misjudgements, potentially exacerbating vulnerabilities rather than mitigating them. As LLM adoption grows, rigorous security testing, bias auditing, and risk assessment, especially in RAG-powered models, are essential to prevent exploitation and ensure trustworthy, unbiased AI-driven decision-making. 

When AI Goes Rogue: The Dangers of Autonomous Agents 

With AI systems now capable of self-replication, as demonstrated in a recent study, the risk of uncontrolled AI propagation or rogue AI – AI systems that act against the interests of their creators, users, or humanity at large – is growing. Security and AI researchers have raised concerns that these rogue systems can arise either accidentally or maliciously. Particularly when autonomous AI agents are granted access to data, APIs, and external integrations. The broader an AI’s reach through integrations and automation, the greater the potential threat of it going rogue. This means robust oversight, security measures, and ethical AI governance essential in mitigating these risks. 

The Future of AI Agents for Automation in Cybercrime 

A more disruptive shift in cybercrime can and will come from AI Agents. These transform AI from a passive assistant into an autonomous actor capable of planning and executing complex attacks. Google, Amazon, Meta, Microsoft, and Salesforce are already developing Agentic AI for business use. However, in the hands of cybercriminals, its implications are alarming. These AI agents can be used to autonomously scan for vulnerabilities, exploit security weaknesses, and execute cyberattacks at scale. They can also allow attackers to scrape massive amounts of personal data from social media platforms. They can automatically compose and send fake executive requests to employees. And, for example, analyse divorce records across multiple countries to identify individuals for AI-driven romance scams, orchestrated by an AI agent. These AI-driven fraud tactics don’t just scale attacks, they make them more personalised and harder to detect. Unlike current GenAI threats, Agentic AI has the potential to automate entire cybercrime operations, significantly amplifying the risk​. 

How Defenders Can Use AI & AI Agents 

Organisations cannot afford to remain passive in the face of AI-driven threats. Security professionals need to remain abreast of the latest developments. Here are some of the  opportunities in using AI to defend against AI:  

AI-Powered Threat Detection and Response

Security teams can deploy AI and AI-agents to monitor networks in real time, identify anomalies, and respond to threats faster than human analysts can. AI-driven security platforms can automatically correlate vast amounts of data to detect subtle attack patterns. These might otherwise go unnoticed. AI can create dynamic threat modelling, real-time network behaviour analysis, and deep anomaly detection​. For example, as outlined by researchers of Orange Cyber Defense, AI-assisted threat detection is crucial as attackers increasingly use “Living off the Land” (LOL) techniques that mimic normal user behaviour. Making it harder for detection teams to separate real threats from benign activity. By analysing repetitive requests and unusual traffic patterns, AI-driven systems can quickly identify anomalies and trigger real-time alerts, allowing for faster defensive responses. 

However, despite the potential of AI-agents, human analysts still remain critical. Their intuition and adaptability are essential for recognising nuanced attack patterns. They can leverage real incident and organisational insights to prioritise resources effectively. 

Automated Phishing and Fraud Prevention

AI-powered email security solutions can analyse linguistic patterns, and metadata to identify AI-generated phishing attempts before they reach employees, by analysing writing patterns and behavioural anomalies. AI can also flag unusual sender behaviour and improve detection of BEC attacks​. Similarly, detection algorithms can help verify the authenticity of communications and prevent impersonation scams. AI-powered biometric and audio analysis tools detect deepfake media by identifying voice and video inconsistencies. However, real-time deepfake detection remains a challenge, as technology continues to evolve. 

User Education & AI-Powered Security Awareness Training

AI-powered platforms deliver personalised security awareness training. They can simulate AI-generated attacks to educate users on evolving threats, helping train employees to recognise deceptive AI-generated content​. And strengthen their individual susceptibility factors and vulnerabilities.  

Adversarial AI Countermeasures

Just as cybercriminals use AI to bypass security, defenders can employ adversarial AI techniques. For example, deploying deception technologies – such as AI-generated honeypots – to mislead and track attackers. As well as continuously training defensive AI models to recognise and counteract evolving attack patterns. 

Using AI to Fight AI-Driven Misinformation and Scams

AI-powered tools can detect synthetic text and deepfake misinformation, assisting fact-checking and source validation. Fraud detection models can analyse news sources, financial transactions, and AI-generated media to flag manipulation attempts​. Counter-attacks, like those shown by research project Countercloud or O2 Telecoms AI agent “Daisy” show how AI based bots and deepfake real-time voice chatbots can be used to counter disinformation campaigns as well as scammers by engaging them in endless conversations to waste their time and reducing their ability to target real victims​. 

In a future where both attackers and defenders use AI, defenders need to be aware of how adversarial AI operates. And how AI can be used to defend against their attacks. In this fast-paced environment, organisations need to guard against their greatest enemy: their own complacency. While at the same time considering AI-driven security solutions thoughtfully and deliberately. Rather than rushing to adopt the next shiny AI security tool, decision makers should carefully evaluate AI-powered defences to ensure they match the sophistication of emerging AI threats. Hastily deploying AI without strategic risk assessment could introduce new vulnerabilities, making a mindful, measured approach essential in securing the future of cybersecurity.  

To stay ahead in this AI-powered digital arms race, organisations should:  

  • Monitor both the threat and AI landscape to stay abreast of latest developments on both sides. 
  • Train employees frequently on latest AI-driven threats, including deepfakes and AI-generated phishing. 
  • Deploy AI for proactive cyber defense, including threat intelligence and incident response. 
  • Continuously test your own AI models against adversarial attacks to ensure resilience. 
  • Cybersecurity
  • Data & AI

Mike Puglia, General Manager, Kaseya Cybersecurity Labs, on how the need for regulatory support to better support industries when tackling cybercrime

Cyberattacks keep coming hard and fast, but things are beginning to change. In the past few months, law enforcement has announced arrests of three people in the Marks & Spencer breach, seven members of the hacking group NoName057, five affiliates of Scattered Spider and also disrupted the infrastructure of gangs such as Flax Typhoon, Star Blizzard and others.  

Earlier this year, the UK retail industry felt the pressure. Brands, including Marks & Spencer, Harrods and Co-op – and by proxy, their customers – became victims of the hacking group, Scatter Spider. Other businesses are now on high alert as this wave of security breaches is expected to continue. For as long as bad actors can reap rewards and the risk of consequences remains small, they will keep attacking. Ransomware-as-a-service lowers the bar to entry further, allowing even those without specialised skills to launch successful ransomware campaigns.

Along with the threats, regulatory pressure on businesses is growing. Organisations must be able to prove they have strong security defences in place or risk paying hefty fines for non-compliance. However, this means we are essentially punishing the victim, not the perpetrator. By putting the onus on the victims to protect themselves, we are missing an important truth… Because there is no bullet-proof defence, even the best security strategies will not end cybercrime for good.

It’s Time to Treat Cybercrime as Crime

What the industry needs instead is a change in how we approach cybercrime. Rather than blaming the victims, we must start treating it as the serious criminal activity it is. It is high time we addressed cybercrime’s fundamental drivers. Opportunity, motive and the widespread perception that criminals can still get away without punishment. As is the case with physical crime, it takes a two-pronged approach to curb cybercrime: Prevention – and an effective response.

Those who attempt physical theft, for example, face trials and potentially prison. While we have seen a growing number of cybercriminals arrested in recent months, the truth we are only scratching the surface. In the digital world, everything is accessible from everywhere, all the time. This creates an inherent vulnerability that makes perfect protection impossible. In many cases, it also makes it much harder to track down the offenders and hold them accountable.

The Problem with Cryptocurrency and Jurisdiction

The cybercrime landscape has also undergone a significant transformation. While in the past, hackers were mostly focused on stealing financial data, there has been a dramatic shift towards ransomware. It’s far easier to encrypt an organisation’s data and demand a ransom than finding buyers for stolen credit card info.

This transformation has further accelerated because cryptocurrency allows cyber attackers to be paid in anonymous currency. Anywhere in the world, at any time. Previously, criminals had to physically collect payments or transfer money to traceable bank accounts. Now, they can operate with anonymity whilst easily converting their loot into real euros, pounds and dollars. This means ‘following the money’ is no longer a useful way for law enforcement to track nefarious activity. If we made it impossible for criminals to anonymously convert cryptocurrency into real currency, we could change the risk-reward calculation.

The second key issue with fighting cybercrime is the question of jurisdiction. Many cybercriminals are based in countries where western governments have no recourse. When hackers operate from non-cooperative jurisdictions, it may be impossible to extradite them. And they may find their activities tolerated by their local government or even supported.  As we have seen with the recent arrests – the threat actors were outside of Russia and China – where many attacks come from.

These two factors – anonymous payment systems and safe havens – create an environment where cybercrime can and will continue to flourish. While organisations can do their best to make it harder for criminals to attack, it is foolish to believe individual businesses will be able to solve the cybercrime problem on their own.

Stop Blaming the Victim

So, what needs to happen? First, the victim-blaming approach must change. We simply cannot regulate every business to become an impenetrable fortress. When a person is physically robbed, police respond to investigate the crime and help recover stolen property. With cybercrime, victims face reputational damage, fines and higher insurance premiums. Incidents often raise questions about where the business’ cybersecurity strategy failed, rather than a recognition that a crime has been committed against them.

A first step forward towards solving the cybercrime problem would require governmental and societal recognition that cyberattacks represent crimes against businesses and individuals, not merely failures of those organisations to adequately defend themselves. While many countries have ramped up policing efforts against cybercrime, these are generally underfunded considering the scale of the problem.

Secondly, we need to urgently address the anonymous payment systems that keep fuelling cybercrime. This is not an easy problem to solve, but governments must find better ways to trace and regulate how cryptocurrency is converted into real money.

It is also time we introduced real and severe consequences for cybercriminals. The number one deterrent to any type of crime is fear of being caught and punished. The internet has essentially eliminated this, enabling hackers to operate from nations that turn a blind eye. To address this will require more political pressure on ‘safe harbour’ countries to charge, punish and extradite cybercriminals. Where nations refuse to cooperate, potential sanctions such as restrictions on internet connectivity might force governments to reconsider their tolerance for criminal activities.

Finally, we need to acknowledge that regulations such as GDPR, PCI and NIS have their limits. Despite increasingly complex compliance requirements, cybercrime has continued to grow. While regulations can provide critical and much-needed guidance to businesses, they must be combined with properly funded law enforcement – empowered with tools to bring criminals to justice across jurisdictions.

To truly disrupt the criminal ecosystem, systemic changes are needed. We are starting to see governments give law enforcement the tools they need, but it is very early in that process. Because ultimately, we will not solve the cybercrime problem with defence measures alone.

About Kaseya

At Kaseya, our mission is to empower you to simplify and transform IT and cybersecurity management with innovative platform solutions.

Our Mission:

Since 2000, Kaseya has delivered the technology that IT departments and managed service providers need to reach new heights of success. More than 500,000 IT professionals globally use Kaseya products to manage and secure 300 million devices.

Kaseya’s commitment to our customers goes beyond listening to your needs and puts words into action to deliver innovative solutions that empower your business. But we don’t stop there. Kaseya’s first-of-its-kind Partner First Pledge program shares the risk our partners experience because we know a true partner is with you through the ups and downs of life.

  • Cybersecurity
  • Digital Strategy

The Card & Payments Awards will be taking place on Thursday 5th February 2026 at the famous JW Marriott Grosvenor House Hotel in Mayfair, London. Entries are open now and close in October… Book your table for the Awards now!

The Card & Payments Awards remains the longest-standing and leading networking event of the year for the UK and Irish card and payments industry. With over 1100 guests attending on the night, from over 300 different companies, and with a compelling list of blue-chip sponsors. Enter here and book your tables now.

Recognising Excellence and Innovation in Payments

The Card & Payments Awards has been instrumental in recognising excellence and innovation across the industry from a diverse range of corporations for the past two decades. Each year many eligible organisations compete for one of the prestigious awards which are judged by an independent panel of industry experts. The Awards concludes with its infamous Industry Achievement Award each year. 

The Card & Payments Awards are open across the different categories to credit, debit, prepaid and charge card issuers, co-brands, merchant acquirers, payment processors, retailers and other payments companies worldwide who are offering programmes or initiatives within the UK and Irish market. There are a range of categories covering key disciplines and offering organisations the opportunity to showcase all of their achievements. 

Why Enter

For over 20 years, The Card & Payments Awards have been recognising excellence across the industry.

Widely regarded as the Oscars of the card and payments world, this is your opportunity to stand out and celebrate your achievements.

An entry gives you the chance to:

  • Gain recognition from respected industry leaders
  • Build brand credibility and consumer trust
  • Increase visibility through press and media coverage
  • Extensive networking opportunities with senior industry leaders
  • Demonstrate your commitment to excellence
  • Assessment by an independent panel of experienced industry judges

Entries are judged on the strength of the submission and how well it meets the category criteria. Categories include: Best Industry Innovation, Best Payment Facility, Best App User Experience (CX Initiative), Best Product Design and the Financial Inclusion Award. Last year’s winners include moneyhub for Open Banking, Dojo for Innovating Customer Service with AI, and Nationwide for Product Design.

Enter here and book your tables now to celebrate the industry’s biggest achievements, whilst meeting the key players from across the sector.

FinTech Strategy meets with Citigroup’s Head of ESG Credit Management, Mauricio Masondo, to discover the future for ESG and sustainable finance

Financial Transformation Summit 2025 EXCLUSIVE

At Financial Transformation Summit, Mauricio Masondo, Head of ESG Credit Management at Citigroup, featured on a sustainability panel – ‘The Future of ESG and Sustainable Finance: Balancing Profit and Purpose’. Alongside peers fromGenerali AM, Gallagher Re and Arma Karma, Masondo considered: What key metrics should FIs use to track ESG progress, and how can they ensure authenticity in their sustainability efforts? Developing a holistic ESG strategy amid evolving regulations – key challenges and solutions. How can FIs leverage technology to meet sustainability goals and drive long-term profitability? How can FIs move beyond offering ESG products to embedding sustainability into their core business models?

Following the panel, we spoke with Mauricio to find out more…

Hi Mauricio, tell us about your role at Citigroup?

“In my 32 years with Citi my career has primarily focused on wholesale credit, and in recent years I built out our portfolio management function. For the past year specifically, I’ve been leading the integration of ESG and climate considerations into our credit processes. As Head of ESG Credit Management, my role is to embed ESG requirements into our credit processes in a way that’s consistently and efficiently applied through technology, policies, training, and governance frameworks. Our strategic approach was not to create an ESG silo that replicates existing processes, but rather to integrate ESG considerations seamlessly into our current workflows. This means any credit analyst can now underwrite ESG credits, sustainable loans, or green loans, rather than requiring dedicated specialists. We’ve equipped our entire team with the knowledge and tools they need to handle these transactions effectively.”

You were part of a panel at this Summit focused on the future for ESG and sustainable finance. Can you give us an overview of your thoughts?

“Data standardisation is absolutely critical, especially as we advance into the AI era. I often reference Moody’s as an excellent example of strategic foresight. Moody’s operates two key businesses – credit ratings and data analytics – and early in their AI journey, they made the strategic decision to structure and normalise all their credit research data. This proved to be transformational because it enabled them to deploy AI solutions much more rapidly with clean, structured datasets. We’re working to apply this same principle at Citi. We’re developing processes to structure climate-related data in a way that will be usable across multiple applications. For example, we’re working on integrating emissions data and climate risk assessments into our credit risk rating models. We’re also exploring how this structured approach could support underwriting processes and securitisations, where comprehensive data packages could facilitate risk transfer transactions with institutional investors. The goal is to build normalised, structured data as the foundation for various applications, from portfolio management to AI-driven solutions. While we’re still in the early stages of many of these initiatives, the potential is significant.”

Why is this an exciting time for the business?

“We’re witnessing the convergence of several transformative trends. However, one of our biggest challenges is policy divergence across jurisdictions. Countries are taking vastly different approaches to ESG requirements, and for a global bank like Citi, this creates significant complexity in standardising processes across multiple regulatory environments. While challenging, this divergence also creates opportunities to develop scalable, cost-effective solutions that can adapt to various regulatory frameworks. Second, AI is revolutionising how we approach ESG challenges. It’s helping us structure data more effectively, enhance reporting capabilities, contextualise information, and identify trends that would have been impossible to detect manually.

“Previously, comprehensive ESG analysis required significant time, resources, and personnel. AI has made these processes more accessible and cost-effective. Most importantly, there’s been a fundamental shift in how the industry, and governments, view ESG. It’s evolved beyond compliance and emissions reporting to become a significant business opportunity. We need to capitalise on this transition – moving from reactive reporting to proactive opportunity capture. The capital is there, and if traditional banks don’t seize these opportunities, asset managers, private credit firms, and private equity will. We’re partnering strategically with reinsurance companies and asset managers to develop innovative solutions that unlock transition capital and help companies fund decarbonisation projects.”

“Trade flows are experiencing significant disruption due to current tariff policies. This creates both challenges and opportunities for our clients. Companies are reassessing their supply chain vulnerabilities and seeking greater resilience in their operations. I anticipate we’ll see a regionalisation of trade flows rather than a complete deglobalisation. European companies will likely increase intra-regional trade while reducing intercontinental transactions. We’re seeing similar patterns emerging in Asia and the Middle East. This shift requires banks to be more agile in how we structure trade finance and working capital solutions to meet these evolving needs.”

What pain points are you experiencing that you need to address?  How are you meeting the challenge?

“Working capital finance requires increasingly creative solutions that leverage advanced technology. Banks are recognising that FinTechs often have greater agility in developing and implementing these technologies. There’s significant efficiency in having one FinTech serve multiple banks rather than each institution developing independent solutions. This collaborative approach allows us to move faster while reducing development costs and time-to-market.”

Tell us about a recent success story…

“I designed and led the implementation of an early warning monitoring system for Citi’s credit portfolio. The project began with a fundamental concept: create a data lake, develop meaningful metrics, and engage data scientists to interpret the insights. We collaborated with trade officers and partnered with external specialists to enhance our capabilities.Initially, there was scepticism about the system’s value, particularly because we built it as an independent function within our portfolio management organisation, separate from traditional banking and risk management structures. However, this positioning allowed us to collect unique client data and develop insights that weren’t available elsewhere in the organisation. A critical component of our success was establishing a dedicated credit expert team that oversees the entire process.

“This team leads the engagement and communication of alerts, ensuring that insights are properly interpreted and actionable recommendations reach the right stakeholders. The evolution was remarkable. We progressed from generating a few alerts daily to dozens per day, and eventually to hundreds of alerts weekly. More importantly, we developed sophisticated processes for interpreting and acting on these alerts, with our expert team serving as the bridge between data insights and business action. Bankers and risk managers began to recognise the value, and today, three years later, the system is integral to how we conduct annual reviews and client presentations. It’s incredibly rewarding to provide our bankers with comprehensive data and insights that strengthen their client relationships.”

What’s next for Citigroup when it comes to ESG? What future launches and initiatives are you particularly excited about?

“While it may sound clichéd, AI truly is transformative for our industry. The breadth of use cases and the rapid pace of learning make it essential to our strategic direction. We’ve established a strategic partnership with Google and are investing significantly in AI use case development and implementation across our operations. From an operational perspective, AI will undoubtedly increase our efficiency as an industry. More importantly, it’s enabling us to evolve our business models and create client solutions that weren’t previously feasible. This opens entirely new avenues for innovative product development. Additionally, since CEO Jane Fraser joined, we’ve embarked on a comprehensive transformation program that’s delivering strong results in terms of financial performance and returns. We’ve restructured and simplified our operations, which positions us more competitively as we refresh our leadership teams and attract new talent. The trajectory is very promising.”

Why do you think the evolution of collaboration between banks and FinTechs is set to continue? What are you excited about?

“The current tariff environment is creating opportunities for FinTechs that facilitate connections between banks, investors, and corporations. It’s also presenting consolidation opportunities for private equity firms within the rapidly expanding FinTech ecosystem.”

Why Financial Transformation Summit? What is it about this particular event that makes it the perfect place to embrace innovation? What’s the response been like for Citigroup?

“The panel brought together diverse perspectives from FinTech, asset management, insurance, and banking – all addressing common challenges that span our sectors. This cross-industry dialogue creates tremendous opportunities for collaboration and mutual understanding. The key now is translating these conversations into action. We need to maintain these connections, expand the dialogue, and avoid making decisions in isolation. FinTechs possess the agility to implement changes in their operating models far more quickly than large incumbents like us. However, our procurement systems and processes aren’t always conducive to collaborating with smaller, innovative companies. Events like this highlight the need to streamline how institutions like Citi can collaborate with and learn from FinTechs. We must accelerate our ability to adapt to a rapidly changing world.”

Learn more at citigroup.com/global/our-impact

About Citgroup

A human bank…

We’re helping build more sustainable, economically vibrant communities around the world.

At Citi, helping our clients navigate the challenges and embrace the opportunities of our rapidly changing world is fundamental to our mission of enabling growth and economic progress.

Candex exists to solve tail spend by removing friction and giving procurement leaders time to focus on what truly drives value.

Candex isn’t chasing trends for the sake of innovation. Instead, the company is focused on solving one of the oldest and most persistent challenges in enterprise procurement: getting rid of the noise. 

Most in procurement will be familiar with Candex. Co-founded by Shani Vaza, Chief R&D Officer, and Jeremy Lappin, CEO, Candex is a technology-based master vendor that simplifies onboarding and payments to small and one-time vendors. It delivers a fast, compliant, and easy buying experience for requisitioners, while procurement gains automation, visibility, and control, reducing the vendor master by up to 80%.

For years, procurement teams have battled fragmented data, manual onboarding processes, and administrative bottlenecks. This results in time and resources spent on tasks that add little value, while strategic initiatives suffer from a lack of focus. 

For many organisations, 70% of vendors account for just 5% of spend. With Candex, procurement can manage that long tail of spend without adding operational burden. This frees up teams to focus on strategic priorities, redirect spend to preferred suppliers, and drive more value across the business. At this year’s DPW New York conference, Jeremy Lappin and Chief Customer Officer Danielle McQuiston shared how their platform is helping procurement evolve beyond compliance and cost savings into something far more valuable: clarity.

Addressing the core problem

While many conversations at the event kept coming back to the use of AI, Candex is doing things differently. “AI will transform procurement by uncovering better, more innovative vendors,” says Lappin. “But every new vendor comes with the burden of onboarding and compliance. That’s where Candex makes a real difference—we streamline that process by enabling fast, compliant purchasing without the heavy lift of onboarding. As companies adopt AI, they’ll need a system like ours to truly benefit from what it reveals.”

It’s about bringing the conversation back to the core problem. Lappin continues: “Candex makes it possible to onboard and pay new vendors in minutes, and without setup delays, while keeping procurement firmly in control. That’s where we unlock both agility and compliance.”

Solving procurement’s data problem

After speaking to many procurement leaders at events such as DPW New York 2025, one topic of conversation stood out: that messy data can be a major hurdle to overcome before successful AI adoption can occur. Companies dealing with multiple affiliates for a single vendor can find their data ends up split, duplicated, and difficult to work with at scale. 

“The fragmentation of data is a very old problem,” says Lappin. “One of the reasons it occurs is because the data is organised by affiliates and isn’t aggregated properly. This creates enormous processes.”

A dedicated platform can take on the heavy lifting of sorting through this data, without the use of complex AI models. Lappin continues: “One thing that Candex does to help this problem with smaller vendors is auto-aggregating affiliates under one corporate umbrella. It’s going to massively reduce the data problem by directing that small spend through us.”

McQuiston adds: “Data is the foundation of all the decisions that procurement makes. And the fact that they can consolidate that data within Candex, and look at it only when it’s relevant to what actions they have to take, is a huge contribution to the space for procurement.”

The right data at the right time

Candex isn’t trying to flood procurement teams with dashboards. Instead, it delivers data when and where it’s needed, stripping away the noise to surface what’s important.

“Our customers tell us we filter out 95% of the noise and highlight just the actions that matter. It’s not just visibility, it’s visibility at the right moment,” says McQuiston. “We have amazing reporting that has hundreds of lines of precision data in there, but it’s also aggregated in a way that it calls out to the things that need attention rather than being bogged down with the rest.”

“Oftentimes the stuff that goes through us is the stuff that procurement doesn’t have the time to give its attention to,” explains Lappin. “I think one of the most powerful things we do is get rid of the things they shouldn’t care about so that it’s very easy to see what they should.”

Simplicity wins

Some procurement tools are complex, slow to adopt, and full of friction, but Candex takes a different approach. “The users just want to be able to operate and do the work that they need to do to serve their objectives,” says McQuiston. “Procurement doesn’t have enough resources to deal with all of the small things.”

Bringing the focus back to the core function of procurement simplifies processes and reduces noise. When working with a lot of small vendors, procurement teams can get bogged down with admin and data. This is where Candex takes on the weight of that burden, and allows the business to move forward.

“At the end of the day, Candex is a tool that is so simple from a user perspective, but still has the confidence of the procurement organisation,” McQuiston continues. “It also shines a better light on the procurement function, which often gets a black eye for being in the way of things.”

Real people

For Lappin, the hype around AI isn’t what makes a product great; it’s real-world validation from customers. “There’s only one way to get through the hype,” he says, “and that’s to find other companies that are using the products and loving them. I think that’s one of the things that has made us successful.”

It’s one of the strengths of DPW; these events showcase real use cases, not just demonstrations. This enables attendees to see the impact of new technologies for themselves, and connect with the people behind them. “DPW has the ambition to use real use cases rather than just relying on demos,” says McQuiston. “That’s what’s a little bit different about DPW compared to some other conferences; the proof is in the pudding.”

Lappin and McQuiston also highlighted the importance of customer-led innovation through Candex Connects – roundtables all over the world that allow procurement peers to meet, discuss the challenges affecting them, and learn from one another, as well as sharing their own inspirational use cases. “We’re not just providing a solution. We’re providing a space where our customers get together, discuss best practices,” McQuiston adds. “And I think we’ve done that really well.”

Procurement, repositioned

Ultimately, Candex is about more than just a tool. It’s about reshaping the perception and potential of procurement teams, giving them the freedom and focus to lead strategically. By removing some of the friction of dealing with myriad small vendors, procurement teams are empowered to drive deeper value.

“Our whole business is focused on agility and value creation,” says McQuiston. “We have to be compliant because our customers demand it, but it’s not really about cost savings when you talk about tail spend. Procurement has always been in a position where they believe they can squeeze something out of every purchase. We’ve gotten to a point in the evolution of the function where they realise there’s a portion they can’t squeeze anything out of. It’s powerful to be able to let that go.”

“Procurement needs to be involved in decisions around spend,” adds Lappin. “They help negotiate. They figure out the right vendors. They really are needed in this process, which is why it exists.”

Candex isn’t just solving tail spend, it’s redefining how procurement operates at scale. With built-in controls, full audit trails, and seamless integration with existing systems, Candex empowers procurement to lead strategically, reduce supplier bloat, and stay agile in a complex world.

Candex is proving that the biggest transformation comes from helping procurement teams reduce the noise and get back to the work that matters. 

The FinTech industry, sitting at the nexus of finance and technology, is a prime target for cybercriminals. With the growing…

The FinTech industry, sitting at the nexus of finance and technology, is a prime target for cybercriminals. With the growing prevalence of digital banking, mobile payments, and crypto-assets, cybersecurity has become a non-negotiable priority. In response, a new generation of tools has emerged to help FinTech companies stay ahead of threats. Here are the top five cybersecurity tools safeguarding the sector in 2025:

1. CrowdStrike Falcon – Endpoint Protection Powerhouse

CrowdStrike Falcon has become a leading choice for FinTech companies due to its advanced endpoint detection and response (EDR) capabilities. Powered by AI and cloud-native architecture, Falcon provides real-time monitoring and threat intelligence across endpoints, detecting suspicious behavior before it escalates. Its lightweight agent and scalable design make it ideal for rapidly evolving digital infrastructures.

2. Snyk – Securing FinTech DevOps

FinTech’s embrace of continuous development and integration demands security solutions built for speed. Snyk focuses on developer-first security, helping teams identify and remediate vulnerabilities in open-source dependencies, containers, and infrastructure as code. It integrates directly with GitHub, GitLab, and CI/CD pipelines, ensuring vulnerabilities are caught early—without slowing down development.

3. Fortinet FortiWeb – Web Application Firewall (WAF)

Web applications are the backbone of many FinTech platforms, and FortiWeb provides critical protection. This intelligent WAF defends against OWASP Top 10 threats, including SQL injection and cross-site scripting, while leveraging machine learning to tailor protections in real-time. FinTech platforms using APIs heavily benefit from FortiWeb’s deep learning inspection and bot mitigation features.

4. IBM Security QRadar – SIEM Intelligence

QRadar continues to lead as a top-tier Security Information and Event Management (SIEM) solution. It aggregates and analyzes data from across an organization’s digital ecosystem, detecting threats and providing actionable insights. FinTech firms rely on QRadar for compliance with financial regulations and for its ability to deliver fast, context-rich threat detection and response capabilities.

5. Auth0 – Identity and Access Management (IAM)

Auth0, a standout solution in identity and access management. In FinTech, controlling user access with precision is crucial. Auth0 provides secure, scalable authentication for apps and APIs, offering features like single sign-on (SSO), multi-factor authentication (MFA), and adaptive access policies. With rising threats targeting user credentials, IAM is no longer a back-office function—it’s frontline security.

Cybersecurity in FinTech requires agility, intelligence, and regulatory alignment. Tools like CrowdStrike Falcon, Snyk, Fortinet FortiWeb, IBM QRadar, and Auth) are not just protecting infrastructure. They’re enabling innovation in one of the world’s most dynamic industries. As threats grow more sophisticated, these platforms will continue to shape the future of secure financial technology.

  • Cybersecurity in FinTech

As cryptocurrency continues its march toward mainstream adoption in 2025, selecting a reliable, high-performing exchange has never been more critical….

As cryptocurrency continues its march toward mainstream adoption in 2025, selecting a reliable, high-performing exchange has never been more critical. With factors like security, liquidity, user experience, and range of offerings playing a pivotal role, here are the top five crypto exchanges currently leading the industry.


1. Binance

Overview: Still the largest exchange globally by trading volume, Binance offers a comprehensive platform that serves both retail and institutional traders.

Key Features:

  • Over 600 cryptocurrencies supported.
  • Advanced trading tools including spot, margin, and futures trading.
  • Binance Earn, Launchpad, and Staking features for passive income.
  • Highly competitive fees, starting at 0.1%.

Security & Regulation:
Binance has faced regulatory scrutiny in various countries but continues to work toward greater transparency and compliance. It holds licenses in several jurisdictions and maintains a robust SAFU (Secure Asset Fund for Users) for emergencies.


2. Coinbase

Overview: Widely regarded as the go-to platform for beginners, Coinbase maintains its stronghold in North America with a user-friendly interface and strong regulatory standing.

Key Features:

  • Offers 150+ digital assets.
  • Integrated with Coinbase Wallet for decentralised applications.
  • Recurring buys, portfolio tracking, and robust mobile apps.
  • Listed on NASDAQ, ensuring public transparency.

Security & Regulation:
Coinbase is regulated by U.S. authorities and is one of the few exchanges with full AML/KYC compliance. It employs best-in-class security practices, including cold storage for over 98% of customer funds.


3. Kraken

Overview: Kraken is a favorite among institutional and advanced traders thanks to its robust features and reputation for security.

Key Features:

  • Supports over 200 cryptocurrencies.
  • Offers spot, futures, and margin trading.
  • Kraken Pro for enhanced charting and order types.
  • Kraken Staking with competitive yields.

Security & Regulation:
One of the oldest operating exchanges (since 2011), Kraken has never suffered a major hack. It is regulated in the U.S. and holds a Special Purpose Depository Institution (SPDI) charter in Wyoming.


4. Bybit

Overview: Bybit has risen quickly by offering cutting-edge features tailored to derivatives traders, along with a fast and intuitive UI.

Key Features:

  • Specializes in crypto derivatives, with high leverage options.
  • Also supports spot trading, launchpad tokens, and NFT markets.
  • Popular for its trading competitions and rewards system.

Security & Regulation:
Bybit prioritises fund security with cold wallets and real-time risk audits. It has begun increasing compliance in jurisdictions where regulation is tightening.


5. OKX

Overview: OKX has emerged as a comprehensive crypto ecosystem, offering far more than just a trading platform.

Key Features:

  • Over 300 cryptocurrencies and DeFi integration.
  • Powerful tools for copy trading, bot trading, and options.
  • Active ecosystem for NFTs, DApps, and Web3 tools via OKX Wallet.

Security & Regulation:
OKX publishes monthly proof-of-reserves and maintains robust risk controls. It’s actively pursuing compliance in key regions including Hong Kong and the EU.


Conclusion

While the crypto landscape remains dynamic and subject to regulatory evolution, these five exchanges have proven resilient, innovative, and trustworthy. Whether you’re a newcomer or seasoned trader, choosing the right exchange depends on your specific needs. Be they security, advanced tools, or ease of use. Always consider using multiple platforms to diversify risk and maximise opportunities.

  • Blockchain & Crypto

Kristian Torode, Director & Co-Founder at Crystaline, on Closing the gap between digital convenience and regulatory compliance

As financial firms adopt more digital tools – from instant messaging to video calls – the challenge of capturing, storing and monitoring every conversation in line with regulatory expectations for comms has grown exponentially.

With regulators demanding stricter oversight of all business comms, financial firms must now rethink how they manage messaging across every level of the organisation. Unifiesd Communications (UC) software can help financial service providers remain compliant.

A recent Theta Lake survey revealed that over 70 firms were fined in 2024 for failing to comply with communications regulations. What is more, almost two-thirds of financial firms anticipate even more regulatory requirements on communications in the coming years.

Consequences of Non-Compliance

While fines for failure to comply with comms regulations are more prevalent in the US, there have been several cases affecting financial services firms in the UK.

In August 2023, Morgan Stanley was fined £5.4 million by Ofgem, the UK’s energy regulator, after the bank’s traders discussed wholesale energy prices over WhatsApp on private devices. Use of the platform does not meet regulatory standards for data retention and monitoring, as financial service providers are unable to record these messages concerning energy trading.

Despite industry speculation, the UK Financial Conduct Authority (FCA) has chosen not to implement an outright ban on WhatsApp for business use. Instead, the FCA expects firms to implement policies and monitoring tools to ensure compliance when using such platforms. While this provides some flexibility, it puts the onus on firms to maintain secure and auditable communication records across emerging technologies.

Balancing security and convenience

For financial businesses, the challenge lies in finding a comms solution that is both secure and convenient. WhatsApp appeals to many due to its familiarity and features like group chats, voice calls and file sharing. However, while convenient, it presents serious risks in data privacy, security and compliance, making it unsuitable as a primary communication platform for highly regulated industries like finance.

To address these concerns, many firms are turning to UC platforms that integrate multiple communication tools. These include voice, video, instant messaging and file sharing across a single, secure interface. These platforms provide the convenience of more familiar tools such as WhatsApp while addressing compliance concerns.

Several UC providers now offer platforms tailored to highly regulated industries like finance. Many include security features such as end-to-end encryption, centralised access management and real-time monitoring. This can detect potential compliance breaches, offer built-in archiving for regulatory adherence and consent management to meet data protection requirements.

Digital business communications will continue to play a key role in the financial services sector, but not at the expense of traceability and data security. Unified Communications offers a secure, compliant platform for financial services without sacrificing convenience.    

If your organisation is reassessing its communications strategy in light of evolving compliance demands, Crystaline can provide guidance on navigating the shift to unified communications.

  • Cybersecurity in FinTech

With the right approach, cybersecurity can be contagious argues Galeal Zino, Founder & CEO at NetFoundry – a provider of zero-trust connectivity solutions and originator of the open source tool OpenZiti

Modern financial services are composed of a digitally integrated secure ecosystem – networked together and codependent on ecosystem APIs, microservices and shared data. Complexity and ambiguity are high.

Sir Alex Younger, former head of the British Intelligence Service MI6 said recently that the job of the intelligence service is to dispel complexity and ambiguity.That would make a fine mission statement for the heads of information security in the financial sector.

Meeting a Complex Security Challenge

Most banks leverage core banking systems (CBS) from providers like Temenos, FIS and Finastra. This makes security complex. Connections are needed between the bank’s network and its CBS provider’s network. Traditionally, this necessitates nailing up VPNs. And managing permitted IP addresses in firewall ACLs, MPLS or dedicated circuit-based extranets. Also required are pre-shared certificates, shipping hardware, VDI and/or leaking routes. All of which have multiplied in complexity during digital transformation. And are about to multiply again with AI.

A different approach is secure-by-design. Rather than bolt-on the infrastructure described above, each session is strongly identified, authenticated and authorised. All before it is granted a virtual circuit on a network. This is similar to what the banks do internally with solutions for zero trust, but it is borderless. It works across their digital supply chains, including with their core banking platform and software providers.

One CBS leader, Euronet Worldwide, uses a third-party secure-by-design platform to enable their financial institution customers to connect to its core banking software. This is a great example of the supplier being proactive about their role in security. We’ll see this happen more as new legislation takes effect, the EU CRA. The Euronet example shows that it’s possible to remove some of the ambiguity from shared responsibility. Euronet’s secure-by-design system doesn’t just protect itself but makes every interaction with supply chain partners more secure.

Security designed-in for Financial Services

The same principles apply across financial services. Companies like Euronet can deploy their own zero trust supply chain connections, rather than putting the burden on their finance sector customers to figure it out. In large supply chain scenarios like CBS, this helps everyone. The reality now is that if the VPN of any one financial institution is compromised, then potentially all the banks who connect to the same CBS providers can be exploited. By removing complexity and ambiguity, Euronet is simplifying and securing the entire supply chain.

The big picture is that the WAN/SASE/firewall model is struggling in the post digital transformation, hyperconnected, soon to be AI- powered world. That model was built to secure the WAN. However, new workflows such as the financial supply chain are outside the borders of any single WAN. So, the precious SASE WAN gets connected to the internet via open firewall ports (ACLs) and vulnerable VPNs so the business can connect to supply chain partners. It’s like building a strong boat and then punching holes in it to get a better look at the water. 

AI is the nail in the WAN coffin because AI multiplies and accelerates these workflows. They have at least one leg outside the WAN and it makes them less predictable and more dynamic. More complexity and ambiguity. Good luck connecting AI agents via VPNs and firewall ACLs.

Secure-by-Design Supply Chain

So, what does a secure-by-design supply chain look like and how can financial services identify viable migration paths?

The main characteristics are:

  • Close all inbound “listening” ports on all network firewalls and servers to make your DMZ unreachable from the underlay networks.  Eliminate the reachable firewalls and VPN servers.  No more holes beneath the waterline!
  • End-to-end zero trust between supply chain participants, meaning least-privileged access not just to the network or firewall, but all the way through to applications, APIs, servers and devices. Nothing can connect to anything else without strong identity, authentication and authorisation. This includes end-to end-encryption – no sharing of encryption keys with cloud security providers (which also helps ensure data sovereignty).
  • Microsegmentation, the ability to define in granular detail who or what has access to which applications, and to limit lateral movement in the event of a breach. In effect, every application session becomes a private network-of-one, and it is quarantined by design.

Find out more at https://netfoundry.io/

  • Cybersecurity in FinTech

Rob Meakin, Director of Fraud & Identity at Creditinfo, on leveraging tech to tackle fraud

Financial fraud is increasing around the world, putting both mature and emerging digital economies at risk. The overall global economic impact of financial crime has been estimated to be $5 trillion. Furthermore, according to the 2024 Nasdaq global financial crime report, fraud losses totalled $485.6 billion worldwide. This from fraud scams and bank fraud schemes alone. As such, organisations face a series of challenges, from eroding profit margins to reputational risks to data breaches.

Many factors contribute to this growing wave of fraud. For example, digitisation in banking has created new opportunities for bad actors. With more identity data existing online, attack surfaces have expanded. Hackers now have more possible entry points to exploit vulnerabilities.

At the same time, new technologies, like machine learning (ML), artificial intelligence (AI), and automation are enabling bad actors to innovate faster and evade detection more effectively. AI, in particular, is a double-edged sword. While many businesses use the technology to improve efficiency and decision-making, it also gives bad actors a helping hand. Deepfakes and social engineering, for example, enable them to impersonate individuals with uncanny realism.

Additionally, cybercrime – especially financial crime – is becoming more sophisticated. Today, over two-thirds of financial institutions admitting they’re unprepared to defend against the rising wave of attacks.

Counting the many costs of fraud

Rising fraud creates challenges at local, national, and global levels. Financial loss is, obviously, a primary concern. But financial loss is only part of the total cost of cybercrime. Fraud also brings reputational damage, increased risk of data breaches, and potential legal consequences.

As organisations devise new strategies to tackle rising fraud, they must also heed regulatory requirements. Namely, Anti-Money Laundering (AML) registration, as well as other standards for privacy and consent. These regulations create further challenges for organisations as they aim to uphold rigorous compliance requirements without impacting sales, operating costs, or the customer experience.

It’s time for a different approach to fraud detection

On both local and global levels, mounting fraud threatens economic growth. In its Plan for Change, the UK government has recognised global co-operation will be necessary to tackle fraudsters. However, existing security strategies are too fragmented to suit the needs of diverse markets.

Emerging economies, for example, often lack mature controls, making them inherently vulnerable to hackers. Yet, with smaller digital infrastructures, they’re also less attractive targets for financial crime.

In contrast, more mature economies usually have stronger security defences. However, their larger digital ecosystems make them perhaps even more vulnerable to bad actors’ advances. After all, the more digital an economy becomes, the more fragmented and complex an individual’s identity and the more opportunities for bad actors to exploit or impersonate it.

Combatting fraud at a global scale requires going local

Considering the scale and sophistication of cybercrimes, combatting global fraud will require organisations to turn to localised data for more precise identity verification.

By integrating data from diverse, localised sources and tailoring fraud prevention strategies to market-specific risks, organisations can better detect fraud and establish identity trust. And in a way that both upholds the customer experience and promotes financial inclusion.

Combine credit, government, and digital data to enhance intelligence

Thwarting fraudsters begins with building intelligence to establish trust and verify presented identities. This is where localised data can help. By combining credit bureau data with government registries and digital signals, organisations can find a correlation across multiple digital identity attributes and digital risk signals to assess risk and enable real-time identity trust.

Credit bureau data associated with the presented identity can be used to determine risk and trust based on four vectors:

  • The bureau footprint: information comprising records from multiple contributing organisations
  • Activity history: evidence of recent and consistent payment activity
  • Data consistency: personal data stability
  • Application velocity: recent application history

Meanwhile, government information services and other registries can be incorporated to further cross-check the presented identity and strengthen verification.

By leveraging such a wide range of independent, localised data sources and correlating them with the presented identity attributes, organisations can significantly enhance intelligence to detect fraud without compromising the customer experience.

Tailor strategies to specific markets to support compliance and accessibility

It’s also important that organisations tailor their security and identity-verification strategies to the unique needs and maturity levels of specific markets. For example, in emerging economies, many people struggle to access financial services. This is often due to a lack of a formal credit history or other recognised financial records. Without this information, it can be a challenge for organisations to verify identity and reach trust decisions without inadvertently excluding legitimate users.

But by using localised data sources and market-specific strategies, organisations can make more informed decisions to bring more traditionally excluded parties into the financial system and promote broader financial inclusion without increasing risk or compromising security.

These targeted, market-specific fraud prevention strategies also help organisations with regulatory compliance. For example, for AML compliance, organisations must “identify, assess, and understand the money laundering and terrorist financing risk to which they are exposed.” Using localised data and market-specific strategies can help organisations meet this expectation by aligning fraud detection controls with region-specific threat intelligence.

Conclusion

Global financial crime continues to ramp up, creating new challenges for organisations to detect fraud, verify identities, and comply with regulations. But finding strategies to beat bad actors is made even more difficult by markets’ varying needs, maturity levels, and digital infrastructures.

To combat fraud and cyberthreats on a global scale, organisations should pivot to a localised approach. By combining credit, government, and digital data and tailoring fraud-prevention strategies to specific markets, they can enhance intelligence, maintain compliance, and better manage risk. In doing so, they can not only strengthen security but facilitate access to financial products and services for broader financial inclusion, worldwide.

  • Cybersecurity in FinTech

Intergiro’s CEO, Nick Root, on how payments providers can meet the challenges for cybersecurity in the war on fraud

We operate in the trenches of FinTech – real-time, full-stack and fully exposed to the relentless tide of digital fraud. As an embedded payments provider across the EU, Intergiro lives at the bleeding edge where innovation meets exploitation. And let me be clear: fraud isn’t a back-office nuisance anymore. It’s an existential threat. One that every modern financial company, especially those bootstrapped like ours, must treat as core business, not a support function.

Right now, 30% of our headcount is dedicated to fraud prevention, compliance and cybersecurity. That’s not a vanity metric – that’s the reality of staying alive in a hostile digital environment. We spend millions annually not just on tooling and infrastructure, but on reimbursing innocent victims. For a company building its future on resilience, programmatic control, and capital efficiency, these costs are brutal. But necessary.

The Scamdemic is Here

Fraud is no longer a sideshow; it’s the main event. In the past 18–24 months, we’ve seen a sharp escalation. Sweden’s financial police reported an 80% spike in investment fraud between 2022 and 2023. Our internal metrics tell the same story. Spiking fraud attempts, more advanced attack vectors and a user base under siege.

And this isn’t abstract. It’s personal. For example, I got hit by a fake Uniqlo storefront. Nearly lost money. Only Intergiro’s own controls saved me. It was a sobering moment: even a FinTech founder can fall victim. For digital natives, that’s embarrassing. For the less tech-savvy – think your parents’ generation – it’s a nightmare. My own father won’t use Uber unless one of us physically adds his card to the app.

Understanding the Threat Landscape

To address this epidemic, we first need to clarify the categories of fraud. Payment fraud and ID theft are mostly on us – as FinTechs. If a system fails, or a tool is exploited, we own that and cover the loss. But social engineering and investment fraud? They’re tougher. These rely on psychological manipulation – human vulnerabilities we can’t patch with software updates. Still, that doesn’t mean we’re powerless. We just need to shift our lens.

Upstream, Not Downstream…Fighting social engineering with regulation is like mopping up the floor while the roof’s still leaking. Necessary, but ultimately reactive. We need to move upstream. Way upstream.

Social Media: The Root of the Fraud Problem

Over 75% of fraud starts on social platforms. That’s the front door. If we don’t lock it, we’re just chasing shadows. Meta’s FIRE partnership with UK banks is a baby step in the right direction. But let’s be honest – it shifts responsibility onto banks to clean up the mess, while platforms avoid real-time accountability.

What we need is a pan-European version of FIRE, backed by the teeth of the Digital Services Act and centralised enforcement. FinTech alone can’t drive this. We need regulators, platforms and providers rowing in the same direction.

Public Awareness: Borrowing the Pandemic Playbook

Think about this: between 2020–2022, fraud cost the EU €157 billion. That’s not far off the public health spend from COVID. And fraud doesn’t recede – it compounds.

In a pandemic, we responded with mass public education: masks, distancing, handwashing. We need the same for digital fraud. A real, coordinated public awareness campaign built around these pillars:

  • Basic operational security –  Email is not secure. Banks don’t ask for details over email. Wire transfers aren’t reversible like card transactions.

  • Social media hygiene –  If it smells like a scam; even from a verified blue tick – assume it is. “Stop. Think. Click.”

  • AI as defence –  The same AI used to create scams can help spot them. Let’s teach users how to turn the tools around – scan that investment pitch, audit that wallet address.

Delivery matters here. Dry leaflets won’t cut it. Interactive quizzes, short-form video explainers, browser plug-ins – a toolkit that reaches people where the scams do: in-feed and in-app.

Collective Action Against Fraud: Collaboration Over Competition

FinTech has a reputation for speed, innovation and competition. But when it comes to fraud, isolation is the enemy. No single firm can win this war alone.

We need a secure, privacy-conscious layer for FinTech collaboration. A shared fraud intelligence layer that goes beyond blacklists and blocked BINs. We’re not talking about turning FinTechs into police forces, but enabling programmatic detection through pooled data, shared signals and joint tooling.

At Intergiro, we’re already piloting private data-sharing models with other European players. It’s early – but promising.

Final Word: It Takes a Village

This war against fraud won’t be won in the back office of your local neobank. It needs a whole-of-society effort. Platforms must step up. Regulators must align. And consumers must be trained – not blamed.

Fraud isn’t going away. As AI evolves, so will the threat. But so will we – if we move fast, stay dynamic, and invest in people, tools, and partnerships. Not just for ROI – but for resilience.

At Intergiro, we’re all in. But we can’t do it alone. If FinTech is the infrastructure of modern commerce, fraud is the fault line beneath it. And we can’t build the future on a fault line.

  • Cybersecurity in FinTech

AccessPay CEO Anish Kapoor examines the positive impact of DORA on the digital payments industry

The EU’s Digital Operational Resilience Act (DORA) is a positive step for the payments industry and will help boost the resilience of an ecosystem that has changed radically over the last twenty years. Even so, the implications of this landmark regulation for payment service providers (PSPs) are complex and far-reaching. It will require investment in processes and infrastructure, which must also factor in the ongoing shift to real-time payments.

The technology backstory

Two decades ago, payment technology predominantly referred to back-end systems used by banks and PSPs to process electronic transactions. Online banking was still in its infancy, the smartphone hadn’t yet been launched, and traditional payment methods such as cash and cheques were much more prevalent.  

Today, it is a very different story. The number of electronic payments made via cards and digital wallets, credit transfers and direct debits has exploded. Technology is front and centre in payment service delivery, as individuals and businesses use online portals and mobile apps to manage accounts and initiate payments. While the rise of real-time payments, such as the EU’s SEPA Instant Credit Transfer (SCT Inst), means an increasing proportion of bank transfers are settled instantly rather than over several working days, which also means that anti-fraud measures and other compliance checks have to take place in real-time given the heightened fraud risk.

So, if there is a technological failure at any point in this new world of payments, it can have immediate and considerable ramifications for individuals and businesses. The now-infamous CrowdStrike outage in July 2024 affected several sectors, including banking, with some PSPs unable to process payments. More recently, an hours-long glitch at Bank of Ireland in December 2024 caused delays in processing payroll transactions for some employers, while a two-day outage at Barclays in February 2025  left customers unable to make bank transfers and use their debit cards. To catch up, Barclays had to process payments over the weekend and extend call centre operating hours.  

DORA’s goals

DORA aims to make the EU’s financial institutions (FIs) more resilient to information and communication technology (ICT) risks. It will minimise the potential for IT outages and require FIs to be back online as quickly as possible when they do occur. From a practical perspective, it will oblige them to create and implement ICT risk management frameworks. And meet new requirements for resilience testing, outage reporting, and information sharing.

Of course, the advent of DORA adds to the compliance burden for FIs, who will partly be spurred to comply to avoid fines for non-compliance and the associated negative press. Still, its rollout should be seen as positive for the industry. It should help to improve resilience across the ecosystem and boost customer confidence in the sector.

Improving infrastructure resilience with DORA

One angle that is less widely discussed when it comes to DORA is its implications for a PSP’s infrastructure. Whether developed in-house or outsourced, payment systems will need to have the capacity to accommodate peak loads following any outage. This will require PSPs to scale by multiples of their standard throughput.

For example, if a PSP’s average processing volume is 1,000 transactions per hour and its systems are down for three hours, it will need to have the capacity to process those 3,000 outstanding transactions once service resumes. And without impacting new transactions coming through the system. Additionally, if they are real-time payments, the delayed transactions must be settled as soon as possible. In this hypothetical example, such an outage would mean the system needs to handle 4,000 transactions in one hour, four times its usual capacity.

This requirement to recover quickly from IT outages will necessitate additional investment in infrastructure and automation. Especially given the move towards real-time settlement. In particular, it will likely drive interest in cloud-native technology, which can scale more readily on demand.

Third-party vendor relationships

DORA will also significantly impact how PSPs manage third-party IT vendor relationships. This development has been driven by the growing complexity of the financial ecosystem in the wake of digitisation and the rise of open banking. Research from McKinsey Digital highlights how the growth in the number of apps and vendors has increased the complexity and pressure on IT leaders.  

Under DORA, FIs are expected to monitor third-party providers, update supplier contracts to cover IT resilience, and establish an oversight framework for critical third-party providers. Consequently, conducting due diligence on third-party providers, particularly new vendors, and their approach to resilience is essential. Generally, we are likely to witness a flight to quality, with the providers that invest in controls and resilience set to fare best in the long term.

Adjusting to DORA

The arrival of DORA is a positive development for the payments industry. The sector has changed significantly in recent decades and relies heavily on technology for service delivery. Likewise, its customers depend on the PSPs to deliver their services so that they can conduct their business uninterrupted. However, the changes required by DORA are extensive and will require PSPs to invest in their infrastructure, processes and third-party relationships. As they adjust to the requirements of DORA, PSPs should ensure that infrastructure is resilient and flexible enough to handle surges in transaction flows. And factor in the shift to real-time settlement, which will only add to the demands made of payment systems.

  • Cybersecurity in FinTech
  • Digital Payments

Nick Botha, Payments Lead at AutoRek, on meeting customer expectations for faster, cheaper and more transparent cross-border payments

As international trade and e-commerce continues to expand, cross-border payments have grown substantially. According to the latest report from EY, global cross-border payments are growing at around 9% annually. And they are expected to reach $290tn by 2030. As the digital economy continues to expand, the demand for more efficient, secure, and inclusive payment systems becomes crucial. The shift from traditional T+2 and T+1 settlement periods to real-time payments has already reshaped domestic transactions. Setting the stage for a similar revolution in cross-border payments.

Whilst there is plenty of opportunity for cross-border payments, sending and receiving payments can be a complex and challenging process. This is due to rising data volumes, fragmented systems, and different regulations across multiple territories. So, how can businesses best prepare for the evolving cross-border payments environment?

Breaking down the barriers for cross-border payments

It’s no secret that achieving real-time cross-border payments involves complexities beyond technology alone. Regulatory challenges are a significant hurdle. Multiple financial institutions across different countries have distinct rules around payments, fraud detection, and compliance. For example, the stringent regulations of the UK’s Financial Conduct Authority (FCA) contrasts with the relatively flexible approach of the US Federal Reserve. This diversity in regulations can lead to inefficiencies, increased costs, and compliance burdens. Harmonising these regulations will be crucial for creating a seamless global payment network.

In addition, cross-border payments often take several days to process through traditional banking systems. This can be due to time zones, inefficient processes and the involvement of multiple intermediaries, including correspondent banks, and local financial institutions. Each intermediary adds time and cost to the transaction, and the entire process can take between two to five days. For businesses, these delays can disrupt cash flow, complicate supply chain management, and create issues with paying vendors and employees promptly. Worryingly, the delay can prove hugely problematic for SME’s who often operate with tighter cash reserves and need more immediate access to funds.

Furthermore, businesses engaged in cross-border transactions must also navigate the complexities of fluctuating exchange rates. Currency exchange rates can change dramatically, influencing the cost and value of transactions. This could lead to financial losses if a payment is delayed or if a favourable exchange rate changes before the transaction is processed.

Unlocking potential by reducing complexity

To overcome cross-border challenges, G20 leaders endorsed a roadmap for enhancing payments globally in 2020. This initiative set out to address the four key challenges related to cost, speed, access, and transparency. Therefore, paving the way for a more efficient and inclusive financial ecosystem. For example, the G20 aims for 75% of cross-border payments to be credited with the beneficiary within an hour by 2027. The past couple of years have undoubtedly brought major milestones with respect to this roadmap. Most notably, SWIFT has been a central figure in traditional cross-border payments. It provides a standardised network for financial institutions to send and receive information about transactions.

The challenges faced by businesses with cross-border payments has unlocked new opportunities for financial institutions to develop innovative solutions. FinTechs are leveraging advanced technology, including blockchain, artificial intelligence (AI), and digital currencies, to make cross-border payments faster, cheaper, and more transparent. Blockchain and cryptocurrencies are often cited as potential game changers in cross-border payments due to their ability to eliminate the need for intermediaries, whilst enabling instant and transparent transactions. For example, Ripple, one of the leading blockchain-based payment networks, uses its RippleNet platform to facilitate payments between countries. This provides faster and more cost-effective payments.

Cross-border payments traditionally have been more complex than domestic transactions due to multiple intermediaries. Furthermore, it’s important to note ongoing international collaboration will be crucial to ensuring cross-border payments remain seamless, secure, and inclusive. This opportunity can be maximised through automatic reconciliation. By automating the processing of high volumes of date from cross-border payments, businesses can remove the distractions of mismatched information, fraud concerns and accounting hold-ups. It also manages inbound payments, outbound payments, and inter-currency transfers through a centralised framework. This enables businesses to gain complete visibility of the data.

Opportunities on the horizon for cross-border payments

The pace of change within the payments and wider fintech industry is showing no signs of slowing down. Customer expectations for faster, cheaper and more transparent payments are driving change across the sector. It’s certainly an exciting time for the industry, but financial institutions cannot afford to rest on their laurels. Further growth can be found on the horizon for those who are equipped with the right knowledge to be able to pursue cross-border payments effectively.

  • Blockchain & Crypto
  • Digital Payments

Ben Parker, CEO at eflow Global, on how consolidating information can help organisations achieve a comprehensive view of their regulatory compliance

When it comes to compliance, financial institutions are constantly navigating a landscape that is not only highly complex, but also in a state of perpetual flux. Firms must ensure that they are meeting the current standards set by regulators. Furthermore, they must also stay ahead of the curve in a world where regulations are continuously evolving. It’s about keeping up with the rapid advancement of technology, particularly in areas like artificial intelligence. It reshapes both the methods of regulatory enforcement and the strategies employed by those who seek to circumvent the rules.

Accordingly, the importance of technology and data in compliance strategies is ever increasing. Traditional approaches, such as manual data entry and analysis, are increasingly inadequate in meeting the demands of modern regulations. Just look at the frequency and granularity of data reporting that is needed for the EMIR Refit regulations as a practical example.

However, as financial firms have recognised this shift and turned to technology as the solution, the transition has brought new problems of its own. Namely, the fragmentation of data across disparate, siloed systems. So, how do firms solve this issue?

The data fragmentation problem in compliance

The issue of data fragmentation has become a common occurrence in compliance. Firms are often deploying multiple technology solutions to manage their regulatory obligations. Across areas such as trade surveillance, eComms surveillance, best execution and transaction reporting. As a result, they often find themselves grappling with data silos caused by using multiple, disconnected systems.

While these tools are often very good at specific tasks, a lack of data integration between systems will harm a firm’s overarching compliance efforts. These platforms, if sourced from different vendors, may not be able to share data between one another. This ultimately undermines their effectiveness, negating the operational efficiency technology is supposed to add.

The use of multiple systems by firms can happen for a variety of reasons. For example, legacy technology that has been in place for a number of years, the need to comply with different regulations as the business has scaled and changes in regulatory strategy. Moreover, you also need to consider that reporting formats can differ between regions, as can protocols for monitoring market abuse. When you combine all of these variables, it means only one thing – identifying non-compliant activity is trickier for firms to achieve, as is demonstrating compliance to regulators.

This is a major problem as, perhaps more than ever before, different areas of compliance overlap. For example, being able to monitor suspicious messages shared through digital communications channels could help identify instances of market abuse. Or predict when it might take place. This relies on a firm being able to map its trade data over eComms surveillance data to create a complete picture of the activity. Without being able to do this, firms would have to spend huge amounts of time and resources manually cross-referencing data from separate systems. In turn this increases the risk of human error and the danger of breaching regulations.

Why a holistic system supports compliance

Rather than having to implement complex and costly integrations between in-house and third party apps, a holistic compliance platform can provide the seamless flow of data between various sources via straight-through processing. This creates a real-time overview of compliance processes and streamlines workflows, reducing human errors and enhancing efficiency.

With such technology in place, firms have a central digital hub from which to manage their holistic regulatory strategy. If chosen wisely, additional modules can be easily added and integrated to meet new regulatory requirements as they emerge. This allows firms to scale more effectively.

This ‘single source of truth’ also enables compliance professionals to have a broader understanding of trading activity taking place across their organisation. It also facilitates improved sharing of information between different departments, trading desks and regional offices. This ‘joined up’ approach is likely to become even more important. As the financial landscape becomes increasingly interconnected this will be incredibly challenging to achieve without a centralised digital platform.

New regulations such as EMIR Refit require significant extra reporting requirements. The sheer amount of data and the speed with which it needs to be processed means such automation and integration tools are crucial. Moreover, in such a digitally diverse landscape, a holistic system allows companies to assess the numerous data points needed to be compliant without any regulatory gaps. 

A future non-negotiable

While many firms are currently grappling with multiple compliance systems and data silos, employing a centralised system will become a non-negotiable in the future of compliance. Not only are regulations constantly changing, but trading strategies are evolving even quicker. This means that instances of market abuse, driven by trends like growing interest in digital assets and AI-powered trading, are only likely to increase. If firms are hindered by disparate compliance systems, they leave themselves open to significant regulatory risk.

The underlying challenge for companies is to find ways to maintain compliance and keep on top of changing regulations while also ensuring these efforts do not place an unnecessary strain on resources. In the face of these challenges, a holistic compliance system offers the simple solution to striking this balance – it enhances the efficiency, accuracy, adaptability and overall effectiveness of regulatory processes. Crucially, it is clear that regulators have growing expectations of firms to take a proactive approach to this challenge.

A centralised regulatory system also sets firms up to integrate more advanced tools like AI. There are already highly sophisticated compliance tools that have integrated features like natural language processing to ‘translate’ messages and link suspicious communication to abusive trading. The more comprehensive and diverse the data, the better these models work at analysing trends and spotting abuse.

A holistic solution to a complex compliance challenge

While a firm’s intention may be to drive efficiency, the adoption of compliance technology without a coherent strategy can in fact create more issues. If compliance systems can’t communicate effectively with each other, errors creep into datasets and gaps in regulatory processes appear. This means firms risk breaching regulations and suffering greater market abuse, with both outcomes bringing financial and reputational damage. 

The key lies in integrating these disparate data sources into a single, cohesive, holistic system. By consolidating information, businesses can achieve a comprehensive view of their regulatory compliance. Therefore, reducing the need for cumbersome IT infrastructure and ensuring they remain agile in the face of ongoing regulatory changes. Ultimately, a holistic system simplifies a regulatory and trading landscape that is increasingly varied and complex.

Ben Hunter, Senior Director of Financial Services at Gigamon, on the impact of the Digital Operational Resilience Act (DORA) and what financial institutions can do to ensure lasting compliance

The Digital Operational Resilience Act (DORA) came into force on January 17th. It’s high time for financial institutions to refine their compliance and Cybersecurity efforts. This regulation isn’t just another box-ticking exercise. It represents a shift in the financial services industry that touches everyone in the ecosystem. And every corner of the organisations within it. From IT teams to the board, every department must pull together under a cohesive cyber strategy to meet the challenge. It’s not simply about systems and software. DORA demands a cultural shift toward organisation-wide cyber resilience.

At this stage, the big changes should already be in place. However, the focus now must be on the finer details. The overlooked pieces that could potentially make or break compliance and prove extremely costly. Organisations must tweak processes and ensure every element of their plan works seamlessly and aligns with the broader goal of operational resilience. Here are three areas of focus to perfect preparedness and ensure DORA compliance is not just a box checked but a new standard embraced by the whole organisation.

Criticality of third-party Cybersecurity management

One of DORA’s requirements is reducing reliance on single ICT service providers. This is designed to safeguard financial institutions against concentrated risk. By now, all structural changes should already be in place, with organisations diversifying their ICT providers. Or improving internal capabilities to reduce their external dependencies. However, compliance doesn’t end with restructuring. The focus must now shift from restructuring to managing these relationships effectively. Organisations should be looking to perfect their third-party risk assessment, monitoring, and due diligence strategies. They must ensure their processes for vetting ICT service providers are not just in place but are meticulously detailed. Contracts need to leave no room for ambiguity, with explicit terms outlining providers’ security and risk management strategies. These agreements must be revisited and stress-tested to confirm they align with DORA’s standards.

Equally critical is ironing out the specifics of ongoing monitoring and oversight. Institutions should be finalising the structure and frequency of their performance reviews and audits. Ensuring these mechanisms are robust enough to identify and address any emerging vulnerabilities. Moreover, by focusing on the details now, organisations can build a resilient operational framework that doesn’t just meet DORA’s requirements but builds resilience into their core operations for years to come.

Global efficiency through multi-cloud environments

Adopting a multi-cloud strategy has become essential for financial institutions operating on a global scale. It mitigates concentrated risk by avoiding dependence on a single provider and allows organisations to address the unique regulatory and operational challenges of different regions. However, the complexity of multi-cloud environments brings its own challenges. Particularly in ensuring the visibility and control required under DORA. This is why it’s crucial for organisations and their third parties to refine the tools and processes that support this level of visibility and allow the security teams to continuously monitor their environments.

According to recent data, 50% of CISOs say their confidence in risk management hinges on having full visibility into all data in motion, including encrypted and lateral traffic across both on-premises and cloud environments. This underscores the importance of advanced monitoring capabilities to effectively manage the complexities of multi-cloud infrastructures. While DORA mandates comprehensive visibility, the benefits go beyond just meeting compliance requirements. Deep observability strengthens organisations’ ability to detect vulnerabilities in real-time, ensuring seamless operations across regions and providers, and service continuity. For multi-cloud strategies to be effective, they must be paired with the right network-level monitoring capabilities. It’s important to build resilience from the inside out.

Organisational alignment to demonstrate Cybersecurity compliance

Demonstrating compliance isn’t just about avoiding fines and ticking regulatory boxes. It’s about preserving trust and protecting the organisation’s reputation. Reputational damage and financial penalties hit the top of the organisation hardest. This makes board-level engagement essential to ensuring Cybersecurity efforts are prioritised and aligned with broader business objectives. Boards must recognise that Cybersecurity is not a siloed function; it’s a key aspect of business resilience.

While security leaders are responsible for designing and implementing security strategies, their ability to deliver is directly tied to the board’s involvement. Board members control the decisions that shape an organisation’s Cybersecurity posture, from budget allocation to strategic priorities. Without their active engagement, security leaders may lack the resources, influence, or organisational buy-in necessary to implement comprehensive security measures. This can lead to significant gaps in compliance efforts and overall resilience.

To demonstrate compliance effectively, organisations need a unified approach to gathering, standardising, and presenting evidence to regulatory authorities. This includes aligning on consistent formats for documenting key areas like risk assessments, incident management, security testing, and third-party oversight. By finalising internal policies and leveraging automation tools, institutions can ensure their compliance evidence is regulator-ready and accessible. Such coordination not only satisfies DORA’s demands but also signals a strong, unified commitment to operational resilience. One that must come from the top and ripple throughout the entire organisation.

With penalties for non-compliance reaching up to 2% of global annual turnover, financial institutions cannot afford to be anything less than fully aligned on their compliance strategies going forward. Furthermore, as the broader compliance frameworks are now finalised, the focus must shift to perfecting the finer details that will ensure long-term resilience and success.

About Gigamon

Gigamon offers a deep observability pipeline that efficiently delivers network-derived intelligence and insights to your cloud, security, and observability tools. This eliminates security blind spots, optimises network traffic and reduces tool costs. Therefore, enabling you to better secure and manage your hybrid cloud infrastructure.

  • Cybersecurity in FinTech

Bharat Mistry, Director – Product Management at Trend Micro, on why attack surfaces are more difficult to mange than ever and the need for greater Cybersecurity controls to tackle the problem

Some surprising news emerged in mid-December. A Freedom of Information request sent to the Financial Conduct Authority (FCA) revealed that the number of c

Cybersecurity attacks reported to the regulator by large financial institutions fell 53% from the previous year. Reported data breaches also fell, by 29%. While welcome news, there are some big caveats.

The fall in reports could signify attacks are getting more sophisticated and harder to spot. The reporting periods also didn’t quite align, meaning two-and-a-half months of possible regulatory reports weren’t included in 2024’s figures. In fact, we’re seeing attacks and breaches at financial services industry (FSI) firms surging. In line with these organisations ramping up investment in digital transformation and IT modernisation projects.

Threat actors are grasping the opportunity with both hands. To keep them at bay, IT and cybersecurity leaders in the sector may need to rethink their approach to cyber risk management.

Cybersecurity controls are urgently required

Digital transformation is on an inexorable path. Driven by customer demand for seamless cross-channel experiences, and the quest for more streamlined business processes and productivity gains. Cloud adoption, mobile and app-centric services, remote workforces, and expansive supply chains are the result. However, this rapid change comes at a price. Research warns that half (49%) of global FSI leaders believe their attack surface is spiralling out of control.

Put simply, the ‘attack surface’ is the total expanse of all the IT and OT systems in a business that could theoretically be hacked. It includes everything from on-premises desktops and servers to cloud containers and even employees. Vulnerabilities and misconfigurations across these systems and services are inevitable. And the more assets there are, the more chance there is that a determined threat actor will find a weakness. This allows them to compromise the corporate network or a critical cloud account.

Heeding the warning

The likelihood of them doing so is increasing all the time. Not just because the typical FSI attack surface is increasing, but also because cybercriminals and nation-state operatives are getting better at using AI to their advantage. The National Cyber Security Centre (NCSC) warned back in January 2024 that AI “will almost certainly increase the volume and heighten the impact of cyber-attacks over the next two years”. It’s right. Generative AI in particular lowers the bar for budding threat actors by enabling them to create highly effective social engineering campaigns. And perform reconnaissance at scale to find weaknesses in organisations’ attack surfaces. In some cases, these weaknesses may exist in AI tools brought in by workers themselves. One report claims over a third of firms are struggling with shadow AI.

Our adversaries are also aided by the sheer complexity and interconnectivity of modern digital environments. APIs, microservices and third-party integrations -including frequently buggy or downright malicious open source components – expand the attack surface yet further.

Why it’s time for change

Managing risk across these environments should be a priority for obvious financial and reputational reasons. Open Banking rules and the growth of FinTech have made it easier for dissatisfied customers to jump ship. Furthermore, providing more options for those looking for a new provider. A serious breach could be the catalyst for a mass exodus. It’s also expensive in other ways. FSI is the second-top sector overall in terms of the average cost of a data breach. This is estimated to be over $6m per incident, assuming no more than 113,000 records are compromised.

However, there’s increasingly a regulatory imperative for FSI firms to rethink their Cybersecurity strategy. Any operating in the EU now has to comply with a rigorous new set of requirements in the EU Digital Operational Resilience Act (DORA). From January 1, 2025, those in the UK deemed to be critical third parties (CTPs) will be required to put in place a number of “technology and cyber risk management and operational resilience measures”.

A new mindset

So what does this mean in practice? Modern technology environments are dynamic, with new assets appearing and disappearing. Furthermore, new vulnerabilities are emerging and fresh misconfigurations surfacing on a daily or even hourly basis. Managing risk across this vast, incredibly volatile and highly distributed environment requires a new approach. Traditional perimeter defences are no longer sufficient.

Instead, FSI firms need continuous monitoring of risk across their entire attack surface. From endpoints and networks to servers and cloud workloads. Ideally, such a platform will flag areas of concern and either suggest improvements or automatically remediate. It could be something as simple as changing an insecure password, or patching a critical vulnerability newly published by a key vendor. This is the way to build resilience for the long term.

But there’s more. Some threats will always sneak through corporate defences. That’s why it’s also vital to expand security operations capabilities with AI-driven analytics and cross-layer detection and response (XDR). The goal is to correlate threat data across multiple layers and automatically prioritise alerts for stretched analyst teams. Robust incident response processes are also key here, to ensure no time is wasted in containing the threat and minimising any damage caused.

More broadly, it’s about fostering a culture of cyber resilience. Continuous improvement, proactive defence, and a willingness to adapt are ingrained in the corporate mindset. More Cybersecurity regulations are promised by the government in 2025. The clock’s ticking.

  • Cybersecurity in FinTech

Simon James, CEO of PayComplete, on why 2024 was a pivotal moment for cash and what the future holds

After several years of doom and gloom and many proclaiming the death of cash, the last 12 months have well and truly put that idea to bed. Despite many expecting the COVID pandemic to be the last nail in the coffin, four years later, cash is still in widespread use. The future looks bright. Recent figures from the British Retail Consortium (BRC) underscore the story of 2024… Cash is no longer on the way out and is set to remain a critical part of the payment ecosystem and economy for the foreseeable future.

What happened with cash?

The resilience and ongoing importance of cash to payments, finance, and the economy is down to two factors. Firstly, it’s clear now that consumers care. Recent research from PayComplete’s ‘Why won’t cash just die?!’ report found 89% of consumers view the ability to pay in cash as important to customer satisfaction. More importantly, when it is removed as a payment option, only 26% of consumers comply. Meanwhile, an even larger group (36%) vote with their feet and walk away without making a purchase.

It’s not just customer experience that’s impacted by the absence of cash as a payment option. Brand perception also suffers. Research findings discovered nearly half (47%) of consumers believe organisations that don’t accept it are putting profits ahead of customer satisfaction. Moreover, when denied the opportunity to pay in cash, respondents felt a range of emotions, including inconvenience (54%), outright annoyance (52%) and, for those who walked out without making a purchase, anger (16%). Failure to offer this payment choice is a big risk for businesses. It can negatively impact customer satisfaction, brand reputation, and lead to outright anger from customers.

However, the value consumers place on cash goes beyond it being a way of completing a transaction. It is also seen as critical to supporting local communities. Interestingly, the research found 65% of consumers know card payments incur charges for businesses, resulting in nearly a quarter (22%) actively choosing to pay in cash instead. In fact, over half (57%) of consumers want to help businesses save money by paying in cash, which jumps to 71% for small businesses, tipping, and personal services. Paying with cash, therefore, is not simply a way of transacting with a company. For many shoppers, it’s a sign of support.

Regulators and lawmakers protect cash

However, consumers continuing to care is only part of the story. Furthermore, an important factor has been the steps regulators and governments have taken to protect access to cash. In the UK, 2024 was the year that the FCA’s Access to Cash came into force. This made it a legal requirement for banks and building societies across the UK to provide a minimum level of access to cash. Across the pond, similar measures have been taken by Connecticut, Massachusetts, Colorado and Tennessee as US states move to enshrine access to cash into law. With lawmakers realising its importance, and creating regulations to protect access to it, the long-term future of cash is now secure.

What does it all mean?

2024 has been a watershed year for cash and its future. No longer are there debates and discussions about a cashless society. Instead, it is here to stay, and, with that certainty, it makes it far easier for businesses to plan for their own future. Businesses waiting to see what would happen with cash before deciding if it was part of their future now have a conclusive answer and can plan accordingly. Moreover, those who have already taken steps to move towards a cashless future will need to reverse course or risk facing consumer wrath.

The rise of CashTech

The good news for businesses is that cash management and handling technology hasn’t stood still these past few years. There is a combination of smart hardware and software to finally unify management, processing, and handling. CashTech is a new set of solutions that make it quicker, easier, and more efficient than ever before for businesses to handle cash. Combining hardware and software, CashTech solutions enable enterprises to digitise their handling. Making it easy to assess business-critical areas like cash flow management and better support accounting and business management processes. By automating handling, businesses can also avoid the unnecessary costs of discrepancies and inefficiencies from manual processes.

In the coming years, when we look back on 2024, we will see it as the year the future for cash was confirmed. Talk of a cashless future and the death of hard currency was wide of the mark. While cash may not usurp debit and credit card payments, neither will they bring about its end. With the future now clear, it’s time for businesses to adopt CashTech in 2025 and turn inefficient processes into a game-changing competitive advantage.

About PayComplete

PayComplete is the global leader in cash management solutions, combining bleeding edge hardware solutions with game changing software, unifying cash management with other key payments and operational systems. Dedicated to innovating self-service experiences and operations for both consumers and employees, The PayComplete IoT platform is made up of an adaptable set of SaaS and machine software, intelligent devices, and professional, technical and merchant services. PayComplete Connect unifies the management of transactions, users, devices, and data across the enterprise, bringing digital precision to cash transactions and systems. PayComplete serves a broad range of industries, including retail, transportation, financial services, vending, cash centers, mints and more.Industry leaders, work with PayComplete to make their cash transaction-based businesses more innovative, agile, and efficient.

  • Digital Payments

Martin Greenfield, CEO of Quod Orbis, on a troubling paradox within the cybersecurity landscape: despite substantial investments in security infrastructure, confidence levels and actual capabilities remain worryingly misaligned.

Financial institutions face concrete regulatory pressure on Cybersecurity with the European Union’s Digital Operational Resilience Act (DORA) coming into force in February. This landmark regulation demands robust ICT risk management and comprehensive security monitoring. Currently, many organisations continue to rely on disparate tools and spreadsheets that may leave them vulnerable to sophisticated threats. These include AI-powered deep fakes and targeted spear phishing campaigns.

This challenge transcends the financial sector as organisations across all industries face mounting pressure to demonstrate both security effectiveness and regulatory compliance. Our research reveals a stark reality. Organisations typically maintain an average of 19 security solutions per team. However, a surprising 41% still cite insufficient technology as the primary obstacle to maintaining a robust security posture.

This misalignment points to a fundamental issue. Organisations must recognise effective cybersecurity isn’t achieved through quantity of tools, but through strategic selection of the right solutions. Furthermore, perhaps most concerning is the false sense of security prevalent among IT decision-makers. While 93% express confidence in their infrastructure visibility tools, an alarming 95% acknowledge difficulties in accessing specific digital assets over the past year. This creates dangerous blind spots leaving organisations exposed to both security breaches and compliance shortfalls.

Understanding the Cybersecurity challenge

Today’s enterprise infrastructure resembles a tapestry of critical assets, connections and endpoints. To put this complexity into perspective: IT teams now manage an average of 31 endpoints per person across their organisation. For a company of 1,000 employees, this translates to more than 30,000 devices requiring constant monitoring and protection. This challenge intensifies with the widespread adoption of cloud services, hybrid working arrangements and an ever-growing ecosystem of connected devices.

Scale amplifies these difficulties markedly. Our research reveals organisations with more than 1,250 employees demonstrate the lowest confidence in their existing tools (88%) and face the greatest challenges in accessing critical assets (97%). Moreover, these larger enterprises typically wrestle with an unwieldy combination of legacy systems, bespoke solutions and modern platforms. This results in notably lower visibility rates (79%) compared to their smaller counterparts.

Perhaps most revealing is the stark confidence gap between technical and compliance teams. While 94% of information security directors express confidence in their system visibility, merely 66% of compliance directors share this outlook. This disparity exposes a crucial misalignment between technical capabilities and compliance requirements. One that poses serious operational risks as regulatory frameworks increasingly demand continuous monitoring. Organisations clinging to manual compliance processes face an unstable burden. Teams are stretched thin handling routine tasks while regulations grow more complex. Embracing automated technologies to handle routine monitoring requirements will allow compliance teams to pivot from being reactive box-checkers to strategic risk managers.

Moving from reaction to prevention

The impulse to combat emerging threats by rapidly acquiring new security solutions has led many organisations to create sprawling, inefficient systems. These often compound the very problems they aim to solve.

This reactive approach has trapped organisations in a costly cycle of diminishing returns. Despite substantial technology investments, nearly 40% of firms report a troubling lack of actionable intelligence, while 37% struggle with budget limitations. This paradox is increasingly drawing board-level scrutiny. And rightfully so. After years of approving emergency technology purchases to plug cybersecurity gaps, boards are now questioning the value of new investments. Furthermore, tthis creates a dangerous stalemate: organisations need smarter, not just more, technology investment.

However, a more strategic approach is gaining traction through integrated system monitoring platforms. These comprehensive solutions unite previously disconnected tools under a single dashboard. This can offer real-time visibility across the entire cybersecurity landscape. This unified approach enables teams to identify and address vulnerabilities before they evolve into security incidents. A capability that resonates with the 82% of organisations who recognise enhanced visibility would substantially strengthen their cybersecurity posture.

It’s encouraging that 72% of IT teams have secured increased budgets over the past three years. However, the path forward requires more than mere financial investment. Organisations must shift from reactive spending to strategic deployment. Although this presents its own challenge: convincing board members that additional tooling represents an investment in comprehensive visibility rather than merely plugging security gaps.

The path forward

The transformation from fragmented security to comprehensive oversight demands more than technological upgrades. It requires a fundamental reimagining of how organisations approach cybersecurity monitoring and compliance.

The advantages of this strategic shift are compelling and quantifiable. Our analysis reveals security teams anticipate multiple efficiency gains: 38% expect automation to streamline document creation, 37% foresee improved board pack preparation, and 36% anticipate dedicating more time to strategic security assessments. Perhaps most significantly, 35% predict a reduction in human error alongside enhanced data accuracy. The efficiency gains are substantial. Teams could reclaim up to 60 hours annually per member on board reporting alone, time better invested in strategic security initiatives.

With regulatory frameworks growing increasingly sophisticated across sectors, including the forthcoming DORA regulation, maintaining current practices is no longer viable. The disparity between perceived and actual security capabilities poses a tangible risk that organisations must address proactively.

About Quod Orbis

Quod Orbis is the single source of truth across security, risk and compliance, providing an orchestration layer for the entire tech stack whether in the cloud, on-premise, legacy or bespoke. Founded in 2018, Quod Orbis became part of Dedagroup, one of the leading Italian IT players, in 2024.

A pioneer in Continuous Controls Monitoring (CCM), Quod Orbis provides complete and constant visibility into a company’s cybersecurity, compliance and risk posture. Quod Orbis’ ability to connect with every piece of technology within a business, unrivalled automation capabilities and continual support enables the company to serve a global client base across a wide variety of industries.

  • Cybersecurity in FinTech

Bryan Daugherty, Global Public Policy Director at the BSV Association (BSVA) and Co-Founder at SmartLedger Solutions, on how blockchain technology provides the accountability and cybersecurity needed to prevent widespread IT catastrophes across sectors

By Embracing Blockchain, We Can Create a Safer Digital Future

The rapid increase in cyberattacks poses a severe threat to businesses. These attacks are becoming more sophisticated and costly by the day. The average cost of a data breach in the UK is £3.58 million, and in the US now $9 million. It typically takes 200 days for organisations to detect a breach, followed by another 70 days to contain it. These delays expose significant vulnerabilities in traditional data management systems. They rely heavily on third parties, making them prime targets for cybercriminals.

Blockchain technology offers a transformative solution to these challenges by creating a secure, decentralised model that can effectively mitigate risks. It provides an opportunity for both individuals and organisations to take control of their data. Therefore, improving cybersecurity and ensuring operational resilience.

The Problem with Centralised Systems

Traditional cybersecurity systems are built on centralised models, where data is stored in one location or through third-party intermediaries. This structure makes them attractive targets for cybercriminals, creating a “honeypot” of information that can be breached. A concerning statistic is that, for over a decade, organisations have taken an average of 200 days to detect breaches. Despite claims from cybersecurity vendors that they provide “instant detection,” real-world results show significant gaps in protection, putting data at risk for extended periods.

Blockchain: Game-Changing Cybersecurity Features

Blockchain’s decentralised model provides a powerful alternative. By distributing data across a global network of nodes rather than a central location, blockchain makes it exponentially harder for cybercriminals to compromise large datasets. Even if one node is breached, the entire system remains intact. This eliminates the single point of failure that centralised systems suffer from.

Another key feature of blockchain is its immutability. Once data is recorded on a blockchain, it cannot be altered or erased, making tampering nearly impossible. Therefore, this ensures any unauthorised access is immediately detectable, enabling quicker response times and minimising damage.

Real-Time Threat Detection with CERTIHASH

Blockchain’s potential in cybersecurity is already being realised through solutions like CERTIHASH’s Sentinel Node. A blockchain-based tool that provides real-time threat detection. Built on the BSV blockchain, CERTIHASH can detect breaches within 10 seconds or less, offering a proactive approach to cybersecurity. This is a significant improvement over traditional systems, which often take months to identify breaches, leaving organisations vulnerable to prolonged data exposure.

By leveraging blockchain, cybersecurity shifts from being reactive to proactive. This gives organisations the tools they need to stay ahead of evolving threats and safeguard data more effectively.

Overcoming Misconceptions About Blockchain

Despite the clear advantages of blockchain, many organisations remain hesitant to adopt the technology, often due to misconceptions. Furthermore, some still associate blockchain with cryptocurrencies like Bitcoin, which have been linked to ransomware. This outdated view overlooks blockchain’s real potential as a secure, decentralised data management tool.

Blockchain is not just about crypto; it’s about creating a new standard for data integrity and security. Moreover, it offers decentralised, tamper-proof records that give users control over their own identity and data, reducing reliance on vulnerable third-party systems.

A Decentralised, Secure Future

As global reliance on centralised systems grows, so do the vulnerabilities they present. A single point of failure can lead to widespread outages, as seen in numerous cyberattacks and technical malfunctions. Blockchain, with its decentralised architecture, offers a robust alternative that enhances the security and resilience of critical systems. By distributing data across multiple nodes, blockchain ensures continuity even during attacks or outages.

Conclusion

Investing in blockchain cybersecurity is no longer optional. With cyber-attacks growing in scale and sophistication, organisations must adopt cutting-edge technologies to protect their data, operations, and customer trust. Blockchain’s decentralised and tamper-proof architecture offers the key to building a safer, more secure digital future. One where businesses and individuals alike can operate with confidence, free from the constant threat of cybercrime.

  • Blockchain & Crypto
  • Cybersecurity in FinTech

Misplaced confidence in visibility tools leaves organisations vulnerable amidst record high data breaches, according to latest research

A new report from Quod Orbis highlights that 95% of businesses are at risk of a cybersecurity blindspot. A reported 93% of UK organisations have confidence in their system visibility. However, nearly all (95%) of them have struggled to access critical assets in the last year, according to the research.

Over a third (38%) actually rank lack of visibility as one of their biggest challenges, further highlighting the gap between respondents’ perceptions and the reality of their situation. This comes at a time when data breaches this year have already surpassed one billion stolen records.

Quod Orbis Cybersecurity Research

Martin Greenfield, Quod Orbis CEO, comments: “Businesses are suffering from a blind spot that’s leaving them exposed. Misplaced confidence in existing cybersecurity tools means these same organisations are susceptible to data breaches and non-compliance fallout. This results in potentially crippling financial and reputational consequences.”

Quod Orbis commissioned a research study with international research house, Censuswide, to poll 500 board executives and IT decision makers, across enterprises of 500+ employees in the UK.

Cybersecurity Tech Stacks

Cybersecurity tech stacks are growing exponentially in the face of rising threats. The average team manages 19 security solutions at any one time. However, 41% still report a lack of technology as being their biggest challenge when it comes to maintaining a robust cybersecurity posture.

As 72% of IT teams have had their IT budget increased in the past three years, Greenfield urges businesses to break free from the typical cycle of throwing money at a problem and hoping something sticks. “It’s not about the biggest investment, it’s about the right investment.”

A quarter (26%) of IT decision makers are yet to allocate budget to basic security tools like asset visibility technology. This is despite 40% reporting a lack of actionable data.

It’s clear though that businesses recognise the advantage of implementing the right technology. More than eight in 10 (82%) agree that greater visibility over digital assets will greatly improve business security. This is a huge leap from the 93% of respondents who believe their businesses already provide them with the necessary tools.

According to the data, most upcoming IT investments will be allocated to Continuous Controls Monitoring (32%), privileged and identity access management (30%) and zero trust (29%).

The Future

Greenfield concludes: “Digital infrastructure has reached a level of complexity that not only warrants, but demands, complete visibility. Now is not the time to gamble with your company’s security. Furthermore, organisations need to stop adding layers of unnecessary technology as a way of solving the immediate problem. Instead, they must take a step back and think holistically about how to resolve their issues.

“Tools like CCM, powered by automation, help teams see and understand their security and risk posture in real time. This offers peace of mind that all of their data is relevant and up to date. This level of insight provides early awareness of potential problems and empowers teams to take a proactive approach to security, instead of being forced back into the same reactive position they’ve been in for years.”

About Quod Orbis

Quod Orbis is the single source of truth across security, risk and compliance, providing an orchestration layer for the entire tech stack whether in the cloud, on-premise, legacy or bespoke. Founded in 2018, Quod Orbis became part of Dedagroup, one of the leading Italian IT players, in 2024.

A pioneer in Continuous Controls Monitoring (CCM), Quod Orbis provides complete and constant visibility into a company’s cybersecurity, compliance and risk posture. Quod Orbis’ ability to connect with every piece of technology within a business, unrivalled automation capabilities and continual support enables the company to serve a global client base across a wide variety of industries.

  • Cybersecurity in FinTech

Innovative Systems, a leading provider of enterprise data, compliance, and integration solutions, has launched FinScan Marketplace

The platform will serve as a one-stop shop for anti-money laundering (AML) compliance. It offers a streamlined approach to managing compliance risk and unified case management via a central hub for all related activities. FinScan Marketplace positions itself as a trusted partner for organisations navigating today’s complex, global regulatory landscape.

Removing the complexity of AML compliance

“Our goal with FinScan Marketplace is to remove the complexity of AML compliance. We bring everything organisations need into one unified platform,” said Deborah Overdeput, Chief Marketing Officer at Innovative Systems. “This launch reflects our commitment to delivering solutions that simplify processes. We empower compliance teams to work smarter, and ensure organisations remain vigilant. And fully aligned with evolving regulatory requirements in a rapidly changing landscape.”

FinScan Marketplace revolutionises how organisations manage their AML portfolio. It provides a single, easy-to-navigate interface. Customers can seamlessly access a comprehensive suite of tools. These include sanctions screening, KYC checks, adverse media screening, payment screening, and risk scoring, with additional features continually in development.

FinScan Marketplace

At the heart of FinScan Marketplace is its unified case management system. This integrates all critical AML processes into a cohesive workflow. From performing due diligence checks to monitoring transactions and investigating potential risks, customers can manage everything within a single platform. This integration saves time, reduces errors, and ensures compliance efforts remain seamless and effective.

FinScan Marketplace provides customers with a clear vision of the platform’s evolution. Its intuitive interface lets users view in-progress product developments, register interest in upcoming features. Furthermore, they can participate in design feedback sessions. This approach ensures future enhancements align closely with real-world compliance needs.

“We are not just delivering tools; we are creating partnerships with our customers by building solutions that adapt to their challenges,” Overdeput added. “Transparency and collaboration are key pillars of the FinScan Marketplace.”

Innovative Systems for AML

FinScan Marketplace reflects Innovative Systems’ dedication to becoming a trusted partner for a host of organisations. These include financial institutions, insurance companies, fintechs, casinos and gaming entities, charities and non-profits, government agencies, and other organisations it serves. By continuously delivering value, anticipating industry needs, and prioritising customers’ feedback in its development process, the company demonstrates its commitment to supporting effective and reliable AML compliance.

Innovative Systems delivers enterprise data, compliance, and integration solutions through the company’s leading FinScan®, Enlighten®, and PostLocate® brands. These solutions offer actionable insights and enable organizations to identify the hidden opportunities or risks in their data. We have pioneered best-in-class data quality, data management, and risk and compliance solutions in thousands of applications across more than 65 countries. Our cloud-based (SaaS), on-premise, and hybrid offerings deliver dramatic, measurable improvements in accuracy, cost, and time to production over alternatives. Learn more at innovativesystems.com

About FinScan


Trusted by hundreds of organisations worldwide, Innovative Systems, Inc.’s FinScan offers advanced Anti-Money Laundering (AML) compliance technology and consulting solutions. Built on decades of experience in data management and proprietary matching technologies, FinScan provides a data-first, risk-based approach to ensure unparalleled accuracy and efficiency in identifying and reducing risk, accelerating AML compliance workflows, and optimising team productivity. FinScan’s comprehensive, integrated platform includes Know Your Customer (KYC), unparalleled sanctions screening, risk scoring, data quality, and advisory services for implementing a holistic compliance program. FinScan offers flexible deployment including SaaS, on-premise, and hybrid options. FinScan’s SaaS clients are screening more than 300 billion names a year. Learn more at finscan.com


  • Cybersecurity in FinTech

Alex Mosher, Chief Revenue Officer at Armis, on why businesses are prioritising their cybersecurity budgets, ensuring they have the resources needed to counteract emerging threats

Cybersecurity is no longer optional. In 2025, we expect a significant uptick in overall spending. With threats becoming more sophisticated, organisations recognise the imperative to invest adequately in cybersecurity measures. This trend is driven by the growing awareness that the cost of a cyber-attack far outweighs the investment required to prevent it.


Shift Toward Comprehensive Cybersecurity Solutions

In 2025, there will be a marked shift toward comprehensive security solutions that offer integrated functionalities. Companies will increasingly seek platforms that provide threat detection, incident response, and compliance management within a single solution. This trend arises from the need to simplify security management and reduce complexity. Siloed solutions are ineffective, expensive and reduce the efficiency of security teams with finite resources. Furthermore, by consolidating various security functions into a unified platform, businesses can streamline their processes and enhance their overall security posture. Integrated solutions offer a holistic approach to cybersecurity, addressing multiple aspects of an organisation’s security needs. The move toward comprehensive solutions also reflects a broader understanding of the interconnectedness of cybersecurity elements. A unified solution that addresses multiple areas provides a more robust defence against potential breaches.

Emphasis on Automation and AI

Automation and artificial intelligence (AI) are revolutionising the cybersecurity landscape. Organisations increasingly prioritise spending on AI-driven security solutions to enhance threat detection and response capabilities. The focus will be on tools that streamline incident response, reduce manual workloads, and enable security teams to focus on more strategic initiatives. Moreover, the trend will also include spending on analytics tools that help organisations understand and mitigate risks based on the current threat landscape. Threat intelligence and analytics play a pivotal role in enhancing an organisation’s security posture.

AI technologies offer a proactive approach to cybersecurity, allowing organisations to identify and mitigate threats in real-time. By leveraging machine learning algorithms and data analytics, businesses can gain deeper insights into potential vulnerabilities and respond swiftly to emerging threats. The emphasis on automation and AI is driven by the need to enhance efficiency and effectiveness in cybersecurity operations. By automating routine tasks and employing AI for advanced threat detection, businesses can optimise their resources and achieve a more robust security posture.

Investment in Cloud Cybersecurity Solutions

The migration to cloud environments continues to accelerate, driving the need for robust cloud security solutions. Key investment areas will include cloud security posture management (CSPM) and cloud workload protection platforms (CWPP). The emphasis on cloud security reflects the growing reliance on cloud services for business operations. Moreover, organisations recognise that securing their cloud environments is paramount to safeguarding digital assets and ensuring regulatory compliance. Investments in cloud security solutions also align with the broader trend toward digital transformation. Businesses are leveraging the cloud to drive innovation and agility. This neessitates a strong security framework to protect their evolving digital ecosystems.

Enhanced Budgeting for Compliance and Regulatory Needs

Data protection and privacy regulations are becoming increasingly stringent worldwide. Also, this necessitates enhanced budgeting for compliance-related cybersecurity solutions. I expect organisations to allocate more resources to auditing tools, risk management platforms, and solutions that help them meet regulatory requirements such as GDPR, CCPA, and HIPAA.

The emphasis on compliance reflects a growing awareness of the legal and reputational risks associated with non-compliance. Investing in compliance-related solutions also aligns with the broader trend toward data-driven decision-making. Moreover, by implementing tools that ensure alignment with regulatory requirements, organisations can demonstrate their commitment to ethical data practices and build trust among stakeholders.

Growth in Cybersecurity Insurance Expenditures

Cyber insurance is becoming an essential component of an organisation’s risk management strategy. The growth in cybersecurity insurance expenditures reflects a broader awareness of the financial implications of cybersecurity threats. Investing in cyber insurance aligns with the emphasis on accountability in cybersecurity spending. By securing coverage for potential losses, businesses can demonstrate their commitment to protecting their assets and ensuring business continuity in the face of unforeseen events.

By understanding the key cyber spending patterns outlined here, businesses can make informed decisions. They can enhance their security posture to protect their valuable assets and ensure business continuity as we move into 2025.

  • Cybersecurity in FinTech
  • InsurTech

Waheed Mahmood, Financial Services Lead at Rackspace Technology, on how cloud is elevating CX in the financial services industry

The importance of customer experience (CX) in financial services is growing. In July 2023, the Financial Conduct Authority (FCA) published its Consumer Duty guidelines, designed to set clearer standards of protection for consumers of financial services. The Consumer Duty was created to ensure that financial institutions (FIs) act fairly, while preventing customers from making poor financial decisions.

Despite the guidelines being implemented over a year ago, some FIs are still struggling to meet customers’ needs and are not working hard enough to protect them. In October 2024, for example, the FCA fined TSB Bank Plc £10,910,500 for failing to ensure that customers in arrears were treated fairly between 2014 and 2020.

According to Forrester, there has also been a significant decline in EU bank customer experience (CX) quality in 2024. This matters, because as CX quality declines, so does customer loyalty. Financial service executives must step up their game if they want to stay competitive and earn this loyalty. FIs that leverage technology can increase customer satisfaction, reduce the cost to serve and boost conversion rates and profitability. As we look ahead, here are some ways FIs can harness technology to drive customer satisfaction in 2025 and beyond.

Driving CX through the Cloud

The Consumer Duty’s objective was to guide individuals toward sound financial decisions. To achieve this, FI’s must leverage data and analytical insights. However, legacy systems often hinder effective data sharing and analysis, limiting the ability to provide personalised guidance.

Private cloud technology empowers banks to modernise their legacy systems. This can increase agility with the delivery of new services and products, enabling them to create and deliver enhanced CX. This includes offering seamless digital experiences, from smart self-service options and instant transaction tracking to tailored financial guidance and decision-making. Banks can also use cloud analytics to spot user pain points and service disruptions early, directly improving both customer satisfaction and profitability.

The integration of cloud services with existing banking systems also enhances data flow and interoperability. Real-time analytics platforms, such as Azure Stream Analytics help process and analyse vast amounts of data. This can reveal valuable insights into customer behaviour and preferences. Banks can then offer personalised advice and services, boosting customer satisfaction and interaction.

To maximise these benefits, FI’s need to ensure these customer insights are shared across departments. Eliminating departmental silos can drive improvements in product development, marketing strategies, and customer service protocols. Success requires integrating design expertise and data capabilities – involving teams from every business function to build a data framework and platform. This integration will help convert customer insights into actionable improvements.

Double down on service innovation for CX

Before leveraging cloud technology, FIs must evaluate their current technology stack to identify weak points before embarking on digital transformation initiatives. Legacy systems, which many FIs still depend on put them at a disadvantage as customer demands and expectations grow. This outdated infrastructure is particularly vulnerable, leaving sensitive customer data exposed to risk.

By updating their technology stack, FIs can improve customer interactions while streamlining critical systems for transaction handling and personalisation. These work together to deliver an experience that aligns closely with individual customer needs. 

FIs are also leveraging machine learning to gain insights into customer spending patterns, enabling them to offer personalised financial advice and recommendations. Additionally, GenAI is reshaping CX; AI-driven chatbots, for example, offer instance guidance and assistance, freeing up human staff to focus on more complex issues. However, to maximise the benefits of GenAI, FIs need robust infrastructure in place. GenAI models require high-quality, well-structured data for training and precise forecasting.

A cloud-based platform is particularly well-suited for FIs with specific demands around control, security and workload customisation. By adopting this approach, institutions can meet the high storage and encryption requirements of GenAI, thereby, enhancing both system performance and data security – key factors in scaling these technologies.

To respond to a continued decline in customer experience quality, financial service providers must make this a strategic priority. Delighting and engaging customers on a personal level has become vital and institutions that satisfy these expectations will be best equipped to attract new clients and build enduring loyalty.

  • Neobanking

Seth Ruden, Director of Global Advisory at BioCatch, on how the UK’s financial institutions can be better prepared to deal with authorised push payment (APP) scams

The focus on authorised push payment (APP) fraud scams – where scammers impersonate reputable individuals or institutions – has increasingly shifted to whether banks should reimburse customers for funds stolen by scammers. We can gain valuable insights from the approaches taken by financial institutions in the UK. They are leading the way with their cybersecurity efforts compared to their counterparts in other regions.

First, British banks established a standardised reporting system and typology. This is a fundamental first step that every financial institution should take to grasp the full scope of how financial fraud affects banking consumers. Banks may disclose the type of fraud, the amount of money stolen, and the bank measures used to prevent the scam from occurring. This centralised view brings the true scope of the totality of scams into focus.

Three ways the UK’s financial institutions are leading in the fight against fraud

Second, the UK has developed strategies to identify specific scams and reduce their losses. The regulator added a slew of new controls to banks, including confirmation of payee, scam and transaction-specific interventions, and money mule account controls for those receiving the illicit funds. Before regulation, not every financial institution had implemented these controls, providing an uneven playing field and allowing scams to flourish. Banks outside the UK should not wait for regulators to mandate controls like these. They should do it on their own accord to prove they realise the magnitude of the scam problem and the severity of its impact on bank customers.

Improved consumer financial scam controls should be a minimum requirement for financial institutions in 2024. These controls should cover: authorised push payment behavioural analysis, money mule behaviour around both account opening and account activity, and analysis of both inbound and outbound transactions. Furthermore, detecting and then closing money mule accounts – used by fraudsters as an intermediate stop between the victim’s account and the final destination for the stolen funds – is absolutely critical, as they serve as the backbone for every consumer-based financial scam.

The third? Getting involved. Banks need to integrate themselves and participate with industry and trade associations – such as the FS-ISACs and GASA (Global Anti Scam Alliance). These associations provide opportunities to network with peer institutions and others in the fraud value chain to share scam information and learn from each other.

Effective Fraud Prevention: A practical assessment of Key Strategies

Many banks today use precision anomaly detection and behavioural biometrics to notify them when a fraudulent transaction takes place. Financial institutions in the UK often issue actionable alerts to clients in real-time. Santander UK, for example, now asks customers if they have seen the item in person before approving a payment through Facebook Marketplace. For online account opening, there are good solutions for bot-detection to prevent automated bots from opening new accounts, behavioural biometrics to detect suspicious patterns of data entry, and solutions that can analyse the customer KYC data. A secondary benefit of strong account opening controls is the reduction of operational costs to close bogus accounts.

For detecting existing money mule accounts, traditionally it required tracking the circulation of funds, both the inbound and outbound transaction activity and looking for anomalies (e.g. high value in and then immediately transferred out). Now, user behaviour anomalies – such as changes in the user’s input/output device activity or navigation preferences – may indicate a change in account control before the suspicious transactions take place.

Protecting Customers: What the future holds for Financial institutions

Since the UK’s introduction to faster payments, the region has become a centre of research for the rest of the world. However, eliminating threats to UK customers and their money has remained difficult despite an increase in regulation. While Governments and international groups are starting to identify and take down some of these organisations there are still hundreds of thousands of scammers and coerced individuals involved in these intricate schemes. A key challenge for financial institutions is understanding how scammers get their customers to initiate authorised payment. However, these challenges can be combatted by understanding the psychology behind how scammers work which can be a prominent factor in tackling the problem. Financial institutions must ensure that, in a few years’ time, they can confidently answer ‘yes’ to the question: Did we do enough to help eliminate consumer financial scams?

  • Cybersecurity in FinTech

‘Digitalisation is just the beginning’ according to Crowdfox, a business which aims to improve procurement by bettering the ordering process…

‘Digitalisation is just the beginning’ according to Crowdfox, a business which aims to improve procurement by bettering the ordering process while lowering costs. That tagline speaks to Crowdfox’s dedication to advancing procurement using the exciting tools the sector now has at its disposal, and this push to innovate is being driven, in part, by Martin Rademacher, Crowdfox’s CSO. We sat down with Rademacher at DPW Amsterdam 2024, the exciting vibe of the event spreading far and wide around us. 

Rademacher is responsible for everything to do with Crowdfox’s customers. From sales, to marketing, to customer onboarding and success, and everything in between – that’s Rademacher’s wheelhouse. His background is in management consulting, with a focus on procurement and supply chain. So, while he started out in sales, he soon decided that procurement was the direction to move in.

“During my time as a consultant, I found procurement very interesting because it’s so versatile,” explains Rademacher. “Of course, it’s about the transactional phase with suppliers – but also you’re so connected with R&D, production, logistics, and so on. You have so many fields of application.”

10X thinking

At DPW Amsterdam, the overall theme of the two-day event was 10X. The concept of the 10X rule is around taking a goal you’ve set for yourself and multiplying it by 10. It’s an aspirational tool, coaxing all of us to aim higher. In procurement, that means innovating.

“In the last two years we’ve seen tools like ChatGPT trigger some big adaptations in the procurement world,” says Rademacher. “I think there is the opportunity now to achieve 10X in terms of efficiency gains. Especially when it comes to making better decisions, more quickly, in order to analyse data. We’re now finding out what AI can really do, and focusing on how that can help with strategy.”

For Rademacher, he believes people have the right tools to achieve 10X – it’s now about implementing those tools properly, and having the right culture.

“In the last couple of years, implementing tools has become much easier than it was a decade ago,” Rademacher continues. “They’re so well designed that they fit into large procurement systems, and can connect with other best-of-breed tools. I’d say implementation should be the focus, but it’s not that complicated anymore. AI tools especially are really intuitive. As a result, you don’t need much in the way of change management. People just intuitively cooperate with AI.”

The question of security

The big challenge, Rademacher believes, is data protection. When it comes to barriers preventing a 10X approach, concerns around data privacy are among the biggest issues. As a result, organisations have to take the necessary precautions before plunging into making major technological changes, or risk falling at the first hurdle.

“In the EU, it’s all about data protection,” says Rademacher. These concerns led to the Artificial Intelligence Act (AI Act) coming into force in the EU in August 2024. It was created in response to the rise in generative AI systems, and ensures that there’s a common regulatory framework for AI within the European Union. “Companies are very concerned about their data, but I wouldn’t call this an obstacle – more like a challenge.

“The key is making sure you have a protected environment. Start with a pilot in a limited space, for instance, and then make sure you can find a solution you can control in a safe environment that suits your operations.”

Shooting for the stars

With these measures in mind, it’s never been easier to implement new technologies and aim for that ambitious 10X goal. Certainly, advanced tools have never been more accessible, or more straightforward for businesses to educate themselves about. Even as recently as two years ago, integrating multiple elements of advanced tech – like genAI – wasn’t really possible.

“It definitely wasn’t easy to combine sources the way we can now,” says Rademacher. “Now, you can provide a much better user experience experience not only for procurement professionals, but for anyone who takes advantage of what procurement introduces to the company. Finding the supply to fulfil your demand is so much easier now. You no longer have to have difficult conversations starting with an email to your procurement professional to identify whether you’re allowed to purchase from a certain vendor, and whether they’re vetted or not. Streamlining processes like that makes that information quick and easy to identify.”

Additionally, we’re at a point with advanced technology where the tools we have access to are capable of handling more and more volumes of data at an extremely fast pace. “In consulting, for example, every project started with an analysis of the status quo of a firm,” says Rademacher. “We’d figure out who the vendors are, the categories, and the spend. Depending on the workforce, this could take one or two weeks. Now, with the tools we have access to, you can gather this information in 24 hours.”

The evolution continues

While we’re seeing many of the benefits that come with genAI and other advanced technologies already, it’s only the beginning of what we can achieve using these tools. GenAI is at a peak right now, but according to Rademacher, it might take another five years to achieve its full productivity level. “There’s also this ambitious idea going around of fully autonomous procurement, and it’ll likely take a good 10 years to reach that level of productivity,” he adds. “On the other hand, nobody is talking about robotic process automation anymore because we’re almost there with that already.”

Another challenge is data quality. The cleanliness of an organisation’s data can make or break its use of advanced technology, which is where making the right connections with service providers comes in. “It’s a good example of when to find the right partner,” says Rademacher. “Find someone from the innovative tech space who you think you can rely on. Don’t try to do it all on your own – that’ll just hold you back more and more. Be bold; find the right partner to make the most of your data and that helps you constantly improve. There’s a lot of talent out there, a lot of solutions that are really helpful for organisations of all sizes. You’ll improve step by step.”

There’s no doubt that it’s an exciting time for procurement. The atmosphere at DPW Amsterdam 2024 was electric for that exact reason. The event, in Rademacher’s words, has “a really strong influence on the sector and enables attendees to learn about how the landscape is developing in real time”.

“The AI-driven future is already a reality for us,” he states. “We’re beyond the pilot phase with our AI tool, ChatCFX, and now we really want to drive market share. 2024 going into 2025 sees us in a good position with high user visibility, and now we’re adding ChatCFX to the game, pushing it into the European market. We’re at DPW Amsterdam to meet the players who are looking for a solution exactly like ours, making it an invaluable place to be.”

Certain procurement pain points can prove debilitating for a business, freezing it in its tracks when it’s trying to grow…

Certain procurement pain points can prove debilitating for a business, freezing it in its tracks when it’s trying to grow and improve. This is where companies like Candex are able to step in and turn a headache into something so simple, it requires no further thought. 

Danielle McQuiston is the Chief Customer Officer at Candex. She’s been with the fintech startup for five years, spending two decades prior to that working in procurement at Sanofi. Candex is a technology-based master vendor that allows customers to engage with and pay one-off or small suppliers without setting them up in their system. This means that the system doesn’t get clogged up with suppliers that are rarely or never going to be used again. 

“We’re primarily used for what companies consider tail spend, and we typically deliver it as a punchout catalogue for a really simple user experience,” McQuiston explains. That ability to support lots of customers was what drew her to the role. “Coming to Candex, I was very excited about what they were doing and wanted to help as many companies as possible.”

Addressing tail spend

That ability to address tail spend in a unique way is the main thing that differentiates Candex. It’s an enormous problem for procurement professionals. The way Candex delivers it is through a digital plug-and-play solution, removing the need to be dependent on human intervention. “It’s a horizontal solution for any good or service, and it’s available in over 45 countries now,” says McQuiston. “It becomes part of the customer’s ecosystems and leverages the P2P process. It’s super compliant, and allows a lot of control.”

With this tool in place, Candex’s customers are able to gain much better control over their smaller purchases, defining what is allowed to be purchased. For many, this tool allows them to put tighter restrictions on purchases than their e-procurement systems are able to do. Additionally, Candex runs suppliers through screenings every day, which generally doesn’t happen for small, rarely-used suppliers.

“We run really detailed compliance and sanction screening against all those vendors, taking away a really daunting task from customers,” McQuiston states. “Customers probably check those suppliers once when they’re being set up, but then they never look at them again. Every day, we’re checking them, and keeping an eye on them when our customers can’t.”

Candex’s reporting is extremely detailed, and provides customers with the kind of real-time visibility they wouldn’t normally get – even in their own systems. Reports are generated weekly or monthly, including the diversity status of suppliers. This is data that a lot of clients then feed directly into their Power BI tools and data lakes, meaning they’re able to integrate it seamlessly into their other data.

Cleaning up the data

The whole purpose and aim of Candex’s tool is to make life easier for its customers, streamline its processes, and improve efficiencies. To that end, standardisation is key when it comes to business improvements, and that includes preparing data prior to implementing new technologies and processes. When it comes to ensuring a business’s data is healthy –  before launching into major tech changes – accepting the necessity of making foundational change is key. 

“Data cleansing processes are ugly, cumbersome, and long – and everyone has to do them,” McQuiston comments. “But you have to accept that you’re going to have to do something, if you want to get a handle on your spend. First and foremost, you need to standardise the way you name things, the way you put data in the system, and you need a really strict discipline around that. All of those things will make backend processes a lot easier.”

It’s just one of many considerations CPOs need to bear in mind when seeking out technology solutions and implementation. Modern procurement departments have a seat at the wider business table now, and what they do impacts the entire business. So when it comes to utilising solutions for the sake of the business at large, there are many factors to think about.

“As with any data or technology, it’s all about garbage in and garbage out,” says McQuiston. “Any advanced technology should be used with caution and viewed with a critical eye. You have to start with knowing what you want out of it. 

“A lot of times, people put technology in place because it looks interesting, but you need to start with the problem and work backwards. If the issue is user experience, you need to make sure that whatever you’re implementing focuses on a positive UX. If the problem is unclean data, you need to make sure you’re putting in place all the foundational elements you need to make that better. Always start from the perspective of implementing a technology based on a problem, rather than the other way around.”

Improving UX in 2025

It’s a seriously dynamic time to be involved in procurement right now, as evidenced by the intense buzz around us at DPW Amsterdam as we sit with McQuiston. As we look ahead, she envisions that procurement will have an increasingly powerful impact on user experience. This is particularly important at a time when tasks are becoming increasingly automated, with less and less direct human interaction.

“We’re also seeing a pretty big leap forward in terms of best practice sharing amongst our clients,” says McQuiston, something that events like DPW also encourage. “For Candex, a big theme of 2024 has been getting our clients together to share best practices and information, helping them to develop further expertise in the field. 2025 will have more of the same, but there’s now a higher level of maturity out there in the way customers are considering tail spend. As people continue to onboard solutions, it will be interesting to see how that impacts the UX in relation to Candex. We’re always looking for ways to make our tool more user-friendly and add better functionality.”

All of this is why Candex’s customers love the company. On a base level, Candex takes a complex pain point and makes it simple. In a broader sense, the reason Candex is becoming so popular is the way it works with people. “The most common feedback we get from customers and suppliers is that we’re great to work with because we’re so flexible,” says McQuiston. “We hired a team of procurement experts, so our team is made up of people who really understand the pain of our clients, and can anticipate their fears, their needs, and cater to those.”

Other key findings include surge of info-stealers and botnets, an increase in evasive malware and a rise in network attacks across the Asia Pacific

WatchGuard® Technologies, a global leader in unified Cybersecurity, today released the findings of its latest Internet Security Report. The quarterly analysis details the top malware, network, and endpoint security threats observed during the second quarter of 2024. 

Among the report’s key findings was that 7 of the Top 10 malware threats by volume were new this quarter. Furthermore, this indicates threat actors are pivoting toward new techniques. The new top threats included Lumma Stealer. This advanced malware is designed to steal sensitive data from compromised systems. Also, a Mirai Botnet variant, which infects smart devices and enables threat actors to turn them into remotely controlled bots. And a LokiBot malware, which targets Windows and Android devices and aims to steal credential information. 

Cybersecurity fears for Blockchain

WatchGuard’s Cybersecurity Threat Lab also observed new instances of threat actors employing “EtherHiding”. A method of embedding malicious PowerShell scripts in blockchains such as Binance Smart Contracts. In these instances, a fake error message linking to the malicious script appears on compromised websites, prompting victims to “update your browser”. Malicious code in blockchains poses a long-term threat. As blockchains are not meant to be changed, theoretically, a blockchain could become an immutable host of malicious content. 

“The latest findings in the Q2 2024 Internet Security Report reflect how threat actors tend to fall into patterns of behaviour. Certain attack techniques become trendy and dominant in waves,” said Corey Nachreiner, CSO, WatchGuard Technologies. “Moreover, the report illustrates the importance of routinely updating and patching software and systems to address security gaps and ensure threat actors cannot exploit older vulnerabilities. Adopting a defence-in-depth approach, which can be executed effectively by a dedicated managed service provider, is a vital step toward combating these cybersecurity challenges successfully.”

Additional key findings from WatchGuard’s Report include: 

  • Malware detections were down 24% overall. This drop was caused by a 35% decrease in signature-based detections. However, threat actors were simply shifting focus to more evasive malware. Moreover, in Q2 2024, the Threat Lab’s advanced behavioural engine that identifies ransomware, zero-day threats, and evolving malware threats, found a 168% increase in evasive malware detections quarter-over-quarter. 
     
  • Network attacks increased 33% from Q1 2024. Across regions, the Asia Pacific accounted for 56% of all network attack detections, more than doubling since the previous quarter.
     
  • An NGINX vulnerability, originally detected in 2019, was the top network attack by volume in Q2 2024. It had not appeared in the Threat Lab’s Top 50 network attacks in previous quarters. The vulnerability accounted for 29% of total network attack detection volume, or approximately 724,000 detections across the US, EMEA, and APAC. 
     
  • The Fuzzbunch hacking toolkit emerged as the second-highest endpoint malware threat detected by volume. The toolkit serves as an open-source framework that can be used to attack Windows operating systems. It was stolen during The Shadow Brokers’ attack of the Equation Group, an NSA contractor, in 2016. 
     
  • Seventy-four percent of all browser-initiated endpoint malware attacks targeted Chromium-based browsers, which include Google Chrome, Microsoft Edge, and Brave.
     
  • A signature that detects malicious web content, trojan.html.hidden.1.gen, came in as the fourth most-widespread malware variant. The most common threat category caught by this signature involved phishing campaigns. These gather credentials from a user’s browser and deliver this information to an attacker-controlled server. Curiously, the Threat Lab observed a sample of this signature targeting students and faculty at Valdosta State University in Georgia. 
  • Blockchain & Crypto
  • Cybersecurity in FinTech

UnaFinancial study identifies cybersecurity as most influential factor driving FinTech growth

A recent study from UnaFinancial has identified cybersecurity as the most influential factor driving the development of FinTech worldwide, with a 63% significance. The second most impactful factor is the average hourly wage rate, with a 13% significance.

The study showed that FinTech growth in Europe, America, and globally has the strongest correlation with the size of the cybersecurity market, with correlation coefficients of 0.8714, 0.9762, and 0.8607, respectively.

In Asia, however, FinTech growth was more closely tied to the size of the consumer electronics market (0.9403). Meanwhile in Africa, it correlated with consumer spending volumes (0.7427). Therefore, globally, cybersecurity emerges as the most significant driver of FinTech growth. More vital protection facilitates a more robust FinTech environment.

Economic Disparities with Cybersecurity: High Income vs Low Income Economies

Economic status also plays a crucial role in shaping FinTech dynamics. High-income countries display pronounced correlations with various factors. Notably, the size of the cybersecurity market (0.6923), consumer electronics market (0.5839), average wage rates (0.6237), and consumer spending volumes (0.6971) are all significantly linked to FinTech growth.

Conversely, low-income economies exhibit no substantial correlations with these factors, highlighting a disparity in FinTech development influenced by financial resources and technological infrastructure.

Middle-income countries show a more nuanced relationship, with FinTech volumes correlating with nominal GDP (0.5373), the cybersecurity market (0.5727), consumer electronics (0.5637), fintech hubs (0.5409), and consumer spending volumes (0.6136). This suggests that while multiple factors impact middle-income countries, cybersecurity remains a vital component.

Quantifiable Cybersecurity Impact on FinTech

Furthermore, another interesting finding was the measurable impact of various factors on FinTech transactions. For example, for every $1 million increase in the global cybersecurity market, FinTech transactions per adult are expected to rise by $31.6. Similarly, a $1 increase in the average hourly wage could boost FinTech transactions by $67.5. The establishment of just one more FinTech hub could increase global FinTech transactions per capita by $839.

Remarkably, as a country’s income grows, the correlation between FinTech growth and two factors—cybersecurity market size and average wage rates—becomes stronger. This means these factors may indeed influence the development of FinTech across a country.

A deeper non-linear analysis further validated the significance of these factors. It revealed that the cybersecurity market is the most influential driver of FinTech growth, with 63% of significance, followed by the average wage rate (13%). As we advance into an increasingly digital future, the investment in and enhancement of cybersecurity will remain a cornerstone of FinTech innovation and expansion.

UnaFinancial Study

The UnaFinancial study considered data from 2022 for 146 countries, which were grouped into four regions: Asia, Europe, Africa and America. The potential factors under consideration included gender ratio, nominal GDP per capita, Internet penetration, cybersecurity market volumes per capita, consumer electronics market volumes, number of FinTech hubs per 100,000 people, average hourly wages, consumer spending per capita, direct investment as a share of GDP, unemployment rates, trade volume relative to GDP, and share of urban population.

The study not only illuminates the integral role of cybersecurity but also provides a roadmap for understanding how various factors interplay to influence the global FinTech landscape. In this digital age, safeguarding financial transactions and technologies is as critical as ever. Moreover, ensuring that FinTech continues to flourish amidst evolving challenges and opportunities.

  • Cybersecurity in FinTech

Digital banking offers increased convenience and accessibility. However, this growth also exposes banks to heightened cybersecurity risks. Protecting data and…

Digital banking offers increased convenience and accessibility. However, this growth also exposes banks to heightened cybersecurity risks. Protecting data and information is crucial to maintaining customer trust and preventing financial loss.

Cybercrime poses a significant threat to the digital banking industry. According to Cybercrime Magazine, cybercrime costs will increase by 15% over the next five years and reach $10.5 trillion by 2025. These attacks target sensitive information and funds, causing substantial damage to banks.

To mitigate these risks, banks must implement robust cybersecurity measures to safeguard digital systems and data.

1. Strong Authentication

The Payment Services Directive (PSD2) mandates strong customer authentication (SCA) to reduce fraud and enhance online payment security. This directive imposes specific requirements on market participants to meet new obligations. The European Banking Authority (EBA) developed regulatory technical standards (RTS) based on the Commission’s authority under PSD2. 

The RTS aims to protect consumers and create a level playing field within the evolving financial technology market. To achieve this, the RTS establishes security measures for payment service providers — including banks and other financial institutions — when processing payments or offering payment-related services. 

2. Encryption

Unencrypted data is a common cyber threat. Hackers can easily access this data type and give severe consequences for banks. According to Statista, the average cost of a data breach worldwide is $4.45 million dollars. However, data breaches not only cause substantial financial loss for recovery and ransom payments but also damage a bank’s reputation.

To prevent these issues, all digital banking data must be encrypted. This safeguards information and makes it difficult for cybercriminals to access even if stolen. Encryption transforms data into a coded format that requires a specific key to decipher. Only individuals with the correct key can view the original data. 

Encryption involves using an algorithm and a key to convert plain data into encrypted data. The original data can only be recovered by decrypting the ciphertext with the correct key.

3. Regular Cybersecurity Audit

A security audit is a thorough examination of an organisation’s IT infrastructure. This process verifies the effectiveness of security policies and procedures. Security audits assess how well an institution’s cybersecurity program operates. This includes reviewing policies, testing controls, and checking compliance with industry standards and regulations.

Banks and financial institutions face increasingly complex cyber threats. Regular security audits help identify vulnerabilities in systems. By discovering weaknesses, banks can strengthen defences with firewalls, antivirus, and antimalware software. A cybersecurity audit should be conducted by an independent expert to ensure objectivity.

4. Employee Training

The World Economic Forum reports that 95% of cyberattacks involve human error. This means hackers often exploit employee mistakes. They use tactics like phishing to deceive employees into revealing sensitive information. This can lead to data breaches and financial loss. For example, employees might click on malicious links, disclose confidential data, or leave devices unattended.

Therefore, bank employees must have training to recognize that cyberattacks are a constant threat. Moreover, the consequences of a breach can be severe for employees, customers, and the bank’s reputation. Cybercriminals operate in a lucrative industry, for that reason, it is imperative to equip employees with the knowledge to safeguard against these threats.

5. Incident Response Planning

An incident response plan is a formal document approved by bank leadership to guide the organisation before, during, and after a potential or confirmed security incident. The plan aims to reduce the impact of security events, limiting operational, financial, and reputational damage.

A successful incident response plan should be established before a security attack occurs and assigned to specific team members. IBM research shows companies with well-developed and tested response plans save an average of $2.66 million compared to those without such protocols. 

To create an effective incident response plan, banks can reference established frameworks. For specific incident handling steps, The National Institute of Standards and Technology’s SP-800-61 and SANS’s Incident Handlers Handbook provide detailed blueprints. Aligning the incident response plan with these resources ensures a focused and effective approach to managing cybersecurity incidents.

Importance of Cybersecurity Measures 

The increasing reliance on digital platforms exposes individuals and organisations to growing cybersecurity risks. Malicious actors exploit security weaknesses to steal personal information and compromise digital assets. Forbes reported a staggering increase in cyberattacks in 2023, impacting over 343 million people, with data breaches soaring by 72 percent from 2021 to 2023. These striking figures highlight the urgent need for state-of-the-art cybersecurity in digital banking.

  • Cybersecurity in FinTech

WatchGuard’s Threat Lab cybersecurity research team forecast headline-stealing hacks involving LLMs, AI-based voice chatbots and VR/MR headsets. They also assess…

WatchGuard’s Threat Lab cybersecurity research team forecast headline-stealing hacks involving LLMs, AI-based voice chatbots and VR/MR headsets. They also assess the impact of the war on talent, AI spear phishing and QR codes.

Watchguard leading on Cybersecurity

WatchGuard Technologies, a global leader in unified cybersecurity, offers an annual batch of predictions covering the most prominent attacks and information security trends that the WatchGuard Threat Lab research team believes will emerge each year. This year, these include malicious prompt engineering tricks targeting large language models (LLMs), managed service providers (MSPs) doubling down on unified security platforms with heavy automation, ‘Vishers’ scaling their malicious operations with AI-based voice chatbots, hacks on modern VR/MR headsets, and more…

“Every new technology trend opens up new attack vectors for cybercriminals,” said Corey Nachreiner, chief security officer at WatchGuard Technologies. “In 2024, the emerging threats targeting companies and individuals will be even more intense, complicated, and difficult to manage. Therefore, with an ongoing cybersecurity skills shortage, the need for MSPs, unified security, and automated platforms to bolster cybersecurity and protect organisations from the ever-evolving threat landscape have never been greater.”

Cybersecurity predictions

The following is a summary of the WatchGuard Threat Lab team’s top cybersecurity predictions for 2024:

Prompt Engineering Tricks Large Language Models (LLMs)

Companies and individuals are experimenting with LLMs to increase operational efficiency. However, threat actors are learning how to exploit LLMs for their own malicious purposes as well. During 2024, the WatchGuard Threat Lab predicts that a smart prompt engineer ‒ whether a criminal attacker or researcher ‒ will crack the code and manipulate an LLM into leaking private data.

MSPs Double Down on Security Services Via Automated Platforms

There are approximately 3.4 million open cybersecurity jobs, and fierce competition for available talent. More SMEs will turn to trusted managed service and security service providers, known as MSPs and MSSPs, to protect them in 2024. To accommodate growing demand and scarce staffing resources, MSPs and MSSPs will double down on unified cybersecurity platforms with heavy automation using artificial AI and Machine Learning.

AI Spear Phishing Tool Sales Boom on the Dark Web

Cybercriminals can already buy tools on the underground that send spam email, automatically craft convincing texts, and scrape the Internet and social media for a particular target’s information and connections. However, a lot of these tools are still manual and require attackers to target one user or group at a time. Well-formatted procedural tasks like these are perfect for automation via AI and machine learning. This makes it likely that AI-powered tools to combat cybersecurity will emerge as best sellers on the dark web in 2024.

AI-Based Vishing Takes Off in 2024

Voice over Internet Protocol (VoIP) and automation technology make it easy to mass dial thousands of numbers. Once a potential victim has been baited onto a call, it still takes a human scammer to reel them in. This system limits the scale of vishing operations. But in 2024 this could change. The combination of convincing deepfake audio and LLMs capable of carrying on conversations with unsuspecting victims will greatly increase the scale and volume of vishing calls. What’s more, they may not even require a human threat actor’s participation.


VR/MR Headsets Allow the Recreation of User Environments

Virtual and mixed reality (VR/MR) headsets are finally beginning to gain mass appeal. However, wherever new and useful technologies emerge, criminal and malicious hackers follow. In 2024, cybersecurity researchers forecast that either a researcher or malicious hacker will find a technique to gather some of the sensor data from VR/MR headsets to recreate the environment users are playing in.


Rampant QR Code Usage Results in a Headline Hack

Quick response (QR) codes provide a convenient way to follow a link with a device such as a mobile phone. They have been around for decades, but mainstream usage has exploded in recent years. Furthermore, Threat Lab cybersecurity analysts expect to see a major, headline-stealing hack in 2024 caused by an employee following a QR code to a malicious destination.

  • Cybersecurity in FinTech

As digital payments continue their rapid ascent, understanding the accompanying cybersecurity challenges has never been more critical. Furthernore, with Statista…

As digital payments continue their rapid ascent, understanding the accompanying cybersecurity challenges has never been more critical. Furthernore, with Statista forecasting a robust 9.52 percent annual growth rate for digital payments from 2024 to 2028, the urgency to address these security concerns intensifies.

While this growth brings unparalleled convenience, it also introduces new security vulnerabilities that must be addressed. Cybersecurity is fundamental in safeguarding confidential data against hacking, fraud, and data breaches. Implementing effective cybersecurity measures can also maintain trust between businesses and clients while preventing financial loss. To optimise cybersecurity, identifying the current threats to digital payment systems is a must for businesses and consumers.

Current Cybersecurity Threats

Digital banks face various threats that continually evolve as technology advances. By addressing these challenges head-on, banks can protect their users and continue the growth of digital payment.

Many types of cyber threats can disrupt digital payment systems:

Phishing attacks: These attacks use deceptive emails, phone calls, or texts to trick victims into revealing personal information, such as login credentials and financial details. The scam can lead to other types of cyber threats.

Malware: Malicious software that infiltrates systems to steal data, monitor activities, or lock accounts. Various forms of malwares have different functions, such as Trojans, Worms, and Spyware.

Man-in-the-Middle (MitM) Attacks: intercept communications between the user and the bank allowing attackers to steal sensitive information or funds.

Data breaches: Unauthorised access to digital bank databases exposes vast amounts of sensitive information, including personal and financial data.

Ransomware: It is an attack that employs malware to infiltrate computer systems to steal data, monitor activities, or lock accounts. The attackers then demand payment and keep disrupting the devices/websites until they are paid.

Credential stuffing: Attackers use stolen usernames and password combinations from other breaches to gain unauthorised access to accounts.

DDoS and DoS attacks: Distributed Denial-of-Service (DDoS) attacks overwhelm the bank’s servers, making online services unavailable to customers. Unlike the Denial-of-Service (DoS) attack where a single source is used to flood the target, DDoS use multiple sources of compromised devices (botnets).

Insider threats: Employees or contractors with access to sensitive information may intentionally or unintentionally cause data breaches or other security incidents.

Social engineering: Manipulating individuals into divulging confidential information through psychological manipulation.

Zero-Day Exploits: Attacks that exploit previously unknown vulnerabilities in software or hardware before patches are available.

Cybersecurity Measures

Encrypting data is essential to convert the personal information into a secure format. This encrypted data can only be accessed with the correct key or description. This ensures that the data remains secure and unreadable after interception.

Multi-Factor Authentication (MFA) adds a layer of security by requiring some form of verification before granting access to the platform. Tokenisation replaces critical payment data with a unique or random token that cannot be hacked once intercepted.

Biometric verification, such as fingerprint and facial recognition, provides additional security by utilising unique physical characteristics. These include the shape of the face and the outline of a fingerprint, both of which are difficult to replicate.

Financial institutions have also innovated to improve cybersecurity by implementing artificial intelligence (AI). For example, JPMorgan Chase has implemented an AI-driven fraud detection system. This application is used for monitoring transaction activity in real-time. It can also detect potential threats or fraudulent transactions using the data analytics tool.

Regulatory Requirements

Financial companies are obligated to meet regulatory compliance. It is important to build customers’ trust and avoid legal or financial penalties. For global financial institutions, regulatory issues might be more complex as each country has its version of rules. As cyber threats evolve, regulators continuously update and enforce these requirements to address new challenges in digital payment systems.

For instance, UK regulations have set strict rules to ensure the security of digital payments. These include data protection measures, and companies that do not prioritise cybersecurity will face substantial fines. Similar regulations have been implemented across European Union (EU) Member States, compelling financial institutions to enhance cybersecurity to create a safe digital payments environment for consumers.

  • Cybersecurity in FinTech
  • Digital Payments

With the growing popularity of digital payments, cybercriminals have found a lucrative target. Cybersecurity data breaches rose sharply by 72%…

With the growing popularity of digital payments, cybercriminals have found a lucrative target. Cybersecurity data breaches rose sharply by 72% in 2023 compared to the previous record-breaking year. This shows the need for financial technology companies to implement strong banking security.

While digital payments offer benefits, businesses must protect themselves and their customers from cyber threats. Understanding the common cyber threats and implementing effective countermeasures are key to long-term success.

The Importance of Cybersecurity for Digital Transactions

With the increasing reliance on online platforms for financial activities, the risk of cyberattacks has grown exponentially. These attacks can lead to significant financial losses, damage to reputation, and erosion of customer trust. From identity theft to data breaches, the consequences of compromised security can be severe.

To prevent such consequences, cybersecurity measures are required for every financial institution. By applying cybersecurity best practices such as encryption, strong authentication, and regular security audits, organisations can protect customer data, prevent fraud, and maintain operational resilience.

Threat Landscape

Cybercriminals employ various tactics to exploit vulnerabilities in digital systems. Phishing attacks, a common method, deceive users into divulging sensitive information through fraudulent emails or websites. Another prevalent threat is ransomware, where cybercriminals encrypt a victim’s data and demand payment for decryption.

Additionally, unauthorised access to accounts through stolen credentials can lead to financial loss. These cyber threats highlight the need for a security framework to protect digital transactions against malicious activities.

Best Practice 1: Encryption

Cybercriminals can easily exploit vulnerable systems, leading to substantial financial losses and reputational damage. A data breach can cost millions of dollars to rectify, including expenses for recovery and ransom payments. A recent IBM report indicates that the average global cost of a data breach exceeds $4.45 million. 

Encryption safeguards sensitive information by transforming it into an unreadable format, accessible only to authorised parties possessing the correct decryption key. This cryptographic process employs complex algorithms and keys to safeguard data integrity and confidentiality.

Best Practice 2: Multi-Factor Authentication

Cybercriminals can easily steal passwords and pins through brute-force attacks, systematically testing numerous combinations until successful. Multi-factor authentication (MFA) offers a robust defence against this threat.

Requiring users to provide multiple forms of identification strengthens account security. This authentication combines different types of verification. This includes information only the user knows, like passwords, items the user possesses, such as security tokens, and unique physical traits, like fingerprints.

By requiring multiple verification steps, banks and financial institutions create a formidable barrier against unauthorised access to sensitive information and funds. Additionally, multi-factor authentication enhances user account management by requiring unique authentication factors for each individual.

Best Practice 3: Employee Training

Organisations with regular cybersecurity training experience a 40% reduction in security incidents compared to those without, according to  This emphasis on employee education is justified as human error remains a primary target for cybercriminals.

Hackers frequently exploit employee vulnerabilities through tactics like phishing, social engineering, and other deceptive methods. By training employees to recognize these threats, financial institutions can mitigate the risk of data breaches and financial losses.

Such incidents can result in substantial financial losses and damage to an institution’s reputation. Consequently, comprehensive cybersecurity training is essential for all bank employees to mitigate these risks.

Best Practice 4: Regular Security Audits

A security audit is an evaluation of an organisation’s digital infrastructure, designed to identify vulnerabilities that could compromise digital transactions. This process involves examining security policies, testing safeguards, and ensuring compliance with industry regulations.

Given the escalating complexity of cyber threats, financial institutions must prioritise regular security audits. Banks can uncover weaknesses before malicious actors exploit them by scrutinising systems and processes.

Regular security audits empower organisations to proactively strengthen defences by implementing essential safeguards such as firewalls, antivirus software, and antimalware solutions. To ensure impartiality and objectivity, it is essential to engage an independent expert to conduct these assessments.

Best Practice 5: Incident Response Planning

As the frequency and sophistication of cyber threats continue to rise, the need for robust defences becomes increasingly critical. Safeguarding digital transactions requires a proactive approach, including a well-defined incident response plan.

An incident response plan is a crucial component of any organisation’s cybersecurity strategy. This formal document outlines strategies for preventing, detecting, and responding to security breaches that could compromise financial data. By establishing clear protocols and assigning specific responsibilities, banks can minimise the impact of cyberattacks and protect both their reputation and customers’ assets.

To be effective, an incident response plan must be established in advance and assigned to specific teams. By following established frameworks, such as those provided by the National Institute of Standards and Technology (NIST) and SANS, organisations can develop comprehensive plans. These resources offer detailed guidance on handling various types of security incidents to ensure a coordinated and efficient response.

Conclusion

Protecting digital transactions requires a multi-faceted approach. Implementing cybersecurity measures is essential for protecting sensitive financial data and maintaining customer trust.

Encryption and multi-factor authentication are foundational elements of a strong security posture. Encryption safeguards data by rendering it unreadable to unauthorised individuals, while multi-factor authentication adds an extra layer of protection by requiring multiple forms of verification. These are just two examples of critical best practices financial institutions should adopt.

Financial institutions must prioritise cybersecurity to maintain customer trust and protect their bottom line. By investing in advanced security measures and staying vigilant against emerging threats, organisations can effectively mitigate risks and ensure the integrity of digital transactions.

  • Cybersecurity in FinTech

We caught up with Danielle McQuiston from Candex to discuss why procurement is risk-averse, and how the business can help.

Candex, a B2B fintech company, has been going through some exciting changes recently. In the five years that Danielle McQuiston – its Chief Customer Officer – has been with the business, it’s gone from its venture round to A series in 2021 and into B series, which it closed out in 2023. Its goal is to make life easier for procurement professionals across sectors. This is because having trusted services at their disposal is one step towards changing procurement’s risk-averse reputation.

Candex’s value proposition is as a tech-based master vendor that helps enterprise buyers engage and pay small and irregular vendors through an easy, quick, streamlined process. The obvious ‘low-hanging fruit’ use case at most enterprise organisations is to use Candex to avoid setting up new vendors for small, infrequent purchases. 

While tackling this low-hanging fruit demonstrates an immediate benefit, Candex is now taking it a step further. It’s helping enterprise clients understand the additional benefits and value that they can get from the solution. We caught up with McQuiston at the DPW NYC Summit in June, an event which featured innovative solutions in procurement. In particular, AI.

Creating and avoiding risk

“The companies that only go for the easy wins still have tens of thousands of suppliers that they hold in their vendor master. They don’t closely manage them and really don’t know them,” McQuiston says. “At some point, these companies have onboarded a supplier to make a small purchase. When they do, they do minimal checks on the vendors since the purchase is small or one-time only. But now that ‘small’ vendor is in the company’s system for anyone to engage with – sometimes forever. These companies are left with little-known and unmanaged vendors taking up 80% of their vendor master. This, in turn, creates risk for the enterprise.” 

Candex can mitigate this risk and empower companies to focus more on strategic relationships. It does this by helping companies offboard their non-strategic vendors, and engage vendors only as needed. Businesses can do this with the confidence that Candex applies robust compliance screening and third-party diligence to all vendors as part of its standard processes. 

As a result, Candex has started helping clients realise how they can reach their initial objectives of deriving more value by lowering risk exposure. By helping them focus on strategic suppliers, they can increase their working capital, accelerate the speed of doing business, and support their supplier diversity programs.

“All those aspects are where my focus is currently,” McQuiston explains. “Along with that, over the next few years, we will continue to make the process even more user-friendly. We’ll also further develop our solutions to meet the ever-changing commercial, compliance, and security landscapes. We can make the system even more intuitive, and help our customers streamline internal processes so things are faster and more cost-effective.”

The roadblocks

Implementing technology solutions to improve procurement is the name of the game across the sector, after all. It was talked about extensively at DPW NYC in June, where we spoke to McQuiston about Candex and trends. Unfortunately, there’s a roadblock for the sector, which is that procurement is risk-averse.

McQuiston explains. “We work primarily with Fortune 2000 companies, and I can’t tell you how many I’ve met up with who have outright told me they’re risk-averse. They all think that’s unusual, but they all say it and most of them are the same. It doesn’t matter if you’re in pharmaceuticals or consumer goods or banking – everyone is in the same boat regarding risk.”

This is because, as a function, procurement was created to ensure security of supply, controlling both quality and cost. “Procurement was born out of the supply chain world with a focus on direct spend. Out of the need to make sure prices don’t go up – and, in fact, go down,” McQuiston continues. 

“Procurement has always been the enforcer of the financial rules. That’s the only way they were able to have an impact on the business initially. Now, procurement wants a seat at the table and is able to more broadly bring value to the business. In return, businesses are asking procurement to ease their role as the enforcer in order to have that seat. This is tough for procurement because, by nature, they’re nervous about losing control since that is how they have added value in the past.”

Hope is here

This may be a challenge, but the march of change isn’t stopping. There’s hope in the air. This is thanks to companies like Candex, as well as the arrival of new technologies. For example, artificial intelligence, which the business world is increasingly looking to leverage.

“AI is the whole theme of this conference,” McQuiston said of DPW NYC. The event spawned many fascinating conversations, not to mention encouraging ones. As the business world utilises technology better, procurement is only going to get better. And AI can help support procurement teams as they look to calibrate their solutions and right-size their approach to risk, efficiency, and value-add for the business. 

“I’m very interested to see how innovative solutions like Candex, as well as AI solutions, become disruptors – in a good way,” says McQuiston. “A lot of other solutions that have tried to enter the procurement space have struggled to really break in and push for significant change. 

“However I believe that if you solve a real problem and have good technology, you will be successful. AI may be able to really help further support technology solutions in their mission to simplify the procurement stack and positively address user experience challenges,” McQuiston concludes.

From AI to multi-factor authentication, here are 7 cybersecurity solutions keeping financial institutions’ critical data secure.

Data belonging to 20.4 million UK citizens was affected by cyberattacks made against financial institutions at the end of 2023. This represents a 143% increase from the 8.4 million individuals affected in the previous year. The demand for robust cybersecurity is ever-increasing in financial institutions.

Financial Institutions encompass a wide range of businesses dealing with financial and monetary transactions, including banks, insurance companies, and brokerage firms. These institutions are pivotal for a functioning capitalist society, simplifying transactions, enabling individuals and entities to seek investment or lend money, and assisting in managing assets.

The increasingly digitalised nature of the economy, including the rise of online-only financial institutions like challenger banks, has accelerated the development of financial technologies and their adoption in the market. As a result, Software as a Service (SaaS) for finance, such as digital banking, electronic payment, online investment, and other online-based services, makes financial services more accessible to the consumer. But, with the ease of access technologies provided, new challenges have also emerged, especially regarding cybersecurity.    

Financial institutions are enticing targets for cybercriminals. Therefore, cybersecurity has become integral to banking security in protecting data from malicious attacks. 

Here are seven top cybersecurity solutions to secure data from online threats.

1. AI-Powered Threat Detection

The ability for AI models to perform pattern recognition on large amounts of unstructured data is opening up an exciting new frontier in threat detection for cybersecurity teams. AI tools can potentially flag subtle differences, anomalies, and patterns that could point to a zero-day threat or the presence of a bad actor in the system. 

Some industry experts believe that AI-powered threat detection will be pivotal in helping cybersecurity teams respond to rapidly evolving cyberattack strategies that are increasingly difficult to combat — somewhat ironically, this uptick in the frequency and sophistication of attacks is at least partially due to the availability of AI tools, which hackers are also putting to use. 

AI’s adaptive learning and advanced recognition capabilities enable automated responses to threats and can predict future risks by analysing past patterns. This helps reduce false positives and saves security teams time on assessments.

2. Multi-Factor Authentication

Multi-factor authentication has quickly become the standard in security and identity protection as more and more people bank, shop, and administer their lives entirely online. Put simple, it’s a multistep account login in which more information besides username and password must be provided. 

Typically referred to as “something you have, something you know”, multi-factor login procedures drastically reduce account hacking, allowing security teams to detect suspicious activity that occurs in the logging processes. 

3. DDoS Mitigation

Distributed Denial of Service (DDoS) is a coordinated cyberattack that overwhelmingly sends a request to the server simultaneously, which makes the server slow down or even go offline. DDoS mitigation is important for banking service security to prevent the interruption of vital services. 

Cynersecurity teams can perform DDoS mitigation by implementing a load balancer, restricting requests from certain places, and blocking communication from outdated or unused ports, protocols, and applications.

4. Compliance

Compliance is vital to both ensure the security of systems and organisations against cyber attack, but also to prevent legal penalties and repercussions if an organisation is found to be in breach of existing regulations. These regulations ensure that an organisation’s cybersecurity set up is in line with the security and data protection laws in the countries where it operates, with the end goal of mitigating risk to the consumer — or just people in general whose data is collected and kept by the company. 

There can be serious legal and financial risks associated with non-compliance — tied to both finance and cybersecurity. For example, in 2021, Natwest was fined over £264 million by the FCA for its extended failure to identify and prevent money laundering. Since the FCA was established, there has not been a year when its total fines issued have been less than £1 million. In the UK, other financial and cybersecurity compliance regulations are DPA 2018, UK GDPR, NIS regulations, and the Computer Misuse Act 1990.

5. Database Activity Monitoring

Database Activity Monitoring refers to any set of tools that monitors and analyses database activity. The goal of this monitoring is to flag and report deceptive, illegal, or undesired behaviour taking place within a system. Ideally, these tools run and operate without any serious impact on user experience.

Because most databases don’t monitor or flag suspicious activity by default, unless you have a tool that handles activity monitoring, making third party solutions a necessity in many cases. According to monitoring software solutions vendor Cyral, most systems also don’t collect enough data to enable “a full forensic investigation of historical breach events.” Also, databases that do often log and store this information inside the database itself. Any attacker that gains access to the database can then, supposedly, have write access to the full collection of tables (as is often the case), meaning they can easily delete any activity rows associated with their presence and theft of data.

6. SQL Injection Prevention

SQL injection is a code injection technique attackers use to steal, spoof, and manipulate data. An effective SQL injection attack can result in attackers gaining unapproved access to sensitive data like including credit card information, PINs, or other private information. In banking security, a failure to prevent SQL injection can result in attackers altering balances, voiding transactions, and even transferring money to their bank accounts. 

Cyberattackers inject malicious SQL code into the backend of a target system when they discover defenceless user inputs in a web application or web page. The hackers can then use this opening to locate the IDs of other users within the database, impersonating these users — usually those with data privileges such as the database administrator — to run malicious code within the system. 

7. Regular Risk Assessment and Training

Perhaps most importantly, the best defence against the rising tide of cybercrime is a cybersecurity conscious culture. Financial institutions should conduct regular risk assessments manually to identify potential vulnerabilities and threats to their systems and networks. 

They should regularly evaluate and revise systems and networks based on analytics and assessments to prioritise cybersecurity initiatives and protect vital assets. Security teams shouls also conduct periodic security awareness training, which can strengthen cyber-readiness among finance personnel. This is particularly important given the rise in generated AI-driven phishing campaigns and other technologically democratised forms of cyber crime.  

Case Study – Cybercriminals in UK Businesses

An investment article from IFA magazine reported 300,000 cybersecurity breaches in finance institutions across the UK in 2022 alone, making them the second-highest number of data breaches from all industries after the IT sector. Reports estimate losses in the region of £27 billion per year, with small businesses in the UK affected the most by cyberattacks, usually phishing. 

The UK authority encourages its citizens to be more aware of the possibility of cyberattacks, especially phishing and fake charity emails, as online threats are growing exponentially. Ledi Sallilari from the SEO consulting firm Reboot also suggested that more complex passwords can help prevent account breaches. 

The rapid expansion of internet usage brings new challenges for cybersecurity. Proper knowledge and awareness about cyber criminals should become mandatory for all Internet users to protect their online data.

Financial institutions, responsible for managing customer funds, need to implement strong cybersecurity measures. With more secure backend systems, they can protect assets and maintain customer trust in an increasingly digital world.

  • Cybersecurity in FinTech

AI, real-time monitoring, and machine learning are helping fintech firms stay ahead of growing cyber threats.

The financial sector faces a growing threat—cybercrime.

Cybersecurity Ventures predicts a significant rise in cybercrime costs, with the total impact of hacks, breaches, and data theft potentially reaching as high as $10.5 trillion a year by 2025. As attacks become more common and more severe, mitigating these risks and preventing fraud is paramount for financial institutions and financial technology companies alike.

Luckily, ongoing advancements in technology offer fintech organisations a powerful arsenal of weapons to combat cybercrimes. Adaptive fraud prevention systems use artificial intelligence (AI) to detect and prevent fraudulent activity in real-time. These intelligent systems continuously learn from new data, allowing them to identify evolving patterns and improve cybersecurity.

Introduction to cyber fraud protection

Cybersecurity is crucial in the financial services industry, where sensitive financial data and transactions are a prime target for cybercriminals. Moreover, cyber attacks can inflict significant financial losses, not just through direct theft but also via hefty regulatory fines, legal costs, and reputational damage.

Financial institutions have a responsibility to safeguard customer trust by implementing robust cyber fraud protection measures. This includes advanced technologies like network security, intrusion detection systems, and malware protection.

By securing financial transactions and customer data, these measures not only deter cyberattacks but also mitigate their impact, fostering customer confidence in the bank’s security posture.

Common types of Cyber fraud

The financial sector occupies a bull’s-eye for cybercriminals, ranking second only to healthcare in global cybercrime costs according to the IBM Cost of a Data Breach Report 2023. Financial institutions face an average loss of $5.9 million per cyber incident, highlighting the critical need for robust cyber fraud protection measures.

These attacks come in various forms. One of the most common isphishing scams. These are attempts to trick people into surrendering sensitive information. Meanwhile, ransomware attacks aim to disrupt operations or extort money by encrypting critical data. Distributed Denial-of-Service (DDoS) attacks overwhelm systems with traffic, making essential services unavailable to legitimate customers.

Advanced cybersecurity technologies

The fight against cyber fraud necessitates sophisticated tools, and advanced technologies like AI and machine learning (ML) are playing an increasingly crucial role.

AI fraud detection uses ML algorithms to identify fraudulent activities within vast datasets. These algorithms are trained to recognise patterns and anomalies that deviate from typical user behaviour and transaction patterns. Once the patterns are identified, attackers can be purged from the system before they have a chance to steal anything of value. Cybersecurity systems powered by ML can drastically reduce the amount of time bad actors spend inside a system.

ML algorithms excel at identifying patterns and trends that might signal potential fraud. Also, by analysing big data, these algorithms can adapt quickly to evolving fraud tactics.

They can detect and alert security teams within seconds of suspicious behaviour, such as unusual purchases or login attempts from unfamiliar locations. Thanks to continuous data analysis, businesses can gain an immediate advantage, allowing them to swiftly identify and respond to suspicious activity, ultimately minimising potential losses.

Case studies

The financial sector is actively exploring the potential of AI to combat cyber fraud. Mastercard’s Decision Intelligence technology exemplifies this trend. By analysing historical spending habits, this AI solution creates a personalised baseline for each cardholder’s behaviour.

This approach is a significant improvement over traditional, one-size-fits-all methods, which often lead to false declines. AI’s contextual analysis of transactions allows it to bypass common triggers for false positives, ultimately enhancing fraud detection accuracy.

Future prospects

The future of cyber fraud protection hinges on the continued evolution of technology. One promising area lies in adaptive technologies, such as behavioural biometrics. Additionally, these systems move beyond static passwords or fingerprints, creating a unique user profile based on a person’s interaction patterns.

These patterns are ‘behavioural fingerprints’ that include typing style, mouse movements, and even how an individual holds their phone. Over time, the system learns user habits, building a digital identity that can detect deviations indicative of unauthorised access.

This approach is particularly effective because it’s nearly impossible for hackers to replicate one’s unique behavioural traits, even if they steal the password. This adds a crucial layer of security that traditional methods cannot provide.

  • Cybersecurity in FinTech

The digital banking industry faces cybersecurity challenges. A Statista report shows a 10 percent jump in global malware attacks in…

The digital banking industry faces cybersecurity challenges. A Statista report shows a 10 percent jump in global malware attacks in 2023, reaching 6.06 billion incidents.

Cybercriminals are growing more skilled, leading to more frequent data breaches that expose vulnerabilities in banking security. Moreover, effective risk management and strong network protocols are essential to securing digital banking operations.

Introduction to Cybersecurity in digital banking

As online transactions become the norm, strong cybersecurity measures become more crucial. Banks keep sensitive financial data and handle high-value transactions, making them prime cyberattack targets.

Effective cybersecurity is a multi-layered approach. Also, it combines advanced technology, strict policies, and constant monitoring to fight cyber threats. These security measures shield not only a bank’s finances but also customer personal information.

For that reason, cybersecurity is the foundation of trust and reliability in finance. Without strong security protocols, the balance between innovation and managing risk is disrupted, potentially shaking customer confidence in digital banking.

Early Cybersecurity practices

The rise of the internet gave birth to a new genre of malicious activity. Cybercriminals emerged to target this new frontier. They launched worms, malware, and phishing attacks.

In response to these escalating threats, the 1990s saw the introduction of firewalls and antivirus software. Additionally, these early security measures acted as barriers between networks to protect systems from unauthorised access.

Cybercriminals constantly develop new viruses and threats. Likewise, antivirus companies continuously create new software patches and signature updates to stay ahead. Despite that, the possibility of new threats slipping through these defences remains a challenge.

Technological advancements

Fraud is a major challenge for financial institutions. Artificial intelligence (AI) has emerged as a powerful weapon in the fight against this threat.

This technology excels at detecting various types of fraud. AI algorithms can detect suspicious activity in real time, helping prevent fraud before it happens.

AI solutions go beyond simple detection. By creating detailed profiles of each customer and tracking their activities, AI can predict potential risks and prevent fraud proactively.

Current Best Practices

A strong foundation is critical to banking security. This includes constantly checking for weaknesses through risk assessments. Digital banks must update their security protocols regularly to keep pace with changing risks. Collaborations with other financial institutions and government agencies help banks stay informed about the latest threats and how to respond.

Data classification is also essential. Banks need strict controls on who can access sensitive information. Employee security training must be regular to make them aware of threats.

Case Studies

The digital bank Starling Bank partnered with cybersecurity firm HackerOne in 2019. This partnership created a streamlined system for anyone to report weaknesses found in its apps and website.

The initiative initially focused on specific areas and common vulnerabilities. This collaboration revealed valuable insights into weaknesses often missed during standard testing. The project’s findings allowed Starling to develop automated detection tools that proactively prevent security issues.

A report by Statista predicts the global cybersecurity market will hit $271.90 billion in 2029, highlighting the growing need for strong defences in digital banking. While still new, quantum computing presents a future hurdle. Its ability to crack current encryption methods means new, quantum-resistant cryptography needs to be developed for banking security.

However, machine learning and AI are expected to be adopted more widely in cybersecurity. Beyond just reacting to threats, financial institutions will also increasingly focus on proactive threat hunting. This means identifying and stopping potential vulnerabilities before they can be exploited.

  • Cybersecurity in FinTech

The FinTech sector has changed how we manage our money. From mobile banking apps to robo-advisors, FinTech offers a new…

The FinTech sector has changed how we manage our money. From mobile banking apps to robo-advisors, FinTech offers a new level of convenience and efficiency. But with this convenience come challenges and cybersecurity responsibilities: safeguarding the vast amount of sensitive financial data entrusted to these platforms.

Cybersecurity is no longer an afterthought for FinTech companies; it’s an essential foundation for their success. Breaches exposing financial information can have devastating consequences, not just for the companies involved but for their users as well.

Understanding these cyber threats is crucial for FinTech companies aiming to safeguard their operations and customer data. Here are the top 10 cybersecurity risks FinTech firms must be aware of in 2024.

1. Phishing Attacks

Phishing attacks trick people into divulging personal information. Cybercriminals often pose as legitimate companies through emails, texts, or phone calls. They llure victims into clicking malicious links or revealing passwords.

Phishing attacks significantly threaten financial companies because they target the human element rather than technological weaknesses. Hackers impersonate trusted sources like banks or colleagues to trick employees into revealing sensitive information or clicking malicious links. It can lead to data breaches, financial losses, and account takeovers.

2. Ransomware

Ransomware attacks involve cybercriminals holding sensitive data hostage and demanding a ransom from the victim. FinTech companies are particularly vulnerable to ransomware attacks because they rely on digital systems and customer financial data.

These attacks can impair operations, damage reputations, and lead to significant financial losses. They can be devastating, as there is no guarantee that paying the ransom will result in the safe return of the data.

3. Insider Cybersecurity Threats

FinTech companies may face a unique cybersecurity threat from their employees, known as insider threats. These insiders can be malicious, accidentally negligent, or even tricked into compromising sensitive data. Malicious insiders might steal financial information or sabotage systems for personal gain. Negligent insiders could leave data exposed or fall victim to phishing scams, unintentionally giving away access.

4. DDoS Attacks

Distributed Denial of Service (DDoS) attacks overwhelm online systems with traffic, making them inaccessible to legitimate users. FinTech firms are attractive targets for these attacks because they offer multiple entry points (banking systems, online accounts) and prioritise constant service availability.

DDoS attacks can severely hurt a FinTech company’s reputation and finances by causing downtime, raising security concerns among customers, and potentially leading to data breaches during the distraction.

5. Malware

FinTech companies are prime targets for malware attacks, accounting for 19 percent of all attacks and suffering nearly US$18.3 billion in losses in 2017. While the number of traditional banking malware strains is decreasing, it doesn’t represent a decline in overall threat. Instead, attackers are developing more sophisticated malware that uses techniques like obfuscation and slow, staged attacks to bypass antivirus detection.

6. Data Breaches

FinTech companies are under fire due to data breaches exposing sensitive financial information. Hackers exploit security flaws to steal user data, leading to financial losses, identity theft, and damaged trust. To combat this, strong encryption methods like end-to-end encryption and tokenisation can scramble data, making it useless to attackers.

7. Mobile Security Risks

Despite offering convenient access to financial services, mobile apps are a double-edged sword for FinTech companies. These apps are vulnerable due to their popularity, making strong security practices essential. Regular security updates, secure coding from the start, and robust data encryption during transmission are crucial to patching weaknesses.

8. Third-Party Cybersecurity Risks

The reliance on third-party vendors for services and integrations creates a security blind spot for FinTech firms. To address this, thorough vetting through due diligence and vendor risk assessments is crucial before forming partnerships.

9. API Vulnerabilities

FinTech companies rely heavily on Application Programming Interfaces (APIs) to enhance customer interfaces and share information across systems. While APIs are essential for data exchange, they also open doors for cyberattacks.

To fortify their defences, FinTech companies need to focus on secure API design with solid authentication methods (like OAuth or API keys), constant monitoring, and regular security assessments to identify and fix weaknesses before they become exploited.

10. Artificial Intelligence & Machine Learning Risks

The use of artificial intelligence (AI) and machine learning (ML) has increased in FinTech for decision-making processes. While beneficial, these systems also present risks if they make inaccurate decisions based on incorrect data. Rigorous testing and monitoring of AI and ML systems are necessary to minimise these risks.

Steps to mitigate threats

The cybersecurity threats facing FinTech in 2024 are varied and complex. FinTech firms must prioritise cybersecurity to protect customer data and maintain trust. By researching technology usage, training employees on cybersecurity, regularly monitoring suspicious activity, and building advanced security systems, FinTech companies can improve their defences against these evolving threats.

  • Cybersecurity in FinTech

With more financial transactions shifting to digital platforms, having proper cybersecurity measures becomes a priority.

Moreover, data is at the heart of every fintech company, which makes them attractive targets for hackers and malicious actors.

Financial technology has created new opportunities for customers and businesses in the finance industry. Individuals can now borrow, transfer, save, and invest from the convenience of their homes. Also, the growth of the industry is massive, with fintech revenues projected to grow sixfold from $245 billion to $1.5 trillion by 2030.

However, following that growth are security risks associated with it. Accounting services firm BPM predicts that cybersecurity attacks aimed at fintech companies will only continue to grow in 2024 and beyond. Furthermore, these attacks can end in monetary losses, reputational damage, and brand erosion.

To prevent such cases, fintech security leaders globally have implemented cybersecurity measures.

1. Stripe

Founded in 2010 by Patrick and John Collison, Stripe specialises in payment processing software and application programming interfaces (APIs).

Based in South San Francisco, California, the company offers top-tier encryption and secure transmission protocols. The protocols, which adhere to the PCI DSS standards, are in place to ensure the security of credit and debit card data.

Launched in 2018, Stripe’s innovative tool Radar detects and blocks fraudulent transactions. After its 2.0 update in 2018, the company claimed it helped reduce fraud rates by an additional 25% for its users.

With other services like Stripe Terminal, Stripe Tax, and Stripe Capital, Stripe has become a trusted name in online payment processing. It powers payments for major companies like Amazon, Google, and Shopify, all of which demand high-security standards.

2. Square

Owned by Block, Inc., Square was launched in 2009 by CEO Jack Dorsey and co-founder Jim McKelvey. Square offers an all-in-one financial services platform, including customer booking, e-commerce, payroll, shifts, loan financing, and banking.

In 2021, Square received FDIC approval from the Utah Department of Financial Institutions. Additionally, with end-to-end encryption, regular vulnerability assessments, and secure data storage, Square reached Level 1 PCI DSS certification. This is the highest level for payment processor certification.

3. PayPal

Launched in 2000 from the merger of Confinity and X.com, PayPal is a leader in secure online transactions.

Acquired by eBay in 2002, PayPal became the leading global payment application after eBay discontinued its Billpoint service. It has arguably outpaced competitors like Citibank C2IT, Yahoo! PayDirect, and BidPay from Western Union.

PayPal uses advanced encryption technologies and multi-factor authentication to protect user data. With its continuous monitoring and fraud prevention mechanisms, the company is compliant with industry standards.

According to the company, its fraud detection tools are informed by data from 1 billion monthly transactions. It claims that the tool gets smarter with each transaction.

4. Ant Financial (Alipay)

Ant Financial’s Alipay, is the second-largest international payment processor after Visa.

Founded in 2014 by Jack Ma as an affiliate of Alibaba, Ant Financial offers a range of products. Available services include electronic payment processing, banking, and mobile payments through brands like Yu’ebao, Huabei, and Xianghubou.

Ant Financial combines advanced cybersecurity measures such as AI-driven fraud detection, biometric authentication, and data encryption. Alipay itself also holds the internationally recognized ISO/IEC 27001 cybersecurity certification.

Used by more than 1.2 billion users, Ant Financial is protected by its AI-powered risk engine AlphaRisk. With the tool, Alipay’s fraud loss rate has been kept under 0.64 in 10 million, way lower than the industry average.

5. Plaid

Established in 2013 by Zack Perret and William Hockey, Plaid is an embedded financial platform. It facilitates secure online payments and transactions by connecting users’ bank accounts to finance applications.

Plaid ensures authorised access to bank data through secure bank portals, which eliminates the need for user credentials. In October 2020, Plaid introduced “Plaid-Link,” a service that enables real-time payments for loans, insurance, and wages. It securely connects 12,000 US financial institutions, plus many more in Canada, the UK, and Europe.

6. Chime

Founded in 2012 by Chris Britt and Ryan King, Chime partners with regional banks to offer fee-free mobile banking services. Chime uses encryption, access protocols, continuous monitoring, and proactive fraud prevention to keep its payment processes secure.

In April 2020, Chime launched the fee-free overdraft product “SpotMe.” It successfully processed $375 million in Economic Stimulus Payments one week from the scheduled government disbursement.

7. Adyen

Adyen, listed on Euronext Amsterdam, is a Dutch FinTech company founded in 2006 by Arnout Schuijff and Pieter van der Does. Primarily catering to businesses, Adyen offers e-commerce, mobile, and POS payment solutions. The company successfully achieved 1.3 billion euros in revenue in 2022.

Adyen’s cybersecurity measures include encryption, tokenization, secure data storage, and regular security assessments, all backed by Level 1 PCI DSS certification.

8. Sift

Founded in 2011, Sift is one of the cybersecurity companies providing AI-powered fraud platform. It uses machine learning combined with data network scoring 1 trillion events per year to offer security solutions.

The company notices that online fraud is a growing problem, especially for retailers and financial institutions. Therefore, Sift’s algorithm distilled over hundreds of millions of user actions to create fraud pattern recognition tool.

Sift has received several accolades, including being named a leader in 2023 Forrester Wave for Digital Fraud Management and G2’s Momentum Leader in Spring 2024.

9. Darktrace

Cybersecurity company Darktrace, established in 2013, uses AI to respond to cyber threats in real time. Since its inception, the tools it created has been deployed over 9,000 times.

With its Enterprise Immune System technology, Darktrace is able to handle Industrial Operational Technology, email, SaaS, cloud, network, and endpoint safety. More than 9,400 organisations, including major financial institutions, rely on its advanced solutions.

The company was included in The Cyber Award’s AI Product of the Year in 2020 and Fast Company’s top 10 most innovative AI companies for 2022.

10. Netskope

Cloud-based cybersecurity company Netskope was founded in 2012 to help organisations apply zero trust principles. The company’s solutions protect data across cloud services and apps, which makes it pivotal for fintech institutions relying on such technologies.

The California-based firm helps financial services companies meet compliance requirements such as FINRA, PCI-DSS, GLBA, and GDPR. Not only that, it provides necessary protection, such as SWG, CASB, ZTNA, DLP, Cloud Firewall and SD-WAN.

In 2024, Netskope is recognized as a leader in the Gartner Magic Quadrant for Cloud Access Security Brokers (CASBs).

What makes these a success

These top cybersecurity firms in fintech have set high standards in cybersecurity. Their efforts have significantly contributed to a safer digital landscape for fintech.

They have also demonstrated collaboration with fellow financial or cybersecurity experts. Collaboration means having access to specialised knowledge that may not be available in-house. This includes latest threat intelligence, security tools, and tailored audits.

Additionally, it is imperative that companies adhere to industry standards and regulations. Compliance is the first step in building trust with users and stakeholders alike.

With 64% of financial services institutions falling victim to ransomware attacks last year, finance organisations should follow best practices from these companies.

  • Cybersecurity in FinTech

Welcome to the latest issue of CEOstrategy where we highlight the challenges and opportunities that come with ‘the’ leadership role

Our cover story focuses on the work of Nigel Vaz, the CEO of Publicis Sapient – a digital business transformation company that partners with organisations globally to help them create and sustain competitive advantage – and his approach to change management.

Welcome to the latest issue of CEOstrategy!

Tasked with accelerating business growth, while building the synergies across an organisation that can drive innovation to meet diverse customer needs and keep revenues on track, the modern CEO must be mentor, marshall and motivator on the journey to success.

Read the latest issue here!

Publicis Sapient: Advice for the modern CEO

“I lead Publicis Sapient with a set of principles to keep me on track, and which I offer to fellow CEOs as a guide,” says CEO Nigel Vaz. “Embrace change, and view challenges as opportunities for growth and innovation; Foster a culture of continuous learning within yourself and your organisation; Advance the organisational capabilities that will enable your company to deliver on your brand promise; Adopt a data-driven approach to decision-making, utilising analytics and advanced technologies and Stay rooted in purpose to realise your competitive advantage.”

EMCS: Leading a small fish making a big impact

“If you look after your people and you have the right people in place, the customer experience takes care of itself,” explains EMCS Industries CEO Trevor Tasker. “A lot of entrepreneurs say the same, but you don’t always see it in action. If I have to micromanage somebody, I’ve made a hiring mistake. When I’ve found the right person, all I have to do is support them and trust them. If I can’t trust them, I can’t lead them. And being trusted makes my employees so much better at their jobs. It makes choosing the customers you deal with very important as well…”

Moneypenny: People at the heart

We are consistently listed in the best places to work rankings and have created a happy and fun working environment,” says Moneypenny CEO Joanna Swash. “We strive to be authentic, and that starts at the top. If the leadership team walks the walk and talks the talk, then trust is built. Trust fosters a culture where employees are motivated, engaged and empowered with a culture of transparency and honesty…”

Bupa: Choice, care and compassion driving digital transformation

“In a fast-changing world, it’s essential that we harness the power of technology to keep improving health outcomes for our customers,” says Global & UK CEO Carlos Jaureguizar of the digital transformation journey helping Bupa become the world’s most customer-centric healthcare company. “We give our people the tools to give customers the best care, streamline the customer experience and drive innovation.”

Also in this issue, we hear from Rachel Youngman, Deputy CEO at the Institute of Physics, on how organisations can leverage ESG targets to meet the Net Zero challenge; we get the lowdown on a fintech success story from RTGS.global CEO Jarrad Hubble; discover the importance of Strategic Thinking with Institute for Management Development Professor Michael Watkins and count down ten reasons why integrity is key to business success with Serenity In Leadership CEO Thom Dennis.

Enjoy the issue!

Dan Brightmore, Editor

Our exclusive cover story this month centres around Versuni, home to some of the world’s most renowned home appliance brands

Versuni: Procurement excellence to drive growth 

Our exclusive cover story this month centres around Versuni, home to some of the world’s most renowned home appliance brands. Versuni is a company with a rich history, dating back to 1891, albeit under a different name. Philips Domestic Appliances was renamed Versuni after the Netherlands-based giant sold the business to China-based global leading Private Equity company Hillhouse Capital in September 2021. And so began a process of disentanglement as Versuni embarked on its journey to becoming a successful and independent entity with a simple yet clear purpose of turning houses into homes. 

Read the new issue here!

“We refer to ourselves as a 130-year-old company with a scale-up mentality,” explains Hugo Sparidans, Chief Procurement Officer, Versuni. “We combine the legacy we have with Philips with all the goodies here in this new, agile environment where things can happen much faster and with a different mindset fully focused on growth.” 

Versuni is now operating under private equity ownership following its separation from Philips two years ago. “My boss called me and said, ‘So, we’re going to spin off Domestic Appliances. Do you have the interest to lead the transition for Procurement within that spin-off, and then potentially after?’ That was an interesting question for me,” Sparidans explains. “I’d had a great career within Philips working for a successful business, but I was now facing the idea of leaving that behind for a trip into the unknown.” 

Read the full story here!

Mars LATAM: Shaping the world of tomorrow  

Mars Pet Nutrition LATAM is changing the sustainability game within the pet food sector. Gabriel Guzman, VP Procurement LATAM, and Ana Milena Zambrano, Climate & Sustainable Sourcing Head LATAM, explain how…

Gabriel Guzman, VP Procurement LATAM, and Ana Milena Zambrano, Climate & Sustainable Sourcing Head LATAM, are leading a major ongoing evolution within Mars Pet Nutrition LATAM. Guzman has worked in some of the world’s largest organisations over 25 years, spearheading many high-profile projects during this time. Zambrano’s career spans 15 years across consumer goods and supply chains, with sustainability as a core lifelong passion. 

A focus on sustainability and the environment is nothing new for Mars – it’s part of the culture. It’s a business with firm ESG pillars and a clear concept of what sustainability means to the organisation. “We believe the world we want tomorrow starts with how we do business today,” says Guzman. “It is the vision at the heart of our Sustainable in a Generation Plan – one where the planet is healthy, people and their pets are thriving, and society is inclusive.”

Read the full story here!

EMCS: A small fish making a big impact 

We sit down with Trevor Tasker, CEO of EMCS, for the second time to discuss partnership, leadership, and the state of the industry 

EMCS Industries is one of the best-kept secrets in its sector. An innovator from day one, EMCS Industries invented the world’s first electrolytic marine growth protection system (MGPS). This set the basic standard for the field, to the extent that everybody else now uses the same or similar technology based on the EMCS Canadian engineered and manufactured antifouling system. Trevor Tasker is the CEO of the company, and he’s not only passionate about what EMCS does, but his rich background in leadership puts him in excellent stead as head of an industry-leading company. 

Tasker’s first job at the age of 16 was as a self-employed wedding DJ. Since then, he has honed his entrepreneurial spirit on an international scale in industries such as financial, large scale digital signage, steel manufacturing, and others. He has experience in both building his own businesses, and being an employee, giving him a good foundation of what it means to both lead and be led. 

“It allows you to get a good mix of what you like, what you don’t like, how you’d like to be treated, and how that shapes the way you treat others as you move through your career,” says Tasker. He’s worked across a variety of industries but the common denominator has been that he’s always either been in a leadership position within a company or running his own company. He’s conducted business all over the world and collected the tools he’s needed to be the best leader he can. 

Read the full story here!

AlphaSense: Making procurement a priority 

Joaquin Rivamonte, Director of Procurement at AlphaSense, talks about how he’s bringing scalability to the organisation, and the benefits of procurement working hand-in-hand with the wider business 

Joaquin Rivamonte has enjoyed a rich and varied career, one which taught him numerous lessons in preparation for his role with market intelligence platform, AlphaSense. He cut his teeth in the financial service sector; he was the Director of Procurement for some medium-sized investment banking companies in San Francisco, helping support Silicon Valley before the businesses he worked for were bought by bigger banks. One was acquired by JP Morgan Chase, where Rivamonte became VP of Procurement. He was then asked to move to New York, just as Silicon Valley was experiencing the dotcom boom.  

Office photos at AlphaSense, 24 Union Square East in New York City.

Rivamonte’s background in building procurement departments from the ground up continued, and eventually, Microsoft took him on. He moved to Seattle to be part of the Microsoft team in 2005, and this was the beginning of his education in how very large procurement departments work. “I did have experience in large groups of people reporting to me already,” Rivamonte says, “but at Microsoft, I had $2-3bn dollars of category responsibility under me. 

“I was responsible for putting together the consulting category, which was almost $1bn, and the outsourcing category of about $1.2bn, plus the web development category and a lot of different IT contracts.” 

Read the full story here!

This month’s cover story features Fiona Adams, Director of Client Value Realization at ProcurementIQ, to hear how the market leader in providing sourcing intelligence is changing the very face of procurement…

It’s a bumper issue this month. Click here to access the latest issue!

And below are just some of this month’s exclusives…

ProcurementIQ: Smart sourcing through people power 

We speak to Fiona Adams, Director of Client Value Realization at ProcurementIQ, to hear how the market leader in providing sourcing intelligence is changing the very face of procurement… 

The industry leader in emboldening procurement practitioners in making intelligent purchases is ProcurementIQ. ProcurementIQ provides its clients with pricing data, supplier intelligence and contract strategies right at their fingertips. Its users are working smarter and more swiftly with trustworthy market intelligence on more than 1,000 categories globally.  

Fiona Adams joined ProcurementIQ in August this year as its Director of Client Value Realization. Out of all the companies vying for her attention, it was ProcurementIQ’s focus on ‘people power’ that attracted her, coupled with her positive experience utilising the platform during her time as a consultant.

Although ProcurementIQ remains on the cutting edge of technology, it is a platform driven by the expertise and passion of its people and this appealed greatly to Adams. “I want to expand my own reach and I’m excited to be problem-solving for corporate America across industries, clients and procurement organizations and teams (internal & external). I know ProcurementIQ can make a difference combined with my approach and experience. Because that passion and that drive, powered by knowledge, is where the real magic happens,” she tells us.  

To read more click here!

ASM Global: Putting people first in change management   

Ama F. Erbynn, Vice President of Strategic Sourcing and Procurement at ASM Global, discusses her mission for driving a people-centric approach to change management in procurement…

Ripping up the carpet and starting again when entering a new organisation isn’t a sure-fire way for success. 

Effective change management takes time and careful planning. It requires evaluating current processes and questioning why things are done in a certain way. Indeed, not everything needs to be changed, especially not for the sake of it, and employees used to operating in a familiar workflow or silo will naturally be fearful of disruptions to their methods. However, if done in the correct way and with a people-centric mindset, delivering change that drives significant value could hold the key to unleashing transformation. 

Ama F. Erbynn, Vice President of Strategic Sourcing and Procurement at ASM Global, aligns herself with that mantra. Her mentality of being agile and responsive to change has proven to be an advantage during a turbulent past few years. For Erbynn, she thrives on leading transformations and leveraging new tools to deliver even better results. “I love change because it allows you to think outside the box,” she discusses. “I have a son and before COVID I used to hear him say, ‘I don’t want to go to school.’ He stayed home for a year and now he begs to go to school, so we adapt and it makes us stronger. COVID was a unique situation but there’s always been adversity and disruptions within supply chain and procurement, so I try and see the silver lining in things.”

To read more click here!

SpendHQ: Realising the possible in spend management software 

Pierre Laprée, Chief Product Officer at SpendHQ, discusses how customers can benefit from leveraging spend management technology to bring tangible value in procurement today…

Turning vision and strategy into highly effective action. This mantra is behind everything SpendHQ does to empower procurement teams.  

The organisation is a leading best-in-class provider of enterprise Spend Intelligence (SI) and Procurement Performance Management (PPM) solutions. These products fill an important gap that has left strategic procurement out of the solution landscape. Through these solutions, customers get actionable spend insights that drive new initiatives, goals, and clear measurements of procurement’s overall value. SpendHQ exists to ultimately help procurement generate and demonstrate better financial and non-financial outcomes. 

Spearheading this strategic vision is Pierre Laprée, long-time procurement veteran and SpendHQ’s Chief Product Officer since July 2022. However, despite his deep understanding of procurement teams’ needs, he wasn’t always a procurement professional. Like many in the space, his path into the industry was a complete surprise.  

To read more click here!

But that’s not all… Earlier this month, we travelled to the Netherlands to cover the first HICX Supplier Experience Live, as well as DPW Amsterdam 2023. Featured inside is our exclusive overview from each event, alongside this edition’s big question – does procurement need a rebrand? Plus, we feature a fascinating interview with Georg Rosch, Vice President Direct Procurement Strategy at JAGGAER, who discusses his organisation’s approach amid significant transformation and evolution.

Enjoy!

Dominic Fitch, Head of Creative Change at leadership development specialist Impact International, outlines five forward-looking skills for the next generation of leaders.

There is no denying that the world of business is evolving at an incredibly fast pace. With the constant launch of new tools and innovative tech, workers are required to embrace a wide range of modern equipment on a regular basis.

As employees continue to up their game, it is only natural that the next generation of leaders will need a set of updated skills too.

Dominic Fitch, Head of Creative Change at leadership development specialist Impact International

Here, with some insights from Dominic Fitch, Head of Creative Change at leadership development specialist Impact International, we take a look at some crucial future requirements that business owners and managers will have to nail to guide their team in an efficient, successful fashion.

1. Technological inclination

In the same way that youngsters jump at the latest technology at the first opportunity, it is important for future leaders to emulate that same drive and curiosity.

The world is becoming increasingly digitalised, and the business sector is no exception. This is why company owners and managers should have a basic understanding of today’s technologies, exploring how modern equipment can actively aid their business. From cloud computing to artificial intelligence and UX development, there are many different tools that can increase your organisation’s chance of success.  

Of course, nobody expects you to be an expert in computing coding or programming. But getting precious digital and tech skills under your belt can provide you with more than one ace up your sleeve.

2. Empathy and emotional intelligence

Just like an experienced, Michelin-star chef, future leaders have to juggle and balance several different aspects to create a perfect menu. Yes, technology will play an essential role in developing and driving your company forward. But software and robots have not yet mastered emotional intelligence, which means they cannot help on the more human side of things.

A business owner or manager should always strive to harness their relationship with colleagues and team members. Empathising, sympathising, supporting, and understanding the necessities of your employees is crucial, as this can inspire confidence and a sense of belonging in your people. If workers feel appreciated and cared for, there is a good chance they will go the extra mile to spur the growth of your business.

Hence, taking an interest in your team’s well-being and nurturing a shared feeling of unity is a fundamental attribute to possess.

3. Openness to diversity

One of the most prominent advantages of modern technology is that it’s abating boundaries and favouring connections with people worldwide. Hence, as time goes by, it is becoming more and more important to collaborate with colleagues from all over the globe. This means that, on a daily basis, you are working with teams from different cultures and who may even speak another language.

Engaging with people from all walks of life and with diverse backgrounds can open the doors to endless opportunities. Not only will you benefit from a vast range of experience, knowledge, and expertise, but you will also learn precious lessons on how to enter and succeed in global markets. Therefore, as the world becomes increasingly connected, future managers need to embrace diversity and make the most of its invaluable benefits.

4. Clarity and communication

Dominic Fitch, Head of Creative Change at leadership development specialist Impact International, outlines five forward-looking skills for the next generation of leaders.

Clarity and effective communication are timeless features of strong leadership. Managers need to build bridges between their team members and outline the company’s missions in a concise, transparent manner. In this respect, leadership development training is an excellent place to start when it comes to learning how to deliver messages and strategies that are straight to the point.

Future leaders have to be able to identify the right channels to carry this out in a smooth, effective way. With the many digital platforms at our disposal, it is important to choose one that can keep people on the same page at all times. What’s more, as innovations and possibilities arise, future managers need to communicate the essence of the question at hand in a digestible fashion.

Simplifying a complex situation or task is a crucial skill, and it is one that can aid both your team’s productivity and your business’ efficiency.

5. Foresight and adaptability

As technology evolves, artificial intelligence progresses, and the business sector continues to mutate, future leaders need to be flexible. Business owners and managers have to be ready to adapt and make sure they are not fazed by what the future holds. They should monitor trends and look at how to welcome change with a positive attitude.

How can you prepare for upcoming possibilities? One effective way is to run through various scenarios and start outlining all possible outcomes. What’s more, engaging with new circumstances and journeying out of your comfort zone can be an important learning curve. In fact, it will teach you how to deal with unfamiliar situations. If an unexpected opportunity comes about, you will have both the skills and confidence to respond to them with confidence.

To keep in step with the times, business leaders of the future will need to polish their set of skills. From emotional intelligence and adaptability to clear communication and openness to diversity, there are many aspects that will strengthen your leadership. By showing an interest for new software and technological developments, you can make sure your company is expanding its reach and exploring new, successful paths.  

In EY’s January 2023 European CEO Outlook Survey, it was discovered European CEOs expect short-term challenges but have reason for optimism.

Today’s CEO faces unprecedented challenges like never before and is tasked with navigating choppy waters.

Amid global uncertainty caused by a potential recession and on the back of war in Ukraine and disruption caused by COVID-19, it can feel overwhelming for even the most experienced leaders.

A positive horizon?

Despite this, consulting giants EY has discovered reason for optimism in its January 2023 CEO Outlook Pulse survey which includes 390 responses from CEOs across Europe. While the survey found 98% of respondents are indeed expecting a global recession, the majority of European CEOs (52%) anticipate it to be temporary and not a persistent one. These figures are a greater percentage than CEOs worldwide (48%) who point to more long-term optimism for the global economy among European CEOs.

According to the survey, 47% of European respondents believe this recession will be different from previous slowdowns. The recent crisis is more driven by myriad geopolitical challenges and an ongoing fallout from the COVID-19 pandemic compared with previous recessions primarily as a result of financial and credit market factors. Many CEOs are aware of this difference and acknowledge the necessity for new and sustainable approaches that build resilience in uncertain times.

In EY’s last survey in October 2022, ongoing pandemic-related concerns such as supply chain issues were the most important topics. However, since then supply chain pressures have eased to some extent with data from S&P Global Purchasing Managers’ Index (PMI) showing improvement. Only 32% of European CEOs now cite supply chains as the key issue which is down from 41% in October. Given inflationary pressures and the upward movement in interest rates, European CEOs are increasingly focusing on the policies and steps they believe European governments should take to help businesses mitigate the downturn.

About 35% of European respondents, in comparison to 32% globally, consider uncertain monetary policy and increasing cost of capital as the biggest challenge to growth. With inflation beginning to decline in November 2022 after 17 months of upward trajectory, CEOs are closely following central bank activity for potential course changes.

A strategy change

In response to the current recession, EU policymakers are considering more dovish economic recovery proposals instead of top-down austerity rules seen during the sovereign debt crises a decade ago. This includes rethinking debt rules to help countries navigate this downturn. Alongside this, EU governments now face pressure on how to handle the discontent of people protesting against the rising cost of living crisis and questions still remain on how extensively they will intervene. In particular, governments are reluctant to pursue austerity measures as a result of protests from the crisis 10 years ago. Meanwhile, for CEOs, financing will continue to be a challenge as a result of increased capital costs that are set to persist which disrupted growth plans.

European CEOs have learned from previous financial crises and recognise that it is essential to think of new and sustainable strategies to capitalise on the opportunities.

What is the way forward?

According to EY, there are five directives which are worth exploring over the next few years.

Investing in operations
European CEOs identify investing internally to boost operations as extremely important. Risk isn’t only about extraordinary events; day-to-day operational failures can also lead to losses, regulatory action and reductions in share prices. Operations such as finance, accounting and supply chain have emerged as the top priority area of investment for European CEOs (41%).

Recognising disruption and accelerating digital transformation

Amid ongoing global pressure to embrace new technologies and a digital transformation, COVID-19 further accelerated a trend toward digitalisation. Around 38% of European CEOs (in line with 37% globally) are looking to invest in digital transformation, data and technology to emerge stronger from this downturn.

Developing a strong environmental, social and governance (ESG) strategy

Businesses need to ensure ESG processes are moved to the centre of business strategy. Sustainability, including net zero and other environmental issues, as well as societal priorities, is one of the key areas that European CEOs identify as a need for more investment.

Nurturing talent

Despite the recession, the labour market remains tight in Europe. European CEOs are weighing cost management options, with 37% considering a move to contract employment and 38% planning on reducing learning and development investments. About one third are also considering a restructuring of their workforce compared with global and Americas CEOs (36% and 42%) considering the same approach.

Portfolio transformation

Looking ahead, portfolio rebalancing is expected to be a key theme as CEOs will be compelled to make bold decisions regarding their business portfolio. During a recession, companies must critically assess what their core businesses are, what their focus should be and where they can create value by spinning out or selling non-core assets. Some 93% of European CEOs consider prioritising restructuring opportunities as an important initiative in the next six months.

Mike Randall, CEO at Simply Asset Finance, discusses how to build a people-first strategy that enables growth.

As the UK economy continues to balance on the edge of a recession, employee retention is quickly being pushed to the top of CEOs’ lists. Over the past couple of years, the job market has shifted dramatically with previously unheard terms such as ‘the great resignation’, ‘quiet quitting’ and ‘hybrid working’ becoming commonplace. People are rightly prioritising their working situation and job satisfaction levels, questioning whether they believe in the organisations they are committing so much time to.

Consequently, there has been a power dynamic shift in favour of the workforce. Reportedly in the third quarter of 2022 businesses witnessed over 365,000 job-to-job resignations across the UK. In similar fashion, the phenomenon of ‘quiet quitting’ – doing the bare minimum required of a job – has become a growing concern but its rise is prompted by a growing number of employees feeling disengaged in their roles.

Against this backdrop of a highly turbulent job market, and increasingly difficult macro-economic pressures, it’s vital for CEOs to prioritise a people-first strategy to ensure healthy growth for their business in 2023. Data from Deloitte has even revealed that experts believe how engaged a workforce feels can directly correlate to overall business output, with 93% of HR and business leaders in agreement that building a sense of belonging is crucial for organisational performance.

Mike Randall, CEO at Simply Asset Finance

However, creating the right environment and recruiting, maintaining and nurturing the right talent to ensure a people first approach can be daunting. With this in mind, here are four learnings CEOs might want to consider when approaching this challenge:

1. Define your beliefs

Before CEOs and founders can hope to attract the right talent, it is critical to first distil and translate the business vision into something that can be understood by employees. Put simply, this means defining the business’ beliefs.

Some business leaders may already refer to this as an ‘employer brand’, and it can be key to not only securing better talent, but also saving a business money in the long-term. Data from LinkedIn for example, recently found that a strong employer brand can help to reduce employee turnover by as much as 28% and cost-per-hire by 50%. Defining these beliefs – or the tenets a business does and doesn’t stand for – is therefore the perfect exercise to put a vision onto paper, and clearly communicate it to its prospective talent.

2. Build a solid culture

Once these beliefs have been defined, they must be reflected, and built into a strong culture. A business’ beliefs should permeate through the whole organisation – from customer communications, to how staff are treated, to how leaders run the business. Culture should essentially be a representation of a business’ beliefs being put into practice.

Building a strong culture in a business, however, is not solely about these beliefs but also extends into how employees are equipped with the tools they need to succeed. Companies that invest in learning and development for example, have been found to benefit from a 24% higher profit margin than those that don’t, according to the Association of Talent Development. Training and development should therefore be seen as a worthwhile and necessary investment that can solidify your culture and ensure profitability, not just an unavoidable cost.

3. Invest in retention

With research from Oxford Economics estimating the average turnover per employee earning £25,000 a year to be £30,000 plus, there is an evident cost to businesses that fail to invest in retention. Tackling this will mean regularly taking the time to truly understand what makes employees tick – and more specifically, understanding their motivations, attitudes, behaviours, strengths and weaknesses.

As the past few years have evidenced, individuals are no longer deciding where they work solely based on salary, but are also thinking about employer values, flexibility, and benefits. To avoid employee churn, businesses should regularly take time to understand what drives their employees and implement retention strategies to address these drivers. Gathering and analysing employee data will play an important role here over the coming years, and should be built into a long-term strategy to optimise employee satisfaction.

4. Build for the future

A common challenge encountered by modern businesses and startups wanting to take a people first approach, can be their ability to stay committed to it. As a business grows in size and becomes successful, it can be all too easy to let external factors dictate its purpose and for it to lose sight of what it initially stood for. The reality is that when this happens, a business is in its most vulnerable state – as its beliefs become increasingly distant, and worse, employees no longer understand what it stands for.

When creating a people-first strategy its therefore important to think long-term. If there are external factors that will potentially put this strategy at risk in future, it’s crucial to identify them, and put in practical steps to mitigate them where possible. The pandemic, for example, is a prime example of an external factor that interrupted the status quo of many businesses – disrupting employees, customers and operations in general. While they can be unpredictable in nature, having a plan to get through these times can help to get you back on track and reassure talent that a solution is in place.

In this economic climate, defining beliefs, building a solid culture, and retention plan should be at the core of every business’ strategy. It’s only when these things are in place that a business can hope to attract and retain talented people that exude the same passion and values built into the heart of a business. As while a business’ growth may be defined by its leaders, it is delivered by its people who are putting that vision into practice.

Mike Randall, CEO at Simply Asset Finance.

Diane Lightfoot, CEO of Business Disability Forum, on changing the narrative around diversity and inclusion in the workplace

Disability is still often parked in the “too difficult” box when it comes to Diversity, Equity and Inclusion. Employers are often afraid of doing or saying the wrong thing and as a result, do or say nothing.

As a CEO, the stakes feel (and often are) higher. That high profile platform can feel daunting at the best of times; when tackling an unfamiliar topic, it can feel positively overwhelming.

Talking about Disability

What we do and say as senior leaders has a huge impact. Indeed, it is critical in driving change. In 2020, we published our global research report, ‘Towards a Disability-Smart world: Global disability inclusion strategy’ . Conducted with our Partner, Shell, the research found that 91 per cent of respondents across multi-national businesses agreed that identifying a senior global disability champion is essential. Talking about disability and diversity – normalising the conversation so it becomes business as usual, has a massive role to play in creating a culture of “psychological safety” in organisations; one in which employees feel safe to share a difference and to ask for the support they need.

As senior leaders, it is easy to forget our privilege and that the environment we inhabit, and how we think the culture feels, may look very different to others. I often quote a research study by our partner Accenture which showed a marked gap (of around 20% across the board) between senior executives’ perception of how “safe” their employees would feel to raise a sensitive topic (including talking about a disability) and how safe they actually felt.

Changing the narrative

So, what can CEOs do to change the narrative? At Business Disability Forum (BDF), we see time and time again that CEOs or senior leaders who have a personal knowledge of and interest in disability issues – perhaps because of their own experience or that of a close family member – are champions in driving change. Senior leaders are less likely to publicly identify as being disabled – the Valuable 500 campaign often quotes the stat that 1 in 7 C suite leaders have a disability, but 4 out of 5 are hiding it. Yet if you as a senior leader are willing to talk about a disability or long-term condition it is hugely powerful in enabling others to do the same.

Storytelling and sharing personal stories can have a huge impact – for good or for bad! The good: A high profile CEO we work with talks openly about his disabled adult children and the moral imperative that he believes that large businesses have in breaking down barriers and opening up opportunities to people who face greater barriers to employment. The bad: I vividly recall being in a meeting with an organisation (not a BDF member!) to plan a possible disability awareness campaign. At the end of the meeting, the CEO then told an anecdote about having had an operation in the past year and being back at work the next day – unlike one of their counterparts who had taken two weeks off to recover. What message does that send? I’ll warrant that those who overheard that story were less likely, not more, to talk about a disability as a result.

Being a disability ally

But you don’t need to have your own lived experience to be an ally. For many businesses, the pandemic brought many senior leaders “up close and personal” with their disabled employees for the first time. In a survey we carried out to find how out how BDF Members and Partners were responding to Covid19, we found that in 83 per cent of organisations the general response to Covid-19 – including arranging internal communications, home working, and ensuring staff have the adjustments they need – was being led by the Chief Operating Officer or Chief Executive.

Whilst the figure for responsibility for ensuring staff with disabilities and long-term conditions specifically can move to home working was much lower – 31 per cent said this was the direct responsibility of the COO or CEO as compared to 69 per cent for HR – this is still encouraging in giving senior leaders much greater insight into the issues facing their disabled employees. Too often we “don’t know what we don’t know” – but once we do, we can call it out.

I was very heartened by a discussion with one of our members who was planning an office relocation in which the senior champion leading the project told me that he had vetoed one possible option because it had cobbled paving directly outside – inaccessible to wheelchair users and difficult for anyone with a mobility or visual impairment.

Role Modelling

Leadership is also critical in modelling adjustments and different ways of working. As a CEO, you probably have the freedom to quietly get on with making the adjustments you need, whether that is working from home one day a week (and it’s worth remembering that pre-COVID-19 home working was the most frequently requested workplace adjustment), different/flexible working times or buying some ergonomic equipment. You don’t need to go through a process or to ask HR – but if you share a different way of working with the wider team again it can be hugely powerful in making it ok for others to ask for the support they need. And again, people are often afraid to ask for even simple adjustments that could transform the quality of their working life.

Our Great Big Workplace Adjustments Survey 2019 found that 28 per cent of those with adjustments and 34 per cent of those without adjustments (but who would have benefited from them) said they did not make requests because they were worried their employer might treat them differently. Again, actions speak louder than words. If the boss doesn’t take a lunch break, the rest of their team is unlikely to.

I hope that one positive legacy of COVID-19 will be a kinder and more human style of leadership. During the pandemic, we were forced to be more human in the way we worked; viewed in our home setting without the “trappings of office” or our workplace “armour” in terms of a formal dress code. The intimacy of letting people into our homes (albeit via our video camera) was a powerful thing. The blurring of lines between work and home has its downsides but has positives too as we started to see the “whole people” in our teams; ironically, since the pandemic began, many of us have got to know our colleagues better than we did before.

Culture Change

Of course, culture needs to be backed up by practical action. Make sure you equip people managers throughout your business with the tools and knowledge they need to have a conversation about disability, to identify any barriers people may be facing and to know where and how to get practical support. Our free Disability Essentials resources is a good place to start.

As Peter Drucker famously said: “Culture eats strategy for breakfast.” Like it or not, what you do as a CEO not only matters but has a disproportionate impact. Why not use that for the good?

https://www.youtube.com/watch?v=g-TRCm1dv6o

Read more insightful features like this in the latest issue of CEOstrategy

Welcome to the launch issue of CEOstrategy where we highlight the challenges and opportunities that come with ‘the’ leadership role

Our first cover story explores how Vodafone is leveraging strong leadership to drive the collaborations enabling businesses to champion change management and better use technology.

Welcome to the launch issue of CEOstrategy!

Tasked with accelerating business growth, while building the synergies across an organisation that can drive innovation to meet diverse customer needs and keep revenues on track, the modern CEO must be mentor, marshall and motivator on the journey to success.

Read the launch issue here!

Leadership with purpose at Vodafone

“Leadership is purpose, it’s why do you do the things you do…”

Our cover story throws the spotlight on Vodafone US CEO David Joosten; also Director for Americas & Partners Markets at Vodafone Business, he talks to CEOstrategy about leading from the front and setting the standards to deliver growth while keeping employees and customers happy.

“People follow leaders that are honest about themselves. If you can reflect on what you’ve done well, but also where you need to improve it can inspire others to do the same.”

EMCS Industries Ltd: How a CEO can navigate change management

“Why hire talent and then tell them what do? You have so much to learn from the great people you hire. Micromanaging is not management, and it’s certainly not leadership. Let your people thrive!”

Read our interview with EMCS Industries Ltd CEO Trevor Tasker for more thought-provoking insights on leadership from the shifting tides of the marine industry in this maiden issue.

How to be an authentic leader

“At the most basic human level, everyone knows what it’s like to feel heard by another person, and how that changes our behaviour. It can help anger and sadness subside and enable us to start seeing things differently. So, when employees are being listened to by their leaders, it can only help how an organisation operates.”

Dr Andrew White, director of the Advanced Management and Leadership Programme at the University of Oxford’s Saïd Business School and host of the Leadership 2050 podcast series, explores transformative approaches to leadership for the modern CEO.

How can CEOs drive forward culture change around diversity and inclusion?

Diane Lightfoot, CEO of Business Disability Forum, explores the changing the narrative around diversity and inclusion in the workplace.

“Disability is still often parked in the “too difficult” box when it comes to Diversity, Equity and Inclusion. Employers are often afraid of doing or saying the wrong thing and as a result, do or say nothing. As a CEO, the stakes feel (and often are) higher. That high profile platform can feel daunting at the best of times; when tackling an unfamiliar topic, it can feel positively overwhelming. But what we do and say as senior leaders has a huge impact. Indeed, it is critical in driving change.”

https://www.youtube.com/watch?v=g-TRCm1dv6o

Also in this launch issue, we get the lowdown on agile ways of working from Kubair Shirazee, CEO of Agile transformation specialists Agilitea. Elsewhere, we speak with Nirav Patel, CEO of the consultancy firm, Bristlecone – a subsidiary of Mahindra Group and a leading provider of AI powered application transformation services for the connected supply chain – who discusses the challenges facing CPOs and supply chain leaders in our uncertain times. And we analyse the latest insights for CEOs from McKinsey and Gartner.

Enjoy the issue!

Dan Brightmore, Editor

Mark Weil, CEO at TMF Group, discusses the rise of staff attrition in the industry

At the start of 2023 many companies are still struggling to find employees. The job market favours the applicant far more than before Covid-19 across many sectors. Higher interest rates and lower economic growth so far haven’t reduced the pressure on labour availability.

High staff turnover isn’t just a matter of the cost it creates. The disruption from running with a lot of open roles and with less experienced staff can disrupt client service, increase error rates and lead to more serious compliance and reputation damage.

Mark Weil, CEO at TMF Group

Examining the data

A lot of commentary on the situation has been based on surveys of employees’ intentions rather than their actual decisions. By managing our clients’ financial, legal and employee administration we have access to large volumes of data. This provides insight on the overall recruitment and resignation levels across workforces, from several hundred thousand employees, covering a broad range of sectors and job levels in more than 90 countries.

As a starting point, the data tells us that there was indeed a significant global increase in staff resignation during and after the pandemic. Across the 90 countries, average company staff attrition rose from around 15% annually in mid-2020 to 25% at the end of 2021. That’s a dramatic 67% increase in just 18 months.

Global annualised employee attrition trend

Digging deeper reveals a much more nuanced picture by company and country. In 2021, staff attrition averaged around 20% across the 90 countries but was below 10% in a small number, with Argentina the lowest at 6%. Of those above 20%, India, the UK and Poland topped the list with a rate of 26%. Both India and Poland are now major destinations for companies establishing regional service centres – locations that are supposed to be low cost, stable hubs that support many other countries. So rising staff turnover there will be particularly painful.

2021 average employee attrition by country

When examining the data at company level, annual attrition levels vary  even more widely, from a low of around 5% to a high of 40%. Some of that will be a result of challenges in specific industries and companies. Some will arise from the underlying attrition in the labour market of the countries they operate in. To disentangle how much is company versus country, we compare in the chart below the attrition a firm is seeing with the average attrition it should be seeing given the mix of countries where it operates.  The wide spread in the data shows that that country averages matter far less than individual company factors. For example, looking at companies whose country mix should give them expected attrition of around 15-20%, we see many at 30%-40% and others at just 5%-10% attrition.

Company actual 2021 attrition versus average for the countries where they operate

Staff attrition is a problem at any time, but becomes a significant threat to a business if it gets too high. How high is a matter of judgement and depends on the particular company. In professional services, for example, when staff attrition is above 20% it starts to impact client service and above 30% it can pose a risk to regulatory and reputational integrity.

The rise in global staff attrition, coupled with big spikes by country and company means that multinational firms will have an increased number of locations where attrition is high and potentially well beyond manageable levels. From 2020 to 2021 the number of employees in company locations experiencing more than 20% attrition nearly doubled, from around 15% to 27%. Looking at where the levels were highest, employees in countries experiencing more than 35% attrition rose from 1% to 7%. That means there’s an increasing number of hotspots, where extremely high staff attrition means companies need to intervene quickly to avoid staff resignations spiralling due to increased workload.

Factoring in country complexity

An important additional factor is the complexity of a particular country to operate in. Many countries  have onerous business rules which are enforced vigorously. High staff turnover in complex countries is particularly dangerous because of the added risk of compliance breaches.

We can look at country complexity using TMF Group’s Global Business Complexity Index. It ranks countries annually based on 292 criteria, covering the fiscal, legal and employment environments for doing business in each location.  

Jolyon Bennett, CEO of Juice, discusses how sustainability has moved to the forefront of his organisation’s operations

A green approach is quickly transitioning away something that is ‘nice to have’ to an essential component of a company’s strategy.

To Jolyon Bennett, who heads up UK tech accessories manufacturer Juice, being environmentally friendly is non-negotiable. Bennett has transformed the mobile phone accessories sector, having consistently introduced a series of quality, vibrant and consumer-focused products to market, ranging from portable power banks through to super-fast chargers.

He takes us under the bonnet of his firm’s sustainability drive.


You have recently removed all single-use plastic from your entire product range – why?

Jolyon Bennett (JB): “Why wouldn’t you? Single-use plastic is one of the biggest polluters in manufacturing – it uses 3% of the entire planet’s oil consumption. This year, it’s forecast that there will be 50kg of plastic waste for every single one of the eight billion human beings on planet earth – that’s a lot! Consumers, manufacturers and brand owners like myself all need to get on board with the fact that we’re going to need to use and re-use plastic packaging to make different things.

“Why have we done it? Because it’s totally the right thing to do. We need to stop making so much plastic and we need start reusing what we’ve already got. We need to stop cutting down trees in order to make paper and cardboard – let the trees grow and re-use what we’ve got. It just makes sense on a planetary level to stop consuming quite so much and start being just a bit more content with what we’ve got. Why do we need to make ‘new new new’ all the time?”


What have you used instead of virgin plastic?

JB: “We’re reusing, reusing, reusing. Did you know that recycled plastic – depending on its quality and density – can be recycled and re-used between seven and 200 times. Isn’t that unbelievable? It’s such an amazing material. Plastic is a vibe, and we should be re-using it. Juice is using post-consumer waste such as Evian bottles to make speakers, old milk cartons to make power banks and so much more!”


Why do you love plastic?

JB: “I just think we’ve got a lot of it so why not reuse it? I admire the material because it’s so durable – it’s an incredible scientific breakthrough to be able to make something that’s not only waterproof and heatproof but lasts for up to 3,000 years. There are so many different elements that make plastic a great material. I would prefer it if we didn’t have any, but that’s not going to solve the current (and ever-growing) problem of plastic waste finding its way into our oceans, and burying it isn’t the answer either. The problem is with us humans is that we just shy away from the truth – l don’t want to shy away, I want to face these problems head on and meet the challenge.”


Has Juice taken a financial hit to make this happen?

JB: “As an example, we sell around three million cables a year (based on last year’s figures) and each piece of packaging that we are making using post-consumer waste costs us between $0.15 and $0.25 more, so as a minimum, our increased cost for doing this is almost half a million dollars. But I still think it’s the right thing to do. Money is made up – the world could end and money would no longer matter, so let’s stop making decisions based purely on money and let’s start making decisions based on the right thing to do.”


How do you rate the overall quality of the ‘Eco’ products compared to the ones they have superseded?

JB: “There is absolutely no difference whatsoever, so I rate them just as highly.”


Do customers really want these eco products or is this more for your own conscience?

JB: “I don’t suffer from guilt so in that respect I don’t feel driven by my conscience to do this – doing the right thing has its own gravity and its own way of whisking you forward. Generally, I believe that people and businesses that do the right things will prosper. I’m a firm believer in the philosophy of ‘do the right thing and good things will happen’ so it’s a strategic choice to do something that has a positive impact because positive things attract positive things. While not every consumer or every retailer is especially interested in our sustainability drive, I do think this is shifting slightly. Maybe I do have a conscience, but the reality is that it’s the right thing to do, and the right thing gets rewarded in the end.”


Are retailers keen to stock them?

JB: “We haven’t given them a choice! We changed all of our products because we wanted to and we are adamant that even though the materials we are using are different, our products still perform just as well, if not better.”


Should other tech brands follow suit?

JB: “Of course they should, and we would happily help them do so. We’re willing to introduce other tech brands to our suppliers and guide them through the same process we’ve taken, sharing our knowledge – including the hurdles we’ve overcome – because it’s the right thing to do. I don’t understand why any brand would want to continue producing virgin plastic when they don’t have to, it just doesn’t make any sense to me.”


What advice would you give to other brands wanting to embark on this process of removing single-use plastic from their products?

JB: “Do it. Stop messing about – get on with it and do it. Although it may cost you a bit more in the short term, we’ve proven that consumers do generally buy more of your products if you are making the right decisions towards the environment, so you will reap this extra cost back whilst also doing the right thing.”


What is next for Juice?

JB: “I want Juice to be a brand that limits its impact. We’re currently doing this with our manufacturing and through our supply chain and the way that we conduct ourselves in general. I want to start releasing products that have a positive impact on humans as well as the planet – I’m a firm believer that everyone can win. There will always be a demand for technology, so I don’t believe that we should be fighting against it, however, I would very much like to see people taking their technology off grid.

“My dream is to be able to take every mobile phone on planet earth off grid and start generating our own personal electricity. I want to create products that link to your activity – imagine if you could run 5k and the kinetic activity could generate enough energy to a charge a device such as a phone or a laptop while you do it? I’m interested in organic solutions to current chemical problems such as organic battery cells using salt water and algae as a storage method of electricity – so much so that we’re currently in discussions with a photosynthesis harvesting electronics brand about using photosynthesis as a charging capability!

“I want to get more connected with nature and I think you can have it all – I think we can still enjoy modern technology as well as the beautiful world around us. If we can utilise our intelligence in the right way, we can all live in a perfectly harmonious symbiotic relationship with amazing technology products and a sustainable environment for all wildlife.”

Procurement is in a state of flux. Against a backdrop of economic uncertainty, the procurement landscape is volatile and requires…

Procurement is in a state of flux.

Against a backdrop of economic uncertainty, the procurement landscape is volatile and requires agility to navigate turbulent waters. But, despite significant disruption could there still be opportunity?

Simon Whatson, Vice President of Efficio Consulting, is optimistic about the future of digital procurement and despite a challenging few years he is confident of a successful bounce back. He gives us the lowdown on the direction of travel for digital procurement in 2023. 

As an executive with considerable experience in the space, we’d love to learn more about your background and how you ended up in procurement. Why was this the specialism for you and how did you get involved to begin with?

Simon Whatson (SW): “I think the one-word answer of how I came into procurement was accidental. I studied maths at university, with a year in France, before I began looking for different roles to apply for.

“Eventually, I was offered a position with a big plumbing and heating merchant with global operations. I worked in that supply chain team for two and a half years. Although it was called supply chain, a lot of the work was procurement, which involved negotiating with suppliers. It was after that stint there, that I discovered consulting and joined a boutique procurement consultancy. Now I am onto my third consultancy and I’m very happy here!

“In terms of why I’ve stayed, one of the success factors in procurement is being able to work cross-functionally. Procurement doesn’t own any of the spending that it is responsible for helping to optimise. It must work with other functions and the spend owners. I quite like the people side of that, building relationships, almost selling internally to bring teams together. That really appeals to me and is a key reason why I’ve been very happy in procurement.”

As we move into exploring procurement today in 2023. The space is filled with challenges and complexities. You only need to look at the last few years. Covid, war in Ukraine, inflation – how would you describe the world’s recent challenges and their effect on the industry and what do you feel CPOs and leaders can do to combat these issues?

SW: “I would flip it around and say that these are not so much challenges but rather opportunities for procurement. When I started my career 18 years ago, procurement was often fighting to get a voice and there were complaints that procurement was not represented at the top table, but the war in Ukraine, inflation, COVID and ESG, these are things which are now on the C-suite agenda and procurement is ideally positioned to help companies face those challenges. If you think about COVID and the war in Ukraine, procurement is in a privileged position to help with this.

“I see some procurement functions that prefer to do what they know, which focuses on the process and transactional side. However, there are also many forward-thinking CPOs and procurement professionals out there, that have really seized this opportunity of being on the C-suite agenda and drive the thinking and the solutions to some of these big challenges we’re seeing.”

Although new technology in procurement has been around for well over a decade, digitalisation has become so much more of an important topic. How would you sum up where procurement and supply chain are in terms of digital transformation today?

SW: “It’s a bit laggard, but digital transformation is difficult, and we have to recognise there are some real trailblazers. There are some firms doing some fantastic things in digital to produce better outcomes. If you contrast your experience when you’re buying something in your private life, it’s much easier than 20 years ago. You can get access to a wealth of pre-sourced things, whether it’s food, a holiday, a car, or a book. You can see reviews of what other people think of these things.

“But when you go into your workplace as a business user and you want to buy something, it doesn’t quite work like that yet. You often have to fill in a form, send it off and wait for them to come back to you. They might come back a little bit later than you were hoping and might tell you that they don’t have that part on the supply frameworks. I think people sometimes get confused about how it can be so easy to buy something as large as a car or a holiday on their sofa at home, but when they want to buy something at work, it seems to be quite cumbersome. Digital can help a lot with that, but it is incumbent on organisations and procurement functions to figure out how to recreate that customer experience that we’ve become accustomed to in our private lives.”

With a new generation of leaders growing up with technology, some might say that it could be a key driver in helping to speed the adoption in procurement along. Is this something you would agree with or what would you point to as a key driver?

SW: “I do think that it will act as one of the catalysts for further digital transformation in organisations, because if procurement doesn’t manage to recreate that customer experience that the new generation expects, then they won’t use procurement going forward and will look to bypass it.

“The analogy that I’ve used previously in this case is one of travel agents. I remember as a child, my parents were able to take us on holiday and I remember the whole process. We would walk into town to the travel agent, and look at some of the brochures of options. They often then had to phone the various airlines or resorts on our behalf. They might not be able to get through, so we’d have to come back the next day. I remember as a child being quite excited by the whole process but actually, thinking back, it was quite cumbersome. You compare that to now, with being able to review online, and you can get instant answers to your questions. It’s not a coincidence that travel agents don’t really exist anymore.”

How much of a challenge is it to not get caught leveraging technology for technologies sake? How important is it to stay true to your approach and be strategic?

SW: “We conducted a study of many procurement leaders and CPOs a few years ago, and one of the things that we found was that about 50% of procurement leaders admitted to having bought technology just on the basis of a fear of missing out, without any real understanding of the benefits that technology was going to bring. That was a real shock and a revealing find because technology is not cheap, and its implementation is quite disruptive. If you’re purchasing a system because everybody else is using it, then there could be some pretty costly mistakes. It is really important to make sure that when buying technology, it is because the benefits are fully understood.

“My advice to companies when looking to digitalise is own your data, visualise that data, and manage your knowledge. If you can focus on getting those things right in that order, and make your technology decisions to support that goal, then that’s a much better way of thinking about it rather than just jumping in and buying a piece of technology.”

It’s clear that the procurement space is an exciting, but challenging, place to be. What do you think will play a key role in the next 12 months to push the digital conversation further to take procurement to the next level?

SW: “Looking forward, one thing that procurement needs to do and continue to do is attract the best people. Ultimately, people are what makes an organisation, and it is what makes a function successful. I think procurement has often not looked for the right skills in the people that it employs. Traditionally, it’s looked for people with procurement experience and while they are valuable and required, we also need leadership potential. People who think a bit more outside the box and aren’t so process driven. A lot of what procurement has done in previous years has been process driven, so if you’re just limiting your search of people to those that have had procurement experience, you’re inevitably going to end up with a lot of people who are process driven.

“I think being bolder and recruiting people from different backgrounds with different skill sets is the way to go. If procurement can ‘own’ the ESG space, that will help with the younger generation see procurement make a difference. I think that’s one thing that will be key to success going forward.”

Check out the latest issue of CPOstrategy Magazine here.

Paul Farrow, Vice President of Hilton Hotels’ Supply Management, sits down with us to discuss how his organisation’s procurement function has evolved amid disruption on a global scale

The hospitality industry has endured a rough ride over the past few years.

Following the COVID-19 pandemic which stopped the world in its tracks and now with millions facing a cost-of-living crisis, it’s been a period of unprecedented disruption for those involved in the space and beyond.

But it’s a challenge met head-on by Paul Farrow, Vice President of Supply Management at Hilton Hotels, and his team who have been forced to respond as the world continues to shift before their eyes.

Farrow gives us a closer look into the inner workings of his firm’s procurement function and how he has led the charge during his time with Hilton Hotels.

Could we start with you introducing yourself and talking a little about your role at Hilton Hotels? 

Paul Farrow (PF): “I’m the Vice President of Hilton’s Supply Management, or HSM as we call it. I’ve been with Hilton Hotels for 12 and a half years, and my role is to head the supply chain function for our hotels across Europe, the Middle East and Africa.

“Over the past few years, Hilton has grown rapidly and has now got 7,000 hotels in over 125 countries globally. What is really exciting is Hilton Supply Management doesn’t just supply Hilton Hotels and the Hilton Engine because we also now supply our franchisees and competitive flags. While we have 7,000 hotels globally, Hilton Supply Management actually supplies close to 13,000 hotels. That’s an interesting business development for us, and a profit earner too.”

You’re greatly experienced, I bet you’ve seen supply chain management and procurement change a lot in recent years? 

PF: “The past two to three years have been tremendously challenging on so many industries but I’d argue that hospitality got hit more than most as a result of the Covid pandemic. Here at Hilton, supply management was really important just to keep the business operational throughout that tough time, but I’m delighted to say we’re fully recovered now.

“Looking back, it was undoubtedly difficult, and you only have to look at the media to see that we’re now going through a period of truly unprecedented inflation. On top of the normal day job, it’s certainly been a very busy time.”

Hospitality must have been under an awful lot of pressure during the pandemic… 

PF: “Most of our teams as a business and all functions have worked together far more collaboratively than ever before through the use of technology and things like Microsoft Teams and Zoom. Trying to work remotely as effectively as possible changed the way we all had to think and the way we had to do. Now we’re back in the workplace and in our offices, we’re actually looking to take advantage of that new approach.”

Inflation, rising costs, energy shortages, as well as drives towards a circular economy means it’s quite a challenging time for CSCOs and CPOs right now, isn’t it?

PF: “Those headwinds have caused and created challenges of the like that we’ve not seen before. The war in Ukraine and Russia has meant significant supply chain disruption and supply shortages of some key ingredients and raw materials. China is a significant source of materials and they’re still having real challenges to get their production to keep up with demand.

“All the local and short-term challenges are around energy and fuel pricing, so throughout the supply chain that’s been a major factor to what we’ve had to deal with. On top of that is the labour shortages. We rely heavily throughout the supply chain and within our business to utilise labour from around the world. In my region, particularly from say Eastern Europe as well as other businesses all fighting for a smaller labour pool than we had before. We are fighting with the likes of the supermarkets, Amazon’s, not just other hotel companies to capture the labour pool we need both in our properties but also within our supply chain supplies themselves.

Hilton operates a rather unique procurement function, doesn’t it?  

PF: “We trade off the Hilton name because our brand strength is something that we are able to utilise and we’re very proud of, but we’ve also got additional leverage by having that group procurement model.

“We’ve got essentially two clients. We’ve got our managed estate which is when an owner chooses to partner with Hilton, they’re signing a management agreement because they want the benefit and value of the Hilton engine. That could be revenue management, how we manage onboarding clients and customers through advertising, as well as the other support we give in terms of finance, HR, marketing and sales as well as procurement.”

HSM is a profit centre and revenue driver through its group procurement model but how does this work?

PF: “Our secret sauce is our culture. It’s our people and that filters across all of our team members and indeed all of our functions. The key strategic pillars are the same for health and supply management around culture, maximising performance and so on as they are across the overall global business.

“Across our 7,000 plus hotels, the majority are actually franchised hotels because that’s the legacy of what still is the model in the US. When I joined Hilton 12 and a half years ago, the reverse is true where nearly all of our hotels in Europe, Middle East and Africa, and indeed in Asia Pacific, were and are managed. In the Europe, Middle East and Africa regions right now we’re building up close to a 50/50 split between managed, leased and franchised.”

What has pleased you most about the roll-out of the HSM?

PF: “It’s certainly not been easy because we’ve got 70 countries that sit within our region here in EMEA and Hilton’s penetration in those individual countries is very different. We may have 100 hotels in one of those markets and only one or two in specific countries. Our scale and our ability to get logistics solutions is different by market.

“Getting everyone on board to what we want to achieve to our guests and to our owners means we have to pull different levers. We have very effective brand standards. If you’re signing up to Hilton, you’re signing up to delivering against those brand standards that we believe are right for our organisation.”

What kind of feedback have you had from your clients? 

PF: “Integrity is in our DNA, and we work very closely with our suppliers who we value as partners. These are long-term relationships, and we work hand in hand because we have to see that they’re successful so that we can be successful – it’s really important to what we do and we constantly look for feedback.

“With our internal and our external customers, we’ll have quarterly business reviews and so we’ll get that feedback through surveys where we are asking them to tell us what we do well and what we could do better. Our partners are now asking what additional value can you do to bring support to our organisation through ESG? So that’s what’s on the table now when it wasn’t before. But it’s not just that – it’s about the security of supply competitiveness, competitiveness of pricing, and a whole bunch of other very important things as well.”

Looking to the future, what’s on the agenda for the next few years?

PF: “We’re out there meeting and greeting people in person and there’s always new opportunities that make things exciting in what we do and how we work. Innovation’s very high on our agenda and we’re very proud of what we do in food and beverage. In non-food categories, it’s about how we support our owners and our hotel general managers to find that competitive edge and do the next big thing ahead of our competitors.”

Anything else important to know?

PF: “One thing we’ve been able to take full advantage of is how we’ve been able to grow our business by bolting on new customers. I think it’s fantastic that our competitors choose to use Hilton Supply Management because they benchmarked what our capabilities are and how competitive we are.

“Another key part of the agenda is environmental, social and governance (ESG) sustainability. Responsible sourcing and everything that sits within that is front and centre of what we do. Within that you’ve got human rights, animal welfare, single use plastics as well as general responsible sourcing like managing food waste. The list is very long, but they’re all very important.”

Check out the latest issue of CPOstrategy Magazine here.

Here are 10 of the most important leadership skills that CEOs need to demonstrate in 2023.

In today’s world, a CEO needs to be lots of things to different people. The importance of having the leadership skill to being able to lead through unprecedented disruption was highlighted by the COVID-19 pandemic and helped to define what makes a good CEO.

Here are 10 of the most important leadership skills that CEOs need to demonstrate in 2023.


1. Clear communication

Communicating effectively with employees is one of the most vital skills any leader can have. By adopting a transparent mindset, it leaves little room for miscommunication or misunderstandings. But rather than just being eloquent, CEOs should deliver meaningful content too. A CEO needs to be able to communicate the essence of the business strategy and the methodology for achieving it.

2. Strong talent management strategy

People are the most important component of all businesses. CEOs who are able to recruit and retain key employees have a greater chance of increasing productivity and efficiency. After recruiting good people, the key to retaining them is by harnessing a positive work environment that empowers employees to succeed.

3. Decision-making

As a leader, thinking strategically to make effective decisions is vital to the success of an organisation. Making decisions is a key part of leadership as well as having the conviction to stand by decisions or agility to adapt when those decisions don’t have the required outcome. While all decisions might not be favourable, making unpopular but necessary calls are important characteristics of a good leader.

4. Negotiation

Negotiation is a fundamental part of being a CEO. In a top leadership position, almost every business conversation will be a negotiation. Good negotiations are important to an organisation because they will ultimately result in better relationships, both with staff inside the company and externally. An effective leader will also help find the best long-term solution by finding the right balance and offering value where both parties feel like they ‘win’.

5. Creativity and innovation

Being quick-thinking and ready to explore new options are great skills of a CEO. Creative leadership can lead to finding innovative solutions in the face of challenging and changing situations. It means in the midst of disruption, of which it has been increasingly prevalent, leaders can still find answers for their teams. Creative CEOs are those who take risks and empower employees to drop outdated and overused practices to innovate and try new things that could lead to greater efficiency.

6. Agility

Without agility over the past few years, businesses would have failed. CEOs were forced to embrace remote working following the advent of the COVID-19 pandemic whether they liked it or not. Now, faced against a potential recession, these macroeconomic events are unavoidable and have to be managed carefully. Effective leaders will have their fingers on the pulse and ready to respond to changes.

7. Strategic forecasting

Creating a clear path forward is essential to achieving uninterrupted success. The ability to look into the future and identify trends and issues to then react to is vital. Good CEOs are able to plan strategically and make informed decisions to set goals and plan for the future easily.

8. Delegation

CEOs can’t do everything. A leader tends to be pulled in a number of different ways every day and it is impossible to be on top of everything. This means the importance of bringing in a team of people who are trusted and skilled in their respective areas of expertise. Successful CEOs are expert delegators because they recognise the value of teamwork and elevating those around them.

9. Approachability

An approachable CEO who welcomes conversation and is an active listener will help employees feel at ease raising issues or concerns. This approach will help build strong relationships with staff and customers and encourage a healthy culture which is beneficial to employee retention. Leaders with strong, trusting and authentic relationships with their teams know that investing time in building these bonds which makes them more effective as a leader and creates a foundation for success.

10. Growth mindset

If a CEO arms themselves with a growth mindset it allows them to meet challenges head-on and evolve. This shines a light on improving through effort, learning and persistence. As others may back down in the face of adversity and upheaval, successful CEOs will strive to move forward with confidence. Those with a growth mindset are unlikely to be swayed as they have the tools needed to reframe challenges as opportunities to grow.

In McKinsey’s latest report ‘Actions the best CEOs are taking in 2023’, we examine three of the biggest trends on the c-level agenda

Anyone can sail a ship when things are going well. But it takes a strong, robust and characterful CEO to steer a business through choppy waters and out the other side.

In McKinsey’s latest report ‘Actions the best CEOs are taking in 2023’, the research and advisory firm uncovered which trends are set to have the biggest impact on how CEOs lead their business throughout the year.

McKinsey’s CEO Excellence Survey surveyed 200 of the best corporate CEOs of the past 15 years. This was completed by whittling down a list of all the current and former CEOs of the 1,000 largest public companies during that timeframe. The list was subsequently filtered based on tenure, including only those who had completed at least six years in the role. From there, the CEOs were continuously shortlisted until the best 200 were determined.

Each CEO was asked to identify the top three trends that are set to determine how leaders tackle the future. Here is an insight into those findings.

1. Actions to deal with digital disruption

CEOs are targeting digital trends in three key ways: developing advanced analytics, enhancing cybersecurity and automating work. OpenAI’s launch of ChatGPT has accelerated the demand of companies looking to embrace advanced analytics for a competitive advantage. Improving cybersecurity is another key action for CEOs with the importance of guarding against external threats paramount amid strengthening and more mature cyberattacks. Lastly, automating work is another key priority to scale efficiency and eliminate boring and manual tasks which free up people’s time.

2. Actions to deal with the risk of high inflation and economic downturn

One CEO who is worried about economic uncertainty told McKinsey: “Act early to lower costs and protect the balance sheet so that you are stronger and leaner when the economy begins to turn more favourably.” McKinsey found that companies that outperformed the 2008 financial crisis cut operating costs by 1% before the downturn while the others expanded costs by the same percentage. The best performers reduced their debt by $1 for every $1 of book capital before the downturn. This can be done by reducing operating expenses, redesigning products and services as well as reassessing strategic and economic assumptions.

3. Actions to deal with the escalation of geopolitical risk

According to McKinsey, there are three actions to help manage the escalation of global and national crises. CEOs are targeting building robust compliance capabilities, creating resilience in supplier networks and investing in monitoring and response capabilities. These actions come following the challenges presented by COVID-19, the war in Ukraine and now inflation concerns. Many firms are choosing to build their trade compliance organisations and improve how they screen different customers and companies. While a defensive approach is the way forward for many, some companies see the turbulent times as an opportunity.

What does today’s CEO need to do to accelerate an organisation’s digital transformation journey?

Digital transformation journeys are no one-size-suits-all. There is no singular way to welcome a new wave of technology into operations.

Since the turn of the century, digitalisation has had an increasingly influential impact on the way CEOs make decisions. Today’s world is full of disruption and potential risk. And with technology growing in complexity it can be challenging to lead such a revolution against a backdrop of economic uncertainty.

Embracing digital

According to KPMG 2022 CEO Outlook, which draws on the perspectives of 1,325 global CEOs across 11 markets, 72% of CEOs agree they have an aggressive digital investment strategy intended to secure first-mover or fast-follower status.

Advancing digitalisation and connectivity across the business is tied (along with attracting and retaining talent) as the top operational priority to achieve growth over the next three years. This digital transformation focus could be driven as a result of increasingly flexible working conditions and greater focus on cybersecurity threats.

However, the prospect of recession is threatening to halt digital transformation in the short-term. KPMG research found that four out of five CEOs note their businesses are pausing or reducing their digital transformation strategies to prepare for the anticipated recession.

This is reinforced further when 70% say they need to be quicker to shift investment to digital opportunities and divest in those areas where they face digital obsolescence.

When a company’s digital transformation ambition is mismatched to its readiness, it is the CEO’s responsibility to close the gap. According to Deloitte, in order to do this successfully, the CEO must assess the current level of organisational readiness for change.

This covers four key pillars that are mixed together to work out an organisation’s overall readiness: leadership, culture, structure and capabilities.

How CEOs can close the gap

Leadership: CEOs need to ensure their c-suite and other key executives are motivated and equipped to execute the vision. CEOs interviewed by Deloitte in a recent study emphasised the importance of the leadership team supporting the transformation vision and having a positive attitude and willingness to transform.

Culture: A large potential barrier to readiness in the organisation is down to culture. Low cultural readiness takes the form of bureaucratic, reactive and risk-averse ways of working that are at against the collaborative, proactive learning mindset needed for ambitious transformation.

Structure: If a company hopes to operate differently, it could mean the need for organising in an alternative way. CEOs will often need to lead the reorganisation of teams, assignment of new roles, revision of incentives, strategies to collapse organisational hierarchies or layers to increase agility.

Capabilities: CEOs need to equip their organisation with four key capabilities to harness digital for a superior capacity for change. These are nimbleness, scalability, stability and optionality which are often enabled or supercharged by digital technologies which are critical factors for competing in an increasingly disrupted world.

For now, one of the CEOs most important roles when steering the ship through disruption is to be ahead of the latest trends and tackle change head-on. By embracing a new digital future that will provide the company with long-lasting benefits, it will help create a brighter and future-proofed firm for years to come even after the CEO is gone.

Gartner surveyed 400 senior business leaders about the challenges faced and their priorities for 2022-23. We analysed the results

Priorities change in a business; they evolve all the time to match the societal landscape around them. Following a major worldwide disruption like the COVID-19 pandemic, it’s no surprise that the focus for CEOs has shifted to match the way our outlooks and challenges have changed.

Gartner surveyed 400 senior business leaders about their 2022-23 priorities and found that – for the first time – environmental sustainability has made its way into the top 10. Additionally, workforce issues are a bigger priority than ever before.

Mark Raskino, VP Analyst at Gartner, said of the results: “In 2022, the Gartner CEO and Senior Business Executive Survey showed that, catalysed by multiple macro trends and economic factors, business leaders are reprioritizing some key areas of enterprise purpose and management focus.”

The last time there was such a dramatic change in the priorities of CEOs was in 2009-10, during the recovery from the last major recession. Here, we’ll dig into the key challenges for CEOs in 2023…

Growth

While growth remains the primary challenge, with 51% of respondents stating that it’s in their top three priorities, it’s actually down 8% from 2021-22. Gartner has surmised that the reason for this is that, due to ongoing supply chain disruptions, business leaders are less focused on driving up demand if they don’t necessarily know whether they can supply. Many organisations are working hard to revamp and improve their supply chains, but uncertainty remains and nobody wants to make promises that they can’t keep.

Gartners top 10 strategic business priority areas for 2022-2023

Technology

Technology has also dropped slightly as a top three priority, though it remains the second biggest focus at 34%. While the survey respondents are 5% less concerned about tech-related issues than in 2021-22, it’s still hugely important – especially as the world recovers from the pandemic.

Many businesses have taken the pandemic as a sign that they need better digitalisation, as a lack of that made the transition to home working difficult for some. Additionally, cybercrime is a major concern, especially when ensuring employees have the hardware and software they need to work safely from multiple locations.

Workforce

A focus on the workforce is up 32% from 2021-22, putting it at 31% in third place. This is the second consecutive year that workforce has become more of a priority, and there are multiple reasons for this.

Attracting and retaining employees is a challenge because older generations are retiring and there aren’t always enough replacements for specific roles. Plus, the younger generations joining the workforce are more likely to align themselves with businesses they truly believe in, meaning they are more picky, so organisations have to be the best they can and transparent with it.

Additionally, diversity, equality, and inclusion are bigger focuses than ever, and these have been boosted by the spotlight being shone on such topics during the pandemic. All in all, almost half (49%) of CEOs agreed with the statement that ‘it is very difficult for us to find and hire the kind of people we need in our business’.

Corporate

At 29%, corporate has dipped only a little since 2021-22 – just 5% – and remains a top priority. Corporate includes company structure and culture changes, and this is a focus right now due to the challenges of employee retention, as well as the drive towards digitalisation. Corporate change is required to improve business efficiency and performance, hence its position on this list.

Financial

The financial side of business has decreased in importance to CEOs for 2022-2023, dropping by 27% since 2021-22. However, it’s still in the top three for 20% of respondents. CFOs are making a major push towards finance transformation through technology to boost efficiency in their departments. Despite the ongoing challenge of building digital competencies in finance, 82% of CFOs have reported that their investments in digital are accelerating and exceeding investments in many other areas.

Products & Services

Products and services remain in the top three spot for 15% of respondents, up 43% from 2021. As the world recovers from the pandemic, the products and services a business produces are in the limelight. Competition is more fierce than it’s ever been, so innovation is key to remain in the best position.

Customer

The customer as a priority is up 26% from 2021-22, at 15% – and it’s no surprise. Linking into products and services, and the challenge of hiring the latest generation of workers, costumers have very high standards and hard work is required to impress them and retain loyalty.

In a Gartner survey about customer service trends, 74% of respondents stated that improving operational excellence to create a seamless customer journey is either ‘important’ or ‘very important’, and the survey found that business growth is best achieved through positive customer experience outcomes.

Environmental sustainability

Nine per cent of respondents to the Gartner survey stated that environmental sustainability is a top three priority – up a huge 292% from 2021-22. This is the first time it’s broken into the top 10, which is telling. Businesses are increasingly under pressure to do more when it comes to their own environmental impact. Many leading nations are aiming to be carbon neutral within the next few decades and being more sustainable undeniably leads to growth.

ESG

Cost

Also at 9% is cost, which is actually down 24%. Despite it being less of a concern than in 2021-22, cost remains a major focus. Supply chain shortages and the government support offered to help people through lockdowns have driven inflation, and Russia’s invasion of Ukraine has made that worse. As a result, we’re seeing the prices of products from the region shoot up, and those cost increases inevitably become the problem of business leaders.

Sales

While it’s number 10 (6%) on Gartner’s list of priority areas, sales is a 77% bigger priority in 2022-2023 than it was in 2021-22. Sales falls into a similar category to cost; with rising inflation comes an inability for customers to spend as freely as they once may have, making the landscape more competitive. Having said that, as we touched on with growth, sales aren’t necessarily being driven to the same degree due to supply chain disruptions.

Sara Malconian, Chief Procurement Officer at Harvard University & Jim Bureau, CEO of JAGGAER explain how ESG & the Circular Economy is changing the evolution of procurement.

We speak to Sara Malconian, Chief Procurement Officer at Harvard University and Jim Bureau, CEO of JAGGAER to see how ESG and the Circular Economy is changing the evolution of procurement…

Sara, how have you seen your role evolve as a procurement leader over the years as ESG and supplier diversity come into focus? 

Procurement leaders have gone from ‘cost cutters’ to ‘problem solvers’ within their organisations. Our core mandates used to be to drive cost savings and efficiency. We were hyper-focused on getting the most out of the organisation’s spend and supplier relationships. Those priorities haven’t gone away, especially in today’s inflationary environment, but the expectations of the procurement function are significantly higher and broader today. 

Procurement functions saved their companies during COVID and the confluence of disruptions that followed. We showed we are a strategic linchpin. We are now looked upon to drive value and impact and strategically guide our organisations to achieve broader goals, including diversity and environmental, social, governance (ESG). Internal stakeholders realised the benefits of procurement and sought help with advancing their department’s agendas or solving their challenges. We listen to their needs, allocate the right resources, and ultimately enable them and the overall organisation to be successful.  

I’ve been in procurement for over 20 years, and I can honestly say you’d be hard-pressed to find a more rewarding and exciting career. Procurement professionals have a real opportunity to make a tangible difference within their organisations, communities, and the world through the way we source products and services. 

What is Harvard doing to have a positive impact on society? Can you share some examples, Sara?

Across the Harvard community, students, alumni, faculty, and staff are advancing scholarship and teaching on the world’s most significant challenges, and everyone wants to do their part to address inequities. Supplier diversity and inclusion have been a priority for Harvard for years, but we wanted to make even more of an impact and really invest in the growth and development of diverse businesses, especially as the pandemic highlighted inequities and disparities within our communities.

In 2021, we formed the Office for Economic Inclusion & Diversity (OEID), which is dedicated to reaching out to diverse suppliers, giving them opportunities, and providing them with tools, training, and resources to be successful. The office also encourages the use of underrepresented business enterprises (UBEs) in the purchasing of all goods, services, and construction at Harvard and standardises procurement practices with these businesses across the university. 

We’re proud of the work this office is doing. We’re actively training suppliers on Harvard’s policies and how they can work with us. We’re creating a central location for them to access bid and RFP opportunities. UBEs can also apply to be mentored by Harvard Business School students.

We’ve created a dashboard to track and analyse spend with diverse suppliers across all of Harvard’s schools and measure progress over time. Everything we’re doing is aimed at increasing spend with our existing diverse suppliers, as well as the number of diverse suppliers that work with Harvard, and helping these suppliers grow their businesses.

Jim, why is prioritizing ESG and supplier diversity important and what steps can companies take today to progress in their journey? 

Beyond being the right thing to do, investors, boards, regulators, customers, and employees now expect organisations to prioritise ESG and diversity initiatives and walk the talk. There’s also a clear business impact. Supplier diversity drives competitive bidding processes that lead to cost savings. Working with partners who are sustainable and have different ideas and perspectives fuels innovation and creates a competitive advantage. Sourcing from a sustainable and diverse supplier pool also reduces risk by broadening organisations’ access to multiple resources for various materials, products, and services. 

One of the most critical steps companies can take to progress on their ESG journey is to make it clear to suppliers that environmentalism is a priority for their organisation. They will attract suppliers with higher levels of ESG maturity and provide suppliers who are earlier on in their ESG journey with sustainability toolkits and training to help educate them on eco-friendly best practices and sustainability innovations.

This step avoids having to overhaul their supply chain to account for ESG. Strategically managing suppliers by leveraging third-party data, scorecards, and supplier audits are crucial for understanding the ESG risks that suppliers pose and minimizing disruptions by working with them to correct these issues. 

Successful supplier diversity programs start with a top-down culture shift. If a company’s culture isn’t diverse, inclusive, and supportive for all its stakeholders, they won’t be able to drive supplier diversity in a meaningful way. Supplier diversity strategy should map back to company goals and include an executive-level champion to sponsor the program internally and help bring in the resources they need.

Outside of leveraging technology to identify diverse suppliers and build a program, businesses can talk with people who have been in their shoes. They can collaborate with like-minded companies at industry events, engage in relevant LinkedIn groups, and connect with organisations such as the National Minority Supplier Development Council.

Once diverse suppliers are on board, organisations can create a supplier diversity policy that clearly outlines how many diverse suppliers need to be invited to bid for each event to ensure teams are executing on the strategy. Leading supplier diversity programs go beyond simply spending with diverse suppliers to providing mentorship and training them on how to respond to RFPs correctly, as well as creating environments where it’s easier for them to engage. 

Jim, what role does technology play in helping organisations achieve ESG and supplier diversity goals?

Technology is a key enabler of ESG and supplier diversity initiatives. One of the biggest obstacles to supplier diversity and ESG is a lack of reliable supplier data. Suppliers don’t always keep their information up to date in self-service portals. The data procurement teams have isn’t always enriched to the level they need, with insights on diversity status, certifications, and proof of ESG compliance.

Researching and assessing suppliers is tedious and time-consuming, which leads many organisations to skip the verification step. Without this information, organisations don’t have a true picture of the inclusivity and sustainability of their supplier network, which makes it impossible to identify the right partners to source from to meet their ESG and supplier diversity goals and make an impact.

Technology addresses this challenge by automatically collecting, enriching, validating, and integrating the supplier data needed to obtain this level of supply base visibility and make decisions that drive ESG and diversity. AI-powered tools are available to match buyers with specific diverse suppliers who also have the capabilities to help drive ESG objectives and meet broader procurement criteria.

Software that segments the supply base and helps visualise spending with small and diverse suppliers across a variety of classifications is critical for setting benchmarks and measuring progress and ROI. 

Jim and Sara, how do you expect the ESG and diversity conversation to shift and where should procurement leaders focus for the future?

Sara: I expect we’ll see the conversation shift to emphasise measurement. It’s not enough anymore to say you’re committed to ESG – you need to prove it and show demonstrable progress and ROI. Maintaining the momentum on ESG initiatives is hard. Technology is key for setting benchmarks and goals, ensuring accountability for hitting key milestones, and measuring progress and return in a credible way. 

Jim: In a declining economic environment, choices inevitably need to be made. I expect the conversation around ESG will center around where companies can focus to maintain progress on ESG initiatives as financial and economic pressures come to the forefront. While some companies may need to scale back in some areas to preserve cash and resources to navigate a downturn, I’d advise them to be careful about slowing ESG down too much as it will be much harder to catch up to current levels after the economy bounces back.

I’d argue that when ESG is done right it can be a strategic lever for navigating a down economy, saving organizations money and resources, driving innovation, and helping them achieve broader business objectives and resilience. 

Here are five of the biggest procurement events happening during 2023 that chief procurement officers won’t want to miss.

Procurement Futures 


London, UK  |  1-2 February 2023 

Held at the QEII Centre in central London, Procurement Futures is a new conference, launching in 2023. It promises delegates the chance to find out how to make supply chains more resilient, with thought-provoking and presentations and discussions designed to inform and inspire.

There is a flexible programme of content that can be tailored to attendees’ preferences, with networking opportunities throughout and a huge variety of sessions to attend and take part in.

This CIPS event has three streams of content: Insights, Ignite and Interact. Insights will showcase presentations and panel discussions from leaders, Ignite will consist of hands-on workshops to help delegates optimise their procurement strategies and Interact will be smaller groups taking part in interactive roundtables and debates.

Speakers across the two days will include Ross Grierson, Director of Procurement, Primark; Patrick Dunne, Director of Group Property, FM & Procurement (CPO), Sainsburys Plc; Rebecca Simpson, Procurement and Supply Chain Director, Balfour Beatty; and Nick Jenkinson, Chief Procurement Officer, Santander. In addition, delegates are ablew to book a one-to-one career workshop, where they’ll get advice on professional development from coaches covering a variety of specialisms. 

Tickets are £795 for CIPS member, £995 for a non-member and £2240 for a supplier/solution provider, and there is a discount of 30% for tickets purchased before 30 November 2022. 


3rd World Digital Procurement Summit 


Berlin, Germany  |  2-3 March 2023 

The third World Digital Procurement Summit is aimed at procurement directors, VPs, managers and other industry specialists. The two-day event will focus on accelerating procurement processes, adopting emerging technologies, finding the right talent, overcoming the barriers to progress and embarking on a journey of transformation. It’s a hybrid event, bringing together procurement experts from various industries, which will maximise knowledge exchange opportunities. The event organisers list five key learning points for delegates: 

  1. Exploring the latest advances in data and cognitive technologies to gain greater insights and improve procurement processes 
  1. Overhauling the procurement ecosystem with new technologies and strategies to drive business value 
  1. Sharing the best practices of monitoring and managing a range of risks to hedge against future disruptions 
  1. Developing capabilities and skillset required for the digital transformation of procurement 
  1. Defining ESG metrics of the procurement strategy to ensure business continuity 

Speakers will include Paul Harlington, Group Procurement Director at TUI Group and Patrick Foelck, Head of Strategy and Transformation Procurement at Roche. 

Click here to check out a video from a previous event. Tickets cost €1495. 


Women in Procurement & Supply Chain 


Sydney, Australia  |  6-8 March 2023 

Returning for its 8th annual event, Women in Procurement & Supply Chain will deliver two days dedicated to leadership and the future of procurement. The event will feature a series of exclusive panel discussions and keynote addresses examining career development, overcoming imposter syndrome, working with confidence, developing an unbeatable talent pool, mentoring, diversity and inclusivity.

It will also address risk mitigation, digital disruption, ESG, sustainability, economic development, ethical sourcing, category management, cultural diversity, strategic sourcing, supplier relationships, procurement with purpose, and supply chain resilience. There are two pre-conference masterclass options on 6 March – that can be booked separately – covering either contract law or leadership skills. 

Some of the reasons to attend include: 

  • Discover the path to taking your procurement career to a new level while elevating your organisation with dedicated days on leadership and the future of procurement 
  • Learn best practice strategies to facedown supply chain vulnerabilities and reduce risk exposure 
  • Get ahead of the game with insights into the future of procurement and the impact of globalisation on modern supply chains 
  • Put yourself at the cutting edge of ESG and procurement with the latest updates and trends in procurement with purpose 

Speakers for the main two-day conference include Michelle Richard, Director of Procurement, Thales; Karina Davies, Chief Procurement Officer, icare NSW; and Kylie McKinlay, Procurement Partner – Property and Business, Australian Broadcasting Corporation. 

Tickets start at $3,495 with discounts available until 25 November 2022. 


Americas Procurement Congress 


Miami, USA  |  21-22 March 2023 

The Americas Procurement Congress will feature the region’s most progressive CPOs sharing their expertise

With a focus on what makes CPOs tick, the Americas Procurement Congress will feature the region’s most progressive CPOs sharing their expertise in keynote presentations and working groups.

Giving delegates the tools to stay on the cutting edge of procurement developments, there are also sessions aimed at those with responsibilities over governance, procurement capabilities and quantifying data. Unsurprisingly, sustainability will also be a key theme in 2023, and attendees will hear from a diverse range of sustainability leaders about how to transition from traditional metrics to a purpose-driven function. 

The agenda for Americas Procurement Congress 2023 will include: 

  • Sustainability of the future  
  • How to transition from traditional metrics to a purpose-driven function   
  • Harnessing the power of digital transformation  
  • Utilizing data as a driver of sustainable value, supply continuity and transparency   Agile procurement  
  • New approaches and skills that facilitate speed and agility   
  • Frictionless procurement  
  • Removing friction from the procurement process to support high-velocity sourcing   
  • Beyond Just in Time 
  • Designing future-fit supply networks for an age of chaos and conflict 

Tickets start at $3649. 


Americas Procurement Congress 


Orlando, Florida  |  8–10 June 2023 

Gartner Supply Chain Symposium/Xpo 2022 addressed the most significant challenges that chief supply chain officers and supply chain leaders face as they mitigate risk and navigate uncertainty in an increasingly dynamic and challenging environment.  

At the conference, the top 5 sessions that CSCOs and supply chain leaders met on included: 

  • Signature Series: The Future of Supply Chain 
  • What the Pivot to Sustainable Profit Means for Procurement Leaders 
  • The Art of the New Age One Page Dashboard: Why Your Current Perfor-mance Measures May Be Doing More Harm Than Good 
  • Manage Supplier Risk With Technology 
  • Procurement Role Redesign: Stop Fitting Square Pegs Into Round Holes 

Tickets start at $4725. 

Here are five of the best procurement schools in Europe.

As procurement becomes an increasingly vital and strategic function within many organisations, people are beginning to realise the full potential of turning it into a career for themselves.

This has subsequently led to many universities noticing the demand in the industry and offering courses which equip students with the relevant qualifications and skills needed to succeed in the supply chain space.

With this in mind, here are five of the best procurement schools in Europe.


1. CIPS


Course: Various
Where: Across England

procurement schools

Run by Oxford College of Procurement and Supply, there are 10 Chartered Institute of Procurement and Supply centres in England offering several different qualification levels to choose from. The courses are recognised throughout the world as harnessing leading edge thinking and professionalism across the procurement and supply chain management space.

CIPS offers courses such as level three, four, five and six in procurement and supply with each qualification created to reflect current, emerging and best practice in procurement and supply chain management. Classes focus on exploring legacy purchasing and supply methods as well as techniques and theory to the application in a business environment.

CIPS doesn’t just offer in-person studying as courses are designed to suit individual lifestyles with virtual classrooms, part-time and weekend options to choose from.


2. Politecnico di Milano


Course: MSc in Supply Chain and Procurement Management
Where: Milan, Italy

Politecnico di Milano
Politecnico di Milano offers an extensive portfolio of programmes

Renowned as being one of the best scientific and technological universities in the world, Politecnico di Milano offers an extensive portfolio of programmes in a variety of different spaces. Its supply chain master’s degree is a 12-month course aimed at equipping students with vital knowledge and skills needed to succeed in the industry.

The course also includes a number of practical activities in the programme such as lessons with international lectures, workshops on soft skills, company presentations, projects with companies, company visits and an international study tour in Rotterdam.

According to Politecnico di Milano, 86% of students were employed three months after graduation while 55% were also working abroad during the same period.

The course was ranked third in the TOP 2021 Eduniversal Best Masters Ranking (Global) and eighth in the QS Supply Chain Management Masters Rankings for 2023.


3. SKEMA Business School


Course: MSc (and MS) Supply Chain Management and Purchasing
Where: Lille and Paris, France

Skema offers two supply chain management (SCM) and procurement masters: The premium international MSc Global Supply Chain Management in Lille taught in English, and the MS in SCM and Purchasing in Paris and Lille mainly taught in French. France’s highly-rated supply chain and procurement program has been designed with a progressive shift from theory to practice. The degree covers the entirety of supply chain activities from planning, purchasing, receiving, production, storage to delivery through nine compulsory and six elective courses.

The global MSc has a new cooperation with the leading prestigious business school, MIT in the US, plus another cooperation with Politechnico from Milano. The MSc master’s degree provides soft skills in supply chain and purchasing management as well as going into future trends in digitalisation, AI, sustainability, ethics, globalisation, risk management and agility. The course’s primary goal is to find future leaders who are seeking to make a positive impact on the world of supply chain management and procurement. The MSc is a full time program, complemented by paid internships in the area of the student’s choice, while the MS alternates weeks of classes with professionals at the forefront of their fields.


4. Audencia Business School


Course: MSc in Supply Chain and Purchasing Management
Where: Nantes, France

Audencia Business School

Created in 2009, Audencia Business School’s programme will cover topics such as procurement, global sourcing and supply chain strategies. Other topics to feature includes green logistics, Big Data, digital transformation, negotiation and commercial law. The course will provide expertise from industry insiders as business executives visit and share professional insights during the programme.

The school works closely with the corporate world and is recognised for its responsible management practices. Audencia is triple-accredited, highly ranked and internationally oriented and according to its website, 79% of course graduates are employed before graduation. The course is available as a one-year or two-year master’s programme.

In autumn 2024, the course is set to be renamed to the MSc in Responsible Procurement and Supply Chain Management.


5. Cranfield School of Management


Course: MSc in Procurement and Supply Chain Management
Where: Cranfield, United Kingdom

Cranfield School of Management provides students with specialist knowledge and skills in procurement needed to progress their careers

Cranfield’s Procurement and Supply Chain Management course has been co-designed with senior industry executives. This purchasing postgraduate course provides students with specialist knowledge and skills in procurement needed to progress their careers. Possessing one of the largest facilities in Europe, the course places considerable emphasis on how to overcome real-world challenges.

Students will gain an in-depth understanding of supply chain strategy and sustainability, procurement strategy, supplier selection and evaluation, negotiation and contact management. They will also be taught how to use data, models and software to solve problems and inform decisions, inventory and operations management and how to design effective supply chain operations.

Students will have the opportunity to attend a study tour and experience a different supply chain perspective elsewhere in Europe.

The course was ranked 11th in the world on the QS Supply Chain Management Masters Rankings for 2023.

CPOstrategy’s cover star this month is procurement transformation expert, and CEO and Co-Founder of Tropic, David Campbell…

Right now, procurement excellence is blooming. Experts determined to create change are coming to the fore and aligning procurement with SaaS to bring an end to the do-it-yourself way of working that decimates technology budgets. Tropic is one such game-changer, providing the tools to navigate software procurement’s complexities for competitive advantage.

Read the latest issue here!

The CEO and Co-Founder of Tropic is David Campbell, a born entrepreneur. He grew up on a cattle ranch in California and has always had at least one side-hustle on the go. Even as a child, he was running some form of money-making venture at any one time – but he didn’t necessarily consider that entrepreneurial pursuits were his calling until later.

CEO and Co-Founder of Tropic, David Campbell
CEO and Co-Founder of Tropic, David Campbell

Campbell studied English at UC Berkeley, and on graduating assumed he’d go into the arts. He’s a lifelong musician and writer, and he moved to a cabin in the woods to write the ‘next great American novel’. This venture, while it didn’t have the exact results he had hoped for, planted the seed in his mind that perhaps entrepreneurialism was for him because he loved setting his own hours and vision, creating a strategy, and executing that…

Elsewhere, we have exclusive interviews with supply chain and procurement leaders at the City of Edmonton and QSC, as well as the results of our first Sustainable Procurement Champions Index. We also have some exciting news from DPW too, ahead of its conference later this month.

Enjoy the issue!