Security on the street with SearchFinancialSecurity.com: Mobile banking

Mobile banking is set to grow rapidly as customers become more and more reliant on mobile technologies and the conveniences they bring. However, there are information security issues to consider. Editor Sarah Hurley recently spoke with Mark Kadrich, CEO and Chief Evangelist at The Security Consortium, to discuss the state of mobile banking and the associated security risks.

In the 13 minute, abridged version of the podcast, you will learn:


  • What the network security challenges financial institutions face with mobile banking;
  • What kinds of threats surround mobile banking;
  • If mobile banking be secured with the same kinds of security technology financial institutions use currently;
  • What issues surround scalability;
  • What's the most over-hyped mobile banking threat is;
  • If customers have an understanding of the most common threats that come with mobile banking.

    In the 27 minute, extended version, you will learn all of the above, as well as more on the intersection of technology and mobile banking programs including:


  • What kinds of policies should be put in place around mobile banking;
  • How can banks can ensure reliability;
  • What needs to be done to keep customer mobile devices secure;
  • What kind of ID management and authentication practices need to be put in place;
  • The encryption steps banks should take to ensure that data is secure in transmission.

    Note: The extended podcast continues with more of the conversation than the abridged version at the 10:47.00 mark.

    Security on the street with SearchFinancialSecurity.com is a monthly podcast series in which you can pick from two versions -- an extended edition and an abridged edition -- to fit the length of your commute to and from work.

    About the speaker:
    Mark Kadrich is the CEO and Chief Evangelist at The Security Consortium. His strengths are in systems level design, policy generation, end point security, and risk management. Mark, a CISSP, is a contributing author in publications such as TCP Unleashed, ISSA Journal, Publish Magazine, Planet IT, RSA, CSI, and The Black Hat Briefings. His own book End Point Security was published in 2007. Mark is also a well-known speaker on network security matters at technical conference and events.

    Play now:
    Download for later:

    Download the podcast here

    • Internet Explorer: Right Click > Save Target As
    • Firefox: Right Click > Save Link As
Play now:
Download for later:

Download the podcast here

  • Internet Explorer: Right Click > Save Target As
  • Firefox: Right Click > Save Link As

This was first published in November 2008

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: