 Good evening and welcome. We're coming to you from the Fiji Symposium in Bangalore, the platform for all dialogue on financial inclusion. And with me today from ITU is Mr Vijay Mori. Welcome Mr Vijay. He also is the leader of Security Infrastructure and Trust Working Group. So welcome, how does it feel to be part of the first ever Fiji Symposium? It feels great. So this symposium is a unique platform that brings together all the stakeholders of the ecosystem, the telco regulators, financial services regulators, the mobile network operators, digital financial services platform providers, and also the fintech community. So it's a really unique platform that we have here that bring together different stakeholders with different interests and different requirements, and they can share all their experience in this unique place. And when it comes to your working group, what exactly are the key objectives of your working group? It's very simple. To make sure that your transactions take place in a secure manner and nobody can steal your information, your money. That's the simplest way of putting it. However, when we talk about security in digital financial services, we're talking about four main things. So how we protect the integrity of the transactions, that is to ensure that no one has tampered with the information that is being sent across. And secondly, is to ensure that whenever you want to use the network to send the money, it's there, it's available, that is the availability of the network is there. Thirdly, it's ensuring that the communications takes place in a secure manner, that you're not losing your money, you're not being defrauded when you use the system. And fourthly, it's looking at all the risk, security risks that are brought into by new technologies because technology changes all the time. And whatever, what was there 10 years ago, now is completely obsolete. And you have new technologies that are coming in, like for example, big data analytics are being used to create profiles for people, so that you can give them credit afterwards, you have to build the credit profile. However, these could have security implications. So we're looking at all these new technologies as well as their security implications. So essentially you're keeping up to speed with all the new technologies that are coming in and trying to make that secure as possible. Exactly. Okay. So with the related to your working group, what exactly are the key areas that you're looking at tackling? Yeah, there are a number of key areas that we are looking at. So the security infrastructure and trust working group itself is a group into four key areas, I would say. So we're looking at for example, how we secure the infrastructure security layer, that is the communications infrastructure, how it can be secured. The second element that we're looking is creating trust in the usage of digital financial services. So ensuring that people when they're using digital financial services, they feel secure. They know that they're not going to be defrauded that when they're sending money to Mr. X, the money is actually reaching Mr. X and not going to Mr. Y. Okay, so how you create the trust in using the system. In this area, we're also looking at digital Ponzi schemes that have come up recently. A lot of these Ponzi schemes used to take place on the phone, but now with the internet, a lot of these Ponzi schemes can reach the people through the internet. So we're looking at the collaboration between telco regulators and financial services regulators, how they can work together to bring down these Ponzi schemes. And in this symposium, we have a paper that is going to be discussed on actually these digital Ponzi schemes and how we can protect people from such schemes. We're also looking at the area of quality of service, for example, to ensure that the network is available when you want to use it. So we have defined some indicators for what we call key performance indicators for the quality of service of the mobile network. And these key performance indicators or KPIs are going to be measured in a pilot project. And this will give a methodology for telco regulators to better monitor the quality of service for mobile networks when it comes to digital financial services. And the fourth area that we have is on distributed ledger technologies, which plays a key role now, which is trying to have a key role in the payment system and in financial services. So we have a work stream which is looking at the implications of using distributed ledger technologies for financial inclusion. And this work stream will be presenting its report as well at the symposium this week. Okay. So quite a bit of issues to be tackled at the working group. Yes, there's a number of issues. And I think if I may add on the infrastructure security, I went through it very quickly, but it actually consists of three subgroups in the infrastructure security. So there are three main groups, like I said. So the most important, not most important, but the three main ones are the application security, looking at all the vulnerabilities at the level of the applications. So whether it's a USSD application or it's an application that's running on a smartphone app. So we're doing security testing on the application to find out whether they have been secured in the right way. And then we'll come up with recommendations on best practices for developers who are actually producing these applications. The second one is how we secure the infrastructure layer with regards to the SS7 vulnerability in communication network. Because through the SS7 vulnerability, someone can get access to your account and transfer funds without you being aware of it. So it's an important issue that needs to be tackled and we're actually looking at developing mitigation strategies for this. We're also developing a security assurance framework which will help DFS providers to better organize themselves when it comes to cybersecurity threats and also provide a framework for the regulators to assess their security compliance as well. It will be like a tool that can be used by the regulators to also assess the compliance of the DFS providers. And the third subgroup that we have under the security work stream is the authentication work stream which is looking at different authentication technologies and looking at the interoperability of these authentication technologies. So previously you would be using a password to send and receive money. So password as you know can be easily tampered with. So in the authentication work stream we're looking at technologies that can help authenticate a person without the need of a password. So it could be facial recognition technology or other kind of technologies that are available currently. But however these have to be implemented in a secure way. And then they have to be interoperable so that they can be used across platforms as well. And most importantly security. Exactly. Great. Thank you so much. Thank you so much for your answers.