Security Evaluations
and Compliance

Good News! Your engineers are now familiar with the APIs available from your Processor or Bank-as-a-Service Platform provider... Product specs are almost final; your designers have a pretty good mockup of the User eXperience... and they have also developed a cool AI-powered chatbot and maybe used a specialized model for financial data analysis or fraud detection.

Bad News! Your partner Bank would now like to see your AML Policy, your Written Information Security Plan, the results of your most recent Penetration Test,  and your employee training log!
And you are not sure that your intended use of AI will not result in unforeseen privacy issues or expose you to new forms of attacks like prompt injections.

We can help your FinTech company be ready with these indispensable items, all customized for your specific product and commensurate with the size of your company and your budget.

Security Audits

We help companies secure their products and infrastructure through a structured approach and consistent methodology based on industry-wide best practices and accompanying resources, such as OSSTMM, OWASP, WASC and ISO27000. We also understand the complexities of securing large language models (LLMs), and our tailored penetration testing methodology is designed specifically for these advanced systems.
We help our clients identify security issues, suggest remediation solutions and provide ongoing support to the customer’s technical team.

Our offensive security team are highly qualified, with certifications including OSCP, OSWP, OSWE, eWPTX, eCPTX, eMAPT, CRTO, and BSCP

Vulnerability Assessments

  • Internal Network
  • External Network
  • Web /Mobile Applications

Penetration Testing Methods

  • "Black Box"
  • "Grey Box"
  • "White Box"

Security Reviews

Cloud Set-Ups

  • AWS/Google Cloud/Azure

Application Code

  • Mobile native/ Web Apps

LLM-induced vulnerabilities

  • Prompt injections, Insecure output handling, Insecure plugins and agents...

Performance Testing and Quality Assurance

Load Testing

  • Evaluate the overall performance of the application

Stress Testing

  • Estimate how many clients the application can handle in the current state

QA Testing

  • Verify workflow and compliance with specs independently from the development team

Soak Testing

  • Investigate system endurance under long-term load (8-12-24 hours)

Performance and QA Testing conducted in partnership with DataArt

Training for FinTech Employees

FinTech teams are often unfamiliar with the financial regulations and security requirements that they have to comply with, often at the explicit request of the banks they partner with to deploy their services.
Most available compliance & security training is difficult to use because it was developed for banks, not for FinTechs.
We have assembled training materials customized for employees and management of FinTechs and we can help administer onboarding and yearly tests to verify that new and existing employees have acquired the required understanding of essential security and compliance rules.

AML / BSA / OFAC Compliance

UDAAP Compliance

GLBA & CCPA Compliance

ID Theft / FACTA Red Flags

Regulation E Compliance

Compliance Policies

Even though your FinTech company is not regulated as a Financial Institution, you are the front line for interactions with customers and the first line of defense against fraud and complaints.
We help draft policy documents as required by your partner Bank, in cooperation with your Operations team, customized for your particular products, roles and responsibilities. Note that your Bank will usually review such documents after we have produced them, and may request changes for specific regulatory compliance reasons. You may also want to have some documents reviewed by legal counsel.

BCP-DR
Plan
Information Security
Plan
Data Retention and Destruction Policy
Vendor Mgmt.
Policy
AML
Policy
UDAAP
Policy
Regulatory
Change
Mgmt
Policy
GLBA
Policy
OFAC
Compliance
Program
Fraud &
Red Flags
Policy
Complaints
Handling
Policy
Customer
Contacts
Policy
^