The software that moves money, processes trades, and manages accounts is among the most scrutinized code on earth. Yet even in highly regulated financial environments, a vulnerability persists that traditional perimeter security cannot address: the integrity of the code itself between development and deployment.
Jamshir Qureshi, a Vice President at Mitsubishi UFJ Financial Group, USA, has spent recent years developing and applying frameworks to close that gap. His work sits at the intersection of cryptographic verification, automated CI/CD pipelines, and the governance challenges posed by artificial intelligence.
In a 2025 peer-reviewed paper, Qureshi introduced the Hybrid Chain of Trust (HCoT), a framework designed to verify both software code and container images within modern development environments. The model addresses a specific problem: as organizations adopt cloud-native architectures, they must ensure that digital artifacts remain authentic and untampered from commit to production.
The approach combines cryptographic signing with automated validation tools, enabling integrity checks that do not slow development cycles. In regulated financial settings, where auditability is mandatory, such frameworks help organizations meet compliance requirements while reducing exposure to supply-chain attacks.
Public citation records indicate the research has been referenced in professional and academic literature addressing DevSecOps automation, secure artifact workflows, and enterprise risk management. The work has drawn attention from researchers across North America, Europe, and Asia, reflecting the global nature of software supply chain challenges.
Qureshi’s research portfolio extends beyond traditional software verification. A 2024 study published in Issues in Information Systems examined AI-powered cloud-based e-commerce systems and digital risk management. The work explores how automated decision-making, and generative models introduce new trust boundaries—particularly in financial and healthcare contexts where outputs carry significant consequences.
“Automation changes the scale of responsibility,” Qureshi observed in a discussion on cybersecurity governance. “When systems act faster than humans, governance has to be built into the technology itself.”
This perspective connects his earlier work on software integrity to emerging questions about AI accountability. If code must be verifiable at every stage, the argument follows, so too must the models and data driving automated decisions.
Qureshi’s expertise has earned him invitations to contribute beyond his corporate role. He is a member of the Forbes Technology Council, an invitation-only community for senior technology executives who meet rigorous selection criteria, including a proven track record of leadership and professional achievement. Through this platform, he engages with other industry leaders on the intersection of technical controls and governance.
He also serves as a peer reviewer for academic and professional publications, including journals affiliated with the International Association for Computer Information Systems and the Journal of Computer Information Systems. In this capacity, he assesses submissions related to secure systems, DevSecOps automation, and enterprise risk management for methodological soundness and originality. He has additionally served as a judge for international recognition programs evaluating innovation and leadership in technology and cybersecurity, placing him in positions of professional judgment over contributions from other specialists.
Qureshi has engaged with broader audiences on cybersecurity governance through professional platforms with editorial oversight. His contributions to these discussions emphasize the need for frameworks that anticipate risk rather than react to breaches.
“Security is no longer a purely technical issue,” he has noted. “It’s a governance issue, a risk issue, and ultimately a societal one.”
For financial institutions, the integrity of software is not abstract. A compromised deployment pipeline can lead to manipulated transactions, data breaches, or systemic failures. Engineers like Qureshi, who design verification mechanisms that operate continuously and automatically, contribute to the invisible architecture that makes digital finance possible.
The Hybrid Chain of Trust and related research offer one approach to building that architecture. As threats evolve and systems grow more complex, the principles of continuous verification and embedded governance may become increasingly central to how organizations protect the code their operations depend on.
Recent Articles By Author