SlideShare a Scribd company logo
1 of 25
What's on your E RADAR?




      IT Governance, Security and Risk
         across the online economy
                  Will Roebuck
               Founder and CEO
         E RADAR | Smarter business online
Why is IT governance important?
●   It costs jobs and affects livelihoods without it
●   Safeguard competitive and collaborative advantage
    ●   Corporate reputation
    ●   (Public) procurement requirements
    ●   Officer (director) liability
●   Meet fiscal, legal and regulatory requirements
●   Provide minimum standards of best practice
Online in 2012 – 15 years of strengths
●   Speed and convenience of business transactions
●   Cost and inventory control
●   Global presence and market opportunity
●   Better customer service
●   Competitive and collaborative advantage
●   Research and innovation
●   Social revolution (accessibility and connecting people)
Online in 2012 – 15 years of weaknesses
●   Pace of change v legacy technologies
    ●   e.g. Royal Bank of Scotland, NHS IT Infrastructure
●   Conflict of laws and regulations
    ●   Whose law applies?
    ●   Common law v statute
●   Work place social networking v time-management
●   Increased globalisation = domino effect (e.g. Enron)
●   Take up of network and information security
●   Beware of imitations...
Know who you're talking to?
Online in 2012 – 15 years of opportunity
 ●   2,405,510,036 online June 2012 (34.3% world population)*
 ●   E-commerce sales represents 16.9 per cent of total sales
 ●   Website sales represented 4.2 per cent of total sales
 ●   78.7 per cent of businesses had a website
 ●   51.9 per cent of businesses had mobile broadband using
     3G
 ●   86.5 per cent of businesses used the Internet to interact
     with public authorities.


* Internet World Stats http://www.internetworldstats.com/stats.htm
Online in 2012 – 15 years of threats
●   Society, business and government
    ●   Financial fraud
    ●   Children and citizens e.g. harassment, bullying...
    ●   Theft – identity, data, intellectual property
    ●   International terrorism
●   UK Cyber Crime Strategy (Nov 2011)
●   Cost to UK economy
    ●   Cyber crime - £27 billion per year?
    ●   Welfare/tax fraud - £200/£300 per citizen per year
Online business environment

●   Supply and demand
    ●   Goods, services, digital downloads, financial instruments
    ●   The 'bottom line'
●   Encouraged by
    ●   Competition, enterprise and innovation
●   Supported by
    ●   People, processes, technology, and information
    ●   Laws, regulations, standards and best practice
What does this all mean?
●   Balance supply and demand against risk
●   Deploy resources carefully
●   Smarter business management
    ●   Identify, develop and use 'the right' people skills
    ●   Re-engineer business processes
    ●   Invest in enabling technology
●   Provide good laws and regulations
    ●   Responsive legal environment
IT challenges over next decade
●   Cloud computing
●   More online applications
    ●   Just require connectivity; transparent licensing
●   Social networks and software
    ●   Enagage with partners and customers; find out interests
●   Document management and collaboration
    ●   Organise resources centrally – audit trails
●   CRM 2.0
    ●   Internet capabilities to manage customers, incl loyalty
IT challenges over next decade
●   Unified communications
    ●   Connecting to the right people
●   Web 3.0 – semantic web
    ●   Intelligent applications
●   Business intelligence
    ●   Improving insights to employees... professional networks
●   Virtualisation – Green IT
    ●   Physical to virtual servers saving energy, carbon foot print,
●   Enterprise mobility
    ●   Applications accessible from mobile devices
Why governance and compliance?
●   Customer trust and confidence
●   Business protection e.g. evidential trail
●   Sector requirements
●   Reduced insurance premiums
●   Corporate reputation
●   Director and vicarious liability
●   'The regulatory stick'
●   Secure transactions
Challenges and issues
●   Corporate
    ●   Vicarious and director liability
    ●   Duty of care towards employee
    ●   Prevent improper and illegal activity over systems /networks
●   Personal
    ●   Directors failing to undertake duties implied by law or as
        additional duties in their contract
Challenges and issues

Contractual
    ●   Prove existence of agreement in disagreement with a
        customer
    ●   Defend an action for unfair dismissal before employment
        tribunal
●   Legal
    ●   Prove an intellectual property right or invention
Challenges and issues

Regulatory
    ●   Registering, reporting, retaining and disposal of records
         –   Annual returns
         –   Invoicing and VAT
         –   Health and Safety
         –   Personnel records
    ●   Data Protection
    ●   Consumer Protection
●   Security of systems and networks... and information
Digital evidence and admissibility
●   Evidence is
    ●   the way that a fact is proved or disproved in a court, tribunal
        or disciplinary.
    ●   Oral, real (primary or secondary) or hearsay (less reliable)
         –   Primary = e.g. signed original contract
         –   Secondary = e.g. unsigned draft of the contract
●   Burden of proof
    ●   Civil cases = with plaintiff and 'balance of probabilities'
    ●   Criminal cases = with prosecution and 'beyond reasonable
        doubt'
Digital evidence and admissibility
●   Evidence in electronic format is admissible
    ●   Electronic Communications Act 2000
    ●   Civil Evidence Act / Youth Justice and Criminal Evidence Act
●   May be legally acceptable but may not be admissible.
●   Admissible document must be sufficiently relevant
●   Court must decide and may give different weight to primary
    or secondary evidence
●   British Standards Code for Legal Admissibility and
    Evidential Weight of Information Stored Electronically.
Misuse of devices
●   Abuse and misuse (Illegal, illicit or wrong)
    ●   Defamatory remarks
    ●   Breach of confidentiality
    ●   Using and abusing copyright without permission
    ●   Negligence in sending viruses to other business
    ●   Sexual or racial harassment
●   Criminal Offences
    ●   e.g. downloading child pornography
    ●   Other illegal images
Monitoring communications
●   Right to privacy – even at work
●   Regulation of Investigatory Powers Act 2000
●   Lawful Business Practice Regulations 2000
    ●   Inform monitoring for lawful business purposes
    ●   Quality, training and security
●   How do you 'monitor' remote workers?
    ●   Blanket monitoring of employees not acceptable
    ●   Must be justified
    ●   Other alternatives?
Data protection
●   8 data protection principles
●   Principle 7 – adequate security measures
●   Principle 8 – international transfers
    ●   Cloud computing
    ●   Where is personal data
    ●   Information Commissioner's Guidance
●   Sensitive personal data
    ●   Encryption
Retention, deletion and retrieval
●   Organisations must have evidence to rely upon it!
●   Information management policy covering
    ●   Retention, access and exchange (including security),
        deletion and retrieval
●   Why a policy?
    ●   Business (cost, time and risk management)
    ●   Legal (e.g. accounting records = 6 years, criminal penalties)
    ●   Regulatory (FSA Rules, Food Standards etc)
About E RADAR


●   Championing enterprise and the online economy
●   Focus on public policy, governance, compliance and risk
    ●   Pre-legislation and post legislation
    ●   IT and online contracting
●   Free-to-use forums
    ●   Monitoring and scrutiny
    ●   Thought-leadership and best practice
    ●   Knowledge Xchange
●   Social network
Back to you... and 2012
●   A turning point?
    ●   Global recession with Euro under threat
    ●   £1 trillion UK government borrowing
    ●   60% EU cross-border e-commerce transactions fail
    ●   Public sector cuts and increasing unemployment
    ●   European Digital Single Market – working or not?


We need visionaries, innovators and entrepreneurs to
recognise the opportunities and walk through the door...”
“The best way to predict
the future is to create it!”
Thank you!




               will@eradar.eu
             http://www.eradar.eu

More Related Content

What's hot

[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again![Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!AIIM International
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...James Mulhern
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
E-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingE-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingIJERA Editor
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiRobust Marketing & Consulting (Pty) Ltd
 
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...AIIM International
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulationJames Mulhern
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by designTommy Vandepitte
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part TwoAIIM International
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesInfinity Software Solutions
 
Consumer representative
Consumer representativeConsumer representative
Consumer representativeCA
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law Priyanka Aash
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysGoutama Bachtiar
 
Characteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiCharacteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiDr. TJ Wolfe
 

What's hot (19)

[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again![Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
E-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingE-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and Prototyping
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popi
 
Byod bpost
Byod bpostByod bpost
Byod bpost
 
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
 
Online terms & conditions
Online terms & conditionsOnline terms & conditions
Online terms & conditions
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Consumer representative
Consumer representativeConsumer representative
Consumer representative
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
IAM
IAMIAM
IAM
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
 
Characteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiCharacteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commercei
 

Similar to IISP NW branch meeting 15 nov 2012 security through governance, compliance…

Personally owned devices at work
Personally owned devices at workPersonally owned devices at work
Personally owned devices at workERADAR
 
05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own Device05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own DeviceE Radar
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldE Radar
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxHillaryObomighie
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...CIO Edge
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Burton Lee
 
Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance ImpactQA
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity managementshivan82
 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptxMhndHTaani
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskTrustArc
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data ProtectionLee Schlenker
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesDimitri Sirota
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Software Integrity Group
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big dataJames Deiotte
 
ey-forensics-discovery-services.pdf
ey-forensics-discovery-services.pdfey-forensics-discovery-services.pdf
ey-forensics-discovery-services.pdfaparnamore11
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...confluent
 
Big Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsBig Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsCharles Mok
 

Similar to IISP NW branch meeting 15 nov 2012 security through governance, compliance… (20)

Personally owned devices at work
Personally owned devices at workPersonally owned devices at work
Personally owned devices at work
 
05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own Device05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own Device
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management
 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptx
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big data
 
ey-forensics-discovery-services.pdf
ey-forensics-discovery-services.pdfey-forensics-discovery-services.pdf
ey-forensics-discovery-services.pdf
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
 
IT Policy
IT PolicyIT Policy
IT Policy
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Big Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsBig Data: Trends, Applications and Potentials
Big Data: Trends, Applications and Potentials
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

IISP NW branch meeting 15 nov 2012 security through governance, compliance…

  • 1. What's on your E RADAR? IT Governance, Security and Risk across the online economy Will Roebuck Founder and CEO E RADAR | Smarter business online
  • 2. Why is IT governance important? ● It costs jobs and affects livelihoods without it ● Safeguard competitive and collaborative advantage ● Corporate reputation ● (Public) procurement requirements ● Officer (director) liability ● Meet fiscal, legal and regulatory requirements ● Provide minimum standards of best practice
  • 3. Online in 2012 – 15 years of strengths ● Speed and convenience of business transactions ● Cost and inventory control ● Global presence and market opportunity ● Better customer service ● Competitive and collaborative advantage ● Research and innovation ● Social revolution (accessibility and connecting people)
  • 4. Online in 2012 – 15 years of weaknesses ● Pace of change v legacy technologies ● e.g. Royal Bank of Scotland, NHS IT Infrastructure ● Conflict of laws and regulations ● Whose law applies? ● Common law v statute ● Work place social networking v time-management ● Increased globalisation = domino effect (e.g. Enron) ● Take up of network and information security ● Beware of imitations...
  • 5. Know who you're talking to?
  • 6. Online in 2012 – 15 years of opportunity ● 2,405,510,036 online June 2012 (34.3% world population)* ● E-commerce sales represents 16.9 per cent of total sales ● Website sales represented 4.2 per cent of total sales ● 78.7 per cent of businesses had a website ● 51.9 per cent of businesses had mobile broadband using 3G ● 86.5 per cent of businesses used the Internet to interact with public authorities. * Internet World Stats http://www.internetworldstats.com/stats.htm
  • 7. Online in 2012 – 15 years of threats ● Society, business and government ● Financial fraud ● Children and citizens e.g. harassment, bullying... ● Theft – identity, data, intellectual property ● International terrorism ● UK Cyber Crime Strategy (Nov 2011) ● Cost to UK economy ● Cyber crime - £27 billion per year? ● Welfare/tax fraud - £200/£300 per citizen per year
  • 8. Online business environment ● Supply and demand ● Goods, services, digital downloads, financial instruments ● The 'bottom line' ● Encouraged by ● Competition, enterprise and innovation ● Supported by ● People, processes, technology, and information ● Laws, regulations, standards and best practice
  • 9. What does this all mean? ● Balance supply and demand against risk ● Deploy resources carefully ● Smarter business management ● Identify, develop and use 'the right' people skills ● Re-engineer business processes ● Invest in enabling technology ● Provide good laws and regulations ● Responsive legal environment
  • 10. IT challenges over next decade ● Cloud computing ● More online applications ● Just require connectivity; transparent licensing ● Social networks and software ● Enagage with partners and customers; find out interests ● Document management and collaboration ● Organise resources centrally – audit trails ● CRM 2.0 ● Internet capabilities to manage customers, incl loyalty
  • 11. IT challenges over next decade ● Unified communications ● Connecting to the right people ● Web 3.0 – semantic web ● Intelligent applications ● Business intelligence ● Improving insights to employees... professional networks ● Virtualisation – Green IT ● Physical to virtual servers saving energy, carbon foot print, ● Enterprise mobility ● Applications accessible from mobile devices
  • 12. Why governance and compliance? ● Customer trust and confidence ● Business protection e.g. evidential trail ● Sector requirements ● Reduced insurance premiums ● Corporate reputation ● Director and vicarious liability ● 'The regulatory stick' ● Secure transactions
  • 13. Challenges and issues ● Corporate ● Vicarious and director liability ● Duty of care towards employee ● Prevent improper and illegal activity over systems /networks ● Personal ● Directors failing to undertake duties implied by law or as additional duties in their contract
  • 14. Challenges and issues Contractual ● Prove existence of agreement in disagreement with a customer ● Defend an action for unfair dismissal before employment tribunal ● Legal ● Prove an intellectual property right or invention
  • 15. Challenges and issues Regulatory ● Registering, reporting, retaining and disposal of records – Annual returns – Invoicing and VAT – Health and Safety – Personnel records ● Data Protection ● Consumer Protection ● Security of systems and networks... and information
  • 16. Digital evidence and admissibility ● Evidence is ● the way that a fact is proved or disproved in a court, tribunal or disciplinary. ● Oral, real (primary or secondary) or hearsay (less reliable) – Primary = e.g. signed original contract – Secondary = e.g. unsigned draft of the contract ● Burden of proof ● Civil cases = with plaintiff and 'balance of probabilities' ● Criminal cases = with prosecution and 'beyond reasonable doubt'
  • 17. Digital evidence and admissibility ● Evidence in electronic format is admissible ● Electronic Communications Act 2000 ● Civil Evidence Act / Youth Justice and Criminal Evidence Act ● May be legally acceptable but may not be admissible. ● Admissible document must be sufficiently relevant ● Court must decide and may give different weight to primary or secondary evidence ● British Standards Code for Legal Admissibility and Evidential Weight of Information Stored Electronically.
  • 18. Misuse of devices ● Abuse and misuse (Illegal, illicit or wrong) ● Defamatory remarks ● Breach of confidentiality ● Using and abusing copyright without permission ● Negligence in sending viruses to other business ● Sexual or racial harassment ● Criminal Offences ● e.g. downloading child pornography ● Other illegal images
  • 19. Monitoring communications ● Right to privacy – even at work ● Regulation of Investigatory Powers Act 2000 ● Lawful Business Practice Regulations 2000 ● Inform monitoring for lawful business purposes ● Quality, training and security ● How do you 'monitor' remote workers? ● Blanket monitoring of employees not acceptable ● Must be justified ● Other alternatives?
  • 20. Data protection ● 8 data protection principles ● Principle 7 – adequate security measures ● Principle 8 – international transfers ● Cloud computing ● Where is personal data ● Information Commissioner's Guidance ● Sensitive personal data ● Encryption
  • 21. Retention, deletion and retrieval ● Organisations must have evidence to rely upon it! ● Information management policy covering ● Retention, access and exchange (including security), deletion and retrieval ● Why a policy? ● Business (cost, time and risk management) ● Legal (e.g. accounting records = 6 years, criminal penalties) ● Regulatory (FSA Rules, Food Standards etc)
  • 22. About E RADAR ● Championing enterprise and the online economy ● Focus on public policy, governance, compliance and risk ● Pre-legislation and post legislation ● IT and online contracting ● Free-to-use forums ● Monitoring and scrutiny ● Thought-leadership and best practice ● Knowledge Xchange ● Social network
  • 23. Back to you... and 2012 ● A turning point? ● Global recession with Euro under threat ● £1 trillion UK government borrowing ● 60% EU cross-border e-commerce transactions fail ● Public sector cuts and increasing unemployment ● European Digital Single Market – working or not? We need visionaries, innovators and entrepreneurs to recognise the opportunities and walk through the door...”
  • 24. “The best way to predict the future is to create it!”
  • 25. Thank you! will@eradar.eu http://www.eradar.eu