Managing IT Security and DataPrivacy Security to Enhance theClient ExperienceOvum Financial Services TechnologyForum25th J...
A CHANGE IN CUSTOMERRELATIONSHIPSMost B2CBrands UseSocial MediaEngagement isnow part of theFABRICCustomers want abetter re...
SOCIAL DATA IS A NEWCURRENCY OF ENGAGEMENTWe generatevast amountsof DATAOn the web andSocial sitesData on our likes,activi...
WHAT KIND OF DATA ISAVAILABLE?
WHAT KIND OF DATA ISAVAILABLE?DemographicsAge, Gender,Geography, HHI,Level ofEducation, Listof friends,Friends ofFriendsIn...
SECURITY STRATEGY FORPERSONAL DATAData Protection andData Privacy regulationsmust be implementedInformation RiskStandards ...
SECURITY STRATEGY FORPERSONAL DATADATA PROTECTION• Personal data must be processed fairlyand lawfully• Obtained for only o...
GAPS IN APPROACHES BYFINANCIALS SERVICES COsMost firms don’thave joined uppolicies.Firms tend to have a reactiveapproach t...
SECURITY SOLUTIONS ANDARCHITECTURESBuild architecturesthat incorporatesecurity from the startThe volumes and timeliness of...
SUMMARYData Privacy and ITSecurity has becomemore complex.Data Protection and Privacy, Information Risk (ISO27001), and Re...
Thanks for ListeningAny Questions?Alpesh Doshi, Fintricitym: +44 7973 822820w: www.fintricity.comt: @alpeshdoshil: www.lin...
References• Guarding the Social Gates, The imperative for Social media Risk Management, Alan Weber, Altimeter Group, Augus...
Managing it security and data privacy security
Upcoming SlideShare
Loading in...5
×

Managing it security and data privacy security

755

Published on

Presentation Ovum Financial Technology Forum

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
755
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
12
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Managing it security and data privacy security

  1. 1. Managing IT Security and DataPrivacy Security to Enhance theClient ExperienceOvum Financial Services TechnologyForum25th June 2013Alpesh DoshiFintricity
  2. 2. A CHANGE IN CUSTOMERRELATIONSHIPSMost B2CBrands UseSocial MediaEngagement isnow part of theFABRICCustomers want abetter relationshipwith their BRANDS
  3. 3. SOCIAL DATA IS A NEWCURRENCY OF ENGAGEMENTWe generatevast amountsof DATAOn the web andSocial sitesData on our likes,activities, friends,views/opinionsSocial Data is now a currency that can be used tobuild one-to-one relationships with customers.Carefully harvesting, analysing and leveragingsocial media data, banks may be able to gainvaluable insight into customer investment patterns,market trends and value propositions.
  4. 4. WHAT KIND OF DATA ISAVAILABLE?
  5. 5. WHAT KIND OF DATA ISAVAILABLE?DemographicsAge, Gender,Geography, HHI,Level ofEducation, Listof friends,Friends ofFriendsInterestsProfile-Based,Contextual,Demonstrated,UndeclaredActionsCreating, Rating,Sending, Sharing,Uploading, Watching,and moreInteractionHow people interactwith content and ads:Clicks, time spent,interactions, videoscompletedRecency andFrequencyHow often andwhen peopleexpress interestsor actionsSentiment andExposureWhat people say,what they read, andwhen and how theysay and read it
  6. 6. SECURITY STRATEGY FORPERSONAL DATAData Protection andData Privacy regulationsmust be implementedInformation RiskStandards – ISO 27001Regulatory and FCA/PRARequirements
  7. 7. SECURITY STRATEGY FORPERSONAL DATADATA PROTECTION• Personal data must be processed fairlyand lawfully• Obtained for only one or more specifiedlawful purpose• Adequate, relevant and not excessive• Accurate and kept up to date• Not be kept for longer than is necessary• Processed in accordance with datasubjects’ rights• Appropriate technical and organisationalmeasures• No transfer outside the EEA unlessadequate protectionRISK MANAGEMENT• Brand Reputation and loss of credibility canbe catastrophic for a financial servicesorganisation• Confidential Information about identifiedindividuals, even though some of the data ispublicly available, must be ‘managed’carefully• Internal Policies, both business andtechnology policies must be coherent andlinked across departments• Monitoring and management of these risks,and how they meet requirements must beimplemented
  8. 8. GAPS IN APPROACHES BYFINANCIALS SERVICES COsMost firms don’thave joined uppolicies.Firms tend to have a reactiveapproach to implementing risks andonly do so when an event happens.IntegratedMonitoring iskey.Most firms have not identifieddata or assessed security risksthat are faced by firms.Data ownership and use of Social .has not beenconsidered yet, but is being used
  9. 9. SECURITY SOLUTIONS ANDARCHITECTURESBuild architecturesthat incorporatesecurity from the startThe volumes and timeliness ofSocial Data requires revisedoperating models and systemsarchitectureGovernance, Risk,Compliancesolutions updatedData Security and UseLifecycle approach createdin an integrated wayRisk Mitigation must be the business imperative, butenable agility and improved customer engagement
  10. 10. SUMMARYData Privacy and ITSecurity has becomemore complex.Data Protection and Privacy, Information Risk (ISO27001), and Regulatory Requirements must becombined into a overall Security StrategyA combination of businessand technology approachesare requiredIt requires joined up thinking and implementationbetween the business and IT
  11. 11. Thanks for ListeningAny Questions?Alpesh Doshi, Fintricitym: +44 7973 822820w: www.fintricity.comt: @alpeshdoshil: www.linkedin.com/in/alpeshdoshi
  12. 12. References• Guarding the Social Gates, The imperative for Social media Risk Management, Alan Weber, Altimeter Group, August 2012• Social Data: Managing data privacy and other Legal Risks, Belinda Doshi, Partner, Nabarro, September 2012• FCA – Data Security http://www.fsa.gov.uk/pubs/other/data_security.pdf• The Social Banker – Social Media Lessons from Banking Insiders KPMG, April 2012
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×