SlideShare a Scribd company logo
1 of 13
Download to read offline
IDC ADRIATIC SECURITY
SUMMIT 2018
HOW TO TALK BUSINESS
Jasna Fumagalli, Director of Compliance, Safety and Risk Management
Belgrade, April 2018
22
Jasna Fumagalli
Director of Compliance, Safety and Risk Management
Graduated and magistered Law Degree from the University of
Zagreb at the Faculty of Law.
Worked in the banking industry from the beginning of career.
Extensive experience in the financial industry gained by
working in several banks and performing jobs that include all
segments of banking business.
In Mercury Processing Services International responsible for
the area of regulatory compliance in the widest sense. A special
focus is a segment of information security and the maintenance
of world certifications that the company has achieved and which
are a guarantee of the company’s focus on safe business
operations and customer data protection
Member of the professional association of ISACA, Croatian
Chamber.
NORMAL
ABOUT US
NORMAL
Mercury Processing Services International is a provider of payment solutions, dedicated to developing and
managing its payment business on an international level. Company was established in 2009.
Located in Croatia and Slovenia, we serve clients from the financial and banking sectors across Central & Eastern Europe
and North Africa. Our portfolio is tailored to meet regional, local market or individual client requirements and business
strategy.
Technological expertise is the main driver of enhancing and enriching our existing business relations, as well as the main
source for innovations we provide in the payment industry.
The foundations of Mercury Processing Services International rely on complementary strengths of the two strongest cards
businesses, Banka Koper and Privredna banka Zagreb, and their transition from local companies into a fully international
organization.
3
4
We are committed to our
clients and their customers
Because our business depends
on the accuracy and security
with which we perform our
operations, we aim for
excellence in everything we
undertake.
But our job is more than just
running payments, but being
adaptable and anticipating the
needs of our clients, and
developing new services to
meet those needs and our
clients' specific institutional
context.
And take great pride in the
quality of our work
In today’s world, everything
has to be quick and easy to
use, and it’s the same with
payments. As all else in the life
of consumers, paying for
goods or a service needs to be
a simple, quick and secure
experience.
That's why our aim is to ensure
that payment process adapts
seamlessly to the lives of the
customers, and not the other
way around.
Together with the people who
make it happen
A vital part of our every success
is our team and their expertize,
so it’s imperative we keep an
open environment where all of
us can exchange ideas and
knowledge.
Equally important, where our
employees have the freedom
and support to grow as
individuals, team members and
team leaders.
ABOUT US
NORMAL
5
OUR KEY PILLARS
SECURITY AND COMPLIANCE
WE FOCUS ON TRUST AND COMPLIANCE
• In-house development of Fraud Management solution
for detecting payment card fraud
• Acting as compliant guardian for banks
• Creating the most innovative and modern disaster
recovery solution
INNOVATION
WE STAY AHEAD OF TRENDS AND PROVIDE
INNOVATIVE SOLUTIONS
• Development of proximity payment solutions
• Implementation of new technologies and introduction
of modern services and functionalities
• Providing multi-payment schemes
INTERNATIONAL SPIRIT
WE ADAPT ACCORDING TO DIFFERENT MARKETS
• Meeting regional, local market or individual client
requirements and business strategy
• All employees are fluent in English
• The company is located in Croatia and Slovenia
OPERATIONAL EXCELLENCE
WE BRING EFFICIENCY AND PRODUCTIVITY
• Assuring high availability of service and operational
performance
• Implementations of improvement methodologies to
advance our products and services
NORMAL
Operating in
11 different markets
IN EUROPE, MIDDLE EAST
AND AFRICA
With more than
300 employees
IN OUR EVER GROWING
TEAM
Average processing
1,5 million transactions
A DAY
Processing
87 transactions
PER SECOND IN PEAK
TIMES
Managing cardholder data for
5,6 million accounts
WORLDWIDE
FACTS IN FIGURES
NORMAL 7
• Cardholder and Card
Management
• Issuer Authorization
Service
• Transaction Processing
• Proximity Payments
• POS Solutions
• ATM Solutions
• E-Commerce
• Reporting
• Call Center
• Dispute and Chargeback
Management
• Strong Authentication
• Fraud Detection
• Advanced Risk Modelling
• Loyalty Programs
ISSUING
SOLUTIONS
ACQUIRING
SOLUTIONS
VALUE ADDED
SERVICES
OUR SERVICES
NORMAL 8
WHY WE NEED TO TALK?
If business (revenue) is a king, than security is his
queen.
Only aligned business and security strategies can
lead to successful and prospective (secure) future.
Without mutual understanding (listening) it is almost
impossible to win the game.
In the end, goal(s) are the same for queen and for
the king.
NORMAL 9
9
WHAT ARE THE CHALLENGES?
There is never enough time
Calculating ROI (especially if no
incident occurred)
We speak different languages
Different tactical needs and priorities
based on the assigned role
Resistance to change
Achieving risk awareness
NORMAL
10
WHAT WE AIM TO ACHIEVE?
ALIGNED VISION
We need to look in the same direction prior to
getting there.
COMMUNICATION
Life is much easier if we better understand each
other
TRAVEL TOGETHER
There is more fun to travel together, than to
meet at the end.
INTEGRATE
Achieving security often means integration of
security elements within each business process
CORPORATE CULTURE
Avoid obstruction by converting corporate
culture into security enabler
PEACE OF MIND
Security aware employees, layered security
defense and properly addressed risks to
guarantee good night sleep.
NORMAL
IN PRACTICE…
11
• Security performs risk assessment and identifies risks above Company’s appetite
• Security proposes risk mitigation steps to reduce risks
• Business plan (e.g. lean canvas, cost-benefit analysis) for risk mitigation is presented
to Business…Communication breaks..
We can’t
do it.
No
budget!
This is
stupid.
This is not
priority. We don’t
want to do
it..
We will have
incidents..
We will lose
clients
We must
do it..
I am getting
too old for
this..
We will lose
license/
certificate We will
pay fees
NORMAL
WHAT CAN WE DO?
12
• Try to understand the impact of security measures on
business
• Be open to non-security topics
• Use simple language
• Use analogies for spreading information security messages
(e.g. https://theanalogiesproject.org/)
• Be open to comments
• Use real incident cases when presenting risks
• Be patient and willing to repeat yourself
• Get everyone on board by understanding what motivates
them
• Try to understand the security risk
• Be open to non-business topics
• Listen carefully
• Propagate security by your own example
• Learn from others, rather than on your own mistakes and
losses
• Focus on the right things - you are probably not properly
equipped to challenge security requirements, but you can
make your life easier if you understand the objective and are
engaged in finding proper solution
BUSINESS SECURITY
NORMAL
THANK YOU!
Any questions?
13

More Related Content

Similar to How to talk business on IDC Adriatic Security Summit 2018

H&A Company Profile
H&A Company ProfileH&A Company Profile
H&A Company Profileugagan
 
Brochure cott group
Brochure cott groupBrochure cott group
Brochure cott groupCOTT Group
 
DossierKumelsoft-english
DossierKumelsoft-englishDossierKumelsoft-english
DossierKumelsoft-englishRodrigo Muiño
 
Standard Chartered Bank Information Technology and Operations
Standard Chartered Bank Information Technology and OperationsStandard Chartered Bank Information Technology and Operations
Standard Chartered Bank Information Technology and OperationsEileen Choi
 
IAG (London) Private Equity Fund Administration 2016
IAG (London) Private Equity Fund Administration 2016IAG (London) Private Equity Fund Administration 2016
IAG (London) Private Equity Fund Administration 2016Alan Ross
 
SC_ITO Pitchbook_v11
SC_ITO Pitchbook_v11SC_ITO Pitchbook_v11
SC_ITO Pitchbook_v11zucchinianne
 
Standard Chartered Bank
Standard Chartered Bank Standard Chartered Bank
Standard Chartered Bank Eileen Choi
 
MoretonSmith Receivables Management Intro
MoretonSmith Receivables Management IntroMoretonSmith Receivables Management Intro
MoretonSmith Receivables Management IntroMoretonSmith
 
IAG (London) Real Estate Fund Administration 2016
IAG (London) Real Estate Fund Administration 2016IAG (London) Real Estate Fund Administration 2016
IAG (London) Real Estate Fund Administration 2016Alan Ross
 
NCS Collection - Business Profile
NCS Collection - Business ProfileNCS Collection - Business Profile
NCS Collection - Business ProfileMaureen A. Farrell
 
Orkest company profile
Orkest company profile    Orkest company profile
Orkest company profile Mohamed Yehia
 
Dental Management System
Dental Management SystemDental Management System
Dental Management SystemMohammad Sayem
 
PCN Presentation 2015
PCN Presentation 2015PCN Presentation 2015
PCN Presentation 2015Mandy Chen
 
Optimum Afrika Corporate Profile
Optimum Afrika Corporate ProfileOptimum Afrika Corporate Profile
Optimum Afrika Corporate ProfileBulelani Mnyaka
 

Similar to How to talk business on IDC Adriatic Security Summit 2018 (20)

The first certified VISA processor aggregator in Europe
The first certified VISA processor aggregator in EuropeThe first certified VISA processor aggregator in Europe
The first certified VISA processor aggregator in Europe
 
H&A Company Profile
H&A Company ProfileH&A Company Profile
H&A Company Profile
 
Brochure cott group
Brochure cott groupBrochure cott group
Brochure cott group
 
DossierKumelsoft-english
DossierKumelsoft-englishDossierKumelsoft-english
DossierKumelsoft-english
 
Standard Chartered Bank Information Technology and Operations
Standard Chartered Bank Information Technology and OperationsStandard Chartered Bank Information Technology and Operations
Standard Chartered Bank Information Technology and Operations
 
SC_ITO Pitchbook_v12
SC_ITO Pitchbook_v12SC_ITO Pitchbook_v12
SC_ITO Pitchbook_v12
 
IAG (London) Private Equity Fund Administration 2016
IAG (London) Private Equity Fund Administration 2016IAG (London) Private Equity Fund Administration 2016
IAG (London) Private Equity Fund Administration 2016
 
SC_ITO Pitchbook_v11
SC_ITO Pitchbook_v11SC_ITO Pitchbook_v11
SC_ITO Pitchbook_v11
 
Standard Chartered Bank
Standard Chartered Bank Standard Chartered Bank
Standard Chartered Bank
 
Presentation Netins Brokers Ltd
Presentation Netins Brokers LtdPresentation Netins Brokers Ltd
Presentation Netins Brokers Ltd
 
MoretonSmith Receivables Management Intro
MoretonSmith Receivables Management IntroMoretonSmith Receivables Management Intro
MoretonSmith Receivables Management Intro
 
IAG (London) Real Estate Fund Administration 2016
IAG (London) Real Estate Fund Administration 2016IAG (London) Real Estate Fund Administration 2016
IAG (London) Real Estate Fund Administration 2016
 
NCS Collection - Business Profile
NCS Collection - Business ProfileNCS Collection - Business Profile
NCS Collection - Business Profile
 
Orkest company profile
Orkest company profile    Orkest company profile
Orkest company profile
 
Dental Management System
Dental Management SystemDental Management System
Dental Management System
 
PCN Presentation 2015
PCN Presentation 2015PCN Presentation 2015
PCN Presentation 2015
 
Optimum Afrika Corporate Profile
Optimum Afrika Corporate ProfileOptimum Afrika Corporate Profile
Optimum Afrika Corporate Profile
 
Office Centre Credentials
Office Centre CredentialsOffice Centre Credentials
Office Centre Credentials
 
Venation Capital Profile Final
Venation Capital Profile  FinalVenation Capital Profile  Final
Venation Capital Profile Final
 
Inselence
InselenceInselence
Inselence
 

More from Mercury Processing Services International

More from Mercury Processing Services International (12)

Cultural transformation in I&O
Cultural transformation in I&OCultural transformation in I&O
Cultural transformation in I&O
 
Securing complex systems using centralized tokenization service
Securing complex systems using centralized tokenization serviceSecuring complex systems using centralized tokenization service
Securing complex systems using centralized tokenization service
 
The First Certified Visa Processor Aggregator In Europe
The First Certified Visa Processor Aggregator In EuropeThe First Certified Visa Processor Aggregator In Europe
The First Certified Visa Processor Aggregator In Europe
 
PSD 2 - Ocean of requirements
PSD 2 - Ocean of requirementsPSD 2 - Ocean of requirements
PSD 2 - Ocean of requirements
 
Machine learning as an enhancement for scoring models
Machine learning as an enhancement for scoring modelsMachine learning as an enhancement for scoring models
Machine learning as an enhancement for scoring models
 
Issuing fraud trends in Slovenia
Issuing fraud trends in SloveniaIssuing fraud trends in Slovenia
Issuing fraud trends in Slovenia
 
Upcoming payment schemes rules changes
Upcoming payment schemes rules changesUpcoming payment schemes rules changes
Upcoming payment schemes rules changes
 
Fighting fraud with artificial inteligence
Fighting fraud with artificial inteligenceFighting fraud with artificial inteligence
Fighting fraud with artificial inteligence
 
What are the most recent Lynx Fraud Management System upgrades
What are the most recent Lynx Fraud Management System upgradesWhat are the most recent Lynx Fraud Management System upgrades
What are the most recent Lynx Fraud Management System upgrades
 
Can security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerceCan security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerce
 
Better fraud solution through fraud and IT synergy
Better fraud solution through fraud and IT synergyBetter fraud solution through fraud and IT synergy
Better fraud solution through fraud and IT synergy
 
Our way of fighting fraud
Our way of fighting fraudOur way of fighting fraud
Our way of fighting fraud
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

How to talk business on IDC Adriatic Security Summit 2018

  • 1. IDC ADRIATIC SECURITY SUMMIT 2018 HOW TO TALK BUSINESS Jasna Fumagalli, Director of Compliance, Safety and Risk Management Belgrade, April 2018
  • 2. 22 Jasna Fumagalli Director of Compliance, Safety and Risk Management Graduated and magistered Law Degree from the University of Zagreb at the Faculty of Law. Worked in the banking industry from the beginning of career. Extensive experience in the financial industry gained by working in several banks and performing jobs that include all segments of banking business. In Mercury Processing Services International responsible for the area of regulatory compliance in the widest sense. A special focus is a segment of information security and the maintenance of world certifications that the company has achieved and which are a guarantee of the company’s focus on safe business operations and customer data protection Member of the professional association of ISACA, Croatian Chamber. NORMAL
  • 3. ABOUT US NORMAL Mercury Processing Services International is a provider of payment solutions, dedicated to developing and managing its payment business on an international level. Company was established in 2009. Located in Croatia and Slovenia, we serve clients from the financial and banking sectors across Central & Eastern Europe and North Africa. Our portfolio is tailored to meet regional, local market or individual client requirements and business strategy. Technological expertise is the main driver of enhancing and enriching our existing business relations, as well as the main source for innovations we provide in the payment industry. The foundations of Mercury Processing Services International rely on complementary strengths of the two strongest cards businesses, Banka Koper and Privredna banka Zagreb, and their transition from local companies into a fully international organization. 3
  • 4. 4 We are committed to our clients and their customers Because our business depends on the accuracy and security with which we perform our operations, we aim for excellence in everything we undertake. But our job is more than just running payments, but being adaptable and anticipating the needs of our clients, and developing new services to meet those needs and our clients' specific institutional context. And take great pride in the quality of our work In today’s world, everything has to be quick and easy to use, and it’s the same with payments. As all else in the life of consumers, paying for goods or a service needs to be a simple, quick and secure experience. That's why our aim is to ensure that payment process adapts seamlessly to the lives of the customers, and not the other way around. Together with the people who make it happen A vital part of our every success is our team and their expertize, so it’s imperative we keep an open environment where all of us can exchange ideas and knowledge. Equally important, where our employees have the freedom and support to grow as individuals, team members and team leaders. ABOUT US NORMAL
  • 5. 5 OUR KEY PILLARS SECURITY AND COMPLIANCE WE FOCUS ON TRUST AND COMPLIANCE • In-house development of Fraud Management solution for detecting payment card fraud • Acting as compliant guardian for banks • Creating the most innovative and modern disaster recovery solution INNOVATION WE STAY AHEAD OF TRENDS AND PROVIDE INNOVATIVE SOLUTIONS • Development of proximity payment solutions • Implementation of new technologies and introduction of modern services and functionalities • Providing multi-payment schemes INTERNATIONAL SPIRIT WE ADAPT ACCORDING TO DIFFERENT MARKETS • Meeting regional, local market or individual client requirements and business strategy • All employees are fluent in English • The company is located in Croatia and Slovenia OPERATIONAL EXCELLENCE WE BRING EFFICIENCY AND PRODUCTIVITY • Assuring high availability of service and operational performance • Implementations of improvement methodologies to advance our products and services NORMAL
  • 6. Operating in 11 different markets IN EUROPE, MIDDLE EAST AND AFRICA With more than 300 employees IN OUR EVER GROWING TEAM Average processing 1,5 million transactions A DAY Processing 87 transactions PER SECOND IN PEAK TIMES Managing cardholder data for 5,6 million accounts WORLDWIDE FACTS IN FIGURES NORMAL 7
  • 7. • Cardholder and Card Management • Issuer Authorization Service • Transaction Processing • Proximity Payments • POS Solutions • ATM Solutions • E-Commerce • Reporting • Call Center • Dispute and Chargeback Management • Strong Authentication • Fraud Detection • Advanced Risk Modelling • Loyalty Programs ISSUING SOLUTIONS ACQUIRING SOLUTIONS VALUE ADDED SERVICES OUR SERVICES NORMAL 8
  • 8. WHY WE NEED TO TALK? If business (revenue) is a king, than security is his queen. Only aligned business and security strategies can lead to successful and prospective (secure) future. Without mutual understanding (listening) it is almost impossible to win the game. In the end, goal(s) are the same for queen and for the king. NORMAL 9
  • 9. 9 WHAT ARE THE CHALLENGES? There is never enough time Calculating ROI (especially if no incident occurred) We speak different languages Different tactical needs and priorities based on the assigned role Resistance to change Achieving risk awareness NORMAL
  • 10. 10 WHAT WE AIM TO ACHIEVE? ALIGNED VISION We need to look in the same direction prior to getting there. COMMUNICATION Life is much easier if we better understand each other TRAVEL TOGETHER There is more fun to travel together, than to meet at the end. INTEGRATE Achieving security often means integration of security elements within each business process CORPORATE CULTURE Avoid obstruction by converting corporate culture into security enabler PEACE OF MIND Security aware employees, layered security defense and properly addressed risks to guarantee good night sleep. NORMAL
  • 11. IN PRACTICE… 11 • Security performs risk assessment and identifies risks above Company’s appetite • Security proposes risk mitigation steps to reduce risks • Business plan (e.g. lean canvas, cost-benefit analysis) for risk mitigation is presented to Business…Communication breaks.. We can’t do it. No budget! This is stupid. This is not priority. We don’t want to do it.. We will have incidents.. We will lose clients We must do it.. I am getting too old for this.. We will lose license/ certificate We will pay fees NORMAL
  • 12. WHAT CAN WE DO? 12 • Try to understand the impact of security measures on business • Be open to non-security topics • Use simple language • Use analogies for spreading information security messages (e.g. https://theanalogiesproject.org/) • Be open to comments • Use real incident cases when presenting risks • Be patient and willing to repeat yourself • Get everyone on board by understanding what motivates them • Try to understand the security risk • Be open to non-business topics • Listen carefully • Propagate security by your own example • Learn from others, rather than on your own mistakes and losses • Focus on the right things - you are probably not properly equipped to challenge security requirements, but you can make your life easier if you understand the objective and are engaged in finding proper solution BUSINESS SECURITY NORMAL