SlideShare a Scribd company logo
1 of 24
Download to read offline
Unlock Customer Engagement Potential
Without Compromising Data Security
.
Welcome!
Holding a Bachelor of Technology degree from
Ryerson University, Chelsea leverages 5+ years
experience of marketing, as well as improving
customer loyalty and advocacy.
Marketing Specialist
SPLICE Software Inc.
 The top cyber threats & the actionable ways to defend against them
 Questions to ask vendors to ensure they keep your data safe
 Methods for improving & securing customer experiences
You will walk away with…
House Keeping
• Please submit questions through Q&A sidebar
• Time allotted for Q&A at the end of the presentation
• Winner announcement for the prize draw tomorrow
• Webinar is being recorded and will be sent to all registrants
THE MVP
SUCCESS FACTOR
Accelerating your ability
to consult with the best of
the insurance industry
 Senior Executives
 Sustainable solutions – not projects
 Perpetuation of the strategy for every engagement
 We look at everything through a business lens…
so you can be sure that client decisions are not
made in a technology vacuum
 Clear plans of action
 No consultant speak
Relationships you can Trust!
What Makes MVP Different?
www.mvpadvisorygroup.com | Copyright @2015 mvp
Who Is Laszlo Gonc
. Laszlo is a recognized senior executive with over 20+
years of progressive experience in business and
information technology.
He leads the IT Risk, Security and Compliance
practice area for MVP Advisory Group. He is
responsible for helping organizations navigate the
new digital frontier, advising on cyber security issues,
mitigate organizational IT risk and build cyber
strategies that protect business assets.
Laszlo is an invited speaker at universities and
conferences, local and national, providing thought
leadership on the state of cyber security, technology
risk management, digital careers of the future and
project management leadership.
Partner, CISSP
MVP Advisory Group
Who Is SPLICE Software Inc.
Privately owned Canadian company founded in 2006.
Headquartered in Canada with offices located in the United
States & Germany.
Using data-driven human voiced messaging, we improve customer
experiences and engagement. SPLICE voice experiences are linguistically
optimized, easily automated, and sent to preferred channels.
Some Recent Accolades…
.
Who Is Andrew Hamill
Andrew is the Founder of PAU Audio, holds a
Bachelor of Applied Science in Electrical
Engineering, and is the Solutions Architect at
SPLICE Software.
As a professional engineer with over 13 years
of experience, Andrew specializes in data
storage, communication, and workflows.
Having worked in the capacity of data and
systems, Andrew Hamill brings together his
unique passion for audio and solving
business problems to create customer
engagement and data security solutions.
Solutions Architect
SPLICE Software Inc.
Looking Ahead
Source: McAfee Labs 2016 Threats Predictions
Why Insurers?
In addition to the banking, financial and healthcare
sectors, insurers are increasingly attractive targets for
cybercriminals because of:
 the richness of credit card, banking, medical, underwriting and
other sensitive customer information,
 the large volumes of data housed in legacy systems and
applications lacking sophisticated encryption and access control,
 the larger attack surface as a result of increased data sharing
with business associates, third-party carriers and vendors,
 the ease of social engineering.
Portions © Copyright 2015-2016. MVP Advisory Group, LLC. All rights reserved.
23% of recipients now open
phishing messages and
11% click on attachments*
Top Cyber Threats
1. Denial-of-Service, Ransomware and Malware
2. Spear Phishing and Social Engineering
3. Infrastructure Vulnerabilities
4. Laptops, Mobile Devices and Smartphones
5. Physical and Facility Security
Source: Verizon 2015 PCI Compliance Report*
More Cyber Threats
6. Payment Systems
7. Attacks through Employee Systems
8. Integrity Attacks
9. Insider Threats
10. Cloud Services.
Source: 2015 Global Megatrends in Cybersecurity, Raytheon & Ponemon Institute, February 2015
78% said their boards had not been
briefed even once on their cybersecurity
strategy over the past 12 months*
Current State
 Existing systems
 Existing partnerships and integrations
 Growth of connected devices and integrations
 Movement to cloud systems & computing
 Highly regulated companies moving to the cloud.
Portions © Copyright 2015-2016. SPLICE Software Inc. All rights reserved.
Future State
 Dramatic growth of connected devices & customer data
 Increased cyber threats
 Changing laws and regulatory landscape
 Increased regulator and auditor scrutiny
 Rise of class action and derivative suits.
Portions © Copyright 2015-2016. MVP Advisory Group, LLC. All rights reserved.
Regulatory & Real Risk
 Regulatory standards and real risk
 Appetite for risk and understanding therefore
 Access and data management
 Third party vetting of security and access
 Third party data management
 Anecdotal examples.
Portions © Copyright 2015-2016. SPLICE Software Inc. All rights reserved.
Cyber Aggressor, circa 1990
The details?
• Small Size Company
• New Employee Hired
• Passed Background Check
• Walked Away With Thousands…
Portions © Copyright 2015-2016. SPLICE Software Inc. All rights reserved.
Where Do You Start?
Key Areas For Improvement
1. Risk Measurement
2. Business Engagement
3. Controls Assessments
4. Third Party Risk Assessments
5. Threat Detection.
Source: RSA/EMC, “Security for Business Innovation Council Report”
Security in the Boardroom
1. Understand fiduciary responsibilities
2. Embrace education and awareness
3. Determine your risk profile
4. Define your risk appetite
5. Take reasonable steps to show due diligence
6. Instill a culture of monitoring, reporting & accountability
7. Confirm appropriate resource allocation
8. Know your regulator, know your industry.
Portions © Copyright 2015-2016. MVP Advisory Group, LLC. All rights reserved.
Build Your Program
Strategic elements to build a successful InfoSec program:
 Develop a ‘need to know’ culture regarding information
 Establish an information security team
 Understand your regulatory and compliance landscape
 Assess your threats, vulnerabilities and risks
 Create a risk mitigation strategy, develop a plan
 Manage & secure third-party business relationships.
Portions © Copyright 2015-2016. MVP Advisory Group, LLC. All rights reserved.
Build Your Program
Operational elements to build a successful InfoSec program:
 Manage information assets and protect the crown jewels
 Secure your computing technologies
 Manage access and user ID life cycle
 Implement security controls and audit them
 Build user awareness and conduct ongoing training
 Create an incident response plan and practice it.
Portions © Copyright 2015-2016. MVP Advisory Group, LLC. All rights reserved.
Customer & Vendor Experience
 It starts with exposure
 What is asked of the client by the vendor
 Up-to-date integration techniques
 SFTP, SOAP, REST, API
 Maturity in system, process, testing, documents & support
 Antiquated vs. Current vs. Bleeding Edge.
Portions © Copyright 2015-2016. SPLICE Software Inc. All rights reserved.
Recommendations
1. Shift focus from technical assets to critical business processes
2. Institute business estimates of cybersecurity risks
3. Establish a business-centric risk assessment process
4. Focus on evidence-based controls assurance
5. Develop informed data collection methods.
Source: RSA/EMC, “Security for Business Innovation Council Report”
Q & A
Deliver the ‘Right’ Customer Experience without Compromising Data Security

More Related Content

What's hot

Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionCylance
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDPriyanka Aash
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Preserving the Privilege during Breach Response
Preserving the Privilege during Breach ResponsePreserving the Privilege during Breach Response
Preserving the Privilege during Breach ResponsePriyanka Aash
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALWayne Anderson
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIsSteven Aiello
 
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...Proofpoint
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsPriyanka Aash
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCBIZ, Inc.
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...IBM Security
 
Improving Security Metrics
Improving Security MetricsImproving Security Metrics
Improving Security MetricsDoug Copley
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Resolver Inc.
 

What's hot (20)

Embracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your DecisionEmbracing Threat Intelligence and Finding ROI in Your Decision
Embracing Threat Intelligence and Finding ROI in Your Decision
 
HEMISPHERE SMB Case Study
HEMISPHERE SMB Case StudyHEMISPHERE SMB Case Study
HEMISPHERE SMB Case Study
 
2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study2018 LexisNexis Fraud Mitigation Study
2018 LexisNexis Fraud Mitigation Study
 
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPAREDDATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
DATA BREACH LITIGATION HOW TO AVOID IT AND BE BETTER PREPARED
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Preserving the Privilege during Breach Response
Preserving the Privilege during Breach ResponsePreserving the Privilege during Breach Response
Preserving the Privilege during Breach Response
 
Unrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINALUnrestricted - Complex Regulation Practical Security FINAL
Unrestricted - Complex Regulation Practical Security FINAL
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
 
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ... 2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
2020 Cost of Insider Threats Global Report with Dr. Larry Ponemon, Chairman ...
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directors
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
MP_OneSheet_VulnThreat
MP_OneSheet_VulnThreatMP_OneSheet_VulnThreat
MP_OneSheet_VulnThreat
 
Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Cybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness AssessmentCybersecurity: Quick Preparedness Assessment
Cybersecurity: Quick Preparedness Assessment
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Improving Security Metrics
Improving Security MetricsImproving Security Metrics
Improving Security Metrics
 
Cyber Security Infographic
Cyber Security InfographicCyber Security Infographic
Cyber Security Infographic
 
Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security Why Corporate Security Professionals Should Care About Information Security
Why Corporate Security Professionals Should Care About Information Security
 

Viewers also liked

How to Leverage Data Insights with the SPLICE Dialog ControllerTM
How to Leverage Data Insights with the SPLICE Dialog ControllerTM How to Leverage Data Insights with the SPLICE Dialog ControllerTM
How to Leverage Data Insights with the SPLICE Dialog ControllerTM SPLICE Software
 
A SPLICE Expert Perspectives Webcast: Customer Experience Beyond Surveys
A SPLICE Expert Perspectives Webcast: Customer Experience Beyond SurveysA SPLICE Expert Perspectives Webcast: Customer Experience Beyond Surveys
A SPLICE Expert Perspectives Webcast: Customer Experience Beyond SurveysSPLICE Software
 
Inbound webinar presentation
Inbound webinar presentation Inbound webinar presentation
Inbound webinar presentation Cordium
 
Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...
Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...
Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...Sarah Silveri, RSI Content Solutions
 
Мобильные решения компании Complex Systems
Мобильные решения компании Complex SystemsМобильные решения компании Complex Systems
Мобильные решения компании Complex SystemsComplex Systems
 
NexJ CDM Overview: Better Understand Customers with NexJ Customer Data Manage...
NexJ CDM Overview: Better Understand Customers with NexJ Customer Data Manage...NexJ CDM Overview: Better Understand Customers with NexJ Customer Data Manage...
NexJ CDM Overview: Better Understand Customers with NexJ Customer Data Manage...NexJ Systems Inc.
 
Stop Branding Pollution: Managing brand complexity & ensuring consistency
Stop Branding Pollution: Managing brand complexity & ensuring consistencyStop Branding Pollution: Managing brand complexity & ensuring consistency
Stop Branding Pollution: Managing brand complexity & ensuring consistencyConceptShare
 
Dynamic Benchmarking For Franchises
Dynamic Benchmarking For FranchisesDynamic Benchmarking For Franchises
Dynamic Benchmarking For FranchisesDynamic Benchmarking
 
InvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner ProgramInvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner ProgramInvisibleCRM
 
Ecommerce In Sri Lanka: Building An Experience That Customers Will Love
Ecommerce In Sri Lanka: Building An Experience That Customers Will LoveEcommerce In Sri Lanka: Building An Experience That Customers Will Love
Ecommerce In Sri Lanka: Building An Experience That Customers Will LoveAdnan Issadeen
 

Viewers also liked (19)

How to Leverage Data Insights with the SPLICE Dialog ControllerTM
How to Leverage Data Insights with the SPLICE Dialog ControllerTM How to Leverage Data Insights with the SPLICE Dialog ControllerTM
How to Leverage Data Insights with the SPLICE Dialog ControllerTM
 
A SPLICE Expert Perspectives Webcast: Customer Experience Beyond Surveys
A SPLICE Expert Perspectives Webcast: Customer Experience Beyond SurveysA SPLICE Expert Perspectives Webcast: Customer Experience Beyond Surveys
A SPLICE Expert Perspectives Webcast: Customer Experience Beyond Surveys
 
Inbound webinar presentation
Inbound webinar presentation Inbound webinar presentation
Inbound webinar presentation
 
Impel elemech-company
Impel elemech-companyImpel elemech-company
Impel elemech-company
 
Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...
Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...
Don’t Hide Your Content in a Traditional Help System: A Case Study from TechP...
 
The Benefits of FileMaker Pro
The Benefits of FileMaker ProThe Benefits of FileMaker Pro
The Benefits of FileMaker Pro
 
CRM on Demand India ,
CRM on Demand India , CRM on Demand India ,
CRM on Demand India ,
 
первая
перваяпервая
первая
 
How to Hire a PR Firm
How to Hire a PR FirmHow to Hire a PR Firm
How to Hire a PR Firm
 
Мобильные решения компании Complex Systems
Мобильные решения компании Complex SystemsМобильные решения компании Complex Systems
Мобильные решения компании Complex Systems
 
NexJ CDM Overview: Better Understand Customers with NexJ Customer Data Manage...
NexJ CDM Overview: Better Understand Customers with NexJ Customer Data Manage...NexJ CDM Overview: Better Understand Customers with NexJ Customer Data Manage...
NexJ CDM Overview: Better Understand Customers with NexJ Customer Data Manage...
 
Slideshow
SlideshowSlideshow
Slideshow
 
Stop Branding Pollution: Managing brand complexity & ensuring consistency
Stop Branding Pollution: Managing brand complexity & ensuring consistencyStop Branding Pollution: Managing brand complexity & ensuring consistency
Stop Branding Pollution: Managing brand complexity & ensuring consistency
 
Nonprofit Special Events
Nonprofit Special EventsNonprofit Special Events
Nonprofit Special Events
 
Presenting John Loder
Presenting John LoderPresenting John Loder
Presenting John Loder
 
Jackson Associates Research Competencies 2013
Jackson Associates Research Competencies 2013Jackson Associates Research Competencies 2013
Jackson Associates Research Competencies 2013
 
Dynamic Benchmarking For Franchises
Dynamic Benchmarking For FranchisesDynamic Benchmarking For Franchises
Dynamic Benchmarking For Franchises
 
InvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner ProgramInvisibleCRM Reselling Partner Program
InvisibleCRM Reselling Partner Program
 
Ecommerce In Sri Lanka: Building An Experience That Customers Will Love
Ecommerce In Sri Lanka: Building An Experience That Customers Will LoveEcommerce In Sri Lanka: Building An Experience That Customers Will Love
Ecommerce In Sri Lanka: Building An Experience That Customers Will Love
 

Similar to Deliver the ‘Right’ Customer Experience without Compromising Data Security

Common sense in security
Common sense in securityCommon sense in security
Common sense in securityPeter Bassill
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comPentest-Tools.com
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisAggregage
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Accenture Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5accenture
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
Social Supply Chain and Sales Pipeline Bridge
Social Supply Chain and Sales Pipeline BridgeSocial Supply Chain and Sales Pipeline Bridge
Social Supply Chain and Sales Pipeline BridgeSteelwedge
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxSymptai Consulting Limited
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and GovernanceSAP Analytics
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security frameworkYann Lecourt
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworksVincent Bellamy
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 
Business model israel_v1.0
Business model israel_v1.0Business model israel_v1.0
Business model israel_v1.0FixNix Inc.,
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingDanielle Bowers
 

Similar to Deliver the ‘Right’ Customer Experience without Compromising Data Security (20)

Common sense in security
Common sense in securityCommon sense in security
Common sense in security
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019The 10 most promising enterprise security solution providers 2019
The 10 most promising enterprise security solution providers 2019
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.com
 
Journey to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a CrisisJourney to the Perfect Application: Digital Transformation During a Crisis
Journey to the Perfect Application: Digital Transformation During a Crisis
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
IT solution
IT solutionIT solution
IT solution
 
Social Supply Chain and Sales Pipeline Bridge
Social Supply Chain and Sales Pipeline BridgeSocial Supply Chain and Sales Pipeline Bridge
Social Supply Chain and Sales Pipeline Bridge
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Embracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptxEmbracing the Risk and Opportunity of AI & Cloud.pptx
Embracing the Risk and Opportunity of AI & Cloud.pptx
 
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
 
Cyber security framework
Cyber security frameworkCyber security framework
Cyber security framework
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018The 10 most trusted cyber security solution providers 2018
The 10 most trusted cyber security solution providers 2018
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
Business model israel_v1.0
Business model israel_v1.0Business model israel_v1.0
Business model israel_v1.0
 
Information Security Analyst Resume. When seeking
Information Security Analyst Resume. When seekingInformation Security Analyst Resume. When seeking
Information Security Analyst Resume. When seeking
 

Recently uploaded

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Deliver the ‘Right’ Customer Experience without Compromising Data Security

  • 1. Unlock Customer Engagement Potential Without Compromising Data Security
  • 2. . Welcome! Holding a Bachelor of Technology degree from Ryerson University, Chelsea leverages 5+ years experience of marketing, as well as improving customer loyalty and advocacy. Marketing Specialist SPLICE Software Inc.
  • 3.  The top cyber threats & the actionable ways to defend against them  Questions to ask vendors to ensure they keep your data safe  Methods for improving & securing customer experiences You will walk away with… House Keeping • Please submit questions through Q&A sidebar • Time allotted for Q&A at the end of the presentation • Winner announcement for the prize draw tomorrow • Webinar is being recorded and will be sent to all registrants
  • 4. THE MVP SUCCESS FACTOR Accelerating your ability to consult with the best of the insurance industry
  • 5.  Senior Executives  Sustainable solutions – not projects  Perpetuation of the strategy for every engagement  We look at everything through a business lens… so you can be sure that client decisions are not made in a technology vacuum  Clear plans of action  No consultant speak Relationships you can Trust! What Makes MVP Different? www.mvpadvisorygroup.com | Copyright @2015 mvp
  • 6. Who Is Laszlo Gonc . Laszlo is a recognized senior executive with over 20+ years of progressive experience in business and information technology. He leads the IT Risk, Security and Compliance practice area for MVP Advisory Group. He is responsible for helping organizations navigate the new digital frontier, advising on cyber security issues, mitigate organizational IT risk and build cyber strategies that protect business assets. Laszlo is an invited speaker at universities and conferences, local and national, providing thought leadership on the state of cyber security, technology risk management, digital careers of the future and project management leadership. Partner, CISSP MVP Advisory Group
  • 7. Who Is SPLICE Software Inc. Privately owned Canadian company founded in 2006. Headquartered in Canada with offices located in the United States & Germany. Using data-driven human voiced messaging, we improve customer experiences and engagement. SPLICE voice experiences are linguistically optimized, easily automated, and sent to preferred channels. Some Recent Accolades…
  • 8. . Who Is Andrew Hamill Andrew is the Founder of PAU Audio, holds a Bachelor of Applied Science in Electrical Engineering, and is the Solutions Architect at SPLICE Software. As a professional engineer with over 13 years of experience, Andrew specializes in data storage, communication, and workflows. Having worked in the capacity of data and systems, Andrew Hamill brings together his unique passion for audio and solving business problems to create customer engagement and data security solutions. Solutions Architect SPLICE Software Inc.
  • 9. Looking Ahead Source: McAfee Labs 2016 Threats Predictions
  • 10. Why Insurers? In addition to the banking, financial and healthcare sectors, insurers are increasingly attractive targets for cybercriminals because of:  the richness of credit card, banking, medical, underwriting and other sensitive customer information,  the large volumes of data housed in legacy systems and applications lacking sophisticated encryption and access control,  the larger attack surface as a result of increased data sharing with business associates, third-party carriers and vendors,  the ease of social engineering. Portions © Copyright 2015-2016. MVP Advisory Group, LLC. All rights reserved.
  • 11. 23% of recipients now open phishing messages and 11% click on attachments* Top Cyber Threats 1. Denial-of-Service, Ransomware and Malware 2. Spear Phishing and Social Engineering 3. Infrastructure Vulnerabilities 4. Laptops, Mobile Devices and Smartphones 5. Physical and Facility Security Source: Verizon 2015 PCI Compliance Report*
  • 12. More Cyber Threats 6. Payment Systems 7. Attacks through Employee Systems 8. Integrity Attacks 9. Insider Threats 10. Cloud Services. Source: 2015 Global Megatrends in Cybersecurity, Raytheon & Ponemon Institute, February 2015 78% said their boards had not been briefed even once on their cybersecurity strategy over the past 12 months*
  • 13. Current State  Existing systems  Existing partnerships and integrations  Growth of connected devices and integrations  Movement to cloud systems & computing  Highly regulated companies moving to the cloud. Portions © Copyright 2015-2016. SPLICE Software Inc. All rights reserved.
  • 14. Future State  Dramatic growth of connected devices & customer data  Increased cyber threats  Changing laws and regulatory landscape  Increased regulator and auditor scrutiny  Rise of class action and derivative suits. Portions © Copyright 2015-2016. MVP Advisory Group, LLC. All rights reserved.
  • 15. Regulatory & Real Risk  Regulatory standards and real risk  Appetite for risk and understanding therefore  Access and data management  Third party vetting of security and access  Third party data management  Anecdotal examples. Portions © Copyright 2015-2016. SPLICE Software Inc. All rights reserved.
  • 16. Cyber Aggressor, circa 1990 The details? • Small Size Company • New Employee Hired • Passed Background Check • Walked Away With Thousands… Portions © Copyright 2015-2016. SPLICE Software Inc. All rights reserved.
  • 17. Where Do You Start? Key Areas For Improvement 1. Risk Measurement 2. Business Engagement 3. Controls Assessments 4. Third Party Risk Assessments 5. Threat Detection. Source: RSA/EMC, “Security for Business Innovation Council Report”
  • 18. Security in the Boardroom 1. Understand fiduciary responsibilities 2. Embrace education and awareness 3. Determine your risk profile 4. Define your risk appetite 5. Take reasonable steps to show due diligence 6. Instill a culture of monitoring, reporting & accountability 7. Confirm appropriate resource allocation 8. Know your regulator, know your industry. Portions © Copyright 2015-2016. MVP Advisory Group, LLC. All rights reserved.
  • 19. Build Your Program Strategic elements to build a successful InfoSec program:  Develop a ‘need to know’ culture regarding information  Establish an information security team  Understand your regulatory and compliance landscape  Assess your threats, vulnerabilities and risks  Create a risk mitigation strategy, develop a plan  Manage & secure third-party business relationships. Portions © Copyright 2015-2016. MVP Advisory Group, LLC. All rights reserved.
  • 20. Build Your Program Operational elements to build a successful InfoSec program:  Manage information assets and protect the crown jewels  Secure your computing technologies  Manage access and user ID life cycle  Implement security controls and audit them  Build user awareness and conduct ongoing training  Create an incident response plan and practice it. Portions © Copyright 2015-2016. MVP Advisory Group, LLC. All rights reserved.
  • 21. Customer & Vendor Experience  It starts with exposure  What is asked of the client by the vendor  Up-to-date integration techniques  SFTP, SOAP, REST, API  Maturity in system, process, testing, documents & support  Antiquated vs. Current vs. Bleeding Edge. Portions © Copyright 2015-2016. SPLICE Software Inc. All rights reserved.
  • 22. Recommendations 1. Shift focus from technical assets to critical business processes 2. Institute business estimates of cybersecurity risks 3. Establish a business-centric risk assessment process 4. Focus on evidence-based controls assurance 5. Develop informed data collection methods. Source: RSA/EMC, “Security for Business Innovation Council Report”
  • 23. Q & A