Today’s customers are demanding more real-time interaction. Yet, in this digital world, data vulnerability and cyber-attacks against insurers and financial institutions are becoming an increasingly frequent and sophisticated reality. This webinar shares key insights needed to implement modern solutions that improve your customer’s experience while reducing the risk of cyber threats - protecting your company and your customers from attacks.
2. .
Welcome!
Holding a Bachelor of Technology degree from
Ryerson University, Chelsea leverages 5+ years
experience of marketing, as well as improving
customer loyalty and advocacy.
Marketing Specialist
SPLICE Software Inc.
3. The top cyber threats & the actionable ways to defend against them
Questions to ask vendors to ensure they keep your data safe
Methods for improving & securing customer experiences
You will walk away with…
House Keeping
• Please submit questions through Q&A sidebar
• Time allotted for Q&A at the end of the presentation
• Winner announcement for the prize draw tomorrow
• Webinar is being recorded and will be sent to all registrants
5. Senior Executives
Sustainable solutions – not projects
Perpetuation of the strategy for every engagement
We look at everything through a business lens…
so you can be sure that client decisions are not
made in a technology vacuum
Clear plans of action
No consultant speak
Relationships you can Trust!
What Makes MVP Different?
www.mvpadvisorygroup.com | Copyright @2015 mvp
6. Who Is Laszlo Gonc
. Laszlo is a recognized senior executive with over 20+
years of progressive experience in business and
information technology.
He leads the IT Risk, Security and Compliance
practice area for MVP Advisory Group. He is
responsible for helping organizations navigate the
new digital frontier, advising on cyber security issues,
mitigate organizational IT risk and build cyber
strategies that protect business assets.
Laszlo is an invited speaker at universities and
conferences, local and national, providing thought
leadership on the state of cyber security, technology
risk management, digital careers of the future and
project management leadership.
Partner, CISSP
MVP Advisory Group
7. Who Is SPLICE Software Inc.
Privately owned Canadian company founded in 2006.
Headquartered in Canada with offices located in the United
States & Germany.
Using data-driven human voiced messaging, we improve customer
experiences and engagement. SPLICE voice experiences are linguistically
optimized, easily automated, and sent to preferred channels.
Some Recent Accolades…
8. .
Who Is Andrew Hamill
Andrew is the Founder of PAU Audio, holds a
Bachelor of Applied Science in Electrical
Engineering, and is the Solutions Architect at
SPLICE Software.
As a professional engineer with over 13 years
of experience, Andrew specializes in data
storage, communication, and workflows.
Having worked in the capacity of data and
systems, Andrew Hamill brings together his
unique passion for audio and solving
business problems to create customer
engagement and data security solutions.
Solutions Architect
SPLICE Software Inc.
11. 23% of recipients now open
phishing messages and
11% click on attachments*
Top Cyber Threats
1. Denial-of-Service, Ransomware and Malware
2. Spear Phishing and Social Engineering
3. Infrastructure Vulnerabilities
4. Laptops, Mobile Devices and Smartphones
5. Physical and Facility Security
Source: Verizon 2015 PCI Compliance Report*
12. More Cyber Threats
6. Payment Systems
7. Attacks through Employee Systems
8. Integrity Attacks
9. Insider Threats
10. Cloud Services.
Source: 2015 Global Megatrends in Cybersecurity, Raytheon & Ponemon Institute, February 2015
78% said their boards had not been
briefed even once on their cybersecurity
strategy over the past 12 months*
17. Where Do You Start?
Key Areas For Improvement
1. Risk Measurement
2. Business Engagement
3. Controls Assessments
4. Third Party Risk Assessments
5. Threat Detection.
Source: RSA/EMC, “Security for Business Innovation Council Report”
22. Recommendations
1. Shift focus from technical assets to critical business processes
2. Institute business estimates of cybersecurity risks
3. Establish a business-centric risk assessment process
4. Focus on evidence-based controls assurance
5. Develop informed data collection methods.
Source: RSA/EMC, “Security for Business Innovation Council Report”