SlideShare a Scribd company logo
Strictly Private
and Confidential
Trust in Digital Age
Vincent Loy, PwC Singapore
PwC
Agenda
1. The rise of the Digital World
2. Impact of the Digital Natives
3. Trust: Currency of the Digital Age
4. How to build Trust in the Digital Age
PwC
1
The Rise of The Digital World
PwC
PwC
“An explosive Growth of Technology”
PwC 4
Smart Nation
Social
Networking
Cloud
Computing
Industry 4.0
Big Data
Artificial
Intelligence
Internet of
Things
Virtual
Reality
Augmented
Reality
Smart
Drones
Block Chain
Autonomous
Driving
Mobility
Quantum
Computing
Robots
3D Printing
The Digital Age
PwC
“Top 8 out
of 150 tech
most likely
to affect
business
globally”
5
Key Emerging Tech by 2020 most likely to affect
business globally
Abolishes logistical
limitations and opens new
possibilities for simulation
Machine learning has potential to
create new products and services
Potential to turn any
business into a factory
Provides new modes
for surveillance,
survey, and delivery
Automate, augment
or assist human
activity
Sensors across the value chain can
capture and analyse information to
fulfill business objectives
Blending of physical and
virtual world presents new
business opportunities
Distributed electronic ledger has
potential for prevention of fraud
PwC
6
The Digital evolution has already started
PwC
NOW
PwC
Key Drivers for Digital Natives
Smart
Nation
Social
Networking
Cloud
Computing
Industry
4.0
Big
Data
Artificial
Intelligence
Internet
of
Things
Virtual
Reality
Augmented
Reality
Smart
Drones
Blockchain
Autonomous
Driving
Mobility
Quantum
Computing
Robots
3D
Printing
Accessibility
Computing
Power
Storage Cost
PwC
2
Impact of the Digital Natives
PwC
PwC
Who are the Digital Natives?
9
• Has increasingly high
expectations set by market-
leading brands
• Is better informed than ever
• Trusts his/her peers more than
advertising
• Has variety of choices
• Has voice via social media
PwC
What does this mean to businesses
10
Use insight to understand customer
needs and deliver better customer
outcomes
Has detailed insight into how its
products and services are
consumed
Is confident with disruptive digital
technologies
Understands the broader
ecosystem and builds a network of
partnerships
1
2 4
3
Continuously innovates, understands and exploits the potential of new business models
5
PwC
PwC
11
24/7
Undisrupted
IT Services
Privacy
and Data
Protection
How to retain the
digital native
customer?
Need to build
Trust
into fabric of the
operations
Underlying this expectation
PwC
Not just about
technology but also
business strategy
Should underpin
how business is
organised and run
Critical for the
digital age
Premium On
Trust
Trust: Currency of the Digital Age
PwC 12
PwC
3
Trust: Currency of the Digital Age
PwC
PwC | July 2014
Risks of Digital World
14
Sourcing Risk
IT Processes &
Assets
Project
Delivery Risk
IT Resilience and
Continuity
Cyber Security
Business Systems
Data
Governance &
Quality
Technology
Mega Trends
Global IT
IT Governance
Compliance
with Regulation
PwC
Business impact when trust is broken
15
• Costs of remediation &
investigation
• Financial losses
• Share price
PwC 16
4
How to build trust in the Digital Age
PwC
PwC
What all these mean for your business
“Managing risk
and building trust
underpins the
digital agenda as
digital platforms
become
increasingly
central to the
delivery of
business strategy.”
Five key business imperatives:
17
Confidence in your security
Confidence that systems are secure to protect customer
and other data and that identity/privacy issues have been dealt with.
Confidence in your data
Confidence in the integrity of data and the ability
to benefit from what it can reveal about a business
Confidence in your systems
Confidence that business systems have the right controls and monitoring
to ensure that they do what they are supposed to, whether they are in-house
systems or are delivered as cloud based services.
Confidence to take risks
Confidence that technology risks are understood and well managed
and that digital platforms will be available when required (24/7).
Confidence in your digital transformation programme
Confidence to embark on and deliver the next complex digital transformation
programme in a way that delivers the expected benefits, on time and to budget.
Cyber Security
Data
Confidence
Business Systems
Confidence
IT Risk
Confidence
Transformation
Confidence
PwC | July 2014
What all these mean for your business
- Organisation
Strategy Compliance
Customer
Engagement
New opportunities &
considerations
New
regulations
Reshaping interactions from
sales & marketing to billing
& after-sales support
18
People &
Talents
New job categories,
phasing out of old roles
Operations
Improve operational
efficiency and significant
competitive advantage
PwC
PwC
Our Digital Trust Framework
19PwC
PwC
Assess your Digital Trust Profile: Questions to Ask
20
4. What controls enforce
third parties to handle
your data appropriately?
1. Have you identified
your risk profile and
ensured your controls are
‘right-sized’?
2. Is your digital
programme aligned to
your business & IT
strategy?
3. Do you know where
your most valuable
data is physically held?
PwC
5. With increasing
connectivity, how are you
managing access to your
systems?
6. Do you know if those
accessing core systems are
truly who they say they
are?
8. Are you meeting fast-
changing regulatory
requirements?
9. In the event of incident,
what is your incident
response plan to secure
the business and rebuild
trust?
7. If you are holding
customer data, how are
you managing their
security and privacy
expectations?
PwC
Thank you.
This publication has been prepared for general guidance on matters of interest only, and does not
constitute professional advice. You should not act upon the information contained in this publication
without obtaining specific professional advice. No representation or warranty (express or implied) is
given as to the accuracy or completeness of the information contained in this publication, and, to the
extent permitted by law, [insert legal name of the PwC firm], its members, employees and agents do
not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone
else acting, or refraining to act, in reliance on the information contained in this publication or for any
decision based on it.
© 2015 PwC Singapore. All rights reserved. In this document, “PwC” refers to PricewaterhouseCoopers
LLP which is a member firm of PricewaterhouseCoopers International Limited, each member firm of
which is a separate legal entity.
Contact us:
Vincent Loy
Partner
Data Analytics, Cyber &
Financial Crime Leader
Vincent.J.Loy@sg.pwc.com

More Related Content

What's hot

Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
accenture
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
accenture
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
centralohioissa
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
Accenture Australia
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
Pierre Audoin Consultants
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
Accenture Operations
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
Sarah Fane
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)
Ray Bugg
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Big Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to YouBig Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to YouDATAVERSITY
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare
Accenture Security
 
Solving Your Top IT Challenges
Solving Your Top IT Challenges Solving Your Top IT Challenges
Solving Your Top IT Challenges
Insight
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
- Mark - Fullbright
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
Joseph Wynn
 
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powellCWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
Capgemini
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
IDG
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
Resilient Systems
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
Dave James
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Index
accenture
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
 

What's hot (20)

Decoding Organizational DNA
Decoding Organizational DNADecoding Organizational DNA
Decoding Organizational DNA
 
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
The Pulse of Pensions: What Members Really Think of Their Pension Plans and R...
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018State of Cyber Resilience In Australia 2018
State of Cyber Resilience In Australia 2018
 
Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises? Is cyber security now too hard for enterprises?
Is cyber security now too hard for enterprises?
 
How to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber ResilientHow to Make Your Enterprise Cyber Resilient
How to Make Your Enterprise Cyber Resilient
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Big Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to YouBig Data: Beyond the Hype - Why Big Data Matters to You
Big Data: Beyond the Hype - Why Big Data Matters to You
 
Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare Third Annual State of Cyber Resilience SlideShare
Third Annual State of Cyber Resilience SlideShare
 
Solving Your Top IT Challenges
Solving Your Top IT Challenges Solving Your Top IT Challenges
Solving Your Top IT Challenges
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powellCWIN17 telford   gdpr or how to eat the elephant a bit at a time - andy powell
CWIN17 telford gdpr or how to eat the elephant a bit at a time - andy powell
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
Looking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data IncidentsLooking Forward - Regulators and Data Incidents
Looking Forward - Regulators and Data Incidents
 
Convince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cureConvince your board - cyber attack prevention is better than cure
Convince your board - cyber attack prevention is better than cure
 
Accenture Banking Security Index
Accenture Banking Security IndexAccenture Banking Security Index
Accenture Banking Security Index
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 

Similar to ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC

Data and Analytics In The Digital Age
Data and Analytics In The Digital AgeData and Analytics In The Digital Age
Data and Analytics In The Digital AgeNigel Wright Group
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
SPLICE Software
 
PwC: New IT Platform From Strategy Through Execution
PwC: New IT Platform From Strategy Through ExecutionPwC: New IT Platform From Strategy Through Execution
PwC: New IT Platform From Strategy Through Execution
CA Technologies
 
Digital-Trust-Whitepaper
Digital-Trust-WhitepaperDigital-Trust-Whitepaper
Digital-Trust-Whitepaper
digitalinasia
 
Digital, Data & Analytics, Disruption in Deals
Digital, Data & Analytics, Disruption in DealsDigital, Data & Analytics, Disruption in Deals
Digital, Data & Analytics, Disruption in Deals
Anand Rao
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
Search Engine Journal
 
The Best Cloud Apps for Ambitious Law Firms
The Best Cloud Apps for Ambitious Law FirmsThe Best Cloud Apps for Ambitious Law Firms
The Best Cloud Apps for Ambitious Law Firms
Clio - Cloud-Based Legal Technology
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
accenture
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
Accenture Technology
 
Privacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsPrivacy 2020: Recap & Predictions
Privacy 2020: Recap & Predictions
TrustArc
 
PWC 2014 Global Digital IQ Survey
PWC 2014 Global Digital IQ SurveyPWC 2014 Global Digital IQ Survey
PWC 2014 Global Digital IQ Survey
polenumerique33
 
Etude PwC Digital IQ (2014)
Etude PwC Digital IQ (2014)Etude PwC Digital IQ (2014)
Etude PwC Digital IQ (2014)
PwC France
 
The Digital Enterprise: CIO perspectives
The Digital Enterprise: CIO perspectivesThe Digital Enterprise: CIO perspectives
The Digital Enterprise: CIO perspectives
MWD Advisors
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
Bluelock
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
Kayla Catron
 
Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...
accenture
 
Riding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyRiding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information Technology
Goutama Bachtiar
 
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Proofpoint
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Marco Essomba
 
It52015 slides
It52015 slidesIt52015 slides
It52015 slides
Jim Kaplan CIA CFE
 

Similar to ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC (20)

Data and Analytics In The Digital Age
Data and Analytics In The Digital AgeData and Analytics In The Digital Age
Data and Analytics In The Digital Age
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
PwC: New IT Platform From Strategy Through Execution
PwC: New IT Platform From Strategy Through ExecutionPwC: New IT Platform From Strategy Through Execution
PwC: New IT Platform From Strategy Through Execution
 
Digital-Trust-Whitepaper
Digital-Trust-WhitepaperDigital-Trust-Whitepaper
Digital-Trust-Whitepaper
 
Digital, Data & Analytics, Disruption in Deals
Digital, Data & Analytics, Disruption in DealsDigital, Data & Analytics, Disruption in Deals
Digital, Data & Analytics, Disruption in Deals
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
The Best Cloud Apps for Ambitious Law Firms
The Best Cloud Apps for Ambitious Law FirmsThe Best Cloud Apps for Ambitious Law Firms
The Best Cloud Apps for Ambitious Law Firms
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 
Privacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsPrivacy 2020: Recap & Predictions
Privacy 2020: Recap & Predictions
 
PWC 2014 Global Digital IQ Survey
PWC 2014 Global Digital IQ SurveyPWC 2014 Global Digital IQ Survey
PWC 2014 Global Digital IQ Survey
 
Etude PwC Digital IQ (2014)
Etude PwC Digital IQ (2014)Etude PwC Digital IQ (2014)
Etude PwC Digital IQ (2014)
 
The Digital Enterprise: CIO perspectives
The Digital Enterprise: CIO perspectivesThe Digital Enterprise: CIO perspectives
The Digital Enterprise: CIO perspectives
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Legal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive DataLegal Firms and the Struggle to Protect Sensitive Data
Legal Firms and the Struggle to Protect Sensitive Data
 
Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...Managing Risk in a digital world: successfully enabling the quest for new rev...
Managing Risk in a digital world: successfully enabling the quest for new rev...
 
Riding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information TechnologyRiding and Capitalizing the Next Wave of Information Technology
Riding and Capitalizing the Next Wave of Information Technology
 
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
It52015 slides
It52015 slidesIt52015 slides
It52015 slides
 

Recently uploaded

Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
tanyjahb
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
Aurelien Domont, MBA
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 

Recently uploaded (20)

Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx3.0 Project 2_ Developing My Brand Identity Kit.pptx
3.0 Project 2_ Developing My Brand Identity Kit.pptx
 
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Digital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and TemplatesDigital Transformation and IT Strategy Toolkit and Templates
Digital Transformation and IT Strategy Toolkit and Templates
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 

ACCA Smart Finance Series - Trust in the Digital Age Presented by PwC

  • 1. Strictly Private and Confidential Trust in Digital Age Vincent Loy, PwC Singapore
  • 2. PwC Agenda 1. The rise of the Digital World 2. Impact of the Digital Natives 3. Trust: Currency of the Digital Age 4. How to build Trust in the Digital Age
  • 3. PwC 1 The Rise of The Digital World PwC
  • 4. PwC “An explosive Growth of Technology” PwC 4 Smart Nation Social Networking Cloud Computing Industry 4.0 Big Data Artificial Intelligence Internet of Things Virtual Reality Augmented Reality Smart Drones Block Chain Autonomous Driving Mobility Quantum Computing Robots 3D Printing The Digital Age
  • 5. PwC “Top 8 out of 150 tech most likely to affect business globally” 5 Key Emerging Tech by 2020 most likely to affect business globally Abolishes logistical limitations and opens new possibilities for simulation Machine learning has potential to create new products and services Potential to turn any business into a factory Provides new modes for surveillance, survey, and delivery Automate, augment or assist human activity Sensors across the value chain can capture and analyse information to fulfill business objectives Blending of physical and virtual world presents new business opportunities Distributed electronic ledger has potential for prevention of fraud
  • 6. PwC 6 The Digital evolution has already started PwC NOW
  • 7. PwC Key Drivers for Digital Natives Smart Nation Social Networking Cloud Computing Industry 4.0 Big Data Artificial Intelligence Internet of Things Virtual Reality Augmented Reality Smart Drones Blockchain Autonomous Driving Mobility Quantum Computing Robots 3D Printing Accessibility Computing Power Storage Cost
  • 8. PwC 2 Impact of the Digital Natives PwC
  • 9. PwC Who are the Digital Natives? 9 • Has increasingly high expectations set by market- leading brands • Is better informed than ever • Trusts his/her peers more than advertising • Has variety of choices • Has voice via social media
  • 10. PwC What does this mean to businesses 10 Use insight to understand customer needs and deliver better customer outcomes Has detailed insight into how its products and services are consumed Is confident with disruptive digital technologies Understands the broader ecosystem and builds a network of partnerships 1 2 4 3 Continuously innovates, understands and exploits the potential of new business models 5 PwC
  • 11. PwC 11 24/7 Undisrupted IT Services Privacy and Data Protection How to retain the digital native customer? Need to build Trust into fabric of the operations Underlying this expectation
  • 12. PwC Not just about technology but also business strategy Should underpin how business is organised and run Critical for the digital age Premium On Trust Trust: Currency of the Digital Age PwC 12
  • 13. PwC 3 Trust: Currency of the Digital Age PwC
  • 14. PwC | July 2014 Risks of Digital World 14 Sourcing Risk IT Processes & Assets Project Delivery Risk IT Resilience and Continuity Cyber Security Business Systems Data Governance & Quality Technology Mega Trends Global IT IT Governance Compliance with Regulation
  • 15. PwC Business impact when trust is broken 15 • Costs of remediation & investigation • Financial losses • Share price
  • 16. PwC 16 4 How to build trust in the Digital Age PwC
  • 17. PwC What all these mean for your business “Managing risk and building trust underpins the digital agenda as digital platforms become increasingly central to the delivery of business strategy.” Five key business imperatives: 17 Confidence in your security Confidence that systems are secure to protect customer and other data and that identity/privacy issues have been dealt with. Confidence in your data Confidence in the integrity of data and the ability to benefit from what it can reveal about a business Confidence in your systems Confidence that business systems have the right controls and monitoring to ensure that they do what they are supposed to, whether they are in-house systems or are delivered as cloud based services. Confidence to take risks Confidence that technology risks are understood and well managed and that digital platforms will be available when required (24/7). Confidence in your digital transformation programme Confidence to embark on and deliver the next complex digital transformation programme in a way that delivers the expected benefits, on time and to budget. Cyber Security Data Confidence Business Systems Confidence IT Risk Confidence Transformation Confidence
  • 18. PwC | July 2014 What all these mean for your business - Organisation Strategy Compliance Customer Engagement New opportunities & considerations New regulations Reshaping interactions from sales & marketing to billing & after-sales support 18 People & Talents New job categories, phasing out of old roles Operations Improve operational efficiency and significant competitive advantage PwC
  • 19. PwC Our Digital Trust Framework 19PwC
  • 20. PwC Assess your Digital Trust Profile: Questions to Ask 20 4. What controls enforce third parties to handle your data appropriately? 1. Have you identified your risk profile and ensured your controls are ‘right-sized’? 2. Is your digital programme aligned to your business & IT strategy? 3. Do you know where your most valuable data is physically held? PwC 5. With increasing connectivity, how are you managing access to your systems? 6. Do you know if those accessing core systems are truly who they say they are? 8. Are you meeting fast- changing regulatory requirements? 9. In the event of incident, what is your incident response plan to secure the business and rebuild trust? 7. If you are holding customer data, how are you managing their security and privacy expectations?
  • 21. PwC Thank you. This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, [insert legal name of the PwC firm], its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it. © 2015 PwC Singapore. All rights reserved. In this document, “PwC” refers to PricewaterhouseCoopers LLP which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity. Contact us: Vincent Loy Partner Data Analytics, Cyber & Financial Crime Leader Vincent.J.Loy@sg.pwc.com