SlideShare a Scribd company logo
Data
Security.
Mitigating the Strategic Risks of Identity Theft
in the Broker-Dealer Environment
An executive briefing on the hidden threats associated with
protecting personally identifiable information, and how leading
organizations are uncovering and addressing them
Senior executives of financial services firms are
demanding that information security and data
protection strategies advance beyond their
traditional enterprise-wide focus.
Their charge: to broaden the scope of security to include inter-
organizational measures that protect information shared with
vendors, partners and customers.
This broadening of executives’ perspectives on security is just
one finding to emerge from a study of how broker-dealers and
other financial services industry executives are responding to
fundamental landscape changes in these areas:
• Competition
• Regulation
• Technology
• Threats
• Changes in information distribution strategies and channels
According to a Broadridge survey of over 200 executives in broker-
dealer institutions (conducted during the first two weeks of April 2011),
over 85 percent of respondents reported that data security and the
protection of personally identifiable information (PII) are receiving
significant senior executive scrutiny.
Why is the executive suite increasingly interested in data protection?
It’s because the stakes are rising as their companies struggle to manage
growing volumes of sensitive corporate information in increasingly
decentralized, distributed, outsourced and complex environments.
IN THIS REPORT WE WILL:
• Explain how key industry shifts and a threatening landscape
are affecting the broker-dealer community
• Offer senior-level executives a strategic context within which to
make effective decisions to mitigate risks
Our review of the survey data on current attitudes and activities in
the sector, combined with our analysis of emerging best practices,
has strengthened our belief that broker-dealers are under
increasing pressure to develop:
• Extensive, integrated and automated enterprise-wide data
protection strategies
• Interorganizational conventions for mitigating data-loss risks
among customers, partners and third-party providers
The consequences of ineffective data protection, especially those
associated with PII, can be severe. Improperly managed, such data
loss represents a strategic risk to organizations. Even “potential”
vulnerabilities can conceivably cause significant reputational,
financial and operational damage.
Recent high-profile breaches in the financial services sector have
elevated the intensity of public debate on protecting PII within the
industry, among regulators as well as the investor community.
Introduction
QUESTION: Data Security and PII protection are priorities
for my organization’s senior executive leadership
Page 2
Mitigating the Strategic Risks of Identity Theft in the Broker-Dealer Environment
—
Agree
NotApplicable
(Not in use in my
organization)
Disagree
85.1% 11.9% 3.0%
Survey conducted in April 2011.
© 2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge
logo are registered trademarks of Broadridge Financial Solutions, Inc.
Organizationsinmostindustrieshavetakensteps
toprotecthighlysensitiveinformationabout
customers,businessstrategyandorganizational
operations.Manyhavefocusedonputtingdata
insecurelocationstheymanageandarethinking
aboutotherstrategiestokeepunauthorized
individualsfromaccessingit.Thishasbeenthe
strategyofmanycompaniesinthebroker-dealer
communityaswell.
BUSINESS PROCESS EVOLUTION
New competitive pressures, however, have prompted institutions
to explore new business models that reduce cost and improve
speed while enhancing response to customers. These efforts have
translated into expanded requirements that have changed the risk
profile to which data is exposed. For instance, a growing number
of broker-dealers must:
• Handle spiraling volumes of data to support new offerings and
provide customized services to customers
•  Interact more frequently with customers, partners and vendors
through a growing variety of channels (mail, phone, web and
mobile devices)
• Consolidate cumbersome infrastructures that have led to complex,
costly data centers. (Often data centers and application resources
have been developed in siloed environments to support dedicated
service and product offerings.)
• Manage the changing and evolving strategies related to
information distribution
Since these activities are outside of the core competencies
of some broker-dealers, these organizations often have
secured specialized expertise from third-party providers. As a
result, growing volumes of data – including PII – are no longer
concentrated in centralized facilities exclusively controlled by
broker-dealer employees or housed in enterprise-owned facilities.
© 2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge
logo are registered trademarks of Broadridge Financial Solutions, Inc.
Page 3
AChanging
Environment
QUESTION: My organization managed larger
amounts of data and PII in 2010 than during 2009
QUESTION: My organization will manage larger
amounts of data and PII in 2011 than during 2010
Agree
Agree
Disagree
Disagree
Don’t know
Don’t know
57.0%
57.8%
39.8%
40.6%
3.1%
1.6%
QUESTION: At my organization, some staff from
the following third parties also have access to my
organization’s sensitive data and PII
CLIENTS
VENDORS
BUSINESS
PARTNERS
Haveaccess Noaccess Don’tknow
20.1%
52.7%
35.1%
60.4%
28.6%
35.8%
19.5%
18.7%
29.1%
Survey conducted in April 2011.
Survey conducted in April 2011.
Mitigating the Strategic Risks of Identity Theft in the Broker-Dealer Environment
—
Page 4
Mitigating the Strategic Risks of Identity Theft in the Broker-Dealer Environment
—
QUESTION: Working with a third party to support
data security and PII protection offers the
following advantages over keeping them in-house:
68.8%
56.3%
46.9%
43.8%
43.8%
35.9%
32.8%
7.8%
SPECIALIZED EXPERTISE
ADVANTAGES: RESPONSE
PERCENT:
SECURITY
LESS ADMINISTRATIVE
BURDEN
CHECKS AND BALANCES
ACCOUNTABILITY
REPORTING
OTHER
COST SAVINGS
For many broker-dealers, the most sustainable way to respond to these reporting and
protection requirements involves automating as many processes as possible, while
eliminating manual procedures and their potential for abuse and human error.
Survey conducted in April 2011.
REGULATORY SHIFTS
The fallout from the 2008 financial sector crisis ushered in new
international, federal and local statutes. The most recent efforts to
regulate the financial services market (specifically the Dodd-Frank
bill) join the Gramm-Leach-Bliley and Sarbanes-Oxley laws
of earlier years in calling for:
• Increased operational transparency through more granular
and automated reporting
• Locking down control of consumer data by demonstrating
measures to prevent data loss and restrict access
For many broker-dealers, the most sustainable way to respond
to these reporting and protection requirements involves
automating as many processes as possible, while eliminating
manual procedures and their potential for abuse and human error.
Automated processes are easier to monitor, control and audit, and
are in a position to provide reporting on demand.
TECHNOLOGICAL DEVELOPMENTS
As rapidly as things have evolved on the business and regulatory
fronts, they have been outpaced by advances in corporate and
consumer technologies that have altered how organizations
behave and how individuals do business.
Technological advances have had a profound impact on the
financial services industry and the broker-dealer community.
Two developments carry particularly significant implications for
managing the data security and PII protection imperatives.
	 Cloud computing
	 In all its types (private, public and hybrid) and at all its levels
(infrastructure, platform and software-as-a-service), cloud
computing can help broker-dealers reduce cost, improve time-to-
market and preserve a focus on core competencies that generate
shareholder value. We have seen rapid adoption of web-enabled
applications that give diverse stakeholders much easier access to
critical enterprise resources.
However, for many executives, “easy to access” is synonymous with
“easy to breach.” This has created a conundrum for those who want to
gain a competitive advantage by introducing operational efficiencies
while also mitigating risks by keeping tight control of data.
There is growing recognition that not all clouds are created equal,
and that their different types and implementations imply significantly
different security and risk profiles. Indeed, in many situations, the
cloud “play” may be the most secure course of action – even for PII
assets. The survey respondents even suggest that broker-dealers
may have an opportunity to enhance their security posture by
tapping into the expertise of vendors who have deep and proven core
competencies in security management.
	 The key to success, as we shall discuss, lies in integrating cloud resources
with enterprise-wide security and data-loss prevention strategies.
© 2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge
logo are registered trademarks of Broadridge Financial Solutions, Inc.
Mobility
	 In the form of smartphones and tablet computing, mobility is
fundamentally transforming the way people interact with each
other, their favorite institutions (from banking to retailing), and
even their employers.
	 Mobility has upped the ante on the user experience that
customers expect, which consequently has elevated the level of
complexity at the end point (where technology touches the user).
Mobile data access, therefore, requires intense focus from senior
decision makers who seek to win market share while mitigating
the risk of losing control of sensitive information.
EVOLVING THREAT AND VULNERABILITY LANDSCAPE
To understand the threats and vulnerabilities to which sensitive
information is exposed, we can view them as two distinct drivers:
• Active attackers, or people who mean to do your organization harm
(often driven by profit motives)
• Inadvertent acts from people (employees, clients, partners, etc.)
who put your organization in harm’s way through error
The profile of active attackers who target enterprises has evolved
significantly over the past decade. Gone are the days when
attacks stemmed from sophomoric impulses simply to embarrass
organizations in highly public forums. It is now believed that most
malware – resources designed to break the law – originates from
organized crime syndicates based all over the world.
Today’s attacks are stealthy, designed to go undetected, and
motivated by the desire to monetize cyber-breaches by capturing
data to:
• Sell on the black market
• Engage in extortion
• Pursue any range of other criminal
activities that yield high profits
Incentives for such attacks are massive. The FBI has estimated that
cyber-crime generates as much as $1 trillion a year in illegal profits.
The other face of the active attacker is closer to home – employees
who, due to greed or disgruntlement, exploit corporate trust to
breach enterprise security measures. The infamous WikiLeaks
offers the highest-profile vehicle for those who would purposely
expose their organizations to this category of threat.
Passive or inadvertent threats may actually be the source of most
data losses. These threats come from people who violate data
access controls and policies due to carelessness or ignorance.
These two categories of threat (active and inadvertent) can
combine to disastrous effect when unsuspecting employees
click on links that allow malicious code to penetrate enterprise
cyber-defenses.
© 2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge
logo are registered trademarks of Broadridge Financial Solutions, Inc.
Page 5
…growing volumes of data – including PII –
are no longer concentrated in centralized
facilities exclusively controlled by broker-
dealer employees or housed in enterprise-
owned facilities.
Mitigating the Strategic Risks of Identity Theft in the Broker-Dealer Environment
—
Page 6
Mitigating the Strategic Risks of Identity Theft in the Broker-Dealer Environment
—
Today’sbusinessstrategiesrelyontheability
toengagewithnewmarketsinnewwaysusinga
plethoraofnewtechnologies.Yettheymustbe
accompaniedbyequallyrobuststrategiesthat
willmitigateriskandensurecompliancewiththe
regulations,lawsandcontractualobligationsthat
governthebehaviorsofbroker-dealerinstitutions.
For this reason data protection and information security must receive
attention and support from the key disciplines of the C-level suite.
There are strategic, operational, financial and technological issues that
must be coordinated to ensure that:
• Internal processes and procedures are secured
• Interorganizational measures are functioning to protect data as it travels
among customers, partners and third-party providers of services
A top-down review of all operations must take place, using a rigorous
analysis that addresses these key questions:
• Where does sensitive data, including PII, reside in my organization,
and under what conditions?
• Who within my organization has access to this data and for what reason?
• What applications interact with this data, and how is data protection
accounted for in their operations?
• Is there an enterprise-wide data protection strategy in place, or is data
protection managed department by department?
• Who outside of my organization has access to this data and for
what reason?
• Where does this data travel in the course of supporting business
operations – both within the enterprise and across the organizational
boundaries of:
»» Customers
»» Partners
»» Third-PartyProviders
• Whatarethenatureandcontractualstructureoftheaboveexternal
relationshipsamongorganizationsthatcarrysensitivedata,includingPII?
• Howsynchronizedarethedataprotectionmeasuresamongthedifferent
partiesamongwhomsensitivedataisexchanged?
WHAT TO LOOK FOR
Astheseandotherquestionsareexaminedthroughtheperspectivesof
differentC-leveldisciplines(CEO,COO,CFO,CIO,Compliance,etc.),the
resultingstrategiesandsolutionsshouldseekandpromote:
•  Definedproceduresthatcangenerateimmediateaudit,complianceand
forensicreportsondemand
•  Measuresthatfocusasmuchonmonitoring,rapidresponseandresilience
asonthreatdetectionandprevention
• Measures that have an integrated approach to securing the people,
processes and technologies that interact with sensitive data
• Service-oriented protection initiatives that have an integrated
perspective on how infrastructure, networks and applications work
together to make resources available to end users
• Centralized (i.e. enterprise-wide) policies that govern entitlements
and enforce enterprise-wide and interorganizational, role-based
access controls to resources that contain sensitive information
• Black- and white-listing initiatives that proactively identify who and
what is allowed to touch sensitive information
ActionItems
FortheBroker-DealerCommunity
© 2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge
logo are registered trademarks of Broadridge Financial Solutions, Inc.
© 2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge
logo are registered trademarks of Broadridge Financial Solutions, Inc.
Page 7
Conclusion
The broker-dealer community’s business success
increasingly depends on leveraging a set of
shared technological resources that requires
information of all types, including sensitive
PII data, to cross organizational borders.
Organizations are creating intimate relationships
with customers, partners and trusted vendors
to create value chains that generate important
shared value propositions.
While this shift is creating many exciting opportunities, it also is
changing the risk posture of businesses in fundamental ways. Just as
value propositions are being built by synergistic relationships in which
the whole is greater than the sum of its parts, executives must ensure
that similarly coordinated efforts are undertaken to protect data that
flows outside of corporate boundaries.
It no longer is sufficient to focus solely on internal process and
technological advancements intended to improve security of sensitive
data. An overarching perspective must be brought to bear to protect
information that flows through the systems of the enterprise, its
customers, its partners and its critical technology vendors.
By using the information and considerations outlined in this report,
financial services executives can help to ensure that the new
opportunities generated by advances in computing technologies,
network services and evolving business strategies are effectively
“risk-adjusted” to protect their organizations’ reputations, financial
resources and long-term interests.
It no longer is sufficient to focus solely on internal process and technological
advancements intended to improve security of sensitive data. An overarching
perspective must be brought to bear to protect information that flows through
the systems of the enterprise, its customers, its partners and its critical
technology vendors.
With roots that go back more than 40 years, Broadridge
is the financial services industry’s leading provider of
innovative technological and outsourcing services.
Our expertise encompasses every aspect of securities
processing and investor communications. Our clients
include global banks; retail, institutional and discount
brokerage firms; correspondent clearing firms; mutual
and hedge funds; investment management organiza-
tions; and corporate issuers, all of whom have one
thing in common: they look to Broadridge for solutions
that help them enhance their performance, increase
efficiency, reduce cost and maintain focus on serving
clients and shareholders.
©2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge
logo are registered trademarks of Broadridge Financial Solutions, Inc.
For more information about Broadridge’s products
and solutions, please contact your account manager
at broadridgeinfo@broadridge.com.
Broadridge holds the following audits and certifications:
SAS70 Type II and SSAE 16 audits to report on compliance with proper security controls
ISO 9001:2008 Certificate for quality management systems and processes
ISO 27001 Internationally recognized certification for Information and Security Management Systems

More Related Content

What's hot

Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
MuhammadArif823
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
EamonnORagh
 
Sarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessSarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP Process
CXT Group
 
Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.
David Bustin
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
Happiest Minds Technologies
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
David Bustin
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
EMC
 
NoHidingInTheCloud
NoHidingInTheCloudNoHidingInTheCloud
NoHidingInTheCloudJoan Ross
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
DMIMarketing
 
Legal Point of View
Legal Point of ViewLegal Point of View
Legal Point of View
Leila Kim
 
Information Governance
Information GovernanceInformation Governance
Information Governance
Atle Skjekkeland
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
daveGBE
 
Cardware Conference presentation on BIG DATA June 17-18 2014
Cardware Conference presentation on BIG DATA June 17-18 2014Cardware Conference presentation on BIG DATA June 17-18 2014
Cardware Conference presentation on BIG DATA June 17-18 2014Lisa Abe-Oldenburg, B.Comm., JD.
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
Echoworx
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
asundaram1
 
Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentation
Igor Swann
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
AIIM International
 
Security, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it rightSecurity, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it right
N-iX
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Aspiration Software LLC
 

What's hot (20)

Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Sarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP ProcessSarbanes-Oxley Compliance and the RFI/RFP Process
Sarbanes-Oxley Compliance and the RFI/RFP Process
 
Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.Case Problem for Global Finance, Inc.
Case Problem for Global Finance, Inc.
 
California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)California Consumer Privacy Act (CCPA)
California Consumer Privacy Act (CCPA)
 
My Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David BustinMy Risk Assessment and Mitigation Strategy by David Bustin
My Risk Assessment and Mitigation Strategy by David Bustin
 
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...Forrester: How Organizations Are Improving Business Resiliency with Continuou...
Forrester: How Organizations Are Improving Business Resiliency with Continuou...
 
NoHidingInTheCloud
NoHidingInTheCloudNoHidingInTheCloud
NoHidingInTheCloud
 
Access governance en
Access governance enAccess governance en
Access governance en
 
BYOD: Six Essentials for Success
BYOD: Six Essentials for SuccessBYOD: Six Essentials for Success
BYOD: Six Essentials for Success
 
Legal Point of View
Legal Point of ViewLegal Point of View
Legal Point of View
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Cardware Conference presentation on BIG DATA June 17-18 2014
Cardware Conference presentation on BIG DATA June 17-18 2014Cardware Conference presentation on BIG DATA June 17-18 2014
Cardware Conference presentation on BIG DATA June 17-18 2014
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentation
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
 
Security, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it rightSecurity, GDRP, and IT outsourcing: How to get it right
Security, GDRP, and IT outsourcing: How to get it right
 
Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)Law_Firm_Info_Security_Report_June2011 (1)
Law_Firm_Info_Security_Report_June2011 (1)
 

Viewers also liked

Using Market Insights and Sales Data to Optimize Your Distribution Strategy
Using Market Insights and Sales Data to Optimize Your Distribution StrategyUsing Market Insights and Sales Data to Optimize Your Distribution Strategy
Using Market Insights and Sales Data to Optimize Your Distribution StrategyBroadridge
 
Transforming Customer Engagements in a Digital World
Transforming Customer Engagements in a Digital WorldTransforming Customer Engagements in a Digital World
Transforming Customer Engagements in a Digital World
Broadridge
 
Big Data in the Fund Industry: From Descriptive to Prescriptive Data Analytics
Big Data in the Fund Industry: From Descriptive to Prescriptive Data AnalyticsBig Data in the Fund Industry: From Descriptive to Prescriptive Data Analytics
Big Data in the Fund Industry: From Descriptive to Prescriptive Data Analytics
Broadridge
 
Projeto politico pedagogico
Projeto politico pedagogicoProjeto politico pedagogico
Projeto politico pedagogicolabteotonio
 
Origen sueño y realidad, a propósito de una película
Origen sueño y realidad, a propósito de una películaOrigen sueño y realidad, a propósito de una película
Origen sueño y realidad, a propósito de una película
filonexos
 
Atividades para troca de letras
Atividades para troca de letrasAtividades para troca de letras
Atividades para troca de letras
Leonardo Alves
 
PROYECTO DE ORTOGRAFÍA
PROYECTO DE ORTOGRAFÍAPROYECTO DE ORTOGRAFÍA
PROYECTO DE ORTOGRAFÍA
claupatty27
 

Viewers also liked (7)

Using Market Insights and Sales Data to Optimize Your Distribution Strategy
Using Market Insights and Sales Data to Optimize Your Distribution StrategyUsing Market Insights and Sales Data to Optimize Your Distribution Strategy
Using Market Insights and Sales Data to Optimize Your Distribution Strategy
 
Transforming Customer Engagements in a Digital World
Transforming Customer Engagements in a Digital WorldTransforming Customer Engagements in a Digital World
Transforming Customer Engagements in a Digital World
 
Big Data in the Fund Industry: From Descriptive to Prescriptive Data Analytics
Big Data in the Fund Industry: From Descriptive to Prescriptive Data AnalyticsBig Data in the Fund Industry: From Descriptive to Prescriptive Data Analytics
Big Data in the Fund Industry: From Descriptive to Prescriptive Data Analytics
 
Projeto politico pedagogico
Projeto politico pedagogicoProjeto politico pedagogico
Projeto politico pedagogico
 
Origen sueño y realidad, a propósito de una película
Origen sueño y realidad, a propósito de una películaOrigen sueño y realidad, a propósito de una película
Origen sueño y realidad, a propósito de una película
 
Atividades para troca de letras
Atividades para troca de letrasAtividades para troca de letras
Atividades para troca de letras
 
PROYECTO DE ORTOGRAFÍA
PROYECTO DE ORTOGRAFÍAPROYECTO DE ORTOGRAFÍA
PROYECTO DE ORTOGRAFÍA
 

Similar to Mitigating Data Security Risks at Broker Dealers

Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadline
accenture
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
Robert 'Bob' Reyes
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Marco Essomba
 
Big Data is Here for Financial Services White Paper
Big Data is Here for Financial Services White PaperBig Data is Here for Financial Services White Paper
Big Data is Here for Financial Services White Paper
Experian
 
Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...
The Economist Media Businesses
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
Sarah Fane
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
Hiten Sethi
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 
Is effective Data Governance a choice or necessity in Financial Services?
Is effective Data Governance a choice or necessity in Financial Services?Is effective Data Governance a choice or necessity in Financial Services?
Is effective Data Governance a choice or necessity in Financial Services?
Sam Thomsett
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Servicessarah kabirat
 
Big data analytics for life insurers
Big data analytics for life insurersBig data analytics for life insurers
Big data analytics for life insurers
dipak sahoo
 
Big_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedBig_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedShradha Verma
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
OnRamp
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data Privacy
Gigya
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
G. Subramanian
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen Hamilton
 
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit UnionsWebinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Denodo
 

Similar to Mitigating Data Security Risks at Broker Dealers (20)

Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadline
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Big Data is Here for Financial Services White Paper
Big Data is Here for Financial Services White PaperBig Data is Here for Financial Services White Paper
Big Data is Here for Financial Services White Paper
 
Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...Eiu collibra transforming data into action-the business outlook for data gove...
Eiu collibra transforming data into action-the business outlook for data gove...
 
A smarter way to manage identities
A smarter way to manage identitiesA smarter way to manage identities
A smarter way to manage identities
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
Is effective Data Governance a choice or necessity in Financial Services?
Is effective Data Governance a choice or necessity in Financial Services?Is effective Data Governance a choice or necessity in Financial Services?
Is effective Data Governance a choice or necessity in Financial Services?
 
Technology Risk Services
Technology Risk ServicesTechnology Risk Services
Technology Risk Services
 
Big data analytics for life insurers
Big data analytics for life insurersBig data analytics for life insurers
Big data analytics for life insurers
 
Big_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_publishedBig_data_analytics_for_life_insurers_published
Big_data_analytics_for_life_insurers_published
 
Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Managing Consumer Data Privacy
Managing Consumer Data PrivacyManaging Consumer Data Privacy
Managing Consumer Data Privacy
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Booz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of DirectorsBooz Allen's 10 Cyber Priorities for Boards of Directors
Booz Allen's 10 Cyber Priorities for Boards of Directors
 
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit UnionsWebinar #2 - Transforming Challenges into Opportunities for Credit Unions
Webinar #2 - Transforming Challenges into Opportunities for Credit Unions
 

More from Broadridge

Advisor-Driven Retirement Market: Profiling The Top Retirement Advisors
Advisor-Driven Retirement Market: Profiling The Top Retirement AdvisorsAdvisor-Driven Retirement Market: Profiling The Top Retirement Advisors
Advisor-Driven Retirement Market: Profiling The Top Retirement AdvisorsBroadridge
 
FATCA Withholding from a Security Master and Payment Perspective
FATCA Withholding from a Security Master and Payment PerspectiveFATCA Withholding from a Security Master and Payment Perspective
FATCA Withholding from a Security Master and Payment PerspectiveBroadridge
 
Broadridge Analysis of Traditional and Notice & Access Issuers: N&A Adoption,...
Broadridge Analysis of Traditional and Notice & Access Issuers: N&A Adoption,...Broadridge Analysis of Traditional and Notice & Access Issuers: N&A Adoption,...
Broadridge Analysis of Traditional and Notice & Access Issuers: N&A Adoption,...Broadridge
 
Leveraging Data and Analytics to Drive Your DCIO Business
Leveraging Data and Analytics to Drive Your DCIO BusinessLeveraging Data and Analytics to Drive Your DCIO Business
Leveraging Data and Analytics to Drive Your DCIO BusinessBroadridge
 
Transforming Compliance Communications from Challenge to Differentiator
Transforming Compliance Communications from Challenge to DifferentiatorTransforming Compliance Communications from Challenge to Differentiator
Transforming Compliance Communications from Challenge to Differentiator
Broadridge
 
FATCA Compliance: Riding a Roller Coaster of Regulatory Change
FATCA Compliance: Riding a Roller Coaster of Regulatory ChangeFATCA Compliance: Riding a Roller Coaster of Regulatory Change
FATCA Compliance: Riding a Roller Coaster of Regulatory Change
Broadridge
 
IRAs & the ERISA Fiduciary Rules
IRAs & the ERISA Fiduciary RulesIRAs & the ERISA Fiduciary Rules
IRAs & the ERISA Fiduciary Rules
Broadridge
 
Opportunities for e-Delivery in Canada
Opportunities for e-Delivery in CanadaOpportunities for e-Delivery in Canada
Opportunities for e-Delivery in Canada
Broadridge
 
ERISA Fiduciary Issues: A Guide for Advisors
ERISA Fiduciary Issues: A Guide for AdvisorsERISA Fiduciary Issues: A Guide for Advisors
ERISA Fiduciary Issues: A Guide for Advisors
Broadridge
 
Managing Big Data: A Big Problem for Brokerages
Managing Big Data: A Big Problem for BrokeragesManaging Big Data: A Big Problem for Brokerages
Managing Big Data: A Big Problem for Brokerages
Broadridge
 
The Multi-Asset Class Conundrum: Solving Post-Trade Complexities Across Busin...
The Multi-Asset Class Conundrum: Solving Post-Trade Complexities Across Busin...The Multi-Asset Class Conundrum: Solving Post-Trade Complexities Across Busin...
The Multi-Asset Class Conundrum: Solving Post-Trade Complexities Across Busin...
Broadridge
 
Rethinking Reconciliation: How a Global Center of Excellence Can Enhance Risk...
Rethinking Reconciliation: How a Global Center of Excellence Can Enhance Risk...Rethinking Reconciliation: How a Global Center of Excellence Can Enhance Risk...
Rethinking Reconciliation: How a Global Center of Excellence Can Enhance Risk...
Broadridge
 
Tax Management: Navigating a Perfect Storm of Tax Complexity
Tax Management: Navigating a Perfect Storm of Tax ComplexityTax Management: Navigating a Perfect Storm of Tax Complexity
Tax Management: Navigating a Perfect Storm of Tax ComplexityBroadridge
 
What Plan Fiduciaries can Expect with 404(a)(5) Disclosures
What Plan Fiduciaries can Expect with 404(a)(5) DisclosuresWhat Plan Fiduciaries can Expect with 404(a)(5) Disclosures
What Plan Fiduciaries can Expect with 404(a)(5) Disclosures
Broadridge
 
408b2 A Look at the New DoL Disclosure and Reporting Rules
408b2 A Look at the New DoL Disclosure and Reporting Rules408b2 A Look at the New DoL Disclosure and Reporting Rules
408b2 A Look at the New DoL Disclosure and Reporting RulesBroadridge
 
Fee and Commission Management in Global Markets
Fee and Commission Management in Global MarketsFee and Commission Management in Global Markets
Fee and Commission Management in Global Markets
Broadridge
 
Global Investing: Considerations for Building an End-to-End Solution
Global Investing: Considerations for Building an End-to-End SolutionGlobal Investing: Considerations for Building an End-to-End Solution
Global Investing: Considerations for Building an End-to-End Solution
Broadridge
 
The New Hedge Fund-Prime Broker Relationship
The New Hedge Fund-Prime Broker RelationshipThe New Hedge Fund-Prime Broker Relationship
The New Hedge Fund-Prime Broker Relationship
Broadridge
 
Broker-Dealer Outsourcing: Key Regulatory Issues and Strategies for Compliance
Broker-Dealer Outsourcing: Key Regulatory Issues and Strategies for ComplianceBroker-Dealer Outsourcing: Key Regulatory Issues and Strategies for Compliance
Broker-Dealer Outsourcing: Key Regulatory Issues and Strategies for Compliance
Broadridge
 
Report on Roundtable on Proxy Governance
Report on Roundtable on Proxy GovernanceReport on Roundtable on Proxy Governance
Report on Roundtable on Proxy GovernanceBroadridge
 

More from Broadridge (20)

Advisor-Driven Retirement Market: Profiling The Top Retirement Advisors
Advisor-Driven Retirement Market: Profiling The Top Retirement AdvisorsAdvisor-Driven Retirement Market: Profiling The Top Retirement Advisors
Advisor-Driven Retirement Market: Profiling The Top Retirement Advisors
 
FATCA Withholding from a Security Master and Payment Perspective
FATCA Withholding from a Security Master and Payment PerspectiveFATCA Withholding from a Security Master and Payment Perspective
FATCA Withholding from a Security Master and Payment Perspective
 
Broadridge Analysis of Traditional and Notice & Access Issuers: N&A Adoption,...
Broadridge Analysis of Traditional and Notice & Access Issuers: N&A Adoption,...Broadridge Analysis of Traditional and Notice & Access Issuers: N&A Adoption,...
Broadridge Analysis of Traditional and Notice & Access Issuers: N&A Adoption,...
 
Leveraging Data and Analytics to Drive Your DCIO Business
Leveraging Data and Analytics to Drive Your DCIO BusinessLeveraging Data and Analytics to Drive Your DCIO Business
Leveraging Data and Analytics to Drive Your DCIO Business
 
Transforming Compliance Communications from Challenge to Differentiator
Transforming Compliance Communications from Challenge to DifferentiatorTransforming Compliance Communications from Challenge to Differentiator
Transforming Compliance Communications from Challenge to Differentiator
 
FATCA Compliance: Riding a Roller Coaster of Regulatory Change
FATCA Compliance: Riding a Roller Coaster of Regulatory ChangeFATCA Compliance: Riding a Roller Coaster of Regulatory Change
FATCA Compliance: Riding a Roller Coaster of Regulatory Change
 
IRAs & the ERISA Fiduciary Rules
IRAs & the ERISA Fiduciary RulesIRAs & the ERISA Fiduciary Rules
IRAs & the ERISA Fiduciary Rules
 
Opportunities for e-Delivery in Canada
Opportunities for e-Delivery in CanadaOpportunities for e-Delivery in Canada
Opportunities for e-Delivery in Canada
 
ERISA Fiduciary Issues: A Guide for Advisors
ERISA Fiduciary Issues: A Guide for AdvisorsERISA Fiduciary Issues: A Guide for Advisors
ERISA Fiduciary Issues: A Guide for Advisors
 
Managing Big Data: A Big Problem for Brokerages
Managing Big Data: A Big Problem for BrokeragesManaging Big Data: A Big Problem for Brokerages
Managing Big Data: A Big Problem for Brokerages
 
The Multi-Asset Class Conundrum: Solving Post-Trade Complexities Across Busin...
The Multi-Asset Class Conundrum: Solving Post-Trade Complexities Across Busin...The Multi-Asset Class Conundrum: Solving Post-Trade Complexities Across Busin...
The Multi-Asset Class Conundrum: Solving Post-Trade Complexities Across Busin...
 
Rethinking Reconciliation: How a Global Center of Excellence Can Enhance Risk...
Rethinking Reconciliation: How a Global Center of Excellence Can Enhance Risk...Rethinking Reconciliation: How a Global Center of Excellence Can Enhance Risk...
Rethinking Reconciliation: How a Global Center of Excellence Can Enhance Risk...
 
Tax Management: Navigating a Perfect Storm of Tax Complexity
Tax Management: Navigating a Perfect Storm of Tax ComplexityTax Management: Navigating a Perfect Storm of Tax Complexity
Tax Management: Navigating a Perfect Storm of Tax Complexity
 
What Plan Fiduciaries can Expect with 404(a)(5) Disclosures
What Plan Fiduciaries can Expect with 404(a)(5) DisclosuresWhat Plan Fiduciaries can Expect with 404(a)(5) Disclosures
What Plan Fiduciaries can Expect with 404(a)(5) Disclosures
 
408b2 A Look at the New DoL Disclosure and Reporting Rules
408b2 A Look at the New DoL Disclosure and Reporting Rules408b2 A Look at the New DoL Disclosure and Reporting Rules
408b2 A Look at the New DoL Disclosure and Reporting Rules
 
Fee and Commission Management in Global Markets
Fee and Commission Management in Global MarketsFee and Commission Management in Global Markets
Fee and Commission Management in Global Markets
 
Global Investing: Considerations for Building an End-to-End Solution
Global Investing: Considerations for Building an End-to-End SolutionGlobal Investing: Considerations for Building an End-to-End Solution
Global Investing: Considerations for Building an End-to-End Solution
 
The New Hedge Fund-Prime Broker Relationship
The New Hedge Fund-Prime Broker RelationshipThe New Hedge Fund-Prime Broker Relationship
The New Hedge Fund-Prime Broker Relationship
 
Broker-Dealer Outsourcing: Key Regulatory Issues and Strategies for Compliance
Broker-Dealer Outsourcing: Key Regulatory Issues and Strategies for ComplianceBroker-Dealer Outsourcing: Key Regulatory Issues and Strategies for Compliance
Broker-Dealer Outsourcing: Key Regulatory Issues and Strategies for Compliance
 
Report on Roundtable on Proxy Governance
Report on Roundtable on Proxy GovernanceReport on Roundtable on Proxy Governance
Report on Roundtable on Proxy Governance
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

Mitigating Data Security Risks at Broker Dealers

  • 1. Data Security. Mitigating the Strategic Risks of Identity Theft in the Broker-Dealer Environment An executive briefing on the hidden threats associated with protecting personally identifiable information, and how leading organizations are uncovering and addressing them
  • 2. Senior executives of financial services firms are demanding that information security and data protection strategies advance beyond their traditional enterprise-wide focus. Their charge: to broaden the scope of security to include inter- organizational measures that protect information shared with vendors, partners and customers. This broadening of executives’ perspectives on security is just one finding to emerge from a study of how broker-dealers and other financial services industry executives are responding to fundamental landscape changes in these areas: • Competition • Regulation • Technology • Threats • Changes in information distribution strategies and channels According to a Broadridge survey of over 200 executives in broker- dealer institutions (conducted during the first two weeks of April 2011), over 85 percent of respondents reported that data security and the protection of personally identifiable information (PII) are receiving significant senior executive scrutiny. Why is the executive suite increasingly interested in data protection? It’s because the stakes are rising as their companies struggle to manage growing volumes of sensitive corporate information in increasingly decentralized, distributed, outsourced and complex environments. IN THIS REPORT WE WILL: • Explain how key industry shifts and a threatening landscape are affecting the broker-dealer community • Offer senior-level executives a strategic context within which to make effective decisions to mitigate risks Our review of the survey data on current attitudes and activities in the sector, combined with our analysis of emerging best practices, has strengthened our belief that broker-dealers are under increasing pressure to develop: • Extensive, integrated and automated enterprise-wide data protection strategies • Interorganizational conventions for mitigating data-loss risks among customers, partners and third-party providers The consequences of ineffective data protection, especially those associated with PII, can be severe. Improperly managed, such data loss represents a strategic risk to organizations. Even “potential” vulnerabilities can conceivably cause significant reputational, financial and operational damage. Recent high-profile breaches in the financial services sector have elevated the intensity of public debate on protecting PII within the industry, among regulators as well as the investor community. Introduction QUESTION: Data Security and PII protection are priorities for my organization’s senior executive leadership Page 2 Mitigating the Strategic Risks of Identity Theft in the Broker-Dealer Environment — Agree NotApplicable (Not in use in my organization) Disagree 85.1% 11.9% 3.0% Survey conducted in April 2011. © 2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge logo are registered trademarks of Broadridge Financial Solutions, Inc.
  • 3. Organizationsinmostindustrieshavetakensteps toprotecthighlysensitiveinformationabout customers,businessstrategyandorganizational operations.Manyhavefocusedonputtingdata insecurelocationstheymanageandarethinking aboutotherstrategiestokeepunauthorized individualsfromaccessingit.Thishasbeenthe strategyofmanycompaniesinthebroker-dealer communityaswell. BUSINESS PROCESS EVOLUTION New competitive pressures, however, have prompted institutions to explore new business models that reduce cost and improve speed while enhancing response to customers. These efforts have translated into expanded requirements that have changed the risk profile to which data is exposed. For instance, a growing number of broker-dealers must: • Handle spiraling volumes of data to support new offerings and provide customized services to customers •  Interact more frequently with customers, partners and vendors through a growing variety of channels (mail, phone, web and mobile devices) • Consolidate cumbersome infrastructures that have led to complex, costly data centers. (Often data centers and application resources have been developed in siloed environments to support dedicated service and product offerings.) • Manage the changing and evolving strategies related to information distribution Since these activities are outside of the core competencies of some broker-dealers, these organizations often have secured specialized expertise from third-party providers. As a result, growing volumes of data – including PII – are no longer concentrated in centralized facilities exclusively controlled by broker-dealer employees or housed in enterprise-owned facilities. © 2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge logo are registered trademarks of Broadridge Financial Solutions, Inc. Page 3 AChanging Environment QUESTION: My organization managed larger amounts of data and PII in 2010 than during 2009 QUESTION: My organization will manage larger amounts of data and PII in 2011 than during 2010 Agree Agree Disagree Disagree Don’t know Don’t know 57.0% 57.8% 39.8% 40.6% 3.1% 1.6% QUESTION: At my organization, some staff from the following third parties also have access to my organization’s sensitive data and PII CLIENTS VENDORS BUSINESS PARTNERS Haveaccess Noaccess Don’tknow 20.1% 52.7% 35.1% 60.4% 28.6% 35.8% 19.5% 18.7% 29.1% Survey conducted in April 2011. Survey conducted in April 2011. Mitigating the Strategic Risks of Identity Theft in the Broker-Dealer Environment —
  • 4. Page 4 Mitigating the Strategic Risks of Identity Theft in the Broker-Dealer Environment — QUESTION: Working with a third party to support data security and PII protection offers the following advantages over keeping them in-house: 68.8% 56.3% 46.9% 43.8% 43.8% 35.9% 32.8% 7.8% SPECIALIZED EXPERTISE ADVANTAGES: RESPONSE PERCENT: SECURITY LESS ADMINISTRATIVE BURDEN CHECKS AND BALANCES ACCOUNTABILITY REPORTING OTHER COST SAVINGS For many broker-dealers, the most sustainable way to respond to these reporting and protection requirements involves automating as many processes as possible, while eliminating manual procedures and their potential for abuse and human error. Survey conducted in April 2011. REGULATORY SHIFTS The fallout from the 2008 financial sector crisis ushered in new international, federal and local statutes. The most recent efforts to regulate the financial services market (specifically the Dodd-Frank bill) join the Gramm-Leach-Bliley and Sarbanes-Oxley laws of earlier years in calling for: • Increased operational transparency through more granular and automated reporting • Locking down control of consumer data by demonstrating measures to prevent data loss and restrict access For many broker-dealers, the most sustainable way to respond to these reporting and protection requirements involves automating as many processes as possible, while eliminating manual procedures and their potential for abuse and human error. Automated processes are easier to monitor, control and audit, and are in a position to provide reporting on demand. TECHNOLOGICAL DEVELOPMENTS As rapidly as things have evolved on the business and regulatory fronts, they have been outpaced by advances in corporate and consumer technologies that have altered how organizations behave and how individuals do business. Technological advances have had a profound impact on the financial services industry and the broker-dealer community. Two developments carry particularly significant implications for managing the data security and PII protection imperatives. Cloud computing In all its types (private, public and hybrid) and at all its levels (infrastructure, platform and software-as-a-service), cloud computing can help broker-dealers reduce cost, improve time-to- market and preserve a focus on core competencies that generate shareholder value. We have seen rapid adoption of web-enabled applications that give diverse stakeholders much easier access to critical enterprise resources. However, for many executives, “easy to access” is synonymous with “easy to breach.” This has created a conundrum for those who want to gain a competitive advantage by introducing operational efficiencies while also mitigating risks by keeping tight control of data. There is growing recognition that not all clouds are created equal, and that their different types and implementations imply significantly different security and risk profiles. Indeed, in many situations, the cloud “play” may be the most secure course of action – even for PII assets. The survey respondents even suggest that broker-dealers may have an opportunity to enhance their security posture by tapping into the expertise of vendors who have deep and proven core competencies in security management. The key to success, as we shall discuss, lies in integrating cloud resources with enterprise-wide security and data-loss prevention strategies. © 2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge logo are registered trademarks of Broadridge Financial Solutions, Inc.
  • 5. Mobility In the form of smartphones and tablet computing, mobility is fundamentally transforming the way people interact with each other, their favorite institutions (from banking to retailing), and even their employers. Mobility has upped the ante on the user experience that customers expect, which consequently has elevated the level of complexity at the end point (where technology touches the user). Mobile data access, therefore, requires intense focus from senior decision makers who seek to win market share while mitigating the risk of losing control of sensitive information. EVOLVING THREAT AND VULNERABILITY LANDSCAPE To understand the threats and vulnerabilities to which sensitive information is exposed, we can view them as two distinct drivers: • Active attackers, or people who mean to do your organization harm (often driven by profit motives) • Inadvertent acts from people (employees, clients, partners, etc.) who put your organization in harm’s way through error The profile of active attackers who target enterprises has evolved significantly over the past decade. Gone are the days when attacks stemmed from sophomoric impulses simply to embarrass organizations in highly public forums. It is now believed that most malware – resources designed to break the law – originates from organized crime syndicates based all over the world. Today’s attacks are stealthy, designed to go undetected, and motivated by the desire to monetize cyber-breaches by capturing data to: • Sell on the black market • Engage in extortion • Pursue any range of other criminal activities that yield high profits Incentives for such attacks are massive. The FBI has estimated that cyber-crime generates as much as $1 trillion a year in illegal profits. The other face of the active attacker is closer to home – employees who, due to greed or disgruntlement, exploit corporate trust to breach enterprise security measures. The infamous WikiLeaks offers the highest-profile vehicle for those who would purposely expose their organizations to this category of threat. Passive or inadvertent threats may actually be the source of most data losses. These threats come from people who violate data access controls and policies due to carelessness or ignorance. These two categories of threat (active and inadvertent) can combine to disastrous effect when unsuspecting employees click on links that allow malicious code to penetrate enterprise cyber-defenses. © 2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge logo are registered trademarks of Broadridge Financial Solutions, Inc. Page 5 …growing volumes of data – including PII – are no longer concentrated in centralized facilities exclusively controlled by broker- dealer employees or housed in enterprise- owned facilities. Mitigating the Strategic Risks of Identity Theft in the Broker-Dealer Environment —
  • 6. Page 6 Mitigating the Strategic Risks of Identity Theft in the Broker-Dealer Environment — Today’sbusinessstrategiesrelyontheability toengagewithnewmarketsinnewwaysusinga plethoraofnewtechnologies.Yettheymustbe accompaniedbyequallyrobuststrategiesthat willmitigateriskandensurecompliancewiththe regulations,lawsandcontractualobligationsthat governthebehaviorsofbroker-dealerinstitutions. For this reason data protection and information security must receive attention and support from the key disciplines of the C-level suite. There are strategic, operational, financial and technological issues that must be coordinated to ensure that: • Internal processes and procedures are secured • Interorganizational measures are functioning to protect data as it travels among customers, partners and third-party providers of services A top-down review of all operations must take place, using a rigorous analysis that addresses these key questions: • Where does sensitive data, including PII, reside in my organization, and under what conditions? • Who within my organization has access to this data and for what reason? • What applications interact with this data, and how is data protection accounted for in their operations? • Is there an enterprise-wide data protection strategy in place, or is data protection managed department by department? • Who outside of my organization has access to this data and for what reason? • Where does this data travel in the course of supporting business operations – both within the enterprise and across the organizational boundaries of: »» Customers »» Partners »» Third-PartyProviders • Whatarethenatureandcontractualstructureoftheaboveexternal relationshipsamongorganizationsthatcarrysensitivedata,includingPII? • Howsynchronizedarethedataprotectionmeasuresamongthedifferent partiesamongwhomsensitivedataisexchanged? WHAT TO LOOK FOR Astheseandotherquestionsareexaminedthroughtheperspectivesof differentC-leveldisciplines(CEO,COO,CFO,CIO,Compliance,etc.),the resultingstrategiesandsolutionsshouldseekandpromote: •  Definedproceduresthatcangenerateimmediateaudit,complianceand forensicreportsondemand •  Measuresthatfocusasmuchonmonitoring,rapidresponseandresilience asonthreatdetectionandprevention • Measures that have an integrated approach to securing the people, processes and technologies that interact with sensitive data • Service-oriented protection initiatives that have an integrated perspective on how infrastructure, networks and applications work together to make resources available to end users • Centralized (i.e. enterprise-wide) policies that govern entitlements and enforce enterprise-wide and interorganizational, role-based access controls to resources that contain sensitive information • Black- and white-listing initiatives that proactively identify who and what is allowed to touch sensitive information ActionItems FortheBroker-DealerCommunity © 2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge logo are registered trademarks of Broadridge Financial Solutions, Inc.
  • 7. © 2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge logo are registered trademarks of Broadridge Financial Solutions, Inc. Page 7 Conclusion The broker-dealer community’s business success increasingly depends on leveraging a set of shared technological resources that requires information of all types, including sensitive PII data, to cross organizational borders. Organizations are creating intimate relationships with customers, partners and trusted vendors to create value chains that generate important shared value propositions. While this shift is creating many exciting opportunities, it also is changing the risk posture of businesses in fundamental ways. Just as value propositions are being built by synergistic relationships in which the whole is greater than the sum of its parts, executives must ensure that similarly coordinated efforts are undertaken to protect data that flows outside of corporate boundaries. It no longer is sufficient to focus solely on internal process and technological advancements intended to improve security of sensitive data. An overarching perspective must be brought to bear to protect information that flows through the systems of the enterprise, its customers, its partners and its critical technology vendors. By using the information and considerations outlined in this report, financial services executives can help to ensure that the new opportunities generated by advances in computing technologies, network services and evolving business strategies are effectively “risk-adjusted” to protect their organizations’ reputations, financial resources and long-term interests. It no longer is sufficient to focus solely on internal process and technological advancements intended to improve security of sensitive data. An overarching perspective must be brought to bear to protect information that flows through the systems of the enterprise, its customers, its partners and its critical technology vendors.
  • 8. With roots that go back more than 40 years, Broadridge is the financial services industry’s leading provider of innovative technological and outsourcing services. Our expertise encompasses every aspect of securities processing and investor communications. Our clients include global banks; retail, institutional and discount brokerage firms; correspondent clearing firms; mutual and hedge funds; investment management organiza- tions; and corporate issuers, all of whom have one thing in common: they look to Broadridge for solutions that help them enhance their performance, increase efficiency, reduce cost and maintain focus on serving clients and shareholders. ©2011 Broadridge Financial Solutions, Inc. Broadridge and the Broadridge logo are registered trademarks of Broadridge Financial Solutions, Inc. For more information about Broadridge’s products and solutions, please contact your account manager at broadridgeinfo@broadridge.com. Broadridge holds the following audits and certifications: SAS70 Type II and SSAE 16 audits to report on compliance with proper security controls ISO 9001:2008 Certificate for quality management systems and processes ISO 27001 Internationally recognized certification for Information and Security Management Systems