SlideShare a Scribd company logo
What's on your E RADAR?




      IT Governance, Security and Risk
         across the online economy
                  Will Roebuck
               Founder and CEO
         E RADAR | Smarter business online
Why is IT governance important?
●   It costs jobs and affects livelihoods without it
●   Safeguard competitive and collaborative advantage
    ●   Corporate reputation
    ●   (Public) procurement requirements
    ●   Officer (director) liability
●   Meet fiscal, legal and regulatory requirements
●   Provide minimum standards of best practice
Online in 2012 – 15 years of strengths
●   Speed and convenience of business transactions
●   Cost and inventory control
●   Global presence and market opportunity
●   Better customer service
●   Competitive and collaborative advantage
●   Research and innovation
●   Social revolution (accessibility and connecting people)
Online in 2012 – 15 years of weaknesses
●   Pace of change v legacy technologies
    ●   e.g. Royal Bank of Scotland, NHS IT Infrastructure
●   Conflict of laws and regulations
    ●   Whose law applies?
    ●   Common law v statute
●   Work place social networking v time-management
●   Increased globalisation = domino effect (e.g. Enron)
●   Take up of network and information security
●   Beware of imitations...
Know who you're talking to?
Online in 2012 – 15 years of opportunity
 ●   2,405,510,036 online June 2012 (34.3% world population)*
 ●   E-commerce sales represents 16.9 per cent of total sales
 ●   Website sales represented 4.2 per cent of total sales
 ●   78.7 per cent of businesses had a website
 ●   51.9 per cent of businesses had mobile broadband using
     3G
 ●   86.5 per cent of businesses used the Internet to interact
     with public authorities.


* Internet World Stats http://www.internetworldstats.com/stats.htm
Online in 2012 – 15 years of threats
●   Society, business and government
    ●   Financial fraud
    ●   Children and citizens e.g. harassment, bullying...
    ●   Theft – identity, data, intellectual property
    ●   International terrorism
●   UK Cyber Crime Strategy (Nov 2011)
●   Cost to UK economy
    ●   Cyber crime - £27 billion per year?
    ●   Welfare/tax fraud - £200/£300 per citizen per year
Online business environment

●   Supply and demand
    ●   Goods, services, digital downloads, financial instruments
    ●   The 'bottom line'
●   Encouraged by
    ●   Competition, enterprise and innovation
●   Supported by
    ●   People, processes, technology, and information
    ●   Laws, regulations, standards and best practice
What does this all mean?
●   Balance supply and demand against risk
●   Deploy resources carefully
●   Smarter business management
    ●   Identify, develop and use 'the right' people skills
    ●   Re-engineer business processes
    ●   Invest in enabling technology
●   Provide good laws and regulations
    ●   Responsive legal environment
IT challenges over next decade
●   Cloud computing
●   More online applications
    ●   Just require connectivity; transparent licensing
●   Social networks and software
    ●   Enagage with partners and customers; find out interests
●   Document management and collaboration
    ●   Organise resources centrally – audit trails
●   CRM 2.0
    ●   Internet capabilities to manage customers, incl loyalty
IT challenges over next decade
●   Unified communications
    ●   Connecting to the right people
●   Web 3.0 – semantic web
    ●   Intelligent applications
●   Business intelligence
    ●   Improving insights to employees... professional networks
●   Virtualisation – Green IT
    ●   Physical to virtual servers saving energy, carbon foot print,
●   Enterprise mobility
    ●   Applications accessible from mobile devices
Why governance and compliance?
●   Customer trust and confidence
●   Business protection e.g. evidential trail
●   Sector requirements
●   Reduced insurance premiums
●   Corporate reputation
●   Director and vicarious liability
●   'The regulatory stick'
●   Secure transactions
Challenges and issues
●   Corporate
    ●   Vicarious and director liability
    ●   Duty of care towards employee
    ●   Prevent improper and illegal activity over systems /networks
●   Personal
    ●   Directors failing to undertake duties implied by law or as
        additional duties in their contract
Challenges and issues

Contractual
    ●   Prove existence of agreement in disagreement with a
        customer
    ●   Defend an action for unfair dismissal before employment
        tribunal
●   Legal
    ●   Prove an intellectual property right or invention
Challenges and issues

Regulatory
    ●   Registering, reporting, retaining and disposal of records
         –   Annual returns
         –   Invoicing and VAT
         –   Health and Safety
         –   Personnel records
    ●   Data Protection
    ●   Consumer Protection
●   Security of systems and networks... and information
Digital evidence and admissibility
●   Evidence is
    ●   the way that a fact is proved or disproved in a court, tribunal
        or disciplinary.
    ●   Oral, real (primary or secondary) or hearsay (less reliable)
         –   Primary = e.g. signed original contract
         –   Secondary = e.g. unsigned draft of the contract
●   Burden of proof
    ●   Civil cases = with plaintiff and 'balance of probabilities'
    ●   Criminal cases = with prosecution and 'beyond reasonable
        doubt'
Digital evidence and admissibility
●   Evidence in electronic format is admissible
    ●   Electronic Communications Act 2000
    ●   Civil Evidence Act / Youth Justice and Criminal Evidence Act
●   May be legally acceptable but may not be admissible.
●   Admissible document must be sufficiently relevant
●   Court must decide and may give different weight to primary
    or secondary evidence
●   British Standards Code for Legal Admissibility and
    Evidential Weight of Information Stored Electronically.
Misuse of devices
●   Abuse and misuse (Illegal, illicit or wrong)
    ●   Defamatory remarks
    ●   Breach of confidentiality
    ●   Using and abusing copyright without permission
    ●   Negligence in sending viruses to other business
    ●   Sexual or racial harassment
●   Criminal Offences
    ●   e.g. downloading child pornography
    ●   Other illegal images
Monitoring communications
●   Right to privacy – even at work
●   Regulation of Investigatory Powers Act 2000
●   Lawful Business Practice Regulations 2000
    ●   Inform monitoring for lawful business purposes
    ●   Quality, training and security
●   How do you 'monitor' remote workers?
    ●   Blanket monitoring of employees not acceptable
    ●   Must be justified
    ●   Other alternatives?
Data protection
●   8 data protection principles
●   Principle 7 – adequate security measures
●   Principle 8 – international transfers
    ●   Cloud computing
    ●   Where is personal data
    ●   Information Commissioner's Guidance
●   Sensitive personal data
    ●   Encryption
Retention, deletion and retrieval
●   Organisations must have evidence to rely upon it!
●   Information management policy covering
    ●   Retention, access and exchange (including security),
        deletion and retrieval
●   Why a policy?
    ●   Business (cost, time and risk management)
    ●   Legal (e.g. accounting records = 6 years, criminal penalties)
    ●   Regulatory (FSA Rules, Food Standards etc)
About E RADAR


●   Championing enterprise and the online economy
●   Focus on public policy, governance, compliance and risk
    ●   Pre-legislation and post legislation
    ●   IT and online contracting
●   Free-to-use forums
    ●   Monitoring and scrutiny
    ●   Thought-leadership and best practice
    ●   Knowledge Xchange
●   Social network
Back to you... and 2012
●   A turning point?
    ●   Global recession with Euro under threat
    ●   £1 trillion UK government borrowing
    ●   60% EU cross-border e-commerce transactions fail
    ●   Public sector cuts and increasing unemployment
    ●   European Digital Single Market – working or not?


We need visionaries, innovators and entrepreneurs to
recognise the opportunities and walk through the door...”
“The best way to predict
the future is to create it!”
Thank you!




               will@eradar.eu
             http://www.eradar.eu

More Related Content

What's hot

[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again![Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
AIIM International
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
James Mulhern
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
OCTF Industry Engagement
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Lisa Abe-Oldenburg, B.Comm., JD.
 
E-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingE-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and Prototyping
IJERA Editor
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popi
Robust Marketing & Consulting (Pty) Ltd
 
Byod bpost
Byod bpostByod bpost
Byod bpost
Tim Groenwals
 
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...
AIIM International
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
James Mulhern
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
Tommy Vandepitte
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
AIIM International
 
Online terms & conditions
Online terms & conditionsOnline terms & conditions
Online terms & conditions
Prof. Jacques Folon (Ph.D)
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
Infinity Software Solutions
 
Privacy 101
Privacy 101Privacy 101
Consumer representative
Consumer representativeConsumer representative
Consumer representative
CA
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
Priyanka Aash
 
IAM
IAMIAM
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
Goutama Bachtiar
 
Characteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiCharacteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiDr. TJ Wolfe
 

What's hot (19)

[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again![Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
[Webinar Slides] Think Brexit Saves You From EU Data Regulations? Think Again!
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
Privacy Security Data Breach - Regulatory Compliance for Financial Institutio...
 
E-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and PrototypingE-Commerce: Study, Development and Prototyping
E-Commerce: Study, Development and Prototyping
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popi
 
Byod bpost
Byod bpostByod bpost
Byod bpost
 
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...
[Webinar Slides] E-Signatures 101- An Introduction to Digital Transformation ...
 
Gdpr demystified - making sense of the regulation
Gdpr demystified  - making sense of the regulationGdpr demystified  - making sense of the regulation
Gdpr demystified - making sense of the regulation
 
Training privacy by design
Training privacy by designTraining privacy by design
Training privacy by design
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
 
Online terms & conditions
Online terms & conditionsOnline terms & conditions
Online terms & conditions
 
Technology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging TechnologiesTechnology Law: Regulations on the Internet and Emerging Technologies
Technology Law: Regulations on the Internet and Emerging Technologies
 
Privacy 101
Privacy 101Privacy 101
Privacy 101
 
Consumer representative
Consumer representativeConsumer representative
Consumer representative
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
IAM
IAMIAM
IAM
 
Reinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security NowadaysReinforcement of Information Privacy and Security Nowadays
Reinforcement of Information Privacy and Security Nowadays
 
Characteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiCharacteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commercei
 

Similar to IISP NW branch meeting 15 nov 2012 security through governance, compliance…

Personally owned devices at work
Personally owned devices at workPersonally owned devices at work
Personally owned devices at work
ERADAR
 
05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own Device05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own Device
E Radar
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
E Radar
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
HillaryObomighie
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
CIO Edge
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Burton Lee
 
Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance
ImpactQA
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management
shivan82
 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptx
MhndHTaani
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
TrustArc
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
Lee Schlenker
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
Dimitri Sirota
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Software Integrity Group
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
Richard Hogg,Global GDPR Offerings Evangelist
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big data
James Deiotte
 
ey-forensics-discovery-services.pdf
ey-forensics-discovery-services.pdfey-forensics-discovery-services.pdf
ey-forensics-discovery-services.pdf
aparnamore11
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
confluent
 
IT Policy
IT PolicyIT Policy
IT Policy
Sherri Booher
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
Adrian Dumitrescu
 
Big Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsBig Data: Trends, Applications and Potentials
Big Data: Trends, Applications and Potentials
Charles Mok
 

Similar to IISP NW branch meeting 15 nov 2012 security through governance, compliance… (20)

Personally owned devices at work
Personally owned devices at workPersonally owned devices at work
Personally owned devices at work
 
05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own Device05 10-2011 BOYD - Bring Your Own Device
05 10-2011 BOYD - Bring Your Own Device
 
Establishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital WorldEstablishing Security and Trust in the Digital World
Establishing Security and Trust in the Digital World
 
ABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptxABCON-AGM-2021-Final-2.pptx
ABCON-AGM-2021-Final-2.pptx
 
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
Digital Enterprise Festival Birmingham 13/04/17 - Ian West Cognizant VP Data ...
 
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
Polina Zvyagina - Airbnb - Privacy & GDPR Compliance - Stanford Engineering -...
 
Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance Learn ImpactQA's Approach to GDPR compliance
Learn ImpactQA's Approach to GDPR compliance
 
2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management2016 04-26 webinar - consumer-focused identity management
2016 04-26 webinar - consumer-focused identity management
 
info-sys-security.pptx
info-sys-security.pptxinfo-sys-security.pptx
info-sys-security.pptx
 
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy RiskAssessing Risk: How Organizations Can Proactively Manage Privacy Risk
Assessing Risk: How Organizations Can Proactively Manage Privacy Risk
 
Analytics in Action - Data Protection
Analytics in Action - Data ProtectionAnalytics in Action - Data Protection
Analytics in Action - Data Protection
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
Synopsys Security Event Israel Presentation: Taking Your Software to the GDPR...
 
2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar2016 11-17-gdpr-integro-webinar
2016 11-17-gdpr-integro-webinar
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big data
 
ey-forensics-discovery-services.pdf
ey-forensics-discovery-services.pdfey-forensics-discovery-services.pdf
ey-forensics-discovery-services.pdf
 
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
Compliance in Motion: Aligning Data Governance Initiatives with Business Obje...
 
IT Policy
IT PolicyIT Policy
IT Policy
 
GDPR Part 1: Quick Facts
GDPR Part 1: Quick FactsGDPR Part 1: Quick Facts
GDPR Part 1: Quick Facts
 
Big Data: Trends, Applications and Potentials
Big Data: Trends, Applications and PotentialsBig Data: Trends, Applications and Potentials
Big Data: Trends, Applications and Potentials
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 

IISP NW branch meeting 15 nov 2012 security through governance, compliance…

  • 1. What's on your E RADAR? IT Governance, Security and Risk across the online economy Will Roebuck Founder and CEO E RADAR | Smarter business online
  • 2. Why is IT governance important? ● It costs jobs and affects livelihoods without it ● Safeguard competitive and collaborative advantage ● Corporate reputation ● (Public) procurement requirements ● Officer (director) liability ● Meet fiscal, legal and regulatory requirements ● Provide minimum standards of best practice
  • 3. Online in 2012 – 15 years of strengths ● Speed and convenience of business transactions ● Cost and inventory control ● Global presence and market opportunity ● Better customer service ● Competitive and collaborative advantage ● Research and innovation ● Social revolution (accessibility and connecting people)
  • 4. Online in 2012 – 15 years of weaknesses ● Pace of change v legacy technologies ● e.g. Royal Bank of Scotland, NHS IT Infrastructure ● Conflict of laws and regulations ● Whose law applies? ● Common law v statute ● Work place social networking v time-management ● Increased globalisation = domino effect (e.g. Enron) ● Take up of network and information security ● Beware of imitations...
  • 5. Know who you're talking to?
  • 6. Online in 2012 – 15 years of opportunity ● 2,405,510,036 online June 2012 (34.3% world population)* ● E-commerce sales represents 16.9 per cent of total sales ● Website sales represented 4.2 per cent of total sales ● 78.7 per cent of businesses had a website ● 51.9 per cent of businesses had mobile broadband using 3G ● 86.5 per cent of businesses used the Internet to interact with public authorities. * Internet World Stats http://www.internetworldstats.com/stats.htm
  • 7. Online in 2012 – 15 years of threats ● Society, business and government ● Financial fraud ● Children and citizens e.g. harassment, bullying... ● Theft – identity, data, intellectual property ● International terrorism ● UK Cyber Crime Strategy (Nov 2011) ● Cost to UK economy ● Cyber crime - £27 billion per year? ● Welfare/tax fraud - £200/£300 per citizen per year
  • 8. Online business environment ● Supply and demand ● Goods, services, digital downloads, financial instruments ● The 'bottom line' ● Encouraged by ● Competition, enterprise and innovation ● Supported by ● People, processes, technology, and information ● Laws, regulations, standards and best practice
  • 9. What does this all mean? ● Balance supply and demand against risk ● Deploy resources carefully ● Smarter business management ● Identify, develop and use 'the right' people skills ● Re-engineer business processes ● Invest in enabling technology ● Provide good laws and regulations ● Responsive legal environment
  • 10. IT challenges over next decade ● Cloud computing ● More online applications ● Just require connectivity; transparent licensing ● Social networks and software ● Enagage with partners and customers; find out interests ● Document management and collaboration ● Organise resources centrally – audit trails ● CRM 2.0 ● Internet capabilities to manage customers, incl loyalty
  • 11. IT challenges over next decade ● Unified communications ● Connecting to the right people ● Web 3.0 – semantic web ● Intelligent applications ● Business intelligence ● Improving insights to employees... professional networks ● Virtualisation – Green IT ● Physical to virtual servers saving energy, carbon foot print, ● Enterprise mobility ● Applications accessible from mobile devices
  • 12. Why governance and compliance? ● Customer trust and confidence ● Business protection e.g. evidential trail ● Sector requirements ● Reduced insurance premiums ● Corporate reputation ● Director and vicarious liability ● 'The regulatory stick' ● Secure transactions
  • 13. Challenges and issues ● Corporate ● Vicarious and director liability ● Duty of care towards employee ● Prevent improper and illegal activity over systems /networks ● Personal ● Directors failing to undertake duties implied by law or as additional duties in their contract
  • 14. Challenges and issues Contractual ● Prove existence of agreement in disagreement with a customer ● Defend an action for unfair dismissal before employment tribunal ● Legal ● Prove an intellectual property right or invention
  • 15. Challenges and issues Regulatory ● Registering, reporting, retaining and disposal of records – Annual returns – Invoicing and VAT – Health and Safety – Personnel records ● Data Protection ● Consumer Protection ● Security of systems and networks... and information
  • 16. Digital evidence and admissibility ● Evidence is ● the way that a fact is proved or disproved in a court, tribunal or disciplinary. ● Oral, real (primary or secondary) or hearsay (less reliable) – Primary = e.g. signed original contract – Secondary = e.g. unsigned draft of the contract ● Burden of proof ● Civil cases = with plaintiff and 'balance of probabilities' ● Criminal cases = with prosecution and 'beyond reasonable doubt'
  • 17. Digital evidence and admissibility ● Evidence in electronic format is admissible ● Electronic Communications Act 2000 ● Civil Evidence Act / Youth Justice and Criminal Evidence Act ● May be legally acceptable but may not be admissible. ● Admissible document must be sufficiently relevant ● Court must decide and may give different weight to primary or secondary evidence ● British Standards Code for Legal Admissibility and Evidential Weight of Information Stored Electronically.
  • 18. Misuse of devices ● Abuse and misuse (Illegal, illicit or wrong) ● Defamatory remarks ● Breach of confidentiality ● Using and abusing copyright without permission ● Negligence in sending viruses to other business ● Sexual or racial harassment ● Criminal Offences ● e.g. downloading child pornography ● Other illegal images
  • 19. Monitoring communications ● Right to privacy – even at work ● Regulation of Investigatory Powers Act 2000 ● Lawful Business Practice Regulations 2000 ● Inform monitoring for lawful business purposes ● Quality, training and security ● How do you 'monitor' remote workers? ● Blanket monitoring of employees not acceptable ● Must be justified ● Other alternatives?
  • 20. Data protection ● 8 data protection principles ● Principle 7 – adequate security measures ● Principle 8 – international transfers ● Cloud computing ● Where is personal data ● Information Commissioner's Guidance ● Sensitive personal data ● Encryption
  • 21. Retention, deletion and retrieval ● Organisations must have evidence to rely upon it! ● Information management policy covering ● Retention, access and exchange (including security), deletion and retrieval ● Why a policy? ● Business (cost, time and risk management) ● Legal (e.g. accounting records = 6 years, criminal penalties) ● Regulatory (FSA Rules, Food Standards etc)
  • 22. About E RADAR ● Championing enterprise and the online economy ● Focus on public policy, governance, compliance and risk ● Pre-legislation and post legislation ● IT and online contracting ● Free-to-use forums ● Monitoring and scrutiny ● Thought-leadership and best practice ● Knowledge Xchange ● Social network
  • 23. Back to you... and 2012 ● A turning point? ● Global recession with Euro under threat ● £1 trillion UK government borrowing ● 60% EU cross-border e-commerce transactions fail ● Public sector cuts and increasing unemployment ● European Digital Single Market – working or not? We need visionaries, innovators and entrepreneurs to recognise the opportunities and walk through the door...”
  • 24. “The best way to predict the future is to create it!”
  • 25. Thank you! will@eradar.eu http://www.eradar.eu