SlideShare a Scribd company logo
Managing IT Security and Data
Privacy Security to Enhance the
Client Experience
Ovum Financial Services Technology
Forum
25th June 2013
Alpesh Doshi
Fintricity
A CHANGE IN CUSTOMER
RELATIONSHIPS
Most B2C
Brands Use
Social Media
Engagement is
now part of the
FABRIC
Customers want a
better relationship
with their BRANDS
SOCIAL DATA IS A NEW
CURRENCY OF ENGAGEMENT
We generate
vast amounts
of DATA
On the web and
Social sites
Data on our likes,
activities, friends,
views/opinions
Social Data is now a currency that can be used to
build one-to-one relationships with customers.
Carefully harvesting, analysing and leveraging
social media data, banks may be able to gain
valuable insight into customer investment patterns,
market trends and value propositions.
WHAT KIND OF DATA IS
AVAILABLE?
WHAT KIND OF DATA IS
AVAILABLE?
Demographics
Age, Gender,
Geography, HHI,
Level of
Education, List
of friends,
Friends of
Friends
Interests
Profile-Based,
Contextual,
Demonstrated,
Undeclared
Actions
Creating, Rating,
Sending, Sharing,
Uploading, Watching,
and more
Interaction
How people interact
with content and ads:
Clicks, time spent,
interactions, videos
completed
Recency and
Frequency
How often and
when people
express interests
or actions
Sentiment and
Exposure
What people say,
what they read, and
when and how they
say and read it
SECURITY STRATEGY FOR
PERSONAL DATA
Data Protection and
Data Privacy regulations
must be implemented
Information Risk
Standards – ISO 27001
Regulatory and FCA/PRA
Requirements
SECURITY STRATEGY FOR
PERSONAL DATA
DATA PROTECTION
• Personal data must be processed fairly
and lawfully
• Obtained for only one or more specified
lawful purpose
• Adequate, relevant and not excessive
• Accurate and kept up to date
• Not be kept for longer than is necessary
• Processed in accordance with data
subjects’ rights
• Appropriate technical and organisational
measures
• No transfer outside the EEA unless
adequate protection
RISK MANAGEMENT
• Brand Reputation and loss of credibility can
be catastrophic for a financial services
organisation
• Confidential Information about identified
individuals, even though some of the data is
publicly available, must be ‘managed’
carefully
• Internal Policies, both business and
technology policies must be coherent and
linked across departments
• Monitoring and management of these risks,
and how they meet requirements must be
implemented
GAPS IN APPROACHES BY
FINANCIALS SERVICES COs
Most firms don’t
have joined up
policies.
Firms tend to have a reactive
approach to implementing risks and
only do so when an event happens.
Integrated
Monitoring is
key.
Most firms have not identified
data or assessed security risks
that are faced by firms.
Data ownership and use of Social .has not been
considered yet, but is being used
SECURITY SOLUTIONS AND
ARCHITECTURES
Build architectures
that incorporate
security from the start
The volumes and timeliness of
Social Data requires revised
operating models and systems
architecture
Governance, Risk,
Compliance
solutions updated
Data Security and Use
Lifecycle approach created
in an integrated way
Risk Mitigation must be the business imperative, but
enable agility and improved customer engagement
SUMMARY
Data Privacy and IT
Security has become
more complex.
Data Protection and Privacy, Information Risk (ISO
27001), and Regulatory Requirements must be
combined into a overall Security Strategy
A combination of business
and technology approaches
are required
It requires joined up thinking and implementation
between the business and IT
Thanks for Listening
Any Questions?
Alpesh Doshi, Fintricity
m: +44 7973 822820
w: www.fintricity.com
t: @alpeshdoshi
l: www.linkedin.com/in/alpeshdoshi
References
• Guarding the Social Gates, The imperative for Social media Risk Management, Alan Weber, Altimeter Group, August 2012
• Social Data: Managing data privacy and other Legal Risks, Belinda Doshi, Partner, Nabarro, September 2012
• FCA – Data Security http://www.fsa.gov.uk/pubs/other/data_security.pdf
• The Social Banker – Social Media Lessons from Banking Insiders KPMG, April 2012

More Related Content

What's hot

Fundamentals of Mass Collaboration
Fundamentals of Mass CollaborationFundamentals of Mass Collaboration
Fundamentals of Mass Collaboration
Crowdicity
 
What's privacy got to do with social networking services?
What's privacy got to do with social networking services?What's privacy got to do with social networking services?
What's privacy got to do with social networking services?
Samantha Yorke
 
How Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise ApplicationsHow Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise Applications
Kapil Gupta
 
Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12ihlstatemsus
 
#SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights #SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights
Ryan Stephens
 
Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social Networking
David Stephens
 
Social Media- A Practical Approach
Social Media- A Practical Approach Social Media- A Practical Approach
Social Media- A Practical Approach Bayshore Solutions
 
Eklips - Investor Relations and Social Media
Eklips - Investor Relations and Social MediaEklips - Investor Relations and Social Media
Eklips - Investor Relations and Social Media
Peter Einarsson
 
Social Networking Analysis
Social Networking AnalysisSocial Networking Analysis
Social Networking Analysis
Mia Horrigan
 
Megan Griffith Gray - How the web is transforming information provision
Megan Griffith Gray - How the web is transforming information provisionMegan Griffith Gray - How the web is transforming information provision
Megan Griffith Gray - How the web is transforming information provision
NCVO - National Council for Voluntary Organisations
 
How b2 b decision makers use social media
How b2 b decision makers use social mediaHow b2 b decision makers use social media
How b2 b decision makers use social mediaDavid Brooks
 
A Digital Briefing - Social Media
A Digital Briefing - Social MediaA Digital Briefing - Social Media
A Digital Briefing - Social Media
One Zero One
 
AIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web TrendsAIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web Trends
Dominic Jones
 
Amex social media insider v2
Amex social media insider v2Amex social media insider v2
Amex social media insider v2MediaPost
 
The New Rules of Engagement
The New Rules of EngagementThe New Rules of Engagement
The New Rules of Engagement
gabewong
 
Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0
Ross Mayfield
 
CIPR Social Media Best Practice Guidelines
CIPR Social Media Best Practice GuidelinesCIPR Social Media Best Practice Guidelines
CIPR Social Media Best Practice Guidelines
Chartered Institute of Public Relations
 
Building The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For RecruitmentBuilding The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For Recruitment
Annzalie (Ann) Barrett
 

What's hot (20)

Fundamentals of Mass Collaboration
Fundamentals of Mass CollaborationFundamentals of Mass Collaboration
Fundamentals of Mass Collaboration
 
What's privacy got to do with social networking services?
What's privacy got to do with social networking services?What's privacy got to do with social networking services?
What's privacy got to do with social networking services?
 
How Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise ApplicationsHow Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise Applications
 
Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12
 
#SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights #SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights
 
Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social Networking
 
Social Media- A Practical Approach
Social Media- A Practical Approach Social Media- A Practical Approach
Social Media- A Practical Approach
 
Eklips - Investor Relations and Social Media
Eklips - Investor Relations and Social MediaEklips - Investor Relations and Social Media
Eklips - Investor Relations and Social Media
 
Social Networking Analysis
Social Networking AnalysisSocial Networking Analysis
Social Networking Analysis
 
Megan Griffith Gray - How the web is transforming information provision
Megan Griffith Gray - How the web is transforming information provisionMegan Griffith Gray - How the web is transforming information provision
Megan Griffith Gray - How the web is transforming information provision
 
How b2 b decision makers use social media
How b2 b decision makers use social mediaHow b2 b decision makers use social media
How b2 b decision makers use social media
 
Technology lanscape
Technology lanscapeTechnology lanscape
Technology lanscape
 
A Digital Briefing - Social Media
A Digital Briefing - Social MediaA Digital Briefing - Social Media
A Digital Briefing - Social Media
 
AIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web TrendsAIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web Trends
 
Amex social media insider v2
Amex social media insider v2Amex social media insider v2
Amex social media insider v2
 
Emarketing Basics
Emarketing BasicsEmarketing Basics
Emarketing Basics
 
The New Rules of Engagement
The New Rules of EngagementThe New Rules of Engagement
The New Rules of Engagement
 
Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0
 
CIPR Social Media Best Practice Guidelines
CIPR Social Media Best Practice GuidelinesCIPR Social Media Best Practice Guidelines
CIPR Social Media Best Practice Guidelines
 
Building The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For RecruitmentBuilding The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For Recruitment
 

Similar to Managing it security and data privacy security

Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015
Toby Ward
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
Cisco Mobility
 
Social business online information 201112
Social business online information 201112 Social business online information 201112
Social business online information 201112
Alpesh Doshi
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
jeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
glendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
todd581
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
JyotiPandey43595
 
Digital Engagement Strategies
Digital Engagement StrategiesDigital Engagement Strategies
Digital Engagement Strategies
Drew Diskin
 
Unisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria BurkeUnisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria Burke
Prescient Digital Media
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Perficient, Inc.
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
Jim Merrifield, IGP, CIP
 
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Mathew Mytka
 
Data Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesData Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companies
Good Rebels
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
DATAVERSITY
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
AstalapulosListestos
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
jeanettehully
 
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
Altimeter, a Prophet Company
 
Leveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersLeveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersSquareOne|Consulting
 
Social Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan EtlingerSocial Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan Etlinger
Susan Etlinger
 

Similar to Managing it security and data privacy security (20)

Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Social business online information 201112
Social business online information 201112 Social business online information 201112
Social business online information 201112
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Digital Engagement Strategies
Digital Engagement StrategiesDigital Engagement Strategies
Digital Engagement Strategies
 
Unisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria BurkeUnisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria Burke
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
 
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
 
Data Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesData Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companies
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
 
Leveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersLeveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco Partners
 
Social Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan EtlingerSocial Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan Etlinger
 

Recently uploaded

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Managing it security and data privacy security

  • 1. Managing IT Security and Data Privacy Security to Enhance the Client Experience Ovum Financial Services Technology Forum 25th June 2013 Alpesh Doshi Fintricity
  • 2. A CHANGE IN CUSTOMER RELATIONSHIPS Most B2C Brands Use Social Media Engagement is now part of the FABRIC Customers want a better relationship with their BRANDS
  • 3. SOCIAL DATA IS A NEW CURRENCY OF ENGAGEMENT We generate vast amounts of DATA On the web and Social sites Data on our likes, activities, friends, views/opinions Social Data is now a currency that can be used to build one-to-one relationships with customers. Carefully harvesting, analysing and leveraging social media data, banks may be able to gain valuable insight into customer investment patterns, market trends and value propositions.
  • 4.
  • 5. WHAT KIND OF DATA IS AVAILABLE?
  • 6. WHAT KIND OF DATA IS AVAILABLE? Demographics Age, Gender, Geography, HHI, Level of Education, List of friends, Friends of Friends Interests Profile-Based, Contextual, Demonstrated, Undeclared Actions Creating, Rating, Sending, Sharing, Uploading, Watching, and more Interaction How people interact with content and ads: Clicks, time spent, interactions, videos completed Recency and Frequency How often and when people express interests or actions Sentiment and Exposure What people say, what they read, and when and how they say and read it
  • 7. SECURITY STRATEGY FOR PERSONAL DATA Data Protection and Data Privacy regulations must be implemented Information Risk Standards – ISO 27001 Regulatory and FCA/PRA Requirements
  • 8. SECURITY STRATEGY FOR PERSONAL DATA DATA PROTECTION • Personal data must be processed fairly and lawfully • Obtained for only one or more specified lawful purpose • Adequate, relevant and not excessive • Accurate and kept up to date • Not be kept for longer than is necessary • Processed in accordance with data subjects’ rights • Appropriate technical and organisational measures • No transfer outside the EEA unless adequate protection RISK MANAGEMENT • Brand Reputation and loss of credibility can be catastrophic for a financial services organisation • Confidential Information about identified individuals, even though some of the data is publicly available, must be ‘managed’ carefully • Internal Policies, both business and technology policies must be coherent and linked across departments • Monitoring and management of these risks, and how they meet requirements must be implemented
  • 9. GAPS IN APPROACHES BY FINANCIALS SERVICES COs Most firms don’t have joined up policies. Firms tend to have a reactive approach to implementing risks and only do so when an event happens. Integrated Monitoring is key. Most firms have not identified data or assessed security risks that are faced by firms. Data ownership and use of Social .has not been considered yet, but is being used
  • 10. SECURITY SOLUTIONS AND ARCHITECTURES Build architectures that incorporate security from the start The volumes and timeliness of Social Data requires revised operating models and systems architecture Governance, Risk, Compliance solutions updated Data Security and Use Lifecycle approach created in an integrated way Risk Mitigation must be the business imperative, but enable agility and improved customer engagement
  • 11. SUMMARY Data Privacy and IT Security has become more complex. Data Protection and Privacy, Information Risk (ISO 27001), and Regulatory Requirements must be combined into a overall Security Strategy A combination of business and technology approaches are required It requires joined up thinking and implementation between the business and IT
  • 12. Thanks for Listening Any Questions? Alpesh Doshi, Fintricity m: +44 7973 822820 w: www.fintricity.com t: @alpeshdoshi l: www.linkedin.com/in/alpeshdoshi
  • 13. References • Guarding the Social Gates, The imperative for Social media Risk Management, Alan Weber, Altimeter Group, August 2012 • Social Data: Managing data privacy and other Legal Risks, Belinda Doshi, Partner, Nabarro, September 2012 • FCA – Data Security http://www.fsa.gov.uk/pubs/other/data_security.pdf • The Social Banker – Social Media Lessons from Banking Insiders KPMG, April 2012