SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
Managing IT Security and Data
Privacy Security to Enhance the
Client Experience
Ovum Financial Services Technology
Forum
25th June 2013
Alpesh Doshi
Fintricity
A CHANGE IN CUSTOMER
RELATIONSHIPS
Most B2C
Brands Use
Social Media
Engagement is
now part of the
FABRIC
Customers want a
better relationship
with their BRANDS
SOCIAL DATA IS A NEW
CURRENCY OF ENGAGEMENT
We generate
vast amounts
of DATA
On the web and
Social sites
Data on our likes,
activities, friends,
views/opinions
Social Data is now a currency that can be used to
build one-to-one relationships with customers.
Carefully harvesting, analysing and leveraging
social media data, banks may be able to gain
valuable insight into customer investment patterns,
market trends and value propositions.
WHAT KIND OF DATA IS
AVAILABLE?
WHAT KIND OF DATA IS
AVAILABLE?
Demographics
Age, Gender,
Geography, HHI,
Level of
Education, List
of friends,
Friends of
Friends
Interests
Profile-Based,
Contextual,
Demonstrated,
Undeclared
Actions
Creating, Rating,
Sending, Sharing,
Uploading, Watching,
and more
Interaction
How people interact
with content and ads:
Clicks, time spent,
interactions, videos
completed
Recency and
Frequency
How often and
when people
express interests
or actions
Sentiment and
Exposure
What people say,
what they read, and
when and how they
say and read it
SECURITY STRATEGY FOR
PERSONAL DATA
Data Protection and
Data Privacy regulations
must be implemented
Information Risk
Standards – ISO 27001
Regulatory and FCA/PRA
Requirements
SECURITY STRATEGY FOR
PERSONAL DATA
DATA PROTECTION
• Personal data must be processed fairly
and lawfully
• Obtained for only one or more specified
lawful purpose
• Adequate, relevant and not excessive
• Accurate and kept up to date
• Not be kept for longer than is necessary
• Processed in accordance with data
subjects’ rights
• Appropriate technical and organisational
measures
• No transfer outside the EEA unless
adequate protection
RISK MANAGEMENT
• Brand Reputation and loss of credibility can
be catastrophic for a financial services
organisation
• Confidential Information about identified
individuals, even though some of the data is
publicly available, must be ‘managed’
carefully
• Internal Policies, both business and
technology policies must be coherent and
linked across departments
• Monitoring and management of these risks,
and how they meet requirements must be
implemented
GAPS IN APPROACHES BY
FINANCIALS SERVICES COs
Most firms don’t
have joined up
policies.
Firms tend to have a reactive
approach to implementing risks and
only do so when an event happens.
Integrated
Monitoring is
key.
Most firms have not identified
data or assessed security risks
that are faced by firms.
Data ownership and use of Social .has not been
considered yet, but is being used
SECURITY SOLUTIONS AND
ARCHITECTURES
Build architectures
that incorporate
security from the start
The volumes and timeliness of
Social Data requires revised
operating models and systems
architecture
Governance, Risk,
Compliance
solutions updated
Data Security and Use
Lifecycle approach created
in an integrated way
Risk Mitigation must be the business imperative, but
enable agility and improved customer engagement
SUMMARY
Data Privacy and IT
Security has become
more complex.
Data Protection and Privacy, Information Risk (ISO
27001), and Regulatory Requirements must be
combined into a overall Security Strategy
A combination of business
and technology approaches
are required
It requires joined up thinking and implementation
between the business and IT
Thanks for Listening
Any Questions?
Alpesh Doshi, Fintricity
m: +44 7973 822820
w: www.fintricity.com
t: @alpeshdoshi
l: www.linkedin.com/in/alpeshdoshi
References
• Guarding the Social Gates, The imperative for Social media Risk Management, Alan Weber, Altimeter Group, August 2012
• Social Data: Managing data privacy and other Legal Risks, Belinda Doshi, Partner, Nabarro, September 2012
• FCA – Data Security http://www.fsa.gov.uk/pubs/other/data_security.pdf
• The Social Banker – Social Media Lessons from Banking Insiders KPMG, April 2012

Contenu connexe

Tendances

Fundamentals of Mass Collaboration
Fundamentals of Mass CollaborationFundamentals of Mass Collaboration
Fundamentals of Mass CollaborationCrowdicity
 
What's privacy got to do with social networking services?
What's privacy got to do with social networking services?What's privacy got to do with social networking services?
What's privacy got to do with social networking services?Samantha Yorke
 
How Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise ApplicationsHow Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise ApplicationsKapil Gupta
 
Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12ihlstatemsus
 
#SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights #SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights Ryan Stephens
 
Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingDavid Stephens
 
Social Media- A Practical Approach
Social Media- A Practical Approach Social Media- A Practical Approach
Social Media- A Practical Approach Bayshore Solutions
 
Eklips - Investor Relations and Social Media
Eklips - Investor Relations and Social MediaEklips - Investor Relations and Social Media
Eklips - Investor Relations and Social MediaPeter Einarsson
 
Social Networking Analysis
Social Networking AnalysisSocial Networking Analysis
Social Networking AnalysisMia Horrigan
 
How b2 b decision makers use social media
How b2 b decision makers use social mediaHow b2 b decision makers use social media
How b2 b decision makers use social mediaDavid Brooks
 
A Digital Briefing - Social Media
A Digital Briefing - Social MediaA Digital Briefing - Social Media
A Digital Briefing - Social MediaOne Zero One
 
AIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web TrendsAIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web TrendsDominic Jones
 
Amex social media insider v2
Amex social media insider v2Amex social media insider v2
Amex social media insider v2MediaPost
 
The New Rules of Engagement
The New Rules of EngagementThe New Rules of Engagement
The New Rules of Engagementgabewong
 
Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0Ross Mayfield
 
Building The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For RecruitmentBuilding The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For RecruitmentAnnzalie (Ann) Barrett
 

Tendances (20)

Fundamentals of Mass Collaboration
Fundamentals of Mass CollaborationFundamentals of Mass Collaboration
Fundamentals of Mass Collaboration
 
What's privacy got to do with social networking services?
What's privacy got to do with social networking services?What's privacy got to do with social networking services?
What's privacy got to do with social networking services?
 
How Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise ApplicationsHow Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise Applications
 
Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12
 
#SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights #SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights
 
Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social Networking
 
Social Media- A Practical Approach
Social Media- A Practical Approach Social Media- A Practical Approach
Social Media- A Practical Approach
 
Eklips - Investor Relations and Social Media
Eklips - Investor Relations and Social MediaEklips - Investor Relations and Social Media
Eklips - Investor Relations and Social Media
 
Social Networking Analysis
Social Networking AnalysisSocial Networking Analysis
Social Networking Analysis
 
Megan Griffith Gray - How the web is transforming information provision
Megan Griffith Gray - How the web is transforming information provisionMegan Griffith Gray - How the web is transforming information provision
Megan Griffith Gray - How the web is transforming information provision
 
How b2 b decision makers use social media
How b2 b decision makers use social mediaHow b2 b decision makers use social media
How b2 b decision makers use social media
 
Technology lanscape
Technology lanscapeTechnology lanscape
Technology lanscape
 
A Digital Briefing - Social Media
A Digital Briefing - Social MediaA Digital Briefing - Social Media
A Digital Briefing - Social Media
 
AIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web TrendsAIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web Trends
 
Amex social media insider v2
Amex social media insider v2Amex social media insider v2
Amex social media insider v2
 
Emarketing Basics
Emarketing BasicsEmarketing Basics
Emarketing Basics
 
The New Rules of Engagement
The New Rules of EngagementThe New Rules of Engagement
The New Rules of Engagement
 
Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0
 
CIPR Social Media Best Practice Guidelines
CIPR Social Media Best Practice GuidelinesCIPR Social Media Best Practice Guidelines
CIPR Social Media Best Practice Guidelines
 
Building The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For RecruitmentBuilding The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For Recruitment
 

Similaire à Managing IT Security and Data Privacy to Enhance Client Experience

Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015Toby Ward
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Social business online information 201112
Social business online information 201112 Social business online information 201112
Social business online information 201112 Alpesh Doshi
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
Digital Engagement Strategies
Digital Engagement StrategiesDigital Engagement Strategies
Digital Engagement StrategiesDrew Diskin
 
Unisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria BurkeUnisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria BurkePrescient Digital Media
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsJim Merrifield, IGP, CIP
 
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...Mathew Mytka
 
Data Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesData Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesGood Rebels
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityDATAVERSITY
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxjeanettehully
 
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan EtlingerAltimeter, a Prophet Company
 
Leveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersLeveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersSquareOne|Consulting
 
Social Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan EtlingerSocial Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan EtlingerSusan Etlinger
 

Similaire à Managing IT Security and Data Privacy to Enhance Client Experience (20)

Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Social business online information 201112
Social business online information 201112 Social business online information 201112
Social business online information 201112
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Digital Engagement Strategies
Digital Engagement StrategiesDigital Engagement Strategies
Digital Engagement Strategies
 
Unisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria BurkeUnisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria Burke
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
 
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
 
Data Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesData Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companies
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
 
Leveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersLeveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco Partners
 
Social Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan EtlingerSocial Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan Etlinger
 

Dernier

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Dernier (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Managing IT Security and Data Privacy to Enhance Client Experience

  • 1. Managing IT Security and Data Privacy Security to Enhance the Client Experience Ovum Financial Services Technology Forum 25th June 2013 Alpesh Doshi Fintricity
  • 2. A CHANGE IN CUSTOMER RELATIONSHIPS Most B2C Brands Use Social Media Engagement is now part of the FABRIC Customers want a better relationship with their BRANDS
  • 3. SOCIAL DATA IS A NEW CURRENCY OF ENGAGEMENT We generate vast amounts of DATA On the web and Social sites Data on our likes, activities, friends, views/opinions Social Data is now a currency that can be used to build one-to-one relationships with customers. Carefully harvesting, analysing and leveraging social media data, banks may be able to gain valuable insight into customer investment patterns, market trends and value propositions.
  • 4.
  • 5. WHAT KIND OF DATA IS AVAILABLE?
  • 6. WHAT KIND OF DATA IS AVAILABLE? Demographics Age, Gender, Geography, HHI, Level of Education, List of friends, Friends of Friends Interests Profile-Based, Contextual, Demonstrated, Undeclared Actions Creating, Rating, Sending, Sharing, Uploading, Watching, and more Interaction How people interact with content and ads: Clicks, time spent, interactions, videos completed Recency and Frequency How often and when people express interests or actions Sentiment and Exposure What people say, what they read, and when and how they say and read it
  • 7. SECURITY STRATEGY FOR PERSONAL DATA Data Protection and Data Privacy regulations must be implemented Information Risk Standards – ISO 27001 Regulatory and FCA/PRA Requirements
  • 8. SECURITY STRATEGY FOR PERSONAL DATA DATA PROTECTION • Personal data must be processed fairly and lawfully • Obtained for only one or more specified lawful purpose • Adequate, relevant and not excessive • Accurate and kept up to date • Not be kept for longer than is necessary • Processed in accordance with data subjects’ rights • Appropriate technical and organisational measures • No transfer outside the EEA unless adequate protection RISK MANAGEMENT • Brand Reputation and loss of credibility can be catastrophic for a financial services organisation • Confidential Information about identified individuals, even though some of the data is publicly available, must be ‘managed’ carefully • Internal Policies, both business and technology policies must be coherent and linked across departments • Monitoring and management of these risks, and how they meet requirements must be implemented
  • 9. GAPS IN APPROACHES BY FINANCIALS SERVICES COs Most firms don’t have joined up policies. Firms tend to have a reactive approach to implementing risks and only do so when an event happens. Integrated Monitoring is key. Most firms have not identified data or assessed security risks that are faced by firms. Data ownership and use of Social .has not been considered yet, but is being used
  • 10. SECURITY SOLUTIONS AND ARCHITECTURES Build architectures that incorporate security from the start The volumes and timeliness of Social Data requires revised operating models and systems architecture Governance, Risk, Compliance solutions updated Data Security and Use Lifecycle approach created in an integrated way Risk Mitigation must be the business imperative, but enable agility and improved customer engagement
  • 11. SUMMARY Data Privacy and IT Security has become more complex. Data Protection and Privacy, Information Risk (ISO 27001), and Regulatory Requirements must be combined into a overall Security Strategy A combination of business and technology approaches are required It requires joined up thinking and implementation between the business and IT
  • 12. Thanks for Listening Any Questions? Alpesh Doshi, Fintricity m: +44 7973 822820 w: www.fintricity.com t: @alpeshdoshi l: www.linkedin.com/in/alpeshdoshi
  • 13. References • Guarding the Social Gates, The imperative for Social media Risk Management, Alan Weber, Altimeter Group, August 2012 • Social Data: Managing data privacy and other Legal Risks, Belinda Doshi, Partner, Nabarro, September 2012 • FCA – Data Security http://www.fsa.gov.uk/pubs/other/data_security.pdf • The Social Banker – Social Media Lessons from Banking Insiders KPMG, April 2012