SlideShare a Scribd company logo
1 of 13
Download to read offline
Managing IT Security and Data
Privacy Security to Enhance the
Client Experience
Ovum Financial Services Technology
Forum
25th June 2013
Alpesh Doshi
Fintricity
A CHANGE IN CUSTOMER
RELATIONSHIPS
Most B2C
Brands Use
Social Media
Engagement is
now part of the
FABRIC
Customers want a
better relationship
with their BRANDS
SOCIAL DATA IS A NEW
CURRENCY OF ENGAGEMENT
We generate
vast amounts
of DATA
On the web and
Social sites
Data on our likes,
activities, friends,
views/opinions
Social Data is now a currency that can be used to
build one-to-one relationships with customers.
Carefully harvesting, analysing and leveraging
social media data, banks may be able to gain
valuable insight into customer investment patterns,
market trends and value propositions.
WHAT KIND OF DATA IS
AVAILABLE?
WHAT KIND OF DATA IS
AVAILABLE?
Demographics
Age, Gender,
Geography, HHI,
Level of
Education, List
of friends,
Friends of
Friends
Interests
Profile-Based,
Contextual,
Demonstrated,
Undeclared
Actions
Creating, Rating,
Sending, Sharing,
Uploading, Watching,
and more
Interaction
How people interact
with content and ads:
Clicks, time spent,
interactions, videos
completed
Recency and
Frequency
How often and
when people
express interests
or actions
Sentiment and
Exposure
What people say,
what they read, and
when and how they
say and read it
SECURITY STRATEGY FOR
PERSONAL DATA
Data Protection and
Data Privacy regulations
must be implemented
Information Risk
Standards – ISO 27001
Regulatory and FCA/PRA
Requirements
SECURITY STRATEGY FOR
PERSONAL DATA
DATA PROTECTION
• Personal data must be processed fairly
and lawfully
• Obtained for only one or more specified
lawful purpose
• Adequate, relevant and not excessive
• Accurate and kept up to date
• Not be kept for longer than is necessary
• Processed in accordance with data
subjects’ rights
• Appropriate technical and organisational
measures
• No transfer outside the EEA unless
adequate protection
RISK MANAGEMENT
• Brand Reputation and loss of credibility can
be catastrophic for a financial services
organisation
• Confidential Information about identified
individuals, even though some of the data is
publicly available, must be ‘managed’
carefully
• Internal Policies, both business and
technology policies must be coherent and
linked across departments
• Monitoring and management of these risks,
and how they meet requirements must be
implemented
GAPS IN APPROACHES BY
FINANCIALS SERVICES COs
Most firms don’t
have joined up
policies.
Firms tend to have a reactive
approach to implementing risks and
only do so when an event happens.
Integrated
Monitoring is
key.
Most firms have not identified
data or assessed security risks
that are faced by firms.
Data ownership and use of Social .has not been
considered yet, but is being used
SECURITY SOLUTIONS AND
ARCHITECTURES
Build architectures
that incorporate
security from the start
The volumes and timeliness of
Social Data requires revised
operating models and systems
architecture
Governance, Risk,
Compliance
solutions updated
Data Security and Use
Lifecycle approach created
in an integrated way
Risk Mitigation must be the business imperative, but
enable agility and improved customer engagement
SUMMARY
Data Privacy and IT
Security has become
more complex.
Data Protection and Privacy, Information Risk (ISO
27001), and Regulatory Requirements must be
combined into a overall Security Strategy
A combination of business
and technology approaches
are required
It requires joined up thinking and implementation
between the business and IT
Thanks for Listening
Any Questions?
Alpesh Doshi, Fintricity
m: +44 7973 822820
w: www.fintricity.com
t: @alpeshdoshi
l: www.linkedin.com/in/alpeshdoshi
References
• Guarding the Social Gates, The imperative for Social media Risk Management, Alan Weber, Altimeter Group, August 2012
• Social Data: Managing data privacy and other Legal Risks, Belinda Doshi, Partner, Nabarro, September 2012
• FCA – Data Security http://www.fsa.gov.uk/pubs/other/data_security.pdf
• The Social Banker – Social Media Lessons from Banking Insiders KPMG, April 2012

More Related Content

What's hot

Fundamentals of Mass Collaboration
Fundamentals of Mass CollaborationFundamentals of Mass Collaboration
Fundamentals of Mass CollaborationCrowdicity
 
What's privacy got to do with social networking services?
What's privacy got to do with social networking services?What's privacy got to do with social networking services?
What's privacy got to do with social networking services?Samantha Yorke
 
How Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise ApplicationsHow Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise ApplicationsKapil Gupta
 
Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12ihlstatemsus
 
#SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights #SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights Ryan Stephens
 
Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingDavid Stephens
 
Social Media- A Practical Approach
Social Media- A Practical Approach Social Media- A Practical Approach
Social Media- A Practical Approach Bayshore Solutions
 
Eklips - Investor Relations and Social Media
Eklips - Investor Relations and Social MediaEklips - Investor Relations and Social Media
Eklips - Investor Relations and Social MediaPeter Einarsson
 
Social Networking Analysis
Social Networking AnalysisSocial Networking Analysis
Social Networking AnalysisMia Horrigan
 
How b2 b decision makers use social media
How b2 b decision makers use social mediaHow b2 b decision makers use social media
How b2 b decision makers use social mediaDavid Brooks
 
A Digital Briefing - Social Media
A Digital Briefing - Social MediaA Digital Briefing - Social Media
A Digital Briefing - Social MediaOne Zero One
 
AIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web TrendsAIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web TrendsDominic Jones
 
Amex social media insider v2
Amex social media insider v2Amex social media insider v2
Amex social media insider v2MediaPost
 
The New Rules of Engagement
The New Rules of EngagementThe New Rules of Engagement
The New Rules of Engagementgabewong
 
Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0Ross Mayfield
 
Building The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For RecruitmentBuilding The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For RecruitmentAnnzalie (Ann) Barrett
 

What's hot (20)

Fundamentals of Mass Collaboration
Fundamentals of Mass CollaborationFundamentals of Mass Collaboration
Fundamentals of Mass Collaboration
 
What's privacy got to do with social networking services?
What's privacy got to do with social networking services?What's privacy got to do with social networking services?
What's privacy got to do with social networking services?
 
How Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise ApplicationsHow Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise Applications
 
Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12
 
#SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights #SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights
 
Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social Networking
 
Social Media- A Practical Approach
Social Media- A Practical Approach Social Media- A Practical Approach
Social Media- A Practical Approach
 
Eklips - Investor Relations and Social Media
Eklips - Investor Relations and Social MediaEklips - Investor Relations and Social Media
Eklips - Investor Relations and Social Media
 
Social Networking Analysis
Social Networking AnalysisSocial Networking Analysis
Social Networking Analysis
 
Megan Griffith Gray - How the web is transforming information provision
Megan Griffith Gray - How the web is transforming information provisionMegan Griffith Gray - How the web is transforming information provision
Megan Griffith Gray - How the web is transforming information provision
 
How b2 b decision makers use social media
How b2 b decision makers use social mediaHow b2 b decision makers use social media
How b2 b decision makers use social media
 
Technology lanscape
Technology lanscapeTechnology lanscape
Technology lanscape
 
A Digital Briefing - Social Media
A Digital Briefing - Social MediaA Digital Briefing - Social Media
A Digital Briefing - Social Media
 
AIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web TrendsAIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web Trends
 
Amex social media insider v2
Amex social media insider v2Amex social media insider v2
Amex social media insider v2
 
Emarketing Basics
Emarketing BasicsEmarketing Basics
Emarketing Basics
 
The New Rules of Engagement
The New Rules of EngagementThe New Rules of Engagement
The New Rules of Engagement
 
Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0
 
CIPR Social Media Best Practice Guidelines
CIPR Social Media Best Practice GuidelinesCIPR Social Media Best Practice Guidelines
CIPR Social Media Best Practice Guidelines
 
Building The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For RecruitmentBuilding The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For Recruitment
 

Similar to Managing IT Security and Data Privacy to Enhance Client Experience

Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015Toby Ward
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Social business online information 201112
Social business online information 201112 Social business online information 201112
Social business online information 201112 Alpesh Doshi
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
Digital Engagement Strategies
Digital Engagement StrategiesDigital Engagement Strategies
Digital Engagement StrategiesDrew Diskin
 
Unisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria BurkeUnisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria BurkePrescient Digital Media
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsJim Merrifield, IGP, CIP
 
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...Mathew Mytka
 
Data Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesData Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesGood Rebels
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityDATAVERSITY
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxjeanettehully
 
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan EtlingerAltimeter, a Prophet Company
 
Leveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersLeveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersSquareOne|Consulting
 
Social Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan EtlingerSocial Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan EtlingerSusan Etlinger
 

Similar to Managing IT Security and Data Privacy to Enhance Client Experience (20)

Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Social business online information 201112
Social business online information 201112 Social business online information 201112
Social business online information 201112
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Digital Engagement Strategies
Digital Engagement StrategiesDigital Engagement Strategies
Digital Engagement Strategies
 
Unisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria BurkeUnisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria Burke
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
 
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
 
Data Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesData Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companies
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
 
Leveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersLeveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco Partners
 
Social Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan EtlingerSocial Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan Etlinger
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 

Managing IT Security and Data Privacy to Enhance Client Experience

  • 1. Managing IT Security and Data Privacy Security to Enhance the Client Experience Ovum Financial Services Technology Forum 25th June 2013 Alpesh Doshi Fintricity
  • 2. A CHANGE IN CUSTOMER RELATIONSHIPS Most B2C Brands Use Social Media Engagement is now part of the FABRIC Customers want a better relationship with their BRANDS
  • 3. SOCIAL DATA IS A NEW CURRENCY OF ENGAGEMENT We generate vast amounts of DATA On the web and Social sites Data on our likes, activities, friends, views/opinions Social Data is now a currency that can be used to build one-to-one relationships with customers. Carefully harvesting, analysing and leveraging social media data, banks may be able to gain valuable insight into customer investment patterns, market trends and value propositions.
  • 4.
  • 5. WHAT KIND OF DATA IS AVAILABLE?
  • 6. WHAT KIND OF DATA IS AVAILABLE? Demographics Age, Gender, Geography, HHI, Level of Education, List of friends, Friends of Friends Interests Profile-Based, Contextual, Demonstrated, Undeclared Actions Creating, Rating, Sending, Sharing, Uploading, Watching, and more Interaction How people interact with content and ads: Clicks, time spent, interactions, videos completed Recency and Frequency How often and when people express interests or actions Sentiment and Exposure What people say, what they read, and when and how they say and read it
  • 7. SECURITY STRATEGY FOR PERSONAL DATA Data Protection and Data Privacy regulations must be implemented Information Risk Standards – ISO 27001 Regulatory and FCA/PRA Requirements
  • 8. SECURITY STRATEGY FOR PERSONAL DATA DATA PROTECTION • Personal data must be processed fairly and lawfully • Obtained for only one or more specified lawful purpose • Adequate, relevant and not excessive • Accurate and kept up to date • Not be kept for longer than is necessary • Processed in accordance with data subjects’ rights • Appropriate technical and organisational measures • No transfer outside the EEA unless adequate protection RISK MANAGEMENT • Brand Reputation and loss of credibility can be catastrophic for a financial services organisation • Confidential Information about identified individuals, even though some of the data is publicly available, must be ‘managed’ carefully • Internal Policies, both business and technology policies must be coherent and linked across departments • Monitoring and management of these risks, and how they meet requirements must be implemented
  • 9. GAPS IN APPROACHES BY FINANCIALS SERVICES COs Most firms don’t have joined up policies. Firms tend to have a reactive approach to implementing risks and only do so when an event happens. Integrated Monitoring is key. Most firms have not identified data or assessed security risks that are faced by firms. Data ownership and use of Social .has not been considered yet, but is being used
  • 10. SECURITY SOLUTIONS AND ARCHITECTURES Build architectures that incorporate security from the start The volumes and timeliness of Social Data requires revised operating models and systems architecture Governance, Risk, Compliance solutions updated Data Security and Use Lifecycle approach created in an integrated way Risk Mitigation must be the business imperative, but enable agility and improved customer engagement
  • 11. SUMMARY Data Privacy and IT Security has become more complex. Data Protection and Privacy, Information Risk (ISO 27001), and Regulatory Requirements must be combined into a overall Security Strategy A combination of business and technology approaches are required It requires joined up thinking and implementation between the business and IT
  • 12. Thanks for Listening Any Questions? Alpesh Doshi, Fintricity m: +44 7973 822820 w: www.fintricity.com t: @alpeshdoshi l: www.linkedin.com/in/alpeshdoshi
  • 13. References • Guarding the Social Gates, The imperative for Social media Risk Management, Alan Weber, Altimeter Group, August 2012 • Social Data: Managing data privacy and other Legal Risks, Belinda Doshi, Partner, Nabarro, September 2012 • FCA – Data Security http://www.fsa.gov.uk/pubs/other/data_security.pdf • The Social Banker – Social Media Lessons from Banking Insiders KPMG, April 2012