SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
Managing IT Security and Data
Privacy Security to Enhance the
Client Experience
Ovum Financial Services Technology
Forum
25th June 2013
Alpesh Doshi
Fintricity
A CHANGE IN CUSTOMER
RELATIONSHIPS
Most B2C
Brands Use
Social Media
Engagement is
now part of the
FABRIC
Customers want a
better relationship
with their BRANDS
SOCIAL DATA IS A NEW
CURRENCY OF ENGAGEMENT
We generate
vast amounts
of DATA
On the web and
Social sites
Data on our likes,
activities, friends,
views/opinions
Social Data is now a currency that can be used to
build one-to-one relationships with customers.
Carefully harvesting, analysing and leveraging
social media data, banks may be able to gain
valuable insight into customer investment patterns,
market trends and value propositions.
WHAT KIND OF DATA IS
AVAILABLE?
WHAT KIND OF DATA IS
AVAILABLE?
Demographics
Age, Gender,
Geography, HHI,
Level of
Education, List
of friends,
Friends of
Friends
Interests
Profile-Based,
Contextual,
Demonstrated,
Undeclared
Actions
Creating, Rating,
Sending, Sharing,
Uploading, Watching,
and more
Interaction
How people interact
with content and ads:
Clicks, time spent,
interactions, videos
completed
Recency and
Frequency
How often and
when people
express interests
or actions
Sentiment and
Exposure
What people say,
what they read, and
when and how they
say and read it
SECURITY STRATEGY FOR
PERSONAL DATA
Data Protection and
Data Privacy regulations
must be implemented
Information Risk
Standards – ISO 27001
Regulatory and FCA/PRA
Requirements
SECURITY STRATEGY FOR
PERSONAL DATA
DATA PROTECTION
• Personal data must be processed fairly
and lawfully
• Obtained for only one or more specified
lawful purpose
• Adequate, relevant and not excessive
• Accurate and kept up to date
• Not be kept for longer than is necessary
• Processed in accordance with data
subjects’ rights
• Appropriate technical and organisational
measures
• No transfer outside the EEA unless
adequate protection
RISK MANAGEMENT
• Brand Reputation and loss of credibility can
be catastrophic for a financial services
organisation
• Confidential Information about identified
individuals, even though some of the data is
publicly available, must be ‘managed’
carefully
• Internal Policies, both business and
technology policies must be coherent and
linked across departments
• Monitoring and management of these risks,
and how they meet requirements must be
implemented
GAPS IN APPROACHES BY
FINANCIALS SERVICES COs
Most firms don’t
have joined up
policies.
Firms tend to have a reactive
approach to implementing risks and
only do so when an event happens.
Integrated
Monitoring is
key.
Most firms have not identified
data or assessed security risks
that are faced by firms.
Data ownership and use of Social .has not been
considered yet, but is being used
SECURITY SOLUTIONS AND
ARCHITECTURES
Build architectures
that incorporate
security from the start
The volumes and timeliness of
Social Data requires revised
operating models and systems
architecture
Governance, Risk,
Compliance
solutions updated
Data Security and Use
Lifecycle approach created
in an integrated way
Risk Mitigation must be the business imperative, but
enable agility and improved customer engagement
SUMMARY
Data Privacy and IT
Security has become
more complex.
Data Protection and Privacy, Information Risk (ISO
27001), and Regulatory Requirements must be
combined into a overall Security Strategy
A combination of business
and technology approaches
are required
It requires joined up thinking and implementation
between the business and IT
Thanks for Listening
Any Questions?
Alpesh Doshi, Fintricity
m: +44 7973 822820
w: www.fintricity.com
t: @alpeshdoshi
l: www.linkedin.com/in/alpeshdoshi
References
• Guarding the Social Gates, The imperative for Social media Risk Management, Alan Weber, Altimeter Group, August 2012
• Social Data: Managing data privacy and other Legal Risks, Belinda Doshi, Partner, Nabarro, September 2012
• FCA – Data Security http://www.fsa.gov.uk/pubs/other/data_security.pdf
• The Social Banker – Social Media Lessons from Banking Insiders KPMG, April 2012

Mais conteúdo relacionado

Mais procurados

Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12
ihlstatemsus
 
Social Media- A Practical Approach
Social Media- A Practical Approach Social Media- A Practical Approach
Social Media- A Practical Approach
Bayshore Solutions
 
How b2 b decision makers use social media
How b2 b decision makers use social mediaHow b2 b decision makers use social media
How b2 b decision makers use social media
David Brooks
 
Amex social media insider v2
Amex social media insider v2Amex social media insider v2
Amex social media insider v2
MediaPost
 

Mais procurados (20)

Fundamentals of Mass Collaboration
Fundamentals of Mass CollaborationFundamentals of Mass Collaboration
Fundamentals of Mass Collaboration
 
What's privacy got to do with social networking services?
What's privacy got to do with social networking services?What's privacy got to do with social networking services?
What's privacy got to do with social networking services?
 
How Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise ApplicationsHow Enterprise Social Graphs Can Transform Enterprise Applications
How Enterprise Social Graphs Can Transform Enterprise Applications
 
Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12Branding committee logo meeting 8.10.12
Branding committee logo meeting 8.10.12
 
#SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights #SXSW Health 2013 Highlights
#SXSW Health 2013 Highlights
 
Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social Networking
 
Social Media- A Practical Approach
Social Media- A Practical Approach Social Media- A Practical Approach
Social Media- A Practical Approach
 
Eklips - Investor Relations and Social Media
Eklips - Investor Relations and Social MediaEklips - Investor Relations and Social Media
Eklips - Investor Relations and Social Media
 
Social Networking Analysis
Social Networking AnalysisSocial Networking Analysis
Social Networking Analysis
 
Megan Griffith Gray - How the web is transforming information provision
Megan Griffith Gray - How the web is transforming information provisionMegan Griffith Gray - How the web is transforming information provision
Megan Griffith Gray - How the web is transforming information provision
 
How b2 b decision makers use social media
How b2 b decision makers use social mediaHow b2 b decision makers use social media
How b2 b decision makers use social media
 
Technology lanscape
Technology lanscapeTechnology lanscape
Technology lanscape
 
A Digital Briefing - Social Media
A Digital Briefing - Social MediaA Digital Briefing - Social Media
A Digital Briefing - Social Media
 
AIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web TrendsAIRA 2009: Investor Relations Web Trends
AIRA 2009: Investor Relations Web Trends
 
Amex social media insider v2
Amex social media insider v2Amex social media insider v2
Amex social media insider v2
 
Emarketing Basics
Emarketing BasicsEmarketing Basics
Emarketing Basics
 
The New Rules of Engagement
The New Rules of EngagementThe New Rules of Engagement
The New Rules of Engagement
 
Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0Van Web 2.0 naar Enterprise 2.0
Van Web 2.0 naar Enterprise 2.0
 
CIPR Social Media Best Practice Guidelines
CIPR Social Media Best Practice GuidelinesCIPR Social Media Best Practice Guidelines
CIPR Social Media Best Practice Guidelines
 
Building The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For RecruitmentBuilding The Business case to Use social Media For Recruitment
Building The Business case to Use social Media For Recruitment
 

Semelhante a Managing it security and data privacy security

Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
jeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
glendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
todd581
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
jeanettehully
 
Leveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersLeveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco Partners
SquareOne|Consulting
 

Semelhante a Managing it security and data privacy security (20)

Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015Best of the Intranet Global Forum LA 2015
Best of the Intranet Global Forum LA 2015
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Social business online information 201112
Social business online information 201112 Social business online information 201112
Social business online information 201112
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Digital Engagement Strategies
Digital Engagement StrategiesDigital Engagement Strategies
Digital Engagement Strategies
 
Unisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria BurkeUnisys intranet case study by Gloria Burke
Unisys intranet case study by Gloria Burke
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Evolution of Records Management in Law Firms
Evolution of Records Management in Law FirmsEvolution of Records Management in Law Firms
Evolution of Records Management in Law Firms
 
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
Greater Than X: Presentation for CX Workstream Workshop on Consumer Control 2...
 
Data Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companiesData Driven Marketing: the DNA of customer orientated companies
Data Driven Marketing: the DNA of customer orientated companies
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docxRunning head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
Running head PROJECT PLAN INCEPTION1PROJECT PLAN INCEPTION .docx
 
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger[Slides] Social Data Intelligence Webinar, By Susan Etlinger
[Slides] Social Data Intelligence Webinar, By Susan Etlinger
 
Leveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersLeveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco Partners
 
Social Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan EtlingerSocial Data Intelligence: Webinar with Susan Etlinger
Social Data Intelligence: Webinar with Susan Etlinger
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Managing it security and data privacy security

  • 1. Managing IT Security and Data Privacy Security to Enhance the Client Experience Ovum Financial Services Technology Forum 25th June 2013 Alpesh Doshi Fintricity
  • 2. A CHANGE IN CUSTOMER RELATIONSHIPS Most B2C Brands Use Social Media Engagement is now part of the FABRIC Customers want a better relationship with their BRANDS
  • 3. SOCIAL DATA IS A NEW CURRENCY OF ENGAGEMENT We generate vast amounts of DATA On the web and Social sites Data on our likes, activities, friends, views/opinions Social Data is now a currency that can be used to build one-to-one relationships with customers. Carefully harvesting, analysing and leveraging social media data, banks may be able to gain valuable insight into customer investment patterns, market trends and value propositions.
  • 4.
  • 5. WHAT KIND OF DATA IS AVAILABLE?
  • 6. WHAT KIND OF DATA IS AVAILABLE? Demographics Age, Gender, Geography, HHI, Level of Education, List of friends, Friends of Friends Interests Profile-Based, Contextual, Demonstrated, Undeclared Actions Creating, Rating, Sending, Sharing, Uploading, Watching, and more Interaction How people interact with content and ads: Clicks, time spent, interactions, videos completed Recency and Frequency How often and when people express interests or actions Sentiment and Exposure What people say, what they read, and when and how they say and read it
  • 7. SECURITY STRATEGY FOR PERSONAL DATA Data Protection and Data Privacy regulations must be implemented Information Risk Standards – ISO 27001 Regulatory and FCA/PRA Requirements
  • 8. SECURITY STRATEGY FOR PERSONAL DATA DATA PROTECTION • Personal data must be processed fairly and lawfully • Obtained for only one or more specified lawful purpose • Adequate, relevant and not excessive • Accurate and kept up to date • Not be kept for longer than is necessary • Processed in accordance with data subjects’ rights • Appropriate technical and organisational measures • No transfer outside the EEA unless adequate protection RISK MANAGEMENT • Brand Reputation and loss of credibility can be catastrophic for a financial services organisation • Confidential Information about identified individuals, even though some of the data is publicly available, must be ‘managed’ carefully • Internal Policies, both business and technology policies must be coherent and linked across departments • Monitoring and management of these risks, and how they meet requirements must be implemented
  • 9. GAPS IN APPROACHES BY FINANCIALS SERVICES COs Most firms don’t have joined up policies. Firms tend to have a reactive approach to implementing risks and only do so when an event happens. Integrated Monitoring is key. Most firms have not identified data or assessed security risks that are faced by firms. Data ownership and use of Social .has not been considered yet, but is being used
  • 10. SECURITY SOLUTIONS AND ARCHITECTURES Build architectures that incorporate security from the start The volumes and timeliness of Social Data requires revised operating models and systems architecture Governance, Risk, Compliance solutions updated Data Security and Use Lifecycle approach created in an integrated way Risk Mitigation must be the business imperative, but enable agility and improved customer engagement
  • 11. SUMMARY Data Privacy and IT Security has become more complex. Data Protection and Privacy, Information Risk (ISO 27001), and Regulatory Requirements must be combined into a overall Security Strategy A combination of business and technology approaches are required It requires joined up thinking and implementation between the business and IT
  • 12. Thanks for Listening Any Questions? Alpesh Doshi, Fintricity m: +44 7973 822820 w: www.fintricity.com t: @alpeshdoshi l: www.linkedin.com/in/alpeshdoshi
  • 13. References • Guarding the Social Gates, The imperative for Social media Risk Management, Alan Weber, Altimeter Group, August 2012 • Social Data: Managing data privacy and other Legal Risks, Belinda Doshi, Partner, Nabarro, September 2012 • FCA – Data Security http://www.fsa.gov.uk/pubs/other/data_security.pdf • The Social Banker – Social Media Lessons from Banking Insiders KPMG, April 2012