Security Concerns at Offshore Development Centers MIS Practicum Presentation Week 6 Ashish Bahety.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Considerations for Records and Information Management Programs in Light of the Pension Committee and Rimkus Consulting 2010 Decisions.
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
DnB and Brazil Seminar 15 September Why Brazil Vast natural resources and familiar industries Oil and Gas Shipping and ship building Energy Pulp.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
TAKE YOUR BUSINESS GLOBAL International Trade. Why Should You Export?
State of Louisiana January 19, AgendaAgenda Program Update –Company Level Support –Technical Help Desk –Account Management Fraud and Misuse Questions.
2012, Team-Tiger- Northwestern McCormick MSIT 2013 Confidential 1 ©2011, Cognizant Northwestern McCormick MSIT October 20 th, 2012 Information Security.
1 6 - Outsourcing Outsourcing. © Robert G Parker – UW-CISA 2010 Dealing with issues when a portion or all of the provision of technology services is performed.
RIBA / UK TI Conference ‘Working Internationally’ Getting Paid Martin Kelly, KPMG LLP Ruth Adams, KPMG LLP 23rd March 2012.
Methods of Payments Cash in Letter of Documentary Open Advance Credit Collections Account Most Advantageous to the Exporter Most Advantageous to the Importer.
MIS 648 Lecture 131 MIS 648 Presentation Notes: Lecture 13 Managing IT Offshoring: Is it a good thing?
For Holding Companies Accountable for Data Security Breaches Victor Flores CIS
2-1 Personal Selling Opportunities in the Age of Information Selling Today 10 th Edition CHAPTER Manning and Reece 2.
Copyright 2004 – Biz/ed Factors Affecting the Travel and Tourism Industry 2 BTEC National Travel and Tourism.
Geneva, May 2009 Trade Facilitation: Links to Logistics and Development.
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
© 2012 Duke CGGC OFFSHORE SERVICES GLOBAL VALUE CHAIN Conferencia Deslocalización de servicios y cadenas globales de valor: ¿Nuevos factores de cambios.
Managing Procurement and Sourcing Getting What You Need.
Making Debt Sales a Part of Your Recovery Strategy Cynthia M. Henry, MBA Director, Collections Division Orlando Utilities Commission Utility Payment Conference.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
OPERATING ACTIVITIES— OUTSOURCING AC 303 Summer 2015 Prof. G. Thomas White.
Small Companies in International Business Chapter 6.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
Presentation to Senior Management MiFID for Senior Managers Introduction These slides introduce the big changes for senior management from MiFID.
©2008, Promega Corporation. All rights reserved. ©2007, Promega Corporation. All rights reserved. Global Financial Crisis -- Practical Implications for.
AUGUST 25, 2015 Cyber Insurance:
Mike Wyatt, Director State Public Sector Cyber Risk Services
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Cyber Security in Local Government. One of the Industry’s Most Widely Recognized and Highly Accredited Partners 1.
FINANCIAL experts INDUSTRY Some of our clients. Financial translation has become a necessary service, not just within the financial industry but also.
2-1 Personal Selling Opportunities in the Age of Information Selling Today 2.
© 2006 eAgency, Inc. All Rights Reserved. How to Use Technology to Grow Your Small Business into Big Business… Can You Pass the Test? Presented by Robert.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Finance SCOOP Indiana University September 16, 2003.
12/23/2015Software Assist Corporation1 “Most companies have little idea how pervasive FTP activity is in their organizations because FTP is no longer just.
Security and Privacy: Panel of Perspectives Rick Skeel University of Oklahoma.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
2-1 Personal Selling Opportunities in the Age of Information Selling Today 10 th Edition CHAPTER Manning and Reece 2.
Sandler & Travis Trade Advisory Services, Inc. Reducing Risk Through Internal Training: Measurement tools to assess training success WESCCON October 16,
System Users and Developers
Banking and E-Commerce Group ‘A’ April 23 rd 2003.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Paymetric Fulfillment Process
Thomas Ianuzzi, CPP, CISSP, CFE, CCE Information Security Consultants, Inc.
Discovering Hospitality and Tourism, 2nd Ed.© 2008 Pearson Education, Inc. Ninemeier and PerdueUpper Saddle River, NJ The World of Non-Commercial.
NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
Chapter 13 Extending the Organization Along the Supply Chain © Toh Kheng Ho/Age Fotostock America, Inc.
» Overview with Forrester Research Lambert Jemley Vice President, Marketing
Present by Ministry of Economic Affairs Department of Investment Service Section Manager: Kevin Tsui Consultant: Joseph Lin Investment Niche for Taiwan’s.
THE LARGEST BANKS OF THE US. Plan 1. United States' Largest Banks 2. Bank of America 3. JPMorgan Chase 4. Citigroup Inc.
Find Best IT Management Consulting Services
Cybersecurity as a Business Differentiator
CASH MANAGEMENT SERVICES
E&O Risk Management: Meeting the Challenge of Change
Regulatory Compliance
Current ‘Hot Topics’ in Information Security Governance Auditing
SELLING TO THE SMALL AND MEDIUM SIZED BUSINESS: CREDIT, FINANCIAL AND LEGAL ISSUES FOR THE CREDIT TEAM Scott Blakeley, Esq. Susan.
Logistics Process Outsourcing
Logistics Process Outsourcing
Logistics Process Outsourcing
Logistics Process Outsourcing
Compliance….GlobalSearch……WHAT?!?!
Keeping your data, money & reputation safe
Competitive financing from Norway Georg Kervel
Export Letter of Credit Cycle- Advised L/C
Improving Procurement Management Through Better Contract Management Nobody wants to get tangled up in a lawsuit. Even if you are in the right, a breach.
Presentation transcript:

Security Concerns at Offshore Development Centers MIS Practicum Presentation Week 6 Ashish Bahety

The Issue  The Issue: Security Concerns at offshore development centers.  The Problem: Security Breaches Sale of personally identifiable information Unintentional exposure of information to outsiders Loss of Laptops, backup tapes Dishonest insiders

How is the issue looked at?  By the Offshore Development Center Overhyped  By the Client Company “Necessary evil”  By the governments Exporting Country (India/China)  Seriously: Hampers the industry as a whole Importing Country (US)  Politically (Jobs are being lost)  Creating legislation forbidding information leaving US, or to inform customers that their data may be sent out.

Examples of the issue  TJX security breach: Credit Card  A security breach at HSBC's offshore data-processing unit in Bangalore has led to £233,000 being stolen from the accounts of a small number of UK customers.  Iron Mountain Inc lost backup tapes of client Time Warner Inc. holding personal data of 600,000 former and current Time Warner employees.  Bank of America lost an unencrypted backup tape with credit card information on up to 1.2 million federal employees while it was being shipped on a commercial airline.

Vendor and consultant white papers  Good idea of the different theories  What to outsource and what not?  How to select a vendor?  Guidelines to follow to reduce the risk.

Relevance to Academic Coursework  IS Security  Systems Analysis and Development What to outsource and what not to? Associated Risks  IS Planning  Global Supply Chain Management What parts of the Supply Chain to outsource.

General Issue  General Issue: Security  Academic Research: There is a huge cost to document each and every process that is outsourced. Best people in the industry are used at the time of procuring the contract and then they are shifted.  Studies that identify the key factors and challenges:

What is being done?  Increased usage of “more” secure channels.  Training to employees to keep data secure.  Payment to hackers to test the system and identify the weak links.  Investment in secure facilities.  Careful analysis of vendor before selecting them.  Security Audits.