Fine Tuned Machines Building a Strong Brand Image by Securing External Data Transmission A Review of Information Security in the Debt Collections World.

Slides:



Advertisements
Similar presentations
1. 2 Learning Objectives To understand: the characteristics of resources and capabilities that create a foundation for sustainable competitive advantage.
Advertisements

Options appraisal, the business case & procurement
IAPP CONFIDENTIAL Insider Leakage Threatens Privacy.
Creating Trust Online Farrokh Alemi, Ph.D September 12, 2004.
Discovery – The Next Generation!: Business Context of Risk Presentation to the North London Branch British Computer Society 19 March, 2008 Dr. Victoria.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Fine Tuned Machines Information Security in the Debt Collections Industry Securing Data Transmitted to External Partners March 13 th, 2010.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
> > > > The Financial System Chapter 17. Learning Goals Outline the structure and importance of the financial system. List the various types of securities.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
SOX & ISO Protect your data and be ready to be audited!!!
Helping you to achieve your full business potential Presented by Mr. Stephen Clarke Clarke & Hartland Solicitors 48 The Parade Cardiff Wales Wales .
3rd Party Risk Categorization Process
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
1 © 2015 Fidelity National Title Group. 2 What is the CFPB?  CFPB Stands for the CONSUMER FINANCIAL PROTECTION BUREAU  It is an Independent Bureau within.
Citi REO Strategy & Community Relations September 15, 2009.
PRODUCTS Existing New Existing MARKETS New
Who Are We  The Export Credit Guarantee Co. of Egypt has been incorporated in 1993 with a mandatory role of facilitating a healthy development of Egypt’s.
Working Capital Management – Account Receivables
General Awareness Training
Business Strategy Evaluation & Recommendations EVALUATE BUSINESS STRATEGY Internal Assessments Evaluation : Bridge of Business-To-Customer Information.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Credit unions use social media in a variety of ways, including marketing, providing incentives, facilitating applications for new accounts, inviting feedback.
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
United Nations Development Programme Ministry of Labor and Social Policy Financial Leasing as a Microfinancing Tool for Business Development: The Bulgarian.
Implementing and Auditing Ethics Programs
Trade Management  Module 4.  Learning Objectives:  Managing receivables  Securing receivables  Sales documentation.
Chapter 20 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Managing the Firm’s Finances.
EU Data Protection IT Governance view Ger O’Mahony 12 th October 2011.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Session 7 Compliance failure policy. 1 Contents Part 1: COLP and COFA duties Part 2: What do we have to comply with and why does it matter? Part 3: Compliance.
1 Chapter 23 Risk Management. 2 Topics in Chapter Risk management and stock value maximization. Fundamentals of risk management.
Secure . is a means of exchanging digital messages from an author to one or more recipients – it is instant with no delay or postal costs.
Adeyl Khan, Faculty, BBA, NSU Chapter 17. Adeyl Khan, Faculty, BBA, NSU The Financial System  The financial system is the process by which money flows.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
The Pitfalls of the Small Business Owner Protect Your Assets!
Internal Controls For Municipalities Vermont State Auditor’s Office – August 2008.
Michigan State University Global Online. The Structural Analysis of Industries Forces that Determine Industry Profitability Rivalry among current competitors.
Welcome to The Oriel Group. Adrian Stalley Director of Collections Services.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Telephone : +234 (0) | Website : Registered company : Telephone : +234.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Cyber Liability Insurance for an unsecure world
ARMAGEDDON IS HERE: IDENTITY AND COMPUTER BREACHES
The Importance of an AML Programme
Overview of the International Debt Sale Landscape
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
International Credit Management
Implementing and Auditing Ethics Programs
MCF 304: Bank Management Lecture 4.2 Credit Analysis.
Information Security based on International Standard ISO 27001
Information Security: Risk Management or Business Enablement?
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Cyber Issues Facing Medical Practice Managers
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Ethical questions on the use of big data in official statistics
Chapter 17 The Financial System.
What’s that smell? Expanding the boundaries of the industrial hygienist Tina Berceli-Boyle, P.E.
3PM – 5 STAGE PROCESS 5 Basic Elements must be managed – whether you are a buyer or a seller Makes THE difference between success and failure Implications.
Improving SME Access to Finance: the Role of Government
Risk parameters (consequence)
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
One relationship. Many resources for business owners.
DATA DISASTER RECOVERY PLAN
APPLICATION DISASTER RECOVERY RESPONSE
IT DISASTER RECOVERY PLAN
Presentation transcript:

Fine Tuned Machines Building a Strong Brand Image by Securing External Data Transmission A Review of Information Security in the Debt Collections World

Fine Tuned Machines XYZ, a Debt Collections Company A leading Debt Collections firm with over $700 million in Capital Full range of Debt Collections, including auto recovery, municipal accounts, bankruptcy and credit debt Provides collections services for major clients such as Bank of America, Chase, HSBC, Toyota and GMAC Strives to build relationships with the “debt sellers” To achieve the goal of collecting on debts, XYZ is “in the business of purchasing information” 3/13/20102MSIT FTM Group

Fine Tuned Machines PII Data Flow for Debt Collections 3/13/2010MSIT FTM Group3

Fine Tuned Machines Security Concern 3/13/2010MSIT FTM Group4 XYZ must protect the data transmission to external parties to avoid data breaches and defend against malicious attacks Implications of data transmission breaches Legal Consequences Financial Impacts Stakeholder Confidence Company Reputation Other Partnerships (Third Party Data Providers, External Legal Counsel)

Fine Tuned Machines Outline for External Data Transmission 3/13/2010MSIT FTM Group5 Discuss different types of transmission and their protection methods Snail Mail / CD FTP Upload to secured Seller sites Potential Attacks on External Data Transfer Legal implications Costs to protect & secure

Fine Tuned Machines External Communication Policies Adopt policies that mandate secure external communication between trusted networks and untrusted networks through out organization. When secure external communication is not possible; adopt best practices to minimize risk. Evaluate current external communication practices. Create transition plan to move towards approved security policy. Maintain revue process to assess effectiveness of policies.

Fine Tuned Machines 3/13/2010MSIT FTM Group7