Contact Center Security Strategies Karl Walder Director - Solutions Noble Systems.

Slides:



Advertisements
Similar presentations
Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
Advertisements

2 1.Client protection principles 2.Principle #6 in practice 3.The client perspective 4.Participant feedback 5.Tools for improving practice 6.Conclusion.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Safeguarding Data to Ensure Effective Data Use Paige Kowalski |Director| State Policy & Advocacy July 2014.
Navigating Compliance Requirements DCM 6.2 Regs and Codes linford & co llp.
Springfield Technical Community College Security Awareness Training.
Transforming the World of Employee Benefits For Our Policyowners
PCI Compliance Roundtable Update Presented by the PCI Compliance Task Force.
The Financial Modernization Act of 1999, also known as the Gramm-Leach-Bliley Act (GLBA) UNDERSTANDING AND DEVELOPING A STRATEGIC PLAN TO BECOME COMPLIANT.
© 2014 Nelson Brown Hamilton & Krekstein LLC. All Rights Reserved PRIVACY & DATA SECURITY: A LEGAL FRAMEWORK MOLLY LANG, PARTNER, NELSON BROWN & CO.
Surviving a Privacy Exam Barbara B. Fitch 2 nd VP–Market Conduct & Compliance National Life Insurance Company October 3, 2005.
IS3350 Security Issues in Legal Context
Top Questions Executives and Board Members Should be Asking About IT and Cloud Risks.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
8 - 1 ©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Audit Planning and Analytical Procedures Chapter 8.
REGULATIONS Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
HIPAA Security Standards What’s happening in your office?
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
1 Copyright © 2010 M. E. Kabay. All rights reserved. Security Audits, Standards, & Inspections CSH5 Chapter 54 “Security Audits, Standards and Inspections”
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
Information Security in 2015 What to Expect Presented by: Noor Aarohi Senior Risk and Compliance Analyst GW Division of Information Technology 1.
Website Hardening HUIT IT Security | Sep
House Committee on Business and Industry House Bill Implementation of Closed Account Notification System Texas Department of Banking April 22, 2008.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Tbilisi, Georgia June 2013 Government Services and Registries.
Tom Clarke VP, Research & Technology National Center for State Courts.
Managing the Privacy Function at a Large Company Kimberly S. Gray, Esq., CIPP Chief Privacy Officer Highmark Inc.
1 The Auditor’s Perspective Division of Sponsored Research Research Administration Training Series Presented by: Joe Cannella Audit Manager,
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
+ Regulation and Compliance Summary “ Making Great Ideas Become Reality”
Frequently Asked Questions NCSC Product Certification Payroll Anytime, Anywhere!
Managing your Institution-Specific HIPAA Compliance Policies and Procedures Cutting Edge Issues Thursday, December 13, 2007.
The Internet of Things and Consumer Protection
Improving security? CYBER SECURITY: THE SME PERSPECTIVE KELVIN JONES MANAGING DIRECTOR, ACCELERO DIGITAL © Accelero Digital Solutions Ltd
1 PARCC Data Privacy & Security Policy December 2013.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Dino Tsibouris & Mehmet Munur Privacy and Information Security Laws and Updates.
Data Security in the Cloud and Data Breaches: Lawyer’s Perspective Dino Tsibouris Mehmet Munur
Special Meeting on Procedures for Information Exchange November 7, 2007 Geneva Session 1 Anne Meininger United States USA WTO TBT Enquiry Point.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Operational Resilience DR’s Big Data Dilemma September 16, 2015 Datalink IT Resiliency Practice.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
©2005 Prentice Hall Business Publishing, Auditing and Assurance Services 10/e, Arens/Elder/Beasley Audit Planning and Analytical Procedures Chapter.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
Presented by: David Reid, DBA International
Performing Risk Analysis and Testing: Outsource or In-house
Mysale Information Classification 101
Regulatory Compliance
Auditing Cloud Services
Audit Planning and Analytical Procedures
Strategies & Tactics for Data Security
Electronic Transactions Workshop
Electronic Transactions Workshop
EMPLOYER HIPAA COMPLIANCE STRATEGIES HIPAA Summit Audio Conference
Chapter 3: IRS and FTC Data Security Rules
General Counsel and Chief Privacy Officer
Red Flags Rule An Introduction County College of Morris
Alabama Data Breach Notification Act: What 911 Districts Need to Know
Chris Ince ISO Lead Auditor Security Risk Management Ltd
Moving from Consumers to Producers Kings Park Central School District
Audit.
Anatomy of a Common Cyber Attack
Presentation transcript:

Contact Center Security Strategies Karl Walder Director - Solutions Noble Systems

3 Session Goals Benefits of Securing Your Data Security Certifications Government Direction Business Assessment

4 Security From Wikipedia, the free encyclopedia Security is the condition of being protected against danger or loss. In the general sense, security is a concept similar to safety. The nuance between the two is an added emphasis on being protected from dangers that originate from outside. Individuals or actions that encroach upon the condition of protection are responsible for the breach of security.safety The word "security" in general usage is synonymous with "safety," but as a technical term "security" means that something not only is secure but that it has been secured. Definition of Security

5 Stay Up to Date on Security & Compliance The following web portals provide access to compliance and Security standards. It is best to check the sites frequently for updates or subscribe to notifications. Payment Card Industry - Fair Debt Collections Practices Act: System Administration, Networking, and Security (SANS) The Gramm-Leach Bliley Act ISO Security Standards HIPPA

6 Organizations can benefit in many ways by protecting their data. The benefits can provide companies financial value, peace of mind, & investor confidence.

7 Benefits of Securing Your Data Example: –Many companies have adopted one or two well know industry standards to show investors, employee and customers they use best practices. –The two most recognized standards are: ISO 27001, formerly the PCI (Payment Card Industry Standard)

8 Benefits of Securing Your Data Not only are organizations adopting these best practices, they are also engaging Certified third party auditors to ensure the organization are following the adopted practices. Upon completion, the auditors can issue a certificate or report indicating the company is meeting industry standards.

9 Benefits of Securing Your Data However, –When a company’s security is compromised, the costs to correct the breach can be staggering. –In addition, the company’s blemished image and investor confidence can leave the company in a fragile state.

10 Recent Security Headlines: States California was the first state to implement consumer protection legislation for its residence, Notice of Security Breach law (Cal. Civil Code § ) Notice of Security Breach law (Cal. Civil Code § ) –The law requires notification to consumers if a breach or leak occurs. –The law also provides relieve for corporations. –This only applies if the data was encrypted. Since California 43 states, the District of Columbia and Puerto Rico have enacted legislation. –

11 Recent Security Headlines: Federal Currently, Congress has its hands on no fewer than 9 different bills that would set notification procedures of some sort. 3 of those are specific to federal agencies and would not affect private businesses. But the other 6 would. And from a response perspective, that could be a good thing. −This could be especially beneficial to midmarket IT departments, which work with smaller staffs and may not have legal counsel on hand in the company. −Two Senate bills having the most traction right now. S. 495, known as the Personal Data Privacy and Security Act of 2007, is sponsored by Sen. Patrick Leahy, D-Vt., but is given equal support by Pennsylvania Republican Sen. Arlen Specter. Personal Data Privacy and Security Act of 2007 −S. 239, known as the Notification of Risk to Personal Data Act of 2007, is sponsored by Sen. Dianne Feinstein, D-Calif. The bill made it through the Senate Judiciary Committee last year and has been untouched since then.Notification of Risk to Personal Data Act of 2007

12 Leveraging Security Technologies Collection Center technology vendors continue to make advancements in their product lines to provide customers with more options to protect their data. –User Password Encryption –Noble Encrypted data At Rest (NEAR) –System Hardening –Security over the wire (SSH, SFTP, VPN) Vendors are also focused on meeting the Payment Card Industry Standards for Security and are going through the Certification process for their products and organizations.

13 Session Summary Security is becoming a critical issue There are many considerations and options Ask Us about a Business Assessment

14 The costs of compromised security are extremely high – both in dollars & customer relations. Securing Your Data provides financial value, peace of mind, & investor confidence.

15 Q & A p: 888.8NOBLE8 e: w: