Trust, Transparency: What End-Users Want from their Providers!

Slides:



Advertisements
Similar presentations
Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Advertisements

How Identity and Access Management Can Help Your Institution Touch Its Toes Renee Woodten Frost Internet2 and University of Michigan Kevin Morooney The.
European Cloud Computing Conference Panel 1: What should be the legal framework to help create a market for Cloud services? Dalibor Baskovc Member Executive.
Centre for Irish and European Security "Societal Security R&D” Perspectives, Conclusions and Recommendations from Workshop of July 1st 2010 Purpose of.
Core principles in the ASX CGC document. Which one do you think is the most important and least important? Presented by Casey Chan Ethics Governance &
AMSRO Leaders Forum 2014 Presentation by Timothy Pilgrim to AMSRO Sydney, Thursday 20 March 2014.
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
1. You will receive an OAuth link via allowing InsightSquared to access your data in Salesforce.com* through the API and build your reports. It.
COBIT - II.
ISO 9001 Interpretation : Exclusions
© Lloyd’s 1 © Lloyd’s 1 Demystifying Conduct Risk Gabriella Barker Lloyd’s Delegated Authorities.
IT Outsourcing Andy Darnell Jennifer Lawrence Jessica Pruitt.
Patch Management Strategy
Vendor Risk: Effective Management is Essential
1 Gaming, Privacy and Security eGaming Experience in British Columbia British Columbia Lottery Corporation October 5, 2013 Gurmit Aujla – Director, Internal.
SECURITY Is cloud computing secure? Are Microsoft Online Services secure? Is cloud computing secure? Are Microsoft Online Services secure? PRIVACY What.
Ready to use Cloud SLAs. SLALOM Project2 SLALOM is ready to use Cloud SLAs “SLALOM will take theory to practice, providing a trusted verifiable starting.
Slide 1 The 9 th European Financial Markets Convention “Towards true integration by 2009” Brussels May 2005 Corporate Governance Session by the ECGI.
Managing Third Party Risk In a world fraught w/Risk Trust In the Cloud How are you Protecting Customer Data? February 26, 2014 Case Study Vincent Campitelli.
Roles and Responsibilities
1 How do the CODiEs Work? For Software and Content companies.
About Sally Smoczynski Background in process improvement Consultant in Information Security, Service Management and Business Continuity Strong experience.
Industry SDLCs and Business Climate. Justin Kalicharan Credentials Director and Senior Technology Officer Over 14 years of coding experience in various.
FROM CORPORATE GOVERNANCE TO SUSTAINABLE GOVERNANCE Peter White, Principal Consultant – Sustainability Maunsell Australia Pty Ltd, Brisbane, Australia.
CHALLENGING BOUNDARIES Rhodia way, The way we do business.
Material Adopted From: “The Internal Auditing Pocket Guide” --- J.P. Russell.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
FSA - The Financial Supervision Authority Nele Piir, Marge Laan, Kadri Toks.
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
Connecting with Your Peers IT Challenges and Opportunities in 2012 A Facilitated Group Discussion Thursday, January 12, 2012.
Storm Clouds Kenneth R. Ledger Director, Risk Management.
1 THE WORK AND RESPONSIBILITIES OF MANAGERS WHAT DO MANAGERS DO? CHANGING PATTERNS OF WORK AND CHANGING PRIORITIES Slides for a seminar session © Denis.
Eversheds Digital Banking Seminar Obtaining the right technology 30 September 2015 Eve England Principal Associate.
Hosted by Panel Discussion: “Regulatory compliance -- The effect on information management and the storage industry” Moderator: Peter Gerr, senior research.
CAS Spring Meeting June 2007 Introduction to ERM …The Measurements, Quadrants, Tools, and Solutions Prof. Mark C. Vonnahme Fox Family Clinical Professor.
Big Data Definition VolumeVelocity Varity ComplicityVariability.
Daniel Field, Atos Spain Towards the European Open Science Cloud, Heidelberg, 20/01/2016.
FIRMA National Risk Management Training Conference – Orlando, FL Wednesday April 9, 2008 Third Party / SAS 70 Reports A Regulatory and Standards Update.
Discovering Hospitality and Tourism, 2nd Ed.© 2008 Pearson Education, Inc. Ninemeier and PerdueUpper Saddle River, NJ The World of Non-Commercial.
SAS No. 70, Service Organizations A standard for reporting on a service organization’s controls affecting user entities' financial statements. Only for.
Service Organization Control Reports What Have We Learned? Chris Bruhn DIRECTOR, IT RISK SERVICES, BKD, LLP SAS 70 ENDS EXIT TO SSAE 16.
THE TOP FOUR BEST PRACTICES WHEN SELECTING A DALLAS DATA CENTER.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
Enabling Secure Multi-Organization Collaboration Andrew Porter IT Director, Enterprise Architecture Merck & Co., Inc.
Washington State Auditor’s Office Third Party Receipting Presented to Washington Public Ports Association June 2016 Peg Bodin, CISA.
Phone:
Tristedlearning.org trustedlearning.org. Insert School District Name Speaker’s Name Speaker’s Title School District Logo.
CORE Discussion Forum: How to Keep Your Outsourcing Contract Current
Michael Wright • Chief Security Officer • Tech Lock
Al-Ahli Commercial Bank
Enterprise-level Identity Protection
Regulatory Transparency and Efficiency in the Communications Industry in Australia Jennifer Bryant Office of Regulation Review Australia.
Discover the Secrets of ITSM Licensing
William Band, Vice President, Principal Analyst
The Scope for Continuous Assurance In Tax Compliance
Assessing the Security of the Cloud
Business Transformation
Company Overview & Strategy
Family Office Tax and Legal Structures
13th International Microinsurance Conference
Panel 2 Supervisory Apporaches on Insurtech and Regulatory Challenges
Security. Audit. Compliance.
JOB DESCRIPTIONS Transmission-Function Employees:
Microsoft Azure Launches Enterprise Product Costing Solution into the Future, into the Cloud “FACTON EPC is the modern, sustainable software solution for.
Welcome!.
IAPP/TRUSTe Symposium Privacy, Security and Regulatory Compliance
Technical Resources & Training
JOB DESCRIPTIONS Transmission-Function Employees:
MOF Update Community Design
SOFE CDS – Monday, July 16th, 2018
Presentation transcript:

Trust, Transparency: What End-Users Want from their Providers!

The Panel Ed Ferrara Principal Research Analyst Security & Risk Forrester Research

Michael Corey CEO Ntirety

Cody Griffin CPA, CITP, CISA Risk Assurance Services Partner Frost, PLLC

Peter Kujawa President - Locknet Division Locknet - A Division of EO Johnson

The Issue Our industry is built on the trusted relationship. How do we: ‑ Earn trust? ‑ Prove trust? ‑ Deal with those situations where trust is abused?

Trust How can MSPs develop trust for new customers? If trust is necessary for managed services, how can new customers ever choose safely? What are customers top concern? ‑ Data security? ‑ Compliance? ‑ Privacy? ‑ Is this true for cloud? ‑ How about managed services? How do service providers address these concerns?

Transparency What does it mean to be transparent? ‑ Security Perspective? ‑ Operations Perspective? Can MSPs provide transparency without being forced to? Should we? ‑ Market Forces? ‑ Regulatory Forces? How do customers choose a provider without transparency? What do customers want to see from their MSPs?

SLA Transparency SLAs codify trust and transparency? ‑ But do they really? ‑ What works better? What impact does this have on contract renewal?

Trust but verify! What does it mean to Trust but Verify? ‑ Qualifying through existing customers? ‑ Auditing and Assessment? Manage the relationship after the SLA is signed Ensuring their MSP does the job, and having good oversight of the MSP (by the customer)

Conclusions DON'T FORGET TO RATE THIS SESSION THROUGH OUR MSPWORLD MOBILE APP! CLICK THE SURVEY LINK WITHIN THE SESSION DESCRIPTION.