The Collaboration Conundrum Keys to Accessing, Sharing and Protecting to Your Most Critical Content

Size: px
Start display at page:

Download "The Collaboration Conundrum Keys to Accessing, Sharing and Protecting to Your Most Critical Content"

Transcription

1 The Collaboration Conundrum Keys to Accessing, Sharing and Protecting to Your Most Critical Content

2 Before We Begin Choose Audio mode No Handouts Recorded Session Available Ask questions through the Q&A Instant Messaging Minimize the panel

3 Today s Speakers Joseph Kornik Publisher and Editor-in-Chief Consulting magazine Don Ulsch Managing Director, Cybersecurity and Privacy Practice PwC Tom Mataconis Senior Vice President Carlisle & Gallagher Consulting Group, Inc. Tom Rodenhauser Managing Director, Advisory Svcs Kennedy Consulting Research & Advisory Justin Somaini Chief Trust Officer Box

4 Don Ulsch, PwC Sr. Managing Director, Cybersecurity & Privacy

5 Cybersecurity is top of mind, but there s more to be done Source: 2015 US State of Cybercrime Survey (

6 Collaboration is key but with whom? We are undergoing a significant transformation Many IT and security professionals often restrict collaboration to other IT and security professionals This leads to what is sometimes called the Echo Effect Further, many executives and boards still believe that security is an IT thing Yet IT and security professionals are entrusted to protect Boards are entrusted with fiduciary responsibility The absence of meaningful collaboration creates new risk

7 Boards are concerned, but not always engaged

8 Tactical and strategic collaboration There is a tactical and strategic collaborative approach Failure to collaborate results in the potential failure of various elements of the entity Tactical collaboration is about dealing with information or cyber security issues pursuant information protection Strategic collaboration relates the above referenced security issues to the wider spectrum of risk impact: Regulatory Legal Financial Brand/Reputation

9 A cyber risk collaborative approach While not every collaboration requires integrated participation, It is vital to make sure that all bases are covered TACTICAL Security/Technology/ Information & Records/Vendor Management STRATEGIC GOVERNANCE Risk/Legal/Compliance/Audit Privacy/Financial/Board/ Economics & Geopolitical SUPPORT Marketing/Communications/ Line of Business/Distribution

10 Governance as a driver of strategic collaboration US SEC 2011 cyber risk guidance Cyber risk is an evolving element of disclosure in public filings, pre- and post-breach, for registrants In PwC s 18th Annual Global CEO Survey 2015, 87% of US chief executives said they were worried that cyberthreats could impact growth prospects, up from 69% the year before The year 2014 saw the term data breach become part of the broader public vernacular, with The New York Times devoting more than 700 articles related to data breaches, versus fewer than 125 the previous year

11 This is not insignificant As cyberbreaches become part of the vernacular, they become more visible to the board, to investors, to shareholders, and to regulators This leads to increased entity risk, which leads to fiduciary responsibility for oversight, which then leads to demands for more information and threat and risk knowledge, as well as responses and management Collaborating on these issues requires multiple perspectives Once breaches become a serious topic in the boardroom--which they are, increasingly the game changes, and so does the need for enhanced collaboration

12 Contact information Don Ulsch Sr. Managing Director PricewaterhouseCoopers LLP 125 High Street, Boston, MA Mobile Don.Ulsch@us.pwc.com This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PricewaterhouseCoopers LLP, its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it PricewaterhouseCoopers LLP. All rights reserved. In this document, PwC refers to PricewaterhouseCoopers LLP which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity. 12

13 Q&A with Joe and Tom Joseph Kornik Publisher and Editor-in-Chief Consulting magazine Tom Rodenhauser Managing Director, Advisory Services Kennedy Consulting Research & Advisory

14 Intellectual Property Tom Mataconis Senior Vice President #CGInsight

15 #CGInsight The CG Experience CG serves the largest financial services organizations in the U.S. We bring assets to the table that accelerate mobilization and add quality to our execution. We are a business and technology consulting firm focused exclusively on the financial services industry. We have 18 practice areas which address all lines of financial services. 15 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

16 #CGInsight How We See Assets CG has been focusing on generating and protecting IP and assets that differentiate us in the market and accelerate our client work. Community Encourage practice and employee development by enlisting volunteers to develop and harvest assets Clients Go beyond client expectations by accelerating ramp up of engagements, in order to decrease costs and increase efficiency Collateral Build out each practice to have subject-specific assets that show depth and breadth of expertise across all financial areas 16 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

17 #CGInsight Assets by Category CG-specific IP groupings used to designate security permissions within our content platform. Research & Thought Leadership Intellectual capital that is broadly distributed and can be used for external purposes 66 % Tools & Accelerators Built to help improve our services and our ability to deliver them more effectively and efficiently 23 % 10 % Critical IP Trade Secrets Intellectual assets that provides CG with a marketable competitive advantage 17 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

18 #CGInsight Standard Classifications National and international methods of protection for various forms of IP. 1. Copyright copy right Protection over the original works of authorship, including, literary, dramatic, musical and intellectual 2. Trademark trade mark A word, name, symbol or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others 3. Trade Secret trade secret Any confidential business information which provides an enterprise a competitive edge 4. Patent pat ent Grant of a property right to the investor, issued by the U.S. Patent and Trademark Office. A patent grants the right to exclude others from making, using, offering for sale, selling of importing invention 18 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

19 #CGInsight Aligning Assets How national classifications align to the different CG categories. Copyright Trademark Trade Secret Patent Research & Thought Leadership Tools & Accelerators Critical IP 19 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

20 #CGInsight CG s Process for Security CG takes extensive steps to ensure security protocols are met Library Audits Specific Language in SOWs Intellectual Property Logs 20 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

21 #CGInsight Moving Forward Three tips to help build out the right assets to enhance your firms value Asset Harvesting Asset Strategy by Practice Proactive Asset Consideration in External Materials 21 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

22 Contact Us Carlisle & Gallagher Consulting Group, Inc. Tom Mataconis Senior Vice President E: Carlisle & Gallagher Consulting Group, Inc Granite Parkway, Suite 1000, Plano, TX O:

23 Box for Consulting Firms Transforming the way consulting firms work 23

24 Several dynamics are transforming the consulting industry Mobility Globalization Security Cloud Competition Work is done on any device, any where, in real-time Consultants and clients are highly dispersed across geographies Clients have deep concerns about data security IT organizations are managing transitions to the cloud Improved efficiency required to be competitive 24

25 Challenges faced by consulting firms with existing technologies These are hindering a consultant s ability to provide the best services Unsanctioned document sharing Consultants are collaborating with their clients via unsanctioned file sharing applications, which also do not provide for control and visibility Mobile access Difficult to access and edit docs from mobile devices or laptops when they are away from office External collaboration Outdated FTP/extranets that are clunky, costly, inefficient, and difficult to securely collaborate with clients while maintaining control and visibility Internal collaboration Difficult to securely collaborate internally between consultants and their large internal case or deal teams (i.e. managing all versions, edits, comments, etc.) 25

26 This is why over 45,000 organizations choose Box to securely share, manage, and collaborate on their content 50,000 users 10,000 users 35,000 users 600 users 17,000 users 450 users 80,000 users Many leading consulting firms are already Box customers, including 26% of the 2015 Vault Consulting 50 industry leaders 26

27 How consulting firms are transforming their organizations Helps consultants cost effectively and efficiently deliver services Next Gen Collaboration Enterprise Mobility Custom App Development Infrastructure Replacement Consultants are securely collaborating internally and externally Consultants are accessing/editing sensitive docs on the go Firms are building custom applications on Box Consultants are setting up virtual data rooms and client portals 27

28 Questions Joseph Kornik Publisher and Editor-in-Chief Consulting magazine Don Ulsch Managing Director, Cybersecurity and Privacy Practice PwC Tom Mataconis Senior Vice President Carlisle & Gallagher Consulting Group, Inc. Tom Rodenhauser Managing Director, Advisory Svcs Kennedy Consulting Research & Advisory Justin Somaini Chief Trust Officer Box

29 Thank You

Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP

Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP Today's unpredictable business climate and challenging regulatory

More information

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14

www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14 www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the

More information

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES

More information

Compliance & Internal Audit Collaboration

Compliance & Internal Audit Collaboration www.pwc.com Compliance & Internal Collaboration Developing a compliance third line of October 2015 The Society of Corporate Compliance & Ethics 14 th Annual Compliance & Ethics Institute Conference Introductions

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Proving its worth Audience measurement and advertising effectiveness

Proving its worth Audience measurement and advertising effectiveness www.pwc.co.uk/proveit Proving its worth Audience measurement and advertising effectiveness PwC s audience measurement team has developed a range of award-winning cross-platform reach and engagement metrics

More information

IT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR

IT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR IT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR PwC April 4, 2013 Agenda The challenge IT Governance defined IT Governance components Next steps Questions THE CHALLENGE The

More information

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? FREEMAN WOOD HEAD OF MERCER SENTINEL NORTH AMERICA GREGG SOMMER HEAD OF OPERATIONAL RISK ASSESSMENTS MERCER

More information

Escalating concern over cyber threats has CEOs warming to government collaboration

Escalating concern over cyber threats has CEOs warming to government collaboration Escalating concern over cyber threats has CEOs warming to government collaboration 2015 US CEO Survey Leading in extraordinary times With cyber attacks the new normal in business, CEOs from the biggest

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Managing intangible assets It is time to act

Managing intangible assets It is time to act www.pwc.es Managing intangible assets It is time to act We add the value you need 2 Technology Page 5 1 Information management Page 4 3 Content Page 6 6 Taxation of intangible assets Page 10 4 Trademarks,

More information

Customer effectiveness

Customer effectiveness www.pwc.com/sap Customer effectiveness PwC SAP Consulting Services Advance your ability to win, keep and deepen relationships with your customers. Are your customers satisfied? How do you know? Five leading

More information

Navigating to tomorrow: Serving clients and creating value PwC, Global Private Banking and Wealth Management Report 2013 PMAC Canada 26 November 2013

Navigating to tomorrow: Serving clients and creating value PwC, Global Private Banking and Wealth Management Report 2013 PMAC Canada 26 November 2013 Navigating to tomorrow: Serving clients and creating value, Global Private Banking and Wealth Management Report 2013 PMAC Canada 26 November 2013 Key themes and strategic priorities 1 2 3 Pervasive regulatory

More information

Consulting in Procurement April 2015

Consulting in Procurement April 2015 Consulting in Procurement April 2015 Introductions Meet the team Leon Smith Director Shauna Gallagher Manager Mick Davies Senior Manager Chris Croisdale Manager 2 Background & context Objectives of the

More information

Gain a competitive edge through optimized B2B file transfer

Gain a competitive edge through optimized B2B file transfer Gain a competitive edge through optimized B2B file transfer Contents: 1 Centralized systems enable business success 2 Business benefits of strategic file transfer that you can experience for yourself 2

More information

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Exercising Your Enterprise Cyber Response Crisis Management Capabilities Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

20+ At risk and unready in an interconnected world

20+ At risk and unready in an interconnected world At risk and unready in an interconnected world Key findings from The Global State of Information Security Survey 2015 Cyber attacks against power and utilities organizations have transitioned from theoretical

More information

The promise and pitfalls of cyber insurance January 2016

The promise and pitfalls of cyber insurance January 2016 www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped

More information

Intellectual Property How to Protect Your Discovery. Technology Transfer Office

Intellectual Property How to Protect Your Discovery. Technology Transfer Office Intellectual Property How to Protect Your Discovery Technology Transfer Office Technology Transfer In the course of doing research & development you make discoveries BloodCenter Research Foundation protects

More information

Cyber Governance Preparing for the Inevitable Perimeter Breach

Cyber Governance Preparing for the Inevitable Perimeter Breach SAP Brief SAP Extensions SAP Regulation Management by Greenlight, Cyber Governance Edition Objectives Cyber Governance Preparing for the Inevitable Perimeter Breach Augment your preventive cybersecurity

More information

Becoming an RIA? Should You Consider Going Hybrid?

Becoming an RIA? Should You Consider Going Hybrid? Becoming an RIA? Should You Consider Going Hybrid? Key Questions for Finding a Broker-Dealer for Your Commission Business Perspective Perspective Becoming an RIA? Should You Consider Going Hybrid? Executive

More information

Cybersecurity. Considerations for the audit committee

Cybersecurity. Considerations for the audit committee Cybersecurity Considerations for the audit committee Insights on November 2012 governance, risk and compliance Fighting to close the gap Ernst & Young s 2012 Global Information Security Survey 2012 Global

More information

IP Considerations in Outsourcing Agreements

IP Considerations in Outsourcing Agreements IP Considerations in Outsourcing Agreements Speakers: Moderator: Diana Mansour, Associate, Gardner Roberts LLP Mathew Snell, GTS Canada Senior Counsel, IBM Canada Ildiko Mehes, VP and General Counsel,

More information

The Top Ten of Information Security - For 2015

The Top Ten of Information Security - For 2015 7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.

More information

Contents. Legal structures 3-4

Contents. Legal structures 3-4 Legal Issues 1 Contents Legal structures 3-4 1.1 Sole trader 1.2 Partnership 1.3 Limited liability partnership (LLP) 1.4 Limited liability Company 1.5 Franchise 1.6 Social enterprises Intellectual property

More information

Data analytics Delivering intelligence in the moment

Data analytics Delivering intelligence in the moment www.pwc.co.uk Data analytics Delivering intelligence in the moment January 2014 Our point of view Extracting insight from an organisation s data and applying it to business decisions has long been a necessary

More information

Web development, intellectual property, e-commerce & legal issues. Presented By: Lisa Abe

Web development, intellectual property, e-commerce & legal issues. Presented By: Lisa Abe Web development, intellectual property, e-commerce & legal issues Presented By: Lisa Abe October 8, 2005 Web development, intellectual property, e-commerce & legal issues 1. what intellectual property

More information

MoneyTree TM: The Russian venture capital market navigator Overview of Russian IT venture capital deals in 2011

MoneyTree TM: The Russian venture capital market navigator Overview of Russian IT venture capital deals in 2011 MoneyTree TM: The Russian venture capital market navigator Overview of Russian IT venture capital deals in 2011 MoneyTree TM The Russian venture capital market navigator This is the first ever MoneyTree

More information

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the

More information

Sources of Protection For Prohibit Information

Sources of Protection For Prohibit Information Introduction to Corporate Information Security Law Andrea M. Matwyshyn a-matwyshyn@law.northwestern.edu Adjunct Professor of Law, Northwestern University Affiliate, Manufacturing and Technology Policy

More information

Cybersecurity and Insurance Companies

Cybersecurity and Insurance Companies Cybersecurity and Insurance Companies ACLI Forum 500 CEO Leadership Retreat Timothy J. Nagle Vice President & Chief Privacy Counsel Prudential Financial 1 May 13, 2015 What is cybersecurity? Protecting

More information

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,

More information

The heart of your business*

The heart of your business* Advisory services Technology The heart of your business* Advance your ability to win, keep and deepen relationships with your customers Customer Effectiveness *connectedthinking Are your customers satisfied?

More information

CFIR - Finance IT 2015 Cyber security September 2015

CFIR - Finance IT 2015 Cyber security September 2015 www.pwc.dk Cyber security Audit. Tax. Consulting. Our global team and credentials Our team helps organisations understand dynamic cyber challenges, adapt and respond to risks inherent to their business

More information

RETHINKING CYBER SECURITY Changing the Business Conversation

RETHINKING CYBER SECURITY Changing the Business Conversation RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.

More information

COMPETITION TRIGGERS BATTLE FOR TALENT AND ACQUISITIONS

COMPETITION TRIGGERS BATTLE FOR TALENT AND ACQUISITIONS 2015 www.bdo.com For more information on BDO USA s service offerings to this industry vertical, please contact one of the regional service leaders below: TIM CLACKETT Los Angeles 310-557-8201 / tclackett@bdo.com

More information

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape January 2013 Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape At a glance Threats to data security both

More information

Adding up or adding value?

Adding up or adding value? Get up to speed Building Better Finance Functions Adding up or adding value? Making business partnering work whatwouldyouliketochange.com Contents Adding up or adding value? 3 The strategic value of business

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Corporate Data. Effective Data Management in an International World

Corporate Data. Effective Data Management in an International World Corporate Data Effective Data Management in an International World May 7, 2014 Matthew Levy Vice President, Legal & Compliance HP Autonomy Jennifer K. Mailander Associate General Counsel, Director Compliance

More information

How To Manage Social Media Risk

How To Manage Social Media Risk www.pwc.co.uk/riskassurance Social media governance Harnessing your social media opportunity June 2014 Social media allows organisations to engage with people directly, express their corporate personality

More information

IAB internet advertising revenue report 2014 full year results

IAB internet advertising revenue report 2014 full year results www.pwc.com www.iab.net IAB internet advertising revenue report 2014 full year results Agenda Survey methodology 2014 full year results Full year and quarterly trends Advertising formats Social media Pricing

More information

PwC s 2014 Annual Corporate Directors Survey. Trends shaping Governance and the board of the future IT and cybersecurity oversight

PwC s 2014 Annual Corporate Directors Survey. Trends shaping Governance and the board of the future IT and cybersecurity oversight PwC s 2014 Annual Corporate Directors Survey Trends shaping Governance and the board of the future IT and cybersecurity oversight Table of contents The influence of emerging IT IT strategy and risk mitigation

More information

4th Annual ISACA Kettle Moraine Spring Symposium

4th Annual ISACA Kettle Moraine Spring Symposium www.pwc.com 4th Annual ISACA Kettle Moraine Spring Symposium Session 2 Big Data May 14th, 2014 Session Objective Learn about governance, risks, and compliance considerations that become particularly important

More information

Cyber Risks in the Boardroom

Cyber Risks in the Boardroom Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing

More information

Solving the Security Puzzle

Solving the Security Puzzle Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big

More information

It s Time to Revisit your Complaint Management System. January 2014

It s Time to Revisit your Complaint Management System. January 2014 It s Time to Revisit your Complaint Management System January 2014 Sponsored by: - 1 - DMG Consulting LLC Table of Contents Servicing Applications Make a Difference... 1 Delivering Outstanding Customer

More information

Managing the Shadow Cloud

Managing the Shadow Cloud www.pwc.com Managing the Shadow Cloud Integrating cloud governance into European Compliance programs October 2015 Shadow IT is not a new concept and organisations are well aware of the traditional risks

More information

Security is a Partnership

Security is a Partnership Security is a Partnership Written by J.R. Arredondo Director, Product Marketing Security is a Partnership Cover Table of Contents 1. Introduction 2 2. The Increasing Complexity of Security 3 and Compliance

More information

Issues in Software Licensing, Acquisition and

Issues in Software Licensing, Acquisition and Issues in Software Licensing, Acquisition and Development July 18, 2013 David Jennings Context For Our Purposes; What s a license? Fundamentally, it is a permission to do something(s). A license conveys

More information

www.pwc.com/modelrisk New supervisory guidance on model Overview, analysis, and next steps

www.pwc.com/modelrisk New supervisory guidance on model Overview, analysis, and next steps www.pwc.com/modelrisk New supervisory guidance on model risk management: Overview, analysis, and next steps Features of new guidance Issued as supervisory guidance (21 pages) not as a risk bulletin. This

More information

Sponsored by. A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Aggressive and Persistent: Using Frameworks to Defend Against Cyber Attacks

Sponsored by. A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Aggressive and Persistent: Using Frameworks to Defend Against Cyber Attacks A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Aggressive and Persistent: Using Frameworks to Defend Against Cyber Attacks Sponsored by Copyright 2014 Harvard Business School Publishing. All rights

More information

The increasing importance of brand and intangibles in industry April 2014

The increasing importance of brand and intangibles in industry April 2014 www.pwc.com.cy The increasing importance of brand and intangibles in industry Tony Hadjiloucas Partner tony.hadjiloucas@cy.pwc.com Direct line: +357 25555270 Mobile: +357 99411990 Content Introduction

More information

Funding sources throughout business lifecycle

Funding sources throughout business lifecycle www.pwc.ru/debt-advisory Funding sources throughout business lifecycle Dmitry Kovalev Director, Advisory Deals, Russia 18 October 2012 You have plenty of opportunities and they keep evolving as you grow

More information

95% of asset management CEOs say they re very or somewhat confident about growth over the coming three years

95% of asset management CEOs say they re very or somewhat confident about growth over the coming three years 18th Annual Global CEO Survey Redefining competition in a world without boundaries 95% of asset management CEOs say they re very or somewhat confident about growth over the coming three years 82% of asset

More information

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.

More information

www.pwc.com Cybersecurity and Privacy Hot Topics 2015

www.pwc.com Cybersecurity and Privacy Hot Topics 2015 www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets

More information

The Legal Pitfalls of Failing to Develop Secure Cloud Services

The Legal Pitfalls of Failing to Develop Secure Cloud Services SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global

More information

Auditing Standard 5- Effective and Efficient SOX Compliance

Auditing Standard 5- Effective and Efficient SOX Compliance Auditing Standard 5- Effective and Efficient SOX Compliance September 6, 2007 Presented to: The Dallas Chapter of the Institute of Internal Auditors These slides are incomplete without the benefit of the

More information

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

www.pwc.com Navigating the next generation of cloud ERP Insurance

www.pwc.com Navigating the next generation of cloud ERP Insurance www.pwc.com Navigating the next generation of cloud ERP Insurance Agenda 1. Cloud computing 2. Cloud and the future of financial management 3. Insurance trends 4. Cloud readiness Summary 2 If you are currently

More information

Policy for the Exploitation of University Intellectual property - Formation of New Companies

Policy for the Exploitation of University Intellectual property - Formation of New Companies Policy for the Exploitation of University Intellectual property - Formation of New Companies 1. Introduction By law, the University owns the Intellectual property (IP) generated by its employees in the

More information

INTELLECTUAL PROPERTY RIGHTS

INTELLECTUAL PROPERTY RIGHTS INTELLECTUAL PROPERTY RIGHTS WHAT IS INTELLECTUAL PROPERTY AND INTELLECTUAL PROPERTY LAW? Intellectual property law is about the exclusive right to intellectual property the exclusive right to creations

More information

Checklist. davies.com.au

Checklist. davies.com.au IP Checklist davies.com.au Introduction Commercialising ideas and developing a business requires consideration of intellectual property laws. If you don t you might be wasting money or risking the very

More information

UK Corporate Governance Code: Raising the bar on risk management Why this is not business as usual and what you need to do to comply

UK Corporate Governance Code: Raising the bar on risk management Why this is not business as usual and what you need to do to comply www.pwc.co.uk/riskassurance UK Corporate Governance Code: Raising the bar on risk management Why this is not business as usual and what you need to do to comply September 2014 The FRC s amendments to the

More information

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management

More information

Access Governance. Delivering value. What you gain. Putting a project back on track for success

Access Governance. Delivering value. What you gain. Putting a project back on track for success What you gain Risk-managed access Having a second line of defence to identify what needs to be controlled and who owns it lowers your operational costs, while taking a risk-based approach ensures greater

More information

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:

More information

2012 CyberSecurity Watch Survey

2012 CyberSecurity Watch Survey 2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY

More information

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs *This is a sample course catalog. BBNA is in the process of moving all of our recorded content on to our new platform. Not all

More information

Due Diligence Request List: IP and IT

Due Diligence Request List: IP and IT PLC Intellectual Property & Technology An intellectual property (IP) and information technology (IT) due diligence request list for use in connection with an M&A transaction. This request list is designed

More information

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Data Security: Fight Insider Threats & Protect Your Sensitive Data Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand

More information

ADVANCING SECURITY, TOGETHER ADVANCING. THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards

ADVANCING SECURITY, TOGETHER ADVANCING. THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards SYMANTEC SECURE ONE GUIDE DECEMBER 2 0 1 5 ADVANCING SECURITY, TOGETHER ADVANCING THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards Symantec Secure One Guide

More information

Accenture Risk Management. Industry Report. Life Sciences

Accenture Risk Management. Industry Report. Life Sciences Accenture Risk Management Industry Report Life Sciences Risk management as a source of competitive advantage and high performance in the life sciences industry Risk management that enables long-term competitive

More information

Cybersecurity: A View from the Boardroom

Cybersecurity: A View from the Boardroom An Executive Brief from Cisco Cybersecurity: A View from the Boardroom In the modern economy, every company runs on IT. That makes security the business of every person in the organization, from the chief

More information

GREYLOCK PEAK VENTURES LLC 125 S. Main Street Sebastopol, CA 95472 707-515-6770 Fax 413.485.7008

GREYLOCK PEAK VENTURES LLC 125 S. Main Street Sebastopol, CA 95472 707-515-6770 Fax 413.485.7008 Item 1 Cover Page Firm Brochure (Part 2A of Form ADV) GREYLOCK PEAK VENTURES LLC 125 S. Main Street Sebastopol, CA 95472 707-515-6770 Fax 413.485.7008 March 8, 2016 This brochure provides information about

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,

More information

Broker-Dealer and Investment Adviser Compliance Programs

Broker-Dealer and Investment Adviser Compliance Programs Lori A. Richards Principal, PricewaterhouseCoopers Financial Services Regulatory Practice Broker-Dealer and Investment Adviser Compliance Programs Regulatory Requirements, Common Minimum Elements, Other

More information

Beyond converged networks: driving user productivity through unified communications and collaboration.

Beyond converged networks: driving user productivity through unified communications and collaboration. Unified communications and collaboration solutions White paper April 2007 Beyond converged networks: driving user productivity through unified communications and collaboration. Page 2 Contents 2 Executive

More information

Practical guide to corporate governance

Practical guide to corporate governance www.pwc.co.uk Practical guide to corporate governance Governance reporting Moving it forward April 2013 Draft Contents 1 What s the issue? 1 How to address the issue 1 Conclusion 3 Appendices 4 Appendix

More information

Increase insight. Reduce risk. Feel confident.

Increase insight. Reduce risk. Feel confident. Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING

More information

User Agreement. Quality. Value. Efficiency.

User Agreement. Quality. Value. Efficiency. User Agreement Quality. Value. Efficiency. Welcome to QVuE, the Leaders Network on Quality, Value and Efficiency website sponsored by The Medicines Company. The information provided in this Webinar Series

More information

Efficiency and transparency Jaguar Land Rover

Efficiency and transparency Jaguar Land Rover www.pwc.co.uk Efficiency and transparency Jaguar Land Rover How Integrated Planning and Enterprise Performance Management is supporting a remarkable success story. October 2013 Industry Automotive Geography

More information

Developments in cybercrime and cybersecurity

Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity As customers and clients increasingly go online to do their banking with convenience, privacy and security their

More information

Web Protection for Your Business, Customers and Data

Web Protection for Your Business, Customers and Data WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision

More information

Cyber and Data Risk What Keeps You Up at Night?

Cyber and Data Risk What Keeps You Up at Night? Legal Counsel to the Financial Services Industry Cyber and Data Risk What Keeps You Up at Night? December 10, 2014 Introduction & Overview Today s Discussion: Evolving nature of data and privacy risks

More information

Managing Cyber Risk: Are Companies Safeguarding Their Assets?

Managing Cyber Risk: Are Companies Safeguarding Their Assets? Managing Cyber Risk: Are Companies Safeguarding Their Assets? In the last few years, companies both in the United States and abroad have witnessed the steady growth of cyberattacks and corporate espionage.

More information

Data Loss Prevention Program

Data Loss Prevention Program Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional

More information

www.pwc.com PwC The Path Forward for Data Analysis and Continuous Auditing May 2011

www.pwc.com PwC The Path Forward for Data Analysis and Continuous Auditing May 2011 www.pwc.com The Path Forward for Data Analysis and Continuous Auditing May 2011 Agenda What are we hearing in the market? The CA Maturity Path Where to start? What is the difference between CA & CCM? Best

More information

Achieving World-Class Security in Today s Cost-Conscious Business Climate

Achieving World-Class Security in Today s Cost-Conscious Business Climate WHITE PAPER Achieving World-Class Security in Today s Cost-Conscious Business Climate Bringing Real InfoSec to Regular Companies 1 About Confer Confer developed the world s first cyberthreat prevention

More information

Data Privacy and Cybersecurity Task Force

Data Privacy and Cybersecurity Task Force Data Privacy and Cybersecurity Task Force key contact Josephine Cicchetti Shareholder T: 202.965.8162 F: 202.965.8104 email We provide clients across industries with comprehensive counsel on complex, evolving,

More information

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic 1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

RiskAstute. Prepared for When.

RiskAstute. Prepared for When. RiskAstute Prepared for When. phishing Legal Threats ISO 27001/2 IT worms FCC Operations FERC process errors AM NTSB cyber-vandalism cyber-thef Accounting viruses SEC Dodd-Frank Customer Service SOX FAA

More information

IAIS Insurance Core Principle 16

IAIS Insurance Core Principle 16 www.pwc.com Chicago Actuarial Association ORSA Readiness June 19, 2014 IAIS Insurance Core Principle 16 The supervisory regime establishes enterprise risk management requirements for solvency purposes

More information

The basics of an Intellectual Property Program

The basics of an Intellectual Property Program Technology Insights The basics of an Intellectual Property Program Inside: Features of an Intellectual Property Program What is intellectual property? Role of CEOs and CFOs Foreign patents or copyrights

More information

Navigating the NIST Cybersecurity Framework

Navigating the NIST Cybersecurity Framework Navigating the NIST Cybersecurity Framework Explore the NIST Cybersecurity Framework and tools and processes needed for successful implementation. Abstract For federal agencies, addressing cybersecurity

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

Cybercrime and Regulatory Priorities for Cybersecurity

Cybercrime and Regulatory Priorities for Cybersecurity NRS Technology and Communication Compliance Forum Cybercrime and Regulatory Priorities for Cybersecurity Copyright 2014 by K&L Gates LLP. All rights reserved. Sean P. Mahoney sean.mahoney@klgates.com K&L

More information