The Collaboration Conundrum Keys to Accessing, Sharing and Protecting to Your Most Critical Content
|
|
- Abel Jefferson
- 8 years ago
- Views:
Transcription
1 The Collaboration Conundrum Keys to Accessing, Sharing and Protecting to Your Most Critical Content
2 Before We Begin Choose Audio mode No Handouts Recorded Session Available Ask questions through the Q&A Instant Messaging Minimize the panel
3 Today s Speakers Joseph Kornik Publisher and Editor-in-Chief Consulting magazine Don Ulsch Managing Director, Cybersecurity and Privacy Practice PwC Tom Mataconis Senior Vice President Carlisle & Gallagher Consulting Group, Inc. Tom Rodenhauser Managing Director, Advisory Svcs Kennedy Consulting Research & Advisory Justin Somaini Chief Trust Officer Box
4 Don Ulsch, PwC Sr. Managing Director, Cybersecurity & Privacy
5 Cybersecurity is top of mind, but there s more to be done Source: 2015 US State of Cybercrime Survey (
6 Collaboration is key but with whom? We are undergoing a significant transformation Many IT and security professionals often restrict collaboration to other IT and security professionals This leads to what is sometimes called the Echo Effect Further, many executives and boards still believe that security is an IT thing Yet IT and security professionals are entrusted to protect Boards are entrusted with fiduciary responsibility The absence of meaningful collaboration creates new risk
7 Boards are concerned, but not always engaged
8 Tactical and strategic collaboration There is a tactical and strategic collaborative approach Failure to collaborate results in the potential failure of various elements of the entity Tactical collaboration is about dealing with information or cyber security issues pursuant information protection Strategic collaboration relates the above referenced security issues to the wider spectrum of risk impact: Regulatory Legal Financial Brand/Reputation
9 A cyber risk collaborative approach While not every collaboration requires integrated participation, It is vital to make sure that all bases are covered TACTICAL Security/Technology/ Information & Records/Vendor Management STRATEGIC GOVERNANCE Risk/Legal/Compliance/Audit Privacy/Financial/Board/ Economics & Geopolitical SUPPORT Marketing/Communications/ Line of Business/Distribution
10 Governance as a driver of strategic collaboration US SEC 2011 cyber risk guidance Cyber risk is an evolving element of disclosure in public filings, pre- and post-breach, for registrants In PwC s 18th Annual Global CEO Survey 2015, 87% of US chief executives said they were worried that cyberthreats could impact growth prospects, up from 69% the year before The year 2014 saw the term data breach become part of the broader public vernacular, with The New York Times devoting more than 700 articles related to data breaches, versus fewer than 125 the previous year
11 This is not insignificant As cyberbreaches become part of the vernacular, they become more visible to the board, to investors, to shareholders, and to regulators This leads to increased entity risk, which leads to fiduciary responsibility for oversight, which then leads to demands for more information and threat and risk knowledge, as well as responses and management Collaborating on these issues requires multiple perspectives Once breaches become a serious topic in the boardroom--which they are, increasingly the game changes, and so does the need for enhanced collaboration
12 Contact information Don Ulsch Sr. Managing Director PricewaterhouseCoopers LLP 125 High Street, Boston, MA Mobile Don.Ulsch@us.pwc.com This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PricewaterhouseCoopers LLP, its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it PricewaterhouseCoopers LLP. All rights reserved. In this document, PwC refers to PricewaterhouseCoopers LLP which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity. 12
13 Q&A with Joe and Tom Joseph Kornik Publisher and Editor-in-Chief Consulting magazine Tom Rodenhauser Managing Director, Advisory Services Kennedy Consulting Research & Advisory
14 Intellectual Property Tom Mataconis Senior Vice President #CGInsight
15 #CGInsight The CG Experience CG serves the largest financial services organizations in the U.S. We bring assets to the table that accelerate mobilization and add quality to our execution. We are a business and technology consulting firm focused exclusively on the financial services industry. We have 18 practice areas which address all lines of financial services. 15 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.
16 #CGInsight How We See Assets CG has been focusing on generating and protecting IP and assets that differentiate us in the market and accelerate our client work. Community Encourage practice and employee development by enlisting volunteers to develop and harvest assets Clients Go beyond client expectations by accelerating ramp up of engagements, in order to decrease costs and increase efficiency Collateral Build out each practice to have subject-specific assets that show depth and breadth of expertise across all financial areas 16 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.
17 #CGInsight Assets by Category CG-specific IP groupings used to designate security permissions within our content platform. Research & Thought Leadership Intellectual capital that is broadly distributed and can be used for external purposes 66 % Tools & Accelerators Built to help improve our services and our ability to deliver them more effectively and efficiently 23 % 10 % Critical IP Trade Secrets Intellectual assets that provides CG with a marketable competitive advantage 17 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.
18 #CGInsight Standard Classifications National and international methods of protection for various forms of IP. 1. Copyright copy right Protection over the original works of authorship, including, literary, dramatic, musical and intellectual 2. Trademark trade mark A word, name, symbol or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others 3. Trade Secret trade secret Any confidential business information which provides an enterprise a competitive edge 4. Patent pat ent Grant of a property right to the investor, issued by the U.S. Patent and Trademark Office. A patent grants the right to exclude others from making, using, offering for sale, selling of importing invention 18 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.
19 #CGInsight Aligning Assets How national classifications align to the different CG categories. Copyright Trademark Trade Secret Patent Research & Thought Leadership Tools & Accelerators Critical IP 19 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.
20 #CGInsight CG s Process for Security CG takes extensive steps to ensure security protocols are met Library Audits Specific Language in SOWs Intellectual Property Logs 20 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.
21 #CGInsight Moving Forward Three tips to help build out the right assets to enhance your firms value Asset Harvesting Asset Strategy by Practice Proactive Asset Consideration in External Materials 21 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.
22 Contact Us Carlisle & Gallagher Consulting Group, Inc. Tom Mataconis Senior Vice President E: Carlisle & Gallagher Consulting Group, Inc Granite Parkway, Suite 1000, Plano, TX O:
23 Box for Consulting Firms Transforming the way consulting firms work 23
24 Several dynamics are transforming the consulting industry Mobility Globalization Security Cloud Competition Work is done on any device, any where, in real-time Consultants and clients are highly dispersed across geographies Clients have deep concerns about data security IT organizations are managing transitions to the cloud Improved efficiency required to be competitive 24
25 Challenges faced by consulting firms with existing technologies These are hindering a consultant s ability to provide the best services Unsanctioned document sharing Consultants are collaborating with their clients via unsanctioned file sharing applications, which also do not provide for control and visibility Mobile access Difficult to access and edit docs from mobile devices or laptops when they are away from office External collaboration Outdated FTP/extranets that are clunky, costly, inefficient, and difficult to securely collaborate with clients while maintaining control and visibility Internal collaboration Difficult to securely collaborate internally between consultants and their large internal case or deal teams (i.e. managing all versions, edits, comments, etc.) 25
26 This is why over 45,000 organizations choose Box to securely share, manage, and collaborate on their content 50,000 users 10,000 users 35,000 users 600 users 17,000 users 450 users 80,000 users Many leading consulting firms are already Box customers, including 26% of the 2015 Vault Consulting 50 industry leaders 26
27 How consulting firms are transforming their organizations Helps consultants cost effectively and efficiently deliver services Next Gen Collaboration Enterprise Mobility Custom App Development Infrastructure Replacement Consultants are securely collaborating internally and externally Consultants are accessing/editing sensitive docs on the go Firms are building custom applications on Box Consultants are setting up virtual data rooms and client portals 27
28 Questions Joseph Kornik Publisher and Editor-in-Chief Consulting magazine Don Ulsch Managing Director, Cybersecurity and Privacy Practice PwC Tom Mataconis Senior Vice President Carlisle & Gallagher Consulting Group, Inc. Tom Rodenhauser Managing Director, Advisory Svcs Kennedy Consulting Research & Advisory Justin Somaini Chief Trust Officer Box
29 Thank You
Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP
Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP Today's unpredictable business climate and challenging regulatory
More informationwww.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
More informationDON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?
HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS? Gregg Sommer, CAIA Head of Operational Risk Assessments St. Louis MERCER 2015 0 CYBERSECURITY BREACHES
More informationCompliance & Internal Audit Collaboration
www.pwc.com Compliance & Internal Collaboration Developing a compliance third line of October 2015 The Society of Corporate Compliance & Ethics 14 th Annual Compliance & Ethics Institute Conference Introductions
More informationwww.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
More informationProving its worth Audience measurement and advertising effectiveness
www.pwc.co.uk/proveit Proving its worth Audience measurement and advertising effectiveness PwC s audience measurement team has developed a range of award-winning cross-platform reach and engagement metrics
More informationIT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR
IT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR PwC April 4, 2013 Agenda The challenge IT Governance defined IT Governance components Next steps Questions THE CHALLENGE The
More informationDON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?
HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? FREEMAN WOOD HEAD OF MERCER SENTINEL NORTH AMERICA GREGG SOMMER HEAD OF OPERATIONAL RISK ASSESSMENTS MERCER
More informationEscalating concern over cyber threats has CEOs warming to government collaboration
Escalating concern over cyber threats has CEOs warming to government collaboration 2015 US CEO Survey Leading in extraordinary times With cyber attacks the new normal in business, CEOs from the biggest
More informationCybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
More informationManaging intangible assets It is time to act
www.pwc.es Managing intangible assets It is time to act We add the value you need 2 Technology Page 5 1 Information management Page 4 3 Content Page 6 6 Taxation of intangible assets Page 10 4 Trademarks,
More informationCustomer effectiveness
www.pwc.com/sap Customer effectiveness PwC SAP Consulting Services Advance your ability to win, keep and deepen relationships with your customers. Are your customers satisfied? How do you know? Five leading
More informationNavigating to tomorrow: Serving clients and creating value PwC, Global Private Banking and Wealth Management Report 2013 PMAC Canada 26 November 2013
Navigating to tomorrow: Serving clients and creating value, Global Private Banking and Wealth Management Report 2013 PMAC Canada 26 November 2013 Key themes and strategic priorities 1 2 3 Pervasive regulatory
More informationConsulting in Procurement April 2015
Consulting in Procurement April 2015 Introductions Meet the team Leon Smith Director Shauna Gallagher Manager Mick Davies Senior Manager Chris Croisdale Manager 2 Background & context Objectives of the
More informationGain a competitive edge through optimized B2B file transfer
Gain a competitive edge through optimized B2B file transfer Contents: 1 Centralized systems enable business success 2 Business benefits of strategic file transfer that you can experience for yourself 2
More informationExercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
More informationThe Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
More information20+ At risk and unready in an interconnected world
At risk and unready in an interconnected world Key findings from The Global State of Information Security Survey 2015 Cyber attacks against power and utilities organizations have transitioned from theoretical
More informationThe promise and pitfalls of cyber insurance January 2016
www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped
More informationIntellectual Property How to Protect Your Discovery. Technology Transfer Office
Intellectual Property How to Protect Your Discovery Technology Transfer Office Technology Transfer In the course of doing research & development you make discoveries BloodCenter Research Foundation protects
More informationCyber Governance Preparing for the Inevitable Perimeter Breach
SAP Brief SAP Extensions SAP Regulation Management by Greenlight, Cyber Governance Edition Objectives Cyber Governance Preparing for the Inevitable Perimeter Breach Augment your preventive cybersecurity
More informationBecoming an RIA? Should You Consider Going Hybrid?
Becoming an RIA? Should You Consider Going Hybrid? Key Questions for Finding a Broker-Dealer for Your Commission Business Perspective Perspective Becoming an RIA? Should You Consider Going Hybrid? Executive
More informationCybersecurity. Considerations for the audit committee
Cybersecurity Considerations for the audit committee Insights on November 2012 governance, risk and compliance Fighting to close the gap Ernst & Young s 2012 Global Information Security Survey 2012 Global
More informationIP Considerations in Outsourcing Agreements
IP Considerations in Outsourcing Agreements Speakers: Moderator: Diana Mansour, Associate, Gardner Roberts LLP Mathew Snell, GTS Canada Senior Counsel, IBM Canada Ildiko Mehes, VP and General Counsel,
More informationThe Top Ten of Information Security - For 2015
7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.
More informationContents. Legal structures 3-4
Legal Issues 1 Contents Legal structures 3-4 1.1 Sole trader 1.2 Partnership 1.3 Limited liability partnership (LLP) 1.4 Limited liability Company 1.5 Franchise 1.6 Social enterprises Intellectual property
More informationData analytics Delivering intelligence in the moment
www.pwc.co.uk Data analytics Delivering intelligence in the moment January 2014 Our point of view Extracting insight from an organisation s data and applying it to business decisions has long been a necessary
More informationWeb development, intellectual property, e-commerce & legal issues. Presented By: Lisa Abe
Web development, intellectual property, e-commerce & legal issues Presented By: Lisa Abe October 8, 2005 Web development, intellectual property, e-commerce & legal issues 1. what intellectual property
More informationMoneyTree TM: The Russian venture capital market navigator Overview of Russian IT venture capital deals in 2011
MoneyTree TM: The Russian venture capital market navigator Overview of Russian IT venture capital deals in 2011 MoneyTree TM The Russian venture capital market navigator This is the first ever MoneyTree
More informationEl costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
More informationSources of Protection For Prohibit Information
Introduction to Corporate Information Security Law Andrea M. Matwyshyn a-matwyshyn@law.northwestern.edu Adjunct Professor of Law, Northwestern University Affiliate, Manufacturing and Technology Policy
More informationCybersecurity and Insurance Companies
Cybersecurity and Insurance Companies ACLI Forum 500 CEO Leadership Retreat Timothy J. Nagle Vice President & Chief Privacy Counsel Prudential Financial 1 May 13, 2015 What is cybersecurity? Protecting
More informationService Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard
Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,
More informationThe heart of your business*
Advisory services Technology The heart of your business* Advance your ability to win, keep and deepen relationships with your customers Customer Effectiveness *connectedthinking Are your customers satisfied?
More informationCFIR - Finance IT 2015 Cyber security September 2015
www.pwc.dk Cyber security Audit. Tax. Consulting. Our global team and credentials Our team helps organisations understand dynamic cyber challenges, adapt and respond to risks inherent to their business
More informationRETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
More informationCOMPETITION TRIGGERS BATTLE FOR TALENT AND ACQUISITIONS
2015 www.bdo.com For more information on BDO USA s service offerings to this industry vertical, please contact one of the regional service leaders below: TIM CLACKETT Los Angeles 310-557-8201 / tclackett@bdo.com
More informationDo you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape
January 2013 Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape At a glance Threats to data security both
More informationAdding up or adding value?
Get up to speed Building Better Finance Functions Adding up or adding value? Making business partnering work whatwouldyouliketochange.com Contents Adding up or adding value? 3 The strategic value of business
More informationCyber intelligence exchange in business environment : a battle for trust and data
Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building
More informationCorporate Data. Effective Data Management in an International World
Corporate Data Effective Data Management in an International World May 7, 2014 Matthew Levy Vice President, Legal & Compliance HP Autonomy Jennifer K. Mailander Associate General Counsel, Director Compliance
More informationHow To Manage Social Media Risk
www.pwc.co.uk/riskassurance Social media governance Harnessing your social media opportunity June 2014 Social media allows organisations to engage with people directly, express their corporate personality
More informationIAB internet advertising revenue report 2014 full year results
www.pwc.com www.iab.net IAB internet advertising revenue report 2014 full year results Agenda Survey methodology 2014 full year results Full year and quarterly trends Advertising formats Social media Pricing
More informationPwC s 2014 Annual Corporate Directors Survey. Trends shaping Governance and the board of the future IT and cybersecurity oversight
PwC s 2014 Annual Corporate Directors Survey Trends shaping Governance and the board of the future IT and cybersecurity oversight Table of contents The influence of emerging IT IT strategy and risk mitigation
More information4th Annual ISACA Kettle Moraine Spring Symposium
www.pwc.com 4th Annual ISACA Kettle Moraine Spring Symposium Session 2 Big Data May 14th, 2014 Session Objective Learn about governance, risks, and compliance considerations that become particularly important
More informationCyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
More informationSolving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
More informationIt s Time to Revisit your Complaint Management System. January 2014
It s Time to Revisit your Complaint Management System January 2014 Sponsored by: - 1 - DMG Consulting LLC Table of Contents Servicing Applications Make a Difference... 1 Delivering Outstanding Customer
More informationManaging the Shadow Cloud
www.pwc.com Managing the Shadow Cloud Integrating cloud governance into European Compliance programs October 2015 Shadow IT is not a new concept and organisations are well aware of the traditional risks
More informationSecurity is a Partnership
Security is a Partnership Written by J.R. Arredondo Director, Product Marketing Security is a Partnership Cover Table of Contents 1. Introduction 2 2. The Increasing Complexity of Security 3 and Compliance
More informationIssues in Software Licensing, Acquisition and
Issues in Software Licensing, Acquisition and Development July 18, 2013 David Jennings Context For Our Purposes; What s a license? Fundamentally, it is a permission to do something(s). A license conveys
More informationwww.pwc.com/modelrisk New supervisory guidance on model Overview, analysis, and next steps
www.pwc.com/modelrisk New supervisory guidance on model risk management: Overview, analysis, and next steps Features of new guidance Issued as supervisory guidance (21 pages) not as a risk bulletin. This
More informationSponsored by. A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Aggressive and Persistent: Using Frameworks to Defend Against Cyber Attacks
A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Aggressive and Persistent: Using Frameworks to Defend Against Cyber Attacks Sponsored by Copyright 2014 Harvard Business School Publishing. All rights
More informationThe increasing importance of brand and intangibles in industry April 2014
www.pwc.com.cy The increasing importance of brand and intangibles in industry Tony Hadjiloucas Partner tony.hadjiloucas@cy.pwc.com Direct line: +357 25555270 Mobile: +357 99411990 Content Introduction
More informationFunding sources throughout business lifecycle
www.pwc.ru/debt-advisory Funding sources throughout business lifecycle Dmitry Kovalev Director, Advisory Deals, Russia 18 October 2012 You have plenty of opportunities and they keep evolving as you grow
More information95% of asset management CEOs say they re very or somewhat confident about growth over the coming three years
18th Annual Global CEO Survey Redefining competition in a world without boundaries 95% of asset management CEOs say they re very or somewhat confident about growth over the coming three years 82% of asset
More informationTHE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS
THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS Read the Marsh Risk Management Research Briefing: Cyber Risks Extend Beyond Data and Privacy Exposures To access the report, visit www.marsh.com.
More informationwww.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
More informationThe Legal Pitfalls of Failing to Develop Secure Cloud Services
SESSION ID: CSV-R03 The Legal Pitfalls of Failing to Develop Secure Cloud Services Cristin Goodwin Senior Attorney, Trustworthy Computing & Regulatory Affairs Microsoft Corporation Edward McNicholas Global
More informationAuditing Standard 5- Effective and Efficient SOX Compliance
Auditing Standard 5- Effective and Efficient SOX Compliance September 6, 2007 Presented to: The Dallas Chapter of the Institute of Internal Auditors These slides are incomplete without the benefit of the
More informationInternet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President jlink@cottinghambutler.com 2 What s at Risk? $300 billion in
More informationCyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
More informationwww.pwc.com Navigating the next generation of cloud ERP Insurance
www.pwc.com Navigating the next generation of cloud ERP Insurance Agenda 1. Cloud computing 2. Cloud and the future of financial management 3. Insurance trends 4. Cloud readiness Summary 2 If you are currently
More informationPolicy for the Exploitation of University Intellectual property - Formation of New Companies
Policy for the Exploitation of University Intellectual property - Formation of New Companies 1. Introduction By law, the University owns the Intellectual property (IP) generated by its employees in the
More informationINTELLECTUAL PROPERTY RIGHTS
INTELLECTUAL PROPERTY RIGHTS WHAT IS INTELLECTUAL PROPERTY AND INTELLECTUAL PROPERTY LAW? Intellectual property law is about the exclusive right to intellectual property the exclusive right to creations
More informationChecklist. davies.com.au
IP Checklist davies.com.au Introduction Commercialising ideas and developing a business requires consideration of intellectual property laws. If you don t you might be wasting money or risking the very
More informationUK Corporate Governance Code: Raising the bar on risk management Why this is not business as usual and what you need to do to comply
www.pwc.co.uk/riskassurance UK Corporate Governance Code: Raising the bar on risk management Why this is not business as usual and what you need to do to comply September 2014 The FRC s amendments to the
More informationVENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
More informationAccess Governance. Delivering value. What you gain. Putting a project back on track for success
What you gain Risk-managed access Having a second line of defence to identify what needs to be controlled and who owns it lowers your operational costs, while taking a risk-based approach ensures greater
More informationConnecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
More information2012 CyberSecurity Watch Survey
2012 CyberSecurity Watch Survey Unknown How 24 % Bad is the Insider Threat? 51% 2007-2013 Carnegie Mellon University 2012 Carnegie Mellon University NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY
More informationBloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs
Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs *This is a sample course catalog. BBNA is in the process of moving all of our recorded content on to our new platform. Not all
More informationDue Diligence Request List: IP and IT
PLC Intellectual Property & Technology An intellectual property (IP) and information technology (IT) due diligence request list for use in connection with an M&A transaction. This request list is designed
More informationData Security: Fight Insider Threats & Protect Your Sensitive Data
Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand
More informationADVANCING SECURITY, TOGETHER ADVANCING. THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards
SYMANTEC SECURE ONE GUIDE DECEMBER 2 0 1 5 ADVANCING SECURITY, TOGETHER ADVANCING THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards Symantec Secure One Guide
More informationAccenture Risk Management. Industry Report. Life Sciences
Accenture Risk Management Industry Report Life Sciences Risk management as a source of competitive advantage and high performance in the life sciences industry Risk management that enables long-term competitive
More informationCybersecurity: A View from the Boardroom
An Executive Brief from Cisco Cybersecurity: A View from the Boardroom In the modern economy, every company runs on IT. That makes security the business of every person in the organization, from the chief
More informationGREYLOCK PEAK VENTURES LLC 125 S. Main Street Sebastopol, CA 95472 707-515-6770 Fax 413.485.7008
Item 1 Cover Page Firm Brochure (Part 2A of Form ADV) GREYLOCK PEAK VENTURES LLC 125 S. Main Street Sebastopol, CA 95472 707-515-6770 Fax 413.485.7008 March 8, 2016 This brochure provides information about
More informationPresidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,
More informationBroker-Dealer and Investment Adviser Compliance Programs
Lori A. Richards Principal, PricewaterhouseCoopers Financial Services Regulatory Practice Broker-Dealer and Investment Adviser Compliance Programs Regulatory Requirements, Common Minimum Elements, Other
More informationBeyond converged networks: driving user productivity through unified communications and collaboration.
Unified communications and collaboration solutions White paper April 2007 Beyond converged networks: driving user productivity through unified communications and collaboration. Page 2 Contents 2 Executive
More informationPractical guide to corporate governance
www.pwc.co.uk Practical guide to corporate governance Governance reporting Moving it forward April 2013 Draft Contents 1 What s the issue? 1 How to address the issue 1 Conclusion 3 Appendices 4 Appendix
More informationIncrease insight. Reduce risk. Feel confident.
Increase insight. Reduce risk. Feel confident. Define critical goals with enhanced visibility then enable security and compliance across your complex IT infrastructure. VIRTUALIZATION + CLOUD NETWORKING
More informationUser Agreement. Quality. Value. Efficiency.
User Agreement Quality. Value. Efficiency. Welcome to QVuE, the Leaders Network on Quality, Value and Efficiency website sponsored by The Medicines Company. The information provided in this Webinar Series
More informationEfficiency and transparency Jaguar Land Rover
www.pwc.co.uk Efficiency and transparency Jaguar Land Rover How Integrated Planning and Enterprise Performance Management is supporting a remarkable success story. October 2013 Industry Automotive Geography
More informationDevelopments in cybercrime and cybersecurity
Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity As customers and clients increasingly go online to do their banking with convenience, privacy and security their
More informationWeb Protection for Your Business, Customers and Data
WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision
More informationCyber and Data Risk What Keeps You Up at Night?
Legal Counsel to the Financial Services Industry Cyber and Data Risk What Keeps You Up at Night? December 10, 2014 Introduction & Overview Today s Discussion: Evolving nature of data and privacy risks
More informationManaging Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets? In the last few years, companies both in the United States and abroad have witnessed the steady growth of cyberattacks and corporate espionage.
More informationData Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
More informationwww.pwc.com PwC The Path Forward for Data Analysis and Continuous Auditing May 2011
www.pwc.com The Path Forward for Data Analysis and Continuous Auditing May 2011 Agenda What are we hearing in the market? The CA Maturity Path Where to start? What is the difference between CA & CCM? Best
More informationAchieving World-Class Security in Today s Cost-Conscious Business Climate
WHITE PAPER Achieving World-Class Security in Today s Cost-Conscious Business Climate Bringing Real InfoSec to Regular Companies 1 About Confer Confer developed the world s first cyberthreat prevention
More informationData Privacy and Cybersecurity Task Force
Data Privacy and Cybersecurity Task Force key contact Josephine Cicchetti Shareholder T: 202.965.8162 F: 202.965.8104 email We provide clients across industries with comprehensive counsel on complex, evolving,
More information1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extending beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
More informationRiskAstute. Prepared for When.
RiskAstute Prepared for When. phishing Legal Threats ISO 27001/2 IT worms FCC Operations FERC process errors AM NTSB cyber-vandalism cyber-thef Accounting viruses SEC Dodd-Frank Customer Service SOX FAA
More informationIAIS Insurance Core Principle 16
www.pwc.com Chicago Actuarial Association ORSA Readiness June 19, 2014 IAIS Insurance Core Principle 16 The supervisory regime establishes enterprise risk management requirements for solvency purposes
More informationThe basics of an Intellectual Property Program
Technology Insights The basics of an Intellectual Property Program Inside: Features of an Intellectual Property Program What is intellectual property? Role of CEOs and CFOs Foreign patents or copyrights
More informationNavigating the NIST Cybersecurity Framework
Navigating the NIST Cybersecurity Framework Explore the NIST Cybersecurity Framework and tools and processes needed for successful implementation. Abstract For federal agencies, addressing cybersecurity
More informationCyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
More informationCybercrime and Regulatory Priorities for Cybersecurity
NRS Technology and Communication Compliance Forum Cybercrime and Regulatory Priorities for Cybersecurity Copyright 2014 by K&L Gates LLP. All rights reserved. Sean P. Mahoney sean.mahoney@klgates.com K&L
More information