Building Digital Trust
|
|
|
- Marvin O’Brien’
- 10 years ago
- Views:
Transcription
1 Building Digital Trust The confidence to take risks March 2014
2 To be succesful in the digital age, trust has become the fundament to underpin your organisation and business with. - Ruud Kok, PwC Partner 2 Building Digital Trust The confidence to take risks
3 Contents 5 Our point of view 7 How to build digital trust the right way 8 Our Digital Trust Framework 20 Our experience Building Digital Trust The confidence to take risks 3
4 The new trust dynamic: Opportunity + Trust = Growth By building trust you will be able to maximise your growth potential and manage the risks in the opportunities available in the digital age. The need for trust Opportunity Social media Mobile Analytics Cloud Hyper-connectivity Digital identity Speed of change The trust dynamic that the digital age unleashes is huge embrace it or miss the next digital growth opportunity The digital age is here. The potential for you to be fast, agile and creative is as never before. Embracing the opportunities on offer is the only way to stay competitive. As your reliance on IT systems grows and they become a fundamental part of your organisation, they mustn t fail. Technology is a key player in your success. But you and your customers, shareholders and regulators need to trust it. Trust means your customers will buy your products on-line. It means they re confident you ll keep their data safe and secure. Trust means your suppliers know your systems won t fail them. And it means you have the confidence to move your business forward by embracing technology and the opportunities it has to offer. Organisations need to build trust into the fabric of their digital operation. With trust in your data and security, with resilience built into your systems, and with the knowledge that your digital transformations will succeed, you ll have the confidence to embrace your digital future, and enjoy the exponential impact it has on your growth. Growth = opportunity + trust. It s the new equation for the digital age. Let us help you make it work for your business. 4 Building Digital Trust The confidence to take risks
5 Our point of view Tap into the trust dynamics unleashed by digital. Or get left behind. We re in the decade of digital change in which only the fit will survive and thrive. And to be digitally fit, you need to be digitally trusted by customers, suppliers, in fact by all the stakeholders in your business. More than ever before, the growth of your organisation depends on your ability to embrace the new trust dynamic. Barely a week goes by without another reminder of how the power of digital technology continues to disrupt the traditional way business is done and offers innovative opportunities to create new ways of creating value. Not embracing digital opportunities is no longer an option. But acting too quickly and being unclear on your direction is dangerous and could harm your business. You need to manage risk and build trust to feel secure in the choices you make. We ve identified seven key digital developments which are already changing the face of how your business operates. They re vital to the success story of your digital business, and they re all founded on trust. Social media Businesses can understand and interact with customers in new ways and can use social media to build knowledge. Businesses with a clearly defined approach to social media and governance around its use will have an advantage. Social media interaction will increasingly form part of the trust relationship between a business and its stakeholders. Are you listening to them, engaging with them and driving the agenda to manage your reputation? Mobile smartphones offer new opportunities for businesses. Your customers and your own users are consuming information, transacting and communicating from the palm of their hand. Their mobile device has become an essential, everyday experience for them. Mobile payments will underpin the digital economy. Trust is essential for them to feel safe using it. Analytics data is everywhere, and its value to your business is on the increase. Learn to exploit data, share it, manage it and protect it or get left behind. You need to know what you can and can t do with it. And your staff must be well-versed in their data-handling responsibilities. Management need to trust the data and the analyses that are driving business decisions. Cloud by storing data and sourcing services and applications through cloud operators, you lose the sense of security of a defined physical location. Cost and convenience will drive the adoption of cloud services far faster than most businesses imagine. A cloud based internet of applications is emerging and users will switch seamlessly and unknowing between in-house and cloud based applications. Trusting providers to manage your data and services requires new approaches to managing and sourcing services. Hyper-connectivity you operate in a connected world. You share data, your systems are accessed by your trading partners, transactions flow in and out with almost no intervention. Any collaboration of this type needs trust. You can t afford to get it wrong. Digital identity The next wave of digital relies on knowing who you are dealing with. In addition, customers will want more access to, and control of, their own data their digital identity as they share their consumption data and transact on line. Emerging data protection legislation, rapidly evolving cyber security threats and issues of digital trust across international boarders will drive this to the top of the agenda. Speed of change your business is becoming increasingly dependent on technology-driven transformation programmes. Only by seeking new ways of delivering your products and services will you stay ahead of the competition and maintain a strategic edge. You need a transformation process that will deliver on business outcomes. Businesses that are confident in their ability to deliver technology enabled transformation will have a distinct advantage in this new world. Digital trust combined with a new attitude to risk will free you to unleash your potential in these areas. We ll help you develop a digital trust strategy for your business. It ll give you the confidence to make the right choices for your organisation, and drive profitable growth. Building Digital Trust The confidence to take risks 5
6 Legal The new digital trust ecosystem you re more connected than ever Environmental Global Geopolitical Customer Consumer Industry Industry Enterprise JV/ Partners Technology Regulatory Suppliers Service providers Socio-cultural Now: Connectivity and collaboration extend to all facets of business Integration with wide range of business stakeholders, competitors and trading partners, in a dynamic environment built on trust High risk, high opportunity Then: Few strands of connectivity and collaboration Integration limited to supply chain/consumer Low risk, low opportunity What does it take to succeed? We can help you develop the confidence to be a leading player in the new, expanded digital trust ecosystem. First, you need to focus on three key priorities: Get the right attention in the boardroom With digital opportunities and risks becoming so central to business strategy, boards and audit committees must have the digital expertise to set the level of risk that they are willing to accept. They must be able to ask the right questions and hold management to account. Rethink your approach to technology risk In the digital age building trust will provide the context for managing technology risk. Our Digital Trust Framework helps businesses achieve this. Managing the risk in this ever changing world needs new and more dynamic approaches based on up-to-date understanding of the situation. Businesses should develop KPI s to help them understand and measure digital trust. Develop a business strategy for the digital age What s certain is that you will need a business strategy for the digital age not a digital strategy. Your organisation will need to foster more collaboration, greater innovation and faster decision making than you ve experienced before. As part of this you will need to master building digital trust to have the confidence to embrace your digital future. Digital risk and the need to build trust should be treated as an enterprise issue for which boards need to develop a clear risk appetite to suit their specific business circumstances. Alongside this, there needs to be a clear action plan and frequent monitoring and assurance that the risks are appropriately managed. 6 Building Digital Trust The confidence to take risks
7 How to build digital trust the right way Managing risk and building trust underpins the digital agenda as digital platforms become increasingly central to the delivery of business strategy. To build trust you will need confidence in each of these five areas: Cyber security Data confidence Confidence in your security Confidence that systems are secure to protect customer and other data and that identity/privacy issues have been dealt with. Confidence in your data Confidence in the integrity of data and the ability to benefit from what it can reveal about a business. Business systems confidence Confidence in your systems Confidence that business systems have the right controls and monitoring to ensure that they do what they are supposed to, whether they are in-house systems or are delivered as cloud based services. IT Risk resilience Confidence to take risks Confidence that technology risks are understood and well managed and that digital platforms will be available when required (24/7). Transformation confidence Confidence in your digital transformation programme Confidence to embark on and deliver the next complex digital transformation programme in a way that delivers the expected benefits, on time and to budget. Building Digital Trust The confidence to take risks 7
8 Our Digital Trust Framework Cyber security Global IT IT resilience & continuity Compliance with regulation Cyber security IT Risk and Resilience Protect the opportunity Digital Enablement Business systems Business systems confidence IT Governance Digital Trust Project delivery risk Technology mega trends Transformation confidence IT processes and assets Sourcing risk Insight and data quality Data confidence No two businesses are the same. Our Digital Trust Framework gives us the flexibility to respond to the specific needs of your organisation. We ll address all the segments of the Framework to decide what help you need to protect your business and enable profitable digital growth. Whether that means developing a cyber-risk strategy, optimising your control environment or reducing your overall IT risk profile, you ll receive the independent, expert insight you need to build digital trust and succeed in the digital age. Insight and data quality Data is the lifeblood of an organisation. It enables people to understand how well things are working and to decide what to do next? Manage your data well and this can drive competitive advantage. It can improve efficiency and create transparent processes for managing data which will deliver an enhanced reputation creating the foundation of trust with your customers, suppliers and staff. Project delivery risk The volume, cost and complexity of IT projects is increasing. However, one quarter of all projects fail completely and half are delivered late or over budget. In the digital age, business success will become increasingly dependent on technology driven transformation and the speed of change increases. Business systems Businesses are becoming ever more dependent on globally integrated systems both for internal operations and for engaging with customers and suppliers. Most invest significantly in these but do not realise the promised benefits in terms of process best practice, standardisation and improved control. It is crucial that controls and security are embedded into these systems and monitored. Traditional enterprise systems will increasingly interface with cloud based web applications, introducing new risks. Cyber security Cyber attacks are accelerating at an alarming rate and businesses are not keeping pace. Governments are putting unprecedented effort into raising awareness with business. New approaches are required to deal with the evolving business and threat landscape. Breaches or leakages can be financially devastating and do significant damage to reputation. IT resilience and continuity IT services are increasingly intertwined, with a complex combination of layers of infrastructure and service and process interdependencies, including legacy systems, mobile technologies and 3rd party vendors. This complexity potentially leads to multiple and high impact IT outages resulting from the failure of a single component or process. Solutions for data storage or applications in the cloud bring new dimensions of risk. Global IT Operating a global IT system creates additional complexity and risk. Differences in local approaches and attitudes can create global system vulnerabilities. Inadequate global support can lead to high levels of downtime and reduced effectiveness. Complex global data protection legislation is increasingly a consideration for global IT. 8 Building Digital Trust The confidence to take risks
9 PwC provided a real focus on the issues, a no-nonsense approach and an ability to leverage their global experience on any given issue. In addition, they have great people on the ground. CEO, Digital TV broadcaster Compliance with regulation Often multiple compliance requirements are relevant, so a joined-up approach is essential. Otherwise, complexity can create inefficient overlapping controls or gaps that lead to non-compliance. IT governance Managing the structure and framework within which IT operates can have a critical bearing on overall corporate performance. An MIT study found that businesses with below average performance in IT governance were 25 per cent less profitable than their peers whose performance was ranked as good or above. Technology mega trends Analytics, big data, mobile, social media and cloud together represent consumerdriven forces that will impact every business and increase the need for digital trust. Having a business strategy for the digital age is important. Investments in technology can carry high risk exposure but not responding will cause loss of competitive advantage. IT processes & assets Robust and consistently applied IT processes form a fundamental part of IT hygiene. An incomplete IT asset inventory (hardware and software) can create problems for security, impair investment and result in financial and reputational damage from unlicensed software. For example, 90 per cent of all software licensing reviews carried out by PwC have identified non-compliance. Sourcing risk Cloud computing presents irresistible cost saving opportunities and a myriad of risks linked to where data is stored and how it is segregated and secured. Outsourcing often goes wrong and companies are rethinking their approach to it. Some of the worst IT disasters in recent years have been partly caused by badly managed outsourcing. Data protection considerations are forcing businesses to rethink certain offshoring arrangements. Building Digital Trust The confidence to take risks 9
10 Cyber security What does good look like? You continually monitor your risk profile. You understand what matters for the success of your business. You realise this changes as you move forward with your business. You understand in real time, the new threats within the digital landscape. And you re fully aware of the risks you re exposing the organisation to as you execute your strategic plan. You understand how digital is changing the fabric of your business, introducing new threats and changing your risk profile. How we help Cyber security confidence in your security. While cyber security risks have dramatically evolved, the approach businesses use to manage them has not kept pace. The traditional information security model one that is technology focused, compliance-based, perimeteroriented, and aimed at securing the back-office does not address the realities of today. Cyber security isn t just about technology and computers. It s about people, information, systems, processes, culture and physical surroundings. PwC You can t secure everything We help you set the right priorities. Enterprise security architecture Protect what matters Priorities Strategy, organisation and governance Threat intelligence will give you that confidence by helping you manage risks, while staying connected. We ll help you in shaping a broader strategic response to cyber risk by helping to understand current capability and putting in place a focused plan to target cyber security investment in the right places. Our specialists will help also you respond to actual cyber incidents. And they ll advise on the legal issues surrounding breaches, data privacy and protection. To target investment on what matters most we focus on the six areas outlined below: Risk Seize the advantage We help you exploit digital opportunity with confidence. Digital trust is embedded in the strategy Privacy and cyber security legal compliance Risk management and risk appetitethreat intelligence Your eyes are fully open to digital threats. Crisis Confidence in Connections You recognise boundaries have shifted: your business architecture has changed, so have the risks within your digital supply chain. The threats come from within your organisation and outside. It s not if but when We help you build an intelligenceled defence, enabling rapid detection and containment. Technology Continuity and resilience Crisis management Incident response and forensics Monitoring and detection your digital future People Their risk is your risk We help you understand and manage risk in your interconnected business ecosystem. Digital channels Partner and supplier management Robust contracts Fix the basics We help you use technology to your advantage, deriving maximum return from your technology investments. Identity and access management Information technology, operations technology and consumer technology IT security hygiene Security intelligence and analytics People matter We help you build and maintain a secure culture, where people are aware of their critical security decisions. Insider threat management People and moments that matter Security culture and awareness Cyber security services Assess Build Manage Respond 10 Building Digital Trust The confidence to take risks
11 The benefits Operate in the know Our team will help you build a strong security foundation and an agile management framework integrated with your wider business plans, so you can operate knowing your risks and opportunities. Be prepared Every organisation will be breached at some point. Understanding this will help you prepare for the worst. Our team can help you prepare, prevent and protect what matters most to you. Take control Our team will help you take control and keep you up to date on regulatory and legislative changes. Our legal experts will also help you with your data privacy and protection concerns. Feel confident Your people are important, and their actions have a direct impact on your business and its security. We ll advise you on how to create the right culture where your people instinctively do the right thing. Not all assets are equal. Information, digital transactions and smart devices continue to proliferate at an extraordinary rate. Safeguarding all at the highest level is not realistic or possible. Incidents in some areas can be troubling; others can destroy key elements of your business. Building Digital Trust The confidence to take risks 11
12 Data confidence What does good look like? You know what data is important to you and you have the confidence to exploit it for competitive advantage. You understand how to use third party data, where it works and where it doesn t. You know the impact on your data of system change. Your staff know their responsibility to your data ensuring it is right for your business needs. How we help Data confidence confidence in your data is fundamental to an efficient and agile organisation. When you exploit your data and implement good governance, it provides the basis for others to trust you and want to do business with you. We can help you to know what data you need and how good it needs to be. We can ensure that you get your data right, focussing on what s important. We can help you embed good governance and also independently test your systems and processes to ensure that your data is accurately processed and properly reported. For completeness we cover where data is stored, how long it is kept and who should have access. The result is a transparent and reliable governance process, enabling your employees and customers to make the right decisions. You have the controls and processes to know when data quality is compromised and its impact on reporting, decision making and your customers. Competitive advantage Compliance Good decision making You know what data to secure and when to get rid of it. Outcomes Insights Availability of data Governance of data Quality of data 12 Building Digital Trust The confidence to take risks
13 The benefits Peace of mind Knowing your data meets your business needs. Being systemssavvy Understanding what your systems and processes are actually doing to your data, and knowing it s right. Trusting your staff You ll be confident your employees know their role in managing your data, from capture through to destruction. Protecting the important data Our team will help you prioritise the security and protection of the data that matters for your business. Safeguarding your people Having data governance at the heart of your change management process will ensure that the role of your employees is understood and managed. Clear-headed decision-making Confidence in your data, based on good governance, to make the right decision at the right time. Changing data systems with confidence You ll prioritise changes to the way you manage and protect your data. We ll help you understand the value of your data, ensuring you focus your efforts on the data that matters. With quicker, better informed decisions, your business will be agile, remain competitive and be trusted. Building Digital Trust The confidence to take risks 13
14 Business systems confidence What does good look like? Your control environment provides you sustainable, reliable and cost-efficient management of your risks. It s efficient, effective and integrated with, underlying (ERP) and Enterprise Performance Management (EPM) systems, internet/cloud based and mobile applications. Management carries out real-time monitoring and periodic assessment of your systems, strengthening the ERP systems. Dedicated Governance, Risk and Compliance (GRC) technology provides vital support strengthening the ERP and EPM systems. You have thorough insight on performance, process adherence and compliance by continuously monitoring transactional data. How we help Business systems confidence Confidence in your systems: design, strengthen, sustain. You need an integrated and holistic approach to designing, deploying, operating and optimising your control environment. As the business system landscape changes with users moving seamlessly between in-house systems and cloud based web services and mobile applications, a comprehensive approach to business systems control becomes even more important. You ll benefit from our deep technical expertise of the business Standardisation Confidence in your systems and processes Process and control systems landscape, including a range of ERP, EPM and GRC technologies, and extensive experience in defining and deploying risk and control frameworks. This is how we ve been able to help address financial and operational risk for clients across a whole spectrum of processes and industries. Working across the entire control life-cycle, we ll apply a risk and controls lens to your processes and system design, strengthen your overall design, and help you increase the reliability and maturity of your existing control environment in a cost-effective and sustainable manner. Quality Automation Adherence Outcomes Controls culture GRC technology Control design Continuous monitoring and auditing Documentation Business systems landscape Mobile applications Internet/cloud based applications Other enterprise business systems ERP and EPM systems Integration Controls maturity 14 Building Digital Trust The confidence to take risks
15 The benefits The right focus We ll help you understand which risks really matter so you can focus your efforts in the right places. Prevention rather than detection Our team will help you focus on preventing problems upstream, so you won t have to detect and correct them downstream. Prepared for the worst We ll help you arm your people with the skills and tools they need to respond in a crisis. Demystifying technology We ll help you cut through the complexity to express risk in simple business terms. A fresh perspective We ll provide a fresh and independent point of view, benchmarking you with peers. Deep expertise Our leading experts in industry, emerging technology and digital risk will complement your existing team. Efficiency We ll help you streamline and automate your IT governance, risk and compliance activities to deliver value for money. Boards and senior management are demanding greater insight into the control and compliance culture of their organisations. With our help, you can optimise your systems control, giving you better management of risk and improved decision-making. Building Digital Trust The confidence to take risks 15
16 IT risk resilience What does good look like? Your digital risks are proactively identified, assessed, owned, managed and monitored. The information you need to make risk-aware decisions is available at the click of a button. You are well placed to mitigate and avoid high impact system outages. When IT incidents or disasters do occur, you are fully prepared and able to respond quickly. You are fully compliant with regulatory requirements that are dependent on IT. How we help IT risk resilience giving you the confidence to take risks. Businesses across sectors have recently been shaken by the impact of several high profile IT outages and glitches, eroding digital trust. IT services are increasingly intertwined with a complex combination of: layers of infrastructure, service and process interdependencies, including legacy systems, mobile technology and 3rd party vendors. This combined with fragmented understanding of the IT landscape, pressure to implement digital changes faster at lower cost and an increasing need for real time data transfers means that approaches to managing risk and resilience must adapt fast. We ll help you identify a complete set of IT risks and to design the IT governance and risk management processes to better manage them. The PwC Risk Assurance Framework provides a comprehensive and proven approach to managing this process. Being good at this will give you the confidence to embrace the next digital opportunity. Your total cost of compliance is reducing. IT risk is an implicit part of the risk landscape Risk landscape Risk Strategic commercial reputational Organisational operational Financial Compliance regulatory Risk, control and assurance continuum Approach 1 Risk strategy 2 Risk assesment 3 Design implementation management 4 Monitoring 5 Assurance 6 Outcomes Lines of defence Response st line: people, process & technolgy 2nd line: management & oversight 3rd line: internal audit 4th line: external assurance 16 Building Digital Trust The confidence to take risks
17 The benefits C-Suite insight Deep insight for the C-Suite into how to improve technology-related investment decision-making. Change delivery wellness check You will understand how effectively your IT will be able to support and deliver a business critical change programme. Management trouble-shooting advice You will know where your weaknesses are and have a plan in place to monitor the effectiveness of your governance and IT risk resilience processes. Identify and prioritise improvements Our team will help develop a strategic improvement road-map aligned with industry good practice, and benchmarked against peer organisations. Unbiased risk resilience assurance Independent assurance to the board and third parties on the effectiveness of your risk resilience environment. We ll help you make more informed decisions in managing the risks and delivering business value from your IT and technology investments. Building Digital Trust The confidence to take risks 17
18 Transformation confidence What does good look like? Technology-enabled transformation is complex but delivers strategic change to your business. You can realise the full extent of your investment and position yourself ahead of the competition. Shareholders and market analysts recognise your commitment to evolving or innovating your business and are confident in your approach to maximising value from your digital investments. Digital change agendas are delivered on time and to budget and they achieve the outcomes your stakeholders want. Your organisation is focussed on the technology changes that will provide most value to your business, so you can commit your finite resources to gamechanging solutions. How we help Transformation confidence confidence in your digital transformation program. Your business is becoming increasingly dependent on technology-driven transformation programmes. You need to take the lead in these digital change agendas. Doing so will give you the strategic edge, competitive advantage, lower operating costs, and greater agility. Executive board Steering Committee Programme Management Team Project or workstream delivery teams Implementation roll out teams/ capabilities work streams operational teams Systems integrator Business You need to focus on the right opportunities and maximise your chances of achieving them by aligning your projects and programmes appropriately. Acting as your critical friend we ll give you insight and challenge to help you make those tough decisions and support you in realising your digital future. Other partners Software vendor Digital Transformation Assurance External Audit Audit committee Internal Audit Solution assurance and deep dives Continuous assurance Gate reviews Programme assessments Because many change programs fail to deliver the business outcomes, boards are left with the dilemma of knowing they need to change but not having confidence in their ability to deliver the outcomes. 18 Building Digital Trust The confidence to take risks
19 The benefits An unbiased perspective An independent view of the key technology programme activities and deliverables. Leadership will get impartial insight into the state of your digital transformation. Focus on what matters You ll learn to concentrate on the business reason for the change from inception to delivery. Work towards a commercial outcome You ll be equipped to concentrate on the business outcomes of the project. Get a heads-up on risk You ll be forward looking, and get early warning of the key issues and risks. Expert enrichment Our experts in industry, technology and digital transformation programme delivery will enrich your existing project team. Top to bottom assurance We offer the broadest coverage of assurance, guaranteeing you a high-performance technology transformation programme from top to bottom. Effective digital transformation assurance works as the conscience of the transformation. We ll ensure everyone works together to deliver business outcomes not implement technology. Building Digital Trust The confidence to take risks 19
20 Our experience Global life sciences company Online retailer Major UK utility company Client need The client was transforming their global finance, sales and distribution operation underpinned by a digital transformation of their infrastructure, applications and technology support. Solutions delivered We provided rich assurance to the client assessing key delivery risks along their digital change. We assessed the technology design and build and advised on how to maximise their chances of delivering lasting strategic change. Value unleashed Enabled the client to avoid a number of critical failure points and keep their programme on track. Advised on management information solution and good design. Advised on the fitness-for-purpose of the technology solution and its alignment to the business needs. Client need The client recognised the need to overhaul its technology estate to position its business for the future and remain the market leader in their sector. Solutions delivered We assessed their existing IT environment and alignment to their business processes, and advised what solutions they should retain and which ones needed replacing. We helped the client assess what would be required to deliver the digital transformation that would underpin their business strategy. Value unleashed Client developed clarity over their existing digital estate. Developed a roadmap of change for the next 10 years. Enabled the client to understand the true value and opportunity of technology. Client need The company had discovered that 30% of investment was lost through poor data quality and the over-reliance on opinions to make their investment cases. It needed to improve the quality of its data and overall investment in data management. Solutions delivered We used a framework to help the organisation to identify data improvement requirements in their asset management function and project managed the delivery of accelerated data and legacy data improvement. Value unleashed Less reliance on SME judgement and more on robust, accurate and complete data. Data is now considered an essential asset to the organisation. Self-assessment score improvements. 20 Building Digital Trust The confidence to take risks
21 Global oil company Client need One of the leading global oil companies needed to overcome challenges of inaccurate management information, data duplication and data loss. Solutions delivered We assisted in developing the fundamental guiding principles for data governance in the organisation. We developed a framework which included future state process workflows and the procedures & controls for creation and maintenance of master data. Value unleashed Improved stakeholder confidence in the accuracy of their data. More robust reporting internally and externally. More coordinated data activities. Global industrial services company Client need Critical policies and procedures developed to mitigate risk were not being adhered to resulting in frequent non-compliance situations in this company. The current spreadsheet system designed to give an early warning of a problem was considered inadequate. The company had just acquired a Governance Risk and Compliance (GRC) technology and wanted advice on whether this could be used to replace the spreadsheets or whether an alternative would still be required. Solutions delivered We co-developed an end-state operating model that we aligned all implementation plans with. We developed a project plan and roles and responsibilities that ensured that all end-users played an active role in implementation. We then advised on a GRC solution to mirror the client s way of working and co-developed a prototype and training to support the new system. Online administrator Client need Clients in Europe and US had growing need for assurance on delivered online administration and accounting services delivered by our client. Solutions delivered We implemented a control framework for online administration and prepared the scope, risk assessment, defined controls objectives and controls as starting point for certification. Value unleashed Transparancy in delivered service and reliability to end-clients. Development of control framework. Readiness of control aware organisation. Value unleashed Audit costs have been reduced significantly. Senior stakeholders have a single source of information for intelligence. Common tasks are managed by one GRC system, reducing the amount of duplicated tasks. Building Digital Trust The confidence to take risks 21
22 Multi-utility company Client need The organisation had just implemented a new risk management group and other defence functions that required support in their establishment. Solutions delivered We defined the end state vision and developed training material in order to embed the function on the risk management framework into business and IT functions. Value unleashed Better engagement of the (IT) risk management function across the whole company. Improved management decision making through a more consistent assessment of risks. Development of an audit methodology to enable mitigation of key risks. UK central government department Client need We were asked to review two service suppliers who were providing security control services to a major central government department. Our role was to identify the level of compliance to the applicable HMG Information Security policy and standards and help facilitate a learning process between our client and their suppliers around the security compliance expectations. Solutions delivered We reviewed the delivery across seven countries and undertook a compliance review against the Security Policy Framework, policy, Good Practice Guides and ISO27001; where we could evidence the level of compliance throughout the security delivery environment. We also reviewed the complete risk management and security culture of both suppliers, providing the department with recommendations to improve control. Value unleashed We reviewed the bank and the danger it presented to the government. These rigorous checks not only allowed the bank to make major security efficiency improvements but also allowed the banks to continue trading and eliminated serious risks to government security. Large retail company Client need The client was confronted with the fact that their customer data was hacked via their on-line shop. This data was exposed on the internet and resulted negative publicity and harmed the good reputation of this client. Solutions delivered We provided a detailed assessment of the cybersecurity risks the client was facing by using automated tools. In addition we assisted the client to define and implement internal procedures as well as preventative tools to ensure that future risks are properly identified and managed. Value unleashed Assisted the client to get in control over their current cybersecurity risks. Enabled the client to stay in control by designing and implementing cybersecurity policies and procedures. Advised on the technology solutions to build proper preventative tooling based on client s needs. 22 Building Digital Trust The confidence to take risks
23 Contact Ruud Kok Risk Assurance managing partner Mirjam Pauw Digital Trust Driver Erwin de Horde Consumer, Industrial Products & Services Marcel Smit Consumer, Industrial Products & Services Henk Donderwinkel Consumer, Industrial Products & Services Mark Kuijper Technology Media & Telecommunications Angel Fernandez Causi Technology Media & Telecommunications Ronald Teuthof Energy, Utilities & Mining Suzanne Keijl Financial Services Stefan Verweij Financial Services Peter Nieuwenhuizen Financial Services Wim Hutten Private Companies Mark Tesselaar Private Companies Building Digital Trust The confidence to take risks 23
24 At PwC in the Netherlands over 4,300 people work together from 12 offices. PwC Netherlands helps organisations and individuals create the value they re looking for. We re a member of the PwC network of firms in 157 countries with more than 184,000 people. We re committed to delivering quality in assurance, tax and advisory services. Tell us what matters to you and find out more by visiting us at PricewaterhouseCoopers B.V. (KvK ). All rights reserved. PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see for further details.
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence
Assessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
www.pwc.nl Procurement Transformation: Towards Sourcing & Procurement Excellence
www.pwc.nl Procurement Transformation: Towards Sourcing & Procurement Excellence PwC firms provide Industry-focused Assurance, Tax and Advisory services to enhance value for their clients. More than 161.000
IT Risk Closing the Gap
IT Risk Closing the Gap Giving the Board what it needs to understand, manage and challenge IT risk PWC Contents Foreword 1 Executive summary 3 Survey findings Does the Board fully understand the impact
Accenture Technology Consulting. Clearing the Path for Business Growth
Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers
Digital Customer Experience
Digital Customer Experience Digital. Two steps ahead Digital. Two steps ahead Organizations are challenged to deliver a digital promise to their customers. The move to digital is led by customers who are
Data analytics Delivering intelligence in the moment
www.pwc.co.uk Data analytics Delivering intelligence in the moment January 2014 Our point of view Extracting insight from an organisation s data and applying it to business decisions has long been a necessary
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
Digital Strategy. How to create a successful business strategy for the digital world.
Digital Strategy How to create a successful business strategy for the digital world. Digital Strategy Overview Every business today needs a digital strategy. Products and services need to be digitally
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Security and Privacy Trends 2014
2014 Agenda Today s cyber threats 3 You could be under cyber attack now! Improve 6 Awareness of cyber threats propels improvements Expand 11 Leading practices to combat cyber threats Innovate 20 To survive,
/ WHITEPAPER / THE BIMODAL IT
/ WHITEPAPER / THE BIMODAL IT By Melbourne IT Enterprise Services IMPLEMENTING THE DYNAMIC COMPONENT FOR A DIGITAL WORLD Among the IT operational models developed over the years, the recent release of
Cyber Security: from threat to opportunity
IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known
Chief Information Security Officer
Principles Vision Purpose Statement Chief Information Security Officer healthalliance Purpose, Vision and Principles healthalliance provides shared services to benefit NZ health organisations. We will
How To Manage Social Media Risk
www.pwc.co.uk/riskassurance Social media governance Harnessing your social media opportunity June 2014 Social media allows organisations to engage with people directly, express their corporate personality
Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
Government Procurement Service
www.pwc.co.uk Government Procurement Service PwC and the G-Cloud: knowledge, experience, value V1.0 PwC Service Definition 9: G-Cloud Cyber Security Design and Assurance 06 October 2015 www.pwc.co.uk Table
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
www.pwc.com Navigating the next generation of cloud ERP Insurance
www.pwc.com Navigating the next generation of cloud ERP Insurance Agenda 1. Cloud computing 2. Cloud and the future of financial management 3. Insurance trends 4. Cloud readiness Summary 2 If you are currently
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY
CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes
Middlesbrough Manager Competency Framework. Behaviours Business Skills Middlesbrough Manager
Middlesbrough Manager Competency Framework + = Behaviours Business Skills Middlesbrough Manager Middlesbrough Manager Competency Framework Background Middlesbrough Council is going through significant
See what cloud can do for you.
See what cloud can do for you. Uncomplicating cloud business Table of contents Introduction 3 Why cloud is relevant for your business? 4 What is changing? 4 Why organizations are moving to cloud 5 What
Smart Security. Smart Compliance.
Smart Security. Smart Compliance. SRM are dedicated to helping our clients stay safe in the information environment. With a wide range of knowledge and practical experience, our consultants are ready to
Balance collections with retention for each customer. Decision Analytics for debt management in telecommunications
Balance collections with retention for each customer Decision Analytics for debt management in telecommunications Debt management for telecommunications The dynamic telecommunications market is seeing
Enterprise Mobility Empowered by Logicalis / Cisco / Citrix
1 The vitality of your business depends on enterprise mobility. The way we work has changed. So has the way your workers work. Mobile technology now touches almost every aspect of our daily lives. From
The IT Strategic Plan
The IT Strategic Plan for the University of Oxford, 2013-2018 REVISED AND REISSUED, OCTOBER 2015 Contents IT Strategic Plan: Vision... 2 The IT Strategic Plan... 2 IT Strategic Plan: Principles and Assumptions...
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
How to leverage SAP HANA for fast ROI and business advantage 5 STEPS. to success. with SAP HANA. Unleashing the value of HANA
How to leverage SAP HANA for fast ROI and business advantage 5 STEPS to success with SAP HANA Unleashing the value of HANA 5 steps to success with SAP HANA How to leverage SAP HANA for fast ROI and business
Cyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
Business Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
Understanding the impact of the connected revolution. Vodafone Power to you
Understanding the impact of the connected revolution Vodafone Power to you 02 Introduction With competitive pressures intensifying and the pace of innovation accelerating, recognising key trends, understanding
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION.
ARCHITECTURE SERVICES. G-CLOUD SERVICE DEFINITION. Table of contents 1 Introduction...3 2 Architecture Services...4 2.1 Enterprise Architecture Services...5 2.2 Solution Architecture Services...6 2.3 Service
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
BRIDGE. the gaps between IT, cloud service providers, and the business. IT service management for the cloud. Business white paper
BRIDGE the gaps between IT, cloud service providers, and the business. IT service management for the cloud Business white paper Executive summary Today, with more and more cloud services materializing,
How To Transform Insurance Through Digital Transformation
Digital transformation can help you tame the perfect storm. The digital future for insurance. Following the 2008 financial crisis, the insurance sector has faced tighter regulation, which has made it harder
Overview. Introduction. Purpose. Goal. Perspectives (of our goal) Strategic Direction. Connected
2 South Australia Connected Introduction Government is in the connections business. Everything we do ultimately comes down to better connecting the people of South Australia with the things they want and
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
Customer effectiveness
www.pwc.com/sap Customer effectiveness PwC SAP Consulting Services Advance your ability to win, keep and deepen relationships with your customers. Are your customers satisfied? How do you know? Five leading
Effective risk management
Effective risk management Our holistic and disciplined risk management program is designed to mitigate risks at all levels of our business in order to protect our clients interests. 2 Vanguard > Effective
Digital Strategy. Digital Strategy. 2015 CGI IT UK Ltd. Digital Innovation. Enablement Services
Digital Strategy Digital Strategy Digital Innovation Enablement Services 2015 CGI IT UK Ltd. Contents Digital strategy overview Business drivers Anatomy of a solution Digital strategy in practice Delivery
Connect Renfrewshire
How the council will use its information and technology assets to achieve successful change Contents Strategy Context 2 Digital Delivery and Citizen Engagement 4 Operational Excellence and Transformation
IT Governance Regulatory. P.K.Patel AGM, MoF
IT Governance Regulatory Perspective P.K.Patel AGM, MoF Agenda What is IT Governance? Aspects of IT Governance What banks should consider before implementing these aspects? What banks should do for implementation
Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified.
Asset management Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified. Data is about more than numbers. It tells
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Unleashing the power of innovation
How the role of innovation within the business and the way companies innovate are being transformed. Unleashing the power of innovation www.pwc.com 2 Unleashing the power of innovation Gauging changing
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Regulatory Compliance Management for Energy and Utilities
Regulatory Compliance Management for Energy and Utilities The Energy and Utility (E&U) sector is transforming as enterprises are looking for ways to replace aging infrastructure and create clean, sustainable
BBC Technology Strategy
BBC Technology Strategy Issued: January 2010 For more information contact: [email protected] Copyright 2010 BBC All Rights Reserved TECHNOLOGY STRATEGY Introduction This paper defines the BBC s
Access Governance. Delivering value. What you gain. Putting a project back on track for success
What you gain Risk-managed access Having a second line of defence to identify what needs to be controlled and who owns it lowers your operational costs, while taking a risk-based approach ensures greater
A strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
Breaking Down the Insurance Silos
Breaking Down the Insurance Silos Improving Performance through Increased Collaboration Insurers that cannot model business scenarios quickly and accurately to allow them to plan effectively for the future
Tapping the benefits of business analytics and optimization
IBM Sales and Distribution Chemicals and Petroleum White Paper Tapping the benefits of business analytics and optimization A rich source of intelligence for the chemicals and petroleum industries 2 Tapping
Better Operational Agility. For more flexible, resilient and secure communications. Vodafone Power to you
Better Operational Agility For more flexible, resilient and secure communications Vodafone Power to you 02 We needed a way to help grow our 0.5% market share. The leader was at 95% so the solution needed
White paper: Information Management. Information is a strategic business asset are you managing it as such?
White paper: Management Tieto 2013 is a strategic business asset are you managing it as such? White paper: Management Tieto 2013 Management the right decisions and actions at the right time based on correct
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
White Paper March 2009. Government performance management Set goals, drive accountability and improve outcomes
White Paper March 2009 Government performance management Set goals, drive accountability and improve outcomes 2 Contents 3 Business problems Why performance management? 4 Business drivers 6 The solution
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
CA Enterprise Mobility Management MSO
SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.
The promise and pitfalls of cyber insurance January 2016
www.pwc.com/us/insurance The promise and pitfalls of cyber insurance January 2016 2 top issues The promise and pitfalls of cyber insurance Cyber insurance is a potentially huge but still largely untapped
the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group
the evolving governance Model for CYBERSECURITY RISK By Gary owen, Director, Promontory Financial Group 54 Banking PersPective Quarter 2, 2014 Responsibility for the oversight of information security and
SAP ERP FINANCIALS ENABLING FINANCIAL EXCELLENCE. SAP Solution Overview SAP Business Suite
SAP Solution Overview SAP Business Suite SAP ERP FINANCIALS ENABLING FINANCIAL EXCELLENCE ESSENTIAL ENTERPRISE BUSINESS STRATEGY PROVIDING A SOLID FOUNDATION FOR ENTERPRISE FINANCIAL MANAGEMENT 2 Even
The heart of your business*
Advisory services Technology The heart of your business* Advance your ability to win, keep and deepen relationships with your customers Customer Effectiveness *connectedthinking Are your customers satisfied?
Tech-Clarity Insight: Top 5 Misconceptions about Innovation Management Software
Tech-Clarity Insight: Top 5 Misconceptions about Innovation Management Software Busting Myths to Improve Innovation, Time to Market, and Profitability Tech-Clarity, Inc. 2013. Table of Contents Executive
How To Manage Risk With Sas
SOLUTION OVERVIEW SAS Solutions for Enterprise Risk Management A holistic view of risk of risk and exposures for better risk management Overview The principal goal of any financial institution is to generate
treasury risk management
Governance, Concise guide Risk to and Compliance treasury risk management KPMG is a leading provider of professional services including audit, tax and advisory. KPMG in Australia has over 5000 partners
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Efficiency and transparency Jaguar Land Rover
www.pwc.co.uk Efficiency and transparency Jaguar Land Rover How Integrated Planning and Enterprise Performance Management is supporting a remarkable success story. October 2013 Industry Automotive Geography
The National Commission of Audit
CA Technologies submission to The National Commission of Audit November, 2013 Kristen Bresch CA Technologies Executive Summary CA Technologies is pleased to present the National Commission of Audit the
WHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective
WHITE PAPER OCTOBER 2014 Unified Monitoring A Business Perspective 2 WHITE PAPER: UNIFIED MONITORING ca.com Table of Contents Introduction 3 Section 1: Today s Emerging Computing Environments 4 Section
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
MANAGING DIGITAL CONTINUITY
MANAGING DIGITAL CONTINUITY Project Name Digital Continuity Project DRAFT FOR CONSULTATION Date: November 2009 Page 1 of 56 Contents Introduction... 4 What is this Guidance about?... 4 Who is this guidance
White Paper. Growing your business with APIs.
White Paper Growing your business with APIs. Mobile and digital technologies have changed the way we live. Consumers are doing business with all kinds of companies via apps and mobile devices. We expect
Technology Strategy April 2014
Technology Strategy April 2014 Contents Overview 1 Our environment 1 Why change? 2 Our vision for technology what success looks like 3 Our approach 7 Transformation shifts how will we know we have been
Explosive Growth Is No Accident: Driving Digital Transformation in the Insurance Industry
Explosive Growth Is No Accident: Driving Digital Transformation in the Insurance Industry By Mike Sarantopoulos, SVP, Insurance Practice, NTT DATA, Inc. and David Liliedahl, VP, Life & Annuity Portfolio,
Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft
Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security
How To Get More Out Of The Cloud
BUILD THE BUSINESS CASE Justifying the Investment in Enterprise-Grade Architecture table of contents + Growing Demand.... 1.... 2.... 3.... 4... 5 A TechTarget White Paper brought to you by There isn t
A FUTURE IN THE CLOUD
WELCOME TO THE FUTURE OF GLOBAL SOURCING Over the past decade, our work and relationships with business and IT leaders have offered us a unique perspective on the growing influence of technology on business,
Secure by design: taking a strategic approach to cybersecurity
Secure by design: taking a strategic approach to cybersecurity The cybersecurity market is overly focused on auditing policy compliance and performing vulnerability testing when the level of business risk
Embracing CHANGE as a Competitive Advantage
Web Intelligence Content Management TOGETHER System WE CAN Embracing CHANGE as a Competitive Advantage October 2011 V1 Intelligence TOGETHER WE CAN Agile Business Transformation Embracing CHANGE as a Competitive
Improving Financial Advisor Productivity through Automation
Wealth Managment the way we see it Improving Financial Advisor Productivity through Automation How wealth management firms are embracing change by developing next generation advisor platforms Contents
SERVICES. Designing, deploying and supporting world class communications solutions.
Designing, deploying and supporting world class communications solutions. DESIGN Expertise, technologies, tools and ideas Business environments, regulation, expansion and obsolescence are drivers that
CIC Audit Review: Experian Data Quality Enterprise Integrations. Guidance for maximising your investment in enterprise applications
CIC Audit Review: Experian Data Quality Enterprise Integrations Guidance for maximising your investment in enterprise applications February 2014 Table of contents 1. Challenge Overview 03 1.1 Experian
