The Collaboration Conundrum Keys to Accessing, Sharing and Protecting to Your Most Critical Content

Similar documents
Getting to strong Leading Practices for value-enhancing internal audit By Richard Reynolds and Abhinav Aggarwal - PricewaterhouseCoopers LLP

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

Compliance & Internal Audit Collaboration

Cyber security Building confidence in your digital future

IT GOVERNANCE WITH ROBERT GOODSELL, MANAGING DIRECTOR JOE BRUTSCHE, DIRECTOR

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

Escalating concern over cyber threats has CEOs warming to government collaboration

Cybersecurity The role of Internal Audit

Managing intangible assets It is time to act

Customer effectiveness

Consulting in Procurement April 2015

Gain a competitive edge through optimized B2B file transfer

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

20+ At risk and unready in an interconnected world

The promise and pitfalls of cyber insurance January 2016

Intellectual Property How to Protect Your Discovery. Technology Transfer Office

Cyber Governance Preparing for the Inevitable Perimeter Breach

Becoming an RIA? Should You Consider Going Hybrid?

Cybersecurity. Considerations for the audit committee

IP Considerations in Outsourcing Agreements

Data analytics Delivering intelligence in the moment

Web development, intellectual property, e-commerce & legal issues. Presented By: Lisa Abe

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Cybersecurity and Insurance Companies

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

The heart of your business*

CFIR - Finance IT 2015 Cyber security September 2015

RETHINKING CYBER SECURITY Changing the Business Conversation

COMPETITION TRIGGERS BATTLE FOR TALENT AND ACQUISITIONS

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

Adding up or adding value?

Cyber intelligence exchange in business environment : a battle for trust and data

How To Manage Social Media Risk

4th Annual ISACA Kettle Moraine Spring Symposium

Cyber Risks in the Boardroom

Solving the Security Puzzle

It s Time to Revisit your Complaint Management System. January 2014

Issues in Software Licensing, Acquisition and

New supervisory guidance on model Overview, analysis, and next steps

Sponsored by. A REPORT BY HARVARD BUSINESS REVIEW ANALYTIC SERVICES Aggressive and Persistent: Using Frameworks to Defend Against Cyber Attacks

The increasing importance of brand and intangibles in industry April 2014

Funding sources throughout business lifecycle

95% of asset management CEOs say they re very or somewhat confident about growth over the coming three years

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Cybersecurity and Privacy Hot Topics 2015

The Legal Pitfalls of Failing to Develop Secure Cloud Services

Auditing Standard 5- Effective and Efficient SOX Compliance

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Navigating the next generation of cloud ERP Insurance

Policy for the Exploitation of University Intellectual property - Formation of New Companies

INTELLECTUAL PROPERTY RIGHTS

Checklist. davies.com.au

UK Corporate Governance Code: Raising the bar on risk management Why this is not business as usual and what you need to do to comply

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

Access Governance. Delivering value. What you gain. Putting a project back on track for success

Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm

2012 CyberSecurity Watch Survey

Bloomberg BNA Professional Learning Legal Course Catalog OnDemand Programs

Due Diligence Request List: IP and IT

Data Security: Fight Insider Threats & Protect Your Sensitive Data

ADVANCING SECURITY, TOGETHER ADVANCING. THRIVE IN THE FAST- GROWTH SECURITY MARKET Security Focused Easier Achievements Faster Rewards

Accenture Risk Management. Industry Report. Life Sciences

GREYLOCK PEAK VENTURES LLC 125 S. Main Street Sebastopol, CA Fax

Presidential Summit Reveals Cybersecurity Concerns, Trends

Broker-Dealer and Investment Adviser Compliance Programs

Beyond converged networks: driving user productivity through unified communications and collaboration.

Practical guide to corporate governance

User Agreement. Quality. Value. Efficiency.

Efficiency and transparency Jaguar Land Rover

Web Protection for Your Business, Customers and Data

Data Loss Prevention Program

PwC The Path Forward for Data Analysis and Continuous Auditing May 2011

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

IAIS Insurance Core Principle 16

The basics of an Intellectual Property Program

Navigating the NIST Cybersecurity Framework

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Transcription:

The Collaboration Conundrum Keys to Accessing, Sharing and Protecting to Your Most Critical Content

Before We Begin Choose Audio mode No Handouts Recorded Session Available Ask questions through the Q&A Instant Messaging Minimize the panel

Today s Speakers Joseph Kornik Publisher and Editor-in-Chief Consulting magazine Don Ulsch Managing Director, Cybersecurity and Privacy Practice PwC Tom Mataconis Senior Vice President Carlisle & Gallagher Consulting Group, Inc. Tom Rodenhauser Managing Director, Advisory Svcs Kennedy Consulting Research & Advisory Justin Somaini Chief Trust Officer Box

Don Ulsch, PwC Sr. Managing Director, Cybersecurity & Privacy

Cybersecurity is top of mind, but there s more to be done Source: 2015 US State of Cybercrime Survey (www.pwc.com/us/cybercrime)

Collaboration is key but with whom? We are undergoing a significant transformation Many IT and security professionals often restrict collaboration to other IT and security professionals This leads to what is sometimes called the Echo Effect Further, many executives and boards still believe that security is an IT thing Yet IT and security professionals are entrusted to protect Boards are entrusted with fiduciary responsibility The absence of meaningful collaboration creates new risk

Boards are concerned, but not always engaged

Tactical and strategic collaboration There is a tactical and strategic collaborative approach Failure to collaborate results in the potential failure of various elements of the entity Tactical collaboration is about dealing with information or cyber security issues pursuant information protection Strategic collaboration relates the above referenced security issues to the wider spectrum of risk impact: Regulatory Legal Financial Brand/Reputation

A cyber risk collaborative approach While not every collaboration requires integrated participation, It is vital to make sure that all bases are covered TACTICAL Security/Technology/ Information & Records/Vendor Management STRATEGIC GOVERNANCE Risk/Legal/Compliance/Audit Privacy/Financial/Board/ Economics & Geopolitical SUPPORT Marketing/Communications/ Line of Business/Distribution

Governance as a driver of strategic collaboration US SEC 2011 cyber risk guidance Cyber risk is an evolving element of disclosure in public filings, pre- and post-breach, for registrants In PwC s 18th Annual Global CEO Survey 2015, 87% of US chief executives said they were worried that cyberthreats could impact growth prospects, up from 69% the year before The year 2014 saw the term data breach become part of the broader public vernacular, with The New York Times devoting more than 700 articles related to data breaches, versus fewer than 125 the previous year

This is not insignificant As cyberbreaches become part of the vernacular, they become more visible to the board, to investors, to shareholders, and to regulators This leads to increased entity risk, which leads to fiduciary responsibility for oversight, which then leads to demands for more information and threat and risk knowledge, as well as responses and management Collaborating on these issues requires multiple perspectives Once breaches become a serious topic in the boardroom--which they are, increasingly the game changes, and so does the need for enhanced collaboration

Contact information Don Ulsch Sr. Managing Director PricewaterhouseCoopers LLP 125 High Street, Boston, MA 02110 Mobile +1.617.634.9800 - Don.Ulsch@us.pwc.com This publication has been prepared for general guidance on matters of interest only, and does not constitute professional advice. You should not act upon the information contained in this publication without obtaining specific professional advice. No representation or warranty (express or implied) is given as to the accuracy or completeness of the information contained in this publication, and, to the extent permitted by law, PricewaterhouseCoopers LLP, its members, employees and agents do not accept or assume any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, in reliance on the information contained in this publication or for any decision based on it. 2015 PricewaterhouseCoopers LLP. All rights reserved. In this document, PwC refers to PricewaterhouseCoopers LLP which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity. 12

Q&A with Joe and Tom Joseph Kornik Publisher and Editor-in-Chief Consulting magazine Tom Rodenhauser Managing Director, Advisory Services Kennedy Consulting Research & Advisory

Intellectual Property Tom Mataconis Senior Vice President #CGInsight I @InspiredbyCG

#CGInsight I @InspiredbyCG The CG Experience CG serves the largest financial services organizations in the U.S. We bring assets to the table that accelerate mobilization and add quality to our execution. We are a business and technology consulting firm focused exclusively on the financial services industry. We have 18 practice areas which address all lines of financial services. 15 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

#CGInsight I @InspiredbyCG How We See Assets CG has been focusing on generating and protecting IP and assets that differentiate us in the market and accelerate our client work. Community Encourage practice and employee development by enlisting volunteers to develop and harvest assets Clients Go beyond client expectations by accelerating ramp up of engagements, in order to decrease costs and increase efficiency Collateral Build out each practice to have subject-specific assets that show depth and breadth of expertise across all financial areas 16 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

#CGInsight I @InspiredbyCG Assets by Category CG-specific IP groupings used to designate security permissions within our content platform. Research & Thought Leadership Intellectual capital that is broadly distributed and can be used for external purposes 66 % Tools & Accelerators Built to help improve our services and our ability to deliver them more effectively and efficiently 23 % 10 % Critical IP Trade Secrets Intellectual assets that provides CG with a marketable competitive advantage 17 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

#CGInsight I @InspiredbyCG Standard Classifications National and international methods of protection for various forms of IP. 1. Copyright copy right Protection over the original works of authorship, including, literary, dramatic, musical and intellectual 2. Trademark trade mark A word, name, symbol or device that is used in trade with goods to indicate the source of the goods and to distinguish them from the goods of others 3. Trade Secret trade secret Any confidential business information which provides an enterprise a competitive edge 4. Patent pat ent Grant of a property right to the investor, issued by the U.S. Patent and Trademark Office. A patent grants the right to exclude others from making, using, offering for sale, selling of importing invention 18 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

#CGInsight I @InspiredbyCG Aligning Assets How national classifications align to the different CG categories. Copyright Trademark Trade Secret Patent Research & Thought Leadership Tools & Accelerators Critical IP 19 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

#CGInsight I @InspiredbyCG CG s Process for Security CG takes extensive steps to ensure security protocols are met. 1 2 3 Library Audits Specific Language in SOWs Intellectual Property Logs 20 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

#CGInsight I @InspiredbyCG Moving Forward Three tips to help build out the right assets to enhance your firms value. 01 02 03 Asset Harvesting Asset Strategy by Practice Proactive Asset Consideration in External Materials 21 INSPIRED TO HELP YOU SUCCEED 2015 Carlisle & Gallagher Consulting Group, Inc., an NTT DATA Company. Proprietary and Confidential.

Contact Us Carlisle & Gallagher Consulting Group, Inc. Tom Mataconis Senior Vice President E: thomas.mataconis@cgcginc.com Carlisle & Gallagher Consulting Group, Inc. 5601 Granite Parkway, Suite 1000, Plano, TX 75024 O: 704.936.1600 insight@cgcginc.com www.carlisleandgallagher.com @InspiredbyCG

Box for Consulting Firms Transforming the way consulting firms work 23

Several dynamics are transforming the consulting industry Mobility Globalization Security Cloud Competition Work is done on any device, any where, in real-time Consultants and clients are highly dispersed across geographies Clients have deep concerns about data security IT organizations are managing transitions to the cloud Improved efficiency required to be competitive 24

Challenges faced by consulting firms with existing technologies These are hindering a consultant s ability to provide the best services Unsanctioned document sharing Consultants are collaborating with their clients via unsanctioned file sharing applications, which also do not provide for control and visibility Mobile access Difficult to access and edit docs from mobile devices or laptops when they are away from office External collaboration Outdated FTP/extranets that are clunky, costly, inefficient, and difficult to securely collaborate with clients while maintaining control and visibility Internal collaboration Difficult to securely collaborate internally between consultants and their large internal case or deal teams (i.e. managing all versions, edits, comments, etc.) 25

This is why over 45,000 organizations choose Box to securely share, manage, and collaborate on their content 50,000 users 10,000 users 35,000 users 600 users 17,000 users 450 users 80,000 users Many leading consulting firms are already Box customers, including 26% of the 2015 Vault Consulting 50 industry leaders 26

How consulting firms are transforming their organizations Helps consultants cost effectively and efficiently deliver services Next Gen Collaboration Enterprise Mobility Custom App Development Infrastructure Replacement Consultants are securely collaborating internally and externally Consultants are accessing/editing sensitive docs on the go Firms are building custom applications on Box Consultants are setting up virtual data rooms and client portals 27

Questions Joseph Kornik Publisher and Editor-in-Chief Consulting magazine Don Ulsch Managing Director, Cybersecurity and Privacy Practice PwC Tom Mataconis Senior Vice President Carlisle & Gallagher Consulting Group, Inc. Tom Rodenhauser Managing Director, Advisory Svcs Kennedy Consulting Research & Advisory Justin Somaini Chief Trust Officer Box

Thank You