How to create Revenue and Value with IT Security. It can be done. Andre Bertrand

Similar documents
Professional Diploma in Digital Marketing

DESTINATION MELBOURNE PRIVACY POLICY

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Learn How to Defend Your Online Marketplace from Unwanted Traffic

Supplier Security Assessment Questionnaire

20 Quick Tips for Improving Your Marketing Programmes

Secur User Guide

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Secure User Guide

Security Risk Management Strategy in a Mobile and Consumerised World

A strategic approach to fraud

Basic Funneling MX Verify and Redundancy. Why Sorting Solutions? Why Vircom?

On and off premises technologies Which is best for you?

Secure Frequently Asked Questions

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

How To Ensure Your Is Delivered

Reputation Metrics Troubleshooter. Share it!

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering through Your Web Application

MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Iowa Student Loan Online Privacy Statement

Fáilte Ireland Sales Academy. The Fáilte Ireland International Sales Management Programme The Fáilte Ireland Sales Excellence Programme

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

What is Prospect Analytics?

DST . Product FAQs. Thank you for using our products. DST UK

privacy and credit reporting policy.

Acceptable Use Policy

Security Policy JUNE 1, SalesNOW. Security Policy v v

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Crampton Credit Reporting Policy

MARKETING AUTOMATION BROUGHT TO YOU BY W8DATA

E-COMMERCE PROJECT PROFILE

Microsoft Exchange 2003

Small businesses: What you need to know about cyber security

Bridged Apps: specialise in the deployment of many well known apps, as well as building customer made apps, websites, and SEO.

Acceptable Use Policy

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cyber security Building confidence in your digital future

AntiSpam. Administrator Guide and Spam Manager Deployment Guide

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

DMARC and your.bank Domain. September 2015 v

Anti-Phishing Best Practices for ISPs and Mailbox Providers

Secure Your Mobile Workplace

Cyber Intelligence Workforce

Payment Card Industry Data Security Standards

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Lead nurturing: Using marketing to convert a prospect into a sale

Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Software M&A: What you need to know before buying or selling software assets

European developer & provider ensuring data protection User console: Simile Fingerprint Filter Policies and content filtering rules

Digital TV switchover: Social media

How to ensure control and security when moving to SaaS/cloud applications

Eloqua Enhanced Branding and Deliverability More s to the inbox means more opportunities and revenue.

INinbox Start-up Pack

Digital Asset Manager, Digital Curator. Cultural Informatics, Cultural/ Art ICT Manager

The UK Reputation Dividend Study

LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Security Threat Risk Assessment: the final key piece of the PIA puzzle

Internet Marketing Guide

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Chapter 6: Fundamental Cloud Security

Social Business Intelligence For Retail Industry

Assessing the strength of your security operating model

Software Solutions Digital Marketing Business Services. Marketing. What you need to know

An introduction to. A unique opportunity to unlock high-value customer acquisition at immense scale.

Information security due diligence

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

THE OPEN UNIVERSITY OF TANZANIA

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Cost Per Lead Advertising by the Numbers 10 Steps That Will Transform Your Acquisition Process By Steve Rafferty Founder/CEO ActiveProspect, Inc.

UNILEVER PRIVACY PRINCIPLES UNILEVER PRIVACY POLICY

An effective approach to preventing application fraud. Experian Fraud Analytics

MAILGUARD LIVE. Continuity. Trust the innovator to simplify cloud security

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Cyber Security for your Connected Health Device

WORKSHOP #4 CUSTOMER TARGETING (MARKETING) STRATEGY

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

2. What personal information do we collect and hold?

Security Testing for Web Applications and Network Resources. (Banking).

Deliverability Counts

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

Transcription:

How to create Revenue and Value with IT Security. It can be done. Andre Bertrand

A bit about me Head of IT Risk and Security at SEEK I live in Melbourne Background in financial, MSSP and media companies in Australia and the UK I also worked for McLaren F1 team while in the UK. For a car nut that was pretty high up there! I support Variety Children's Charity Disclaimer: These views are my own

Introduction Sometimes IT Security can be seen as a cost centre, managing risks that may or may not occur. This can lead to security being optimised for cost efficiencies making requests for further investments or resources harder. What ways can you go about to lessen the cost centre focus and begin to be seen as revenue and value adding for your company?

How to go from. To

Agenda Three ways that IT Security can add value and generate revenue Integrate and sell enhanced security/fraud protection/privacy features Adding value through repurposing your current capability Adding value through protecting digital channels and initiatives

A note before we get started Today we are talking about security activities or opportunities in addition to the main mission of protecting the organisation, customers and shareholders

Some examples of security/fraud protection/privacy features to core products

Integrate and sell enhanced security/fraud/privacy features Carsales Privacy Protect

Integrate and sell enhanced security/fraud/privacy features Akamai - Security products complimentary to main products

Integrate and sell enhanced security/fraud/privacy features Telstra - Security products complimentary to main products Network/Cloud Domain Hosting Phone Services

Integrate and sell enhanced security/fraud/privacy features GoDaddy - Domain Registrars Privacy settings option. Modern version of PO Box. Digital Physical

Integrate and sell enhanced security/fraud/privacy features How not to do it. Ashley Madison Secure Delete - Fields not removed for $19 GPS coordinates, city, state, country, weight, height, date of birth, smoke and/or like a drink, gender, ethnicity, what turns you on etc

Integrate and sell enhanced security/fraud/privacy features 5. Operate and improve over time to maintain relevance to the market 1. Look at what your company does or sells 2. Understand where there are opportunities for additional protection or enhanced services Security, fraud protection or privacy product or service add-ons seem to work where; You have scale, cost advantage and capability that your customer does not have 4. Build, buy or license new capabilities 3. Size the opportunity and costs to complete or run You serve a need such as anonymity that not all customers want or demand

Repurposing your current capability We gather huge amounts of information to find the threats and manage risks Are parts of that data useful to someone else?

Repurposing your current capability Security activity/process Beneficiary 1 Monitoring of internet proxies Knowledge of platforms use and sprawl in use useful to operations and finance in relation to Shadow IT 2 Managing third party risk Supply chain risk knowledge being of use to procurement or legal 3 Monitoring of domains and websites Knowledge of web domains useful to marketing (brand) and legal

Repurposing your current capability 4 Security activity/process Monitoring server configuration Beneficiary IT Operations looking to understand an outage and who changed what and when 5 Vulnerability Scanning IT Operations looking to understand installed applications or operating systems 6 Network monitoring Understanding of unusual traffic flows affecting network performance This will require some creative thinking around what activities and data you already have and who they could also be used by

Protect Digital Channels and Initiatives How to add real value by working with business and product owners to solve digital business and competitive opportunities

Protect Digital Channels and Initiatives What is the business measuring? Cost of customer acquisition (Sales) Customer churn rates Defects per 1000 products Revenue per customer segment Customer complaint rates Speed to market Understanding what the key business metrics are ensures that you can align your outcomes to supporting these

Protect Digital Channels and Initiatives Business problem or opportunity Our web analytics are being skewed by bot activity. How can I stop this from happening? Better Security Understanding of bot patterns and behaviour on digital assets Enables.. More accurate analytics figures leading to more accurate KPI s and product decisions

Protect Digital Channels and Initiatives Business problem or opportunity We are launching a customer support product that allows us to instant message customers and provide support. How can we ensure client confidentiality? Better Security Application of authentication, fraud detection and encryption controls Enables.. Lower support costs from customer adoption of IM support

Protect Digital Channels and Initiatives Business problem or opportunity We are having great success with our social media presence. How can I ensure that our account is secure and can t be taken over? Better Security Use of MFA, strong credentials, account recovery Enables.. Retained customer trust Strong social media sentiment

Protect Digital Channels and Initiatives Business problem or opportunity I am concerned that our platform is being used to defraud us or other customers. How can I put in place controls that balance effectiveness vs customer friction and drop off rates? Better Security Stronger authentication, fraud capabilities, user education, monitoring Enables.. Repeat customer visits and revenue Low Net Promotor Detractors scores

Protect Digital Channels and Initiatives Business problem or opportunity My website visits to sales conversion rate is being pushed down by fake enquiries. This not only affects our metrics but also creates costs and inefficiencies. What can I do to lower our false leads rate? Better Security Sales leads verification capabilities Website visit patterns Enables.. Better sales conversion rates Lower sales leads response times

Protect Digital Channels and Initiatives Business problem or opportunity We are looking to buy another company. How do we know if the Intellectual Property we are buying the company for has been compromised? Better Security Understand breaches and current capability of target company Enables.. Better market intelligence More competitive M&A deal sizing

Protect Digital Channels and Initiatives Business problem or opportunity I am concerned that competitors are scraping my platform for sales leads and price information. How can I stop or at least manage this? Better Security Bot defences, traffic patterns, app defences Enables.. More competitive position in marketplace

Protect Digital Channels and Initiatives Business problem or opportunity I send out weekly email offers to my customers. How can I be sure that it will get into inboxes and not be seen as SPAM by ISP s? Better Security Adoption of SPF, DKIM and DMARC. Vetting of email templates against SPAM filters Enables.. Higher inbox delivery rates Higher customer conversion rates Lower cost of sales

Protect Digital Channels and Initiatives Business problem or opportunity I want to ensure that rogue code is not being put into my products eg. VW Diesel scandal Better Security Unit Tests Enables.. Regulatory compliance Lower customer complaints Less legal exposure

Summary Recognise that information security has core skills and capabilities that are useful for a wide range of business and customer needs Understand what success is for your business and focus on providing value or deriving value from your current products or services Have a solid understanding of what your business Key Performance and Key Risk indicators are and use that language to measure your controls, revenue and improvements

Thanks for your time today Are there any Questions? We are Hiring. I know a website where you can find the jobs. Andre Bertrand https://au.linkedin.com/pub/andre-bertrand/2/649/bab