Protection of clients information in the age of IT ECBA Spring Conference Prague 2017 Jan Balatka, Analytic & Forensic Technology

Similar documents
Multi-factor authentication enrollment guide for Deloitte client or business partner user

MFA Enrollment Guide. Multi-Factor Authentication (MFA) Enrollment guide STAGE Environment

#DeloitteInnovation: In-Time Uncover the Potential of SAP HANA

Creating your own payment card Joost Kremers MSc CEH

Achieving effective risk management and continuous compliance with Deloitte and SAP

Cyber Security is it a boardroom issue?

#DeloitteInnovation: In-Time How efficiently do you use your SAP HANA?

Adopting SSAE 18 for SOC 1 reports

Real estate predictions 2017 What changes lie ahead?

Deloitte Discovery Caribbean & Bermuda Countries Guide

From Dabbling to Doing The Age of the Intuitive Enterprise

CFOs in a new global environment Sandy Cockrell, Deloitte

GDPR Privacy Webinar. Prioritizing Your Path towards GDPR Compliance Annika Sponselee and Nicole Vreeman 28 February 2018

The New Healthcare Economy is rising up

Spiros Angelopoulos Principal Solutions Architect ForgeRock. Debi Mohanty Senior Manager Deloitte & Touche LLP

Emerging Technologies The risks they pose to your organisations

CIPP/E CIPT. Data Protection Technologist (DPT) Training Bundle Official IAPP Training and Certification

Risk Advisory Academy Training Brochure

Cybersecurity and the role of internal audit An urgent call to action

Plan a Pragmatic Approach to the new EU Data Privacy Regulation

Deloitte Forensic Caribbean & Bermuda Countries Guide

Spread your wings Professional qualifications and development at Deloitte. What impact will you make? careers.deloitte.com

Cyber Risk Services Going beyond limits

Are we breached? Deloitte's Cyber Threat Hunting

HOMEPAGE. Start here to find content via search Login, register, or subscribe. Quick links to content

Cybersecurity Fortification Initiative (CFI) infrastructure whitepaper

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

The impact of digital transformation on industries

Cyber Espionage A proactive approach to cyber security

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

The Quest to Measure Strength of Function for Authenticators: SOFA, So Good

The Future of IT Internal Controls Automation: A Game Changer. January Risk Advisory

Deloitte Connect Frequently Asked Questions (FAQs) Deloitte users

Global Mobile Consumer Survey, US Edition Overview of results

Cyber Risk and Networked Medical Devices

Leveraging ediscovery Technology for Internal Audit 2016 Houston IIA 7th Annual Conference

Capturing insight 2018 Luxembourg Cyber Security Technology Adoption Survey November 2018

Achieving third-party reporting proficiency with SOC 2+

Smarteca Frequently Asked Questions. 8 December 2015

Título de portada NIVEL 1

Vulnerability Management. June Risk Advisory

Tax News Update: Global Edition (GTNU) User Guide

Webcast title in Verdana Regular

Anticipating the wider business impact of a cyber breach in the health care industry

WEB ANALYTICS. An Overview

Bharath Chari Cyber Risk Sr. Manager, Deloitte & Touche LLP

Proactive Security Monitoring From Security watch to the independent SOC organization. November 22 nd 2012, Marek Deml

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

Two-Factor Authentication for Q-Port

Headline Verdana Bold. Internet of Things Cyber threat intelligence

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

2015 User Satisfaction Survey Final report on OHIM s User Satisfaction Survey (USS) conducted in autumn 2015

Deloitte Foundation/FSA Faculty Consortium ASC 606 Implementation: SAB 74 Disclosures and First Quarter Adoption Rob Moynihan and Amy Park May 18,

Incident Response. We ve had a privacy breach now what?

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Preface. Operations within the EU. Serving the EU customers. Third parties operating in the EU

Making an impact that matters 2015 Global Report

Cyber Risk Services Secure. Vigilant. Resilient. Deloitte Malta, Cyber

GDPR: A QUICK OVERVIEW

Digital Directors: The board s role in the cyber world. Thio Tse Gan, Southeast Asia Leader - Cyber Security

Parks Industries LLC Privacy Policy

Common approaches to management. Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C.

Technology Security: 27 th Annual Accounting Show Seminar. Chris Fraser: Consulting Services Manager Infinity Technology Solutions September 21, 2012

Building Resilience to Denial-of-Service Attacks

Cloud Computing Overview. The Business and Technology Impact. October 2013

Two-Factor Authentication for Q-Port

Deloitte Audit and Assurance Tools

Eagles Charitable Foundation Privacy Policy

Portal Recipient Guide

22nd TF-CSIRT Meeting, Porto

Design by Privacy: A holistic approach to privacy by design

Welcome to the quick start guide for Leadin. We also have tutorial video s located in the members area for more of a in depth look at the software.

Cyber Security: Are digital doors still open?

Easy IT Audit Engagements

Financial institutions in the new regulatory environment. Giam Ei Leen, Southeast Asia Risk & Regulatory Advisory Leader, Deloitte Southeast Asia

Privacy and Data Protection Draft Personal Data Protection Bill 2018: A Summary. For Private Circulation Only August 2018.

Step 1: Open browser to navigate to the data science challenge home page

Avoiding the Pitfalls of Bring Your Own Device Policies

Risk-based security in practice Turning information into smart screening. October 2014

Kickstarter Privacy Policy - February 2017 changes

Error! No text of specified style in document.

Personal Data collection, processing, and protection - Data subject rights - data use by the company.

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response

Use EMS to protect your mobile data and mobile app

Building and Testing an Effective Incident Response Plan

Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report. November 19, 2015

Adobe Sign and 21 CFR Part 11

Autobot - IoT enabled security. For Private circulation only October Risk Advisory

The Deloitte-NASCIO Cybersecurity Study Insights from

Multi-factor authentication enrollment guide for Deloitte practitioners

Headline Verdana Bold

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

EU General Data Protection Regulation (GDPR) A Point of View for Technology Sector Organisations. For private circulation only.

Employee Departure Checklist

DATACENTER SERVICES DATACENTER

Client-Server Architecture PlusUltra beyond the Blockchain

Internet of Things (IoT) Securing the Connected Ecosystem

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Data Insight Feature Briefing Box Cloud Storage Support

Transcription:

Protection of clients information in the age of IT ECBA Spring Conference Prague 2017 Jan Balatka, Analytic & Forensic Technology

Agenda 1 Information lifecycle 2 How to protect information 3 Is it enough? 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 2

Information lifecycle 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 3

Information lifecycle simplified Creation Termination Storage Archiving Distribution Usage 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 4

But World is not so simple 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 5

Neither is life of information Creation Storage Distribution Usage 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 6

Neither is life of information cont d Usage Archiving Termination 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 7

Protection of information in different stages 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 8

Protection of information in different stages Creation Termination Storage Archiving Distribution Usage 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 9

Information Creation / Usage Obfuscation & Steganography So we have to You know Put the cat into the oven Ivánek, my dear friend, the carps have arrived. I should not drink too much of this. But I am really looking forward to drink it. Time for some traffic problems. 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 10

Information Storage Disk Decryption: Typing PIN Token Authentication: Typing PIN Inserting Token Key Selection: Typing Passphrase PassWallet Opening Data Opening: Choosing Data Data Opening 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 11

Information Distribution User Authentication: Typing Password Email Creation: Typing Message Email Encryption: Typing Password Sending Email 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 12

Information Archiving Hash Calculation: Opening Document Hash Creation Hash Uploading: Sending Hash Sending to TSA Time Stamping (TSA): Sending TS Archiving: TS Attaching Encryption & Storage 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 13

Information Termination Preparation: SW Installation Disk Connection Wipe: Wipe Process 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 14

Protection of information in different stages Creation / Usage Storage Distribution Archiving Termination Is it needed? Authentication Authorization Validity Delete is NOT wipe Encryption Channel selection Usability Go physical, really 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 15

Is it enough? 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 16

Protection of information is it enough? 2017. For information, contact Deloitte Czech Republic. Protection of clients information in the age of IT 17

Mobile Applications Deloitte CZ Newsletters l Studies l Seminars l News l Videos Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee ( DTTL ), its network of member firms, and their related entities. DTTL and each of its member firms are legally separate and independent entities. DTTL (also referred to as "Deloitte Global") does not provide services to clients. Please see www.deloitte.com/cz/about to learn more about our global network of member firms. Deloitte provides audit, consulting, legal, financial advisory, risk advisory, tax and related services to public and private clients spanning multiple industries. Deloitte serves four out of five Fortune Global 500 companies through a globally connected network of member firms in more than 150 countries and territories bringing world-class capabilities, insights, and high-quality service to address clients' most complex business challenges. To learn more about how Deloitte's approximately 244,000 professionals make an impact that matters, please connect with us on Facebook, LinkedIn, or Twitter. Deloitte Central Europe is a regional organization of entities organized under the umbrella of Deloitte Central Europe Holdings Limited, the member firm in Central Europe of Deloitte Touche Tohmatsu Limited. Services are provided by the subsidiaries and affiliates of Deloitte Central Europe Holdings Limited, which are separate and independent legal entities. The subsidiaries and affiliates of Deloitte Central Europe Holdings Limited are among the region s leading professional services firms, providing services through nearly 6,000 people in 41 offices in 18 countries. 2017. For information, contact Deloitte Czech Republic.