SlideShare ist ein Scribd-Unternehmen logo
1 von 18
© 2016 BlackBerry. All Rights Reserved. 1
1
File Sharing Use Cases in Financial Services
Jeff Holleran
Vice President, Corporate Strategy
July, 2017
© 2016 BlackBerry. All Rights Reserved. 2
2
Agenda
 Secure File Sharing in Financial Services
 Financial Services Use Cases
 Next Steps
Secure File Sharing in Financial Services
© 2016 BlackBerry. All Rights Reserved. 4
4
Financial Services: Key File Security Drivers
 Regulations - Multiple Requirements:
 Data Security and Encryption
 Strong Authentication and User Management
 Protection of Customer Data
 Chain of Custody and Compliance Reporting
 DLP Support
 Intellectual Property Protection
 Internal Technology and Systems
 Management and Maintenance of Client IP
 Corporate Governance and Confidentiality
 Mergers and Acquisitions
 Executive-Level Communications
 Maintenance of Mandated Internal Business Firewalls
 Threat Intelligence Sharing
© 2016 BlackBerry. All Rights Reserved. 5
5
Regulatory Requirements
NYDFS 500 GLBA/ FFIEC PCI DSS GDPR
Protection of Customer Info X X X X
Encryption X X X X
Access Controls X X X X
Compliance Logging and Reporting X X X X
Oversight of External Users X X X X
Incident Monitoring and Reporting X X X
Section 500.15 Encryption of Nonpublic Information.
(a) As part of its cybersecurity program, based on its Risk Assessment, each Covered Entity shall implement
controls, including encryption, to protect Nonpublic Information held or transmitted by the Covered Entity both
in transit over external networks and at rest.
© 2016 BlackBerry. All Rights Reserved. 6
6
Best-Practices Security Standards
 ISO/IEC 27001 Certification
 ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring,
reviewing, maintaining and improving an information security management system."
 SOC2 Type 2 external audits against AICPA auditing standards
 A SOC 2 report helps to address third-party risk concerns by evaluating internal controls, policies, and
procedures that directly relate to the security of a system at a service organization.
 FIPS 140-2
 U.S. government (NIST) computer security standard used to approve cryptographic modules.
Financial Services firms and their technology partners should conform to the following standards:
The following standards provide best-practices security benchmarks for technology providers:
 US DoD ITAR & DFARS Compliance (NIST 800-53 and NIST 800-171)
 US HIPAA compliance and reporting
 UK Cyber Essentials Standards
© 2016 BlackBerry. All Rights Reserved. 7
7
File Sharing Throughout the FS Enterprise
CEO
Board of
Directors
• SEC filings
• Tax/audit filings
• SOX reports
• Placements
• Board reports
CIO /
CTO
Investment
Banking
Human
Resources
• Compliance reports:
GLBA, SOX, PCI,
etc.
• Contracts
• Proprietary systems
• Compensation
• Bonus data
• Employee equity grants
CFO
Market
Research
Legal
Real Estate
Services
• Contracts
• Corp dev/M&A
• eDiscovery
• Outside counsel
Business
Partners
Investors
Banking
Customers
M&A
Parties
Banking
Services
• Board documents
• Strategy plans
EXTERNAL
• Buy-side research
• Sell-side research
• Advisory Services
• M&A deal materials
• Mortgage documents
• Ecological assessment
documents
• Property debt documents
• Loans, Letter of Credit
• Performance report
• Wealth Management/
Investment fund
performance data
Regulators
Outsourced
Operations
Industry
Groups
Outside
Attorneys
Risk
Assessment
Sharing
© 2016 BlackBerry. All Rights Reserved. 8
8
File Sharing Today: Major Risk Factors
The average organization has
13 file sync applications in use – most
not approved or managed by IT
13 76% of organizations send traffic
to Dropbox (2GB/mo. on average)
76%
Source: Netskope, Palo Alto Networks, Gartner
Of non-sanctioned cloud
services used in FS firms are
cloud storage and webmail apps
40% Of cloud DLP violations at FS
Firms involve Webmail, Cloud
Storage or Collaboration Apps
72%
© 2016 BlackBerry. All Rights Reserved. 9
Secure Enterprise File Sharing Requirements
Security & Compliance Productivity
 File Encryption
 Encryption at rest, in transit and in use
 FIPS 140-2 certified crypto-modules
 File Access and Usage Controls
 Only Authorized Users May Access Data and Files
 Restrict File Redistribution
 DRM, watermarking and online-only mode
 Administrative Controls
 Fine-Grained User and Policy Management
 Ability to Revoke or Change Access Automatically or
Manually
 Logging and Auditing
 All Data Access Events Must Be Captured and Logged
 Flexible Compliance Reporting
 DLP Integration and Support
 Collaborative Workspaces
 Accessible via browser and apps
 Cross-Platform Support
 Platform Agnostic
 Secure Access, Productivity and Synchronization
 Extend and Secure Existing Repositories
 “Protect-in-Place”
 Provide Access and Sharing W/O File Migration
 Support Existing Workflows & Systems
 Robust Integration Architecture
 Development API’s and SDK’s
Financial Services
Case Studies
© 2016 BlackBerry. All Rights Reserved. 11
11
Common Financial Services Requirements
SHARING TO AGENTS / MERCHANTS
EXTERNAL AUDIT REPORTING
M&A / COMMERCIAL TRANSACTIONS
LOAN / CREDIT INFORMATION
Remote access / mobile productivity
• Control sensitive / regulated information shared to agents
• Capture data from remote locations on mobile devices
• Securely synced folders
Securely collaborate with 3rd parties
• Sharing spreadsheets, models, numbers, etc.
• Control how files are used, who is accessing them, when and where
• Revoke access to documents after deal
Regulated, non-public information
• Share confidential, non-public documents with outside auditors
• Compliance regulations
Protecting customer statements (PII)
• Collaborating on loan / credit information throughout lifecycle
• Providing regulated statements, capital calls, tax documents
LITIGATION / TRAIL CASES
Sharing to outside counsel
• Simple and secure sharing of files (some large – 10 GB)
• Prevent forwarding of information and revoke access after trial
© 2016 BlackBerry. All Rights Reserved. 12
12
USERSBUSINESS NEED BENEFITS
Requirement 3.4: All credit
card data needs to be encrypted or
rendered unreadable.
• PCI certification on portfolio basis
• Already adopted for secure
collaboration  Easy to apply to
PCI
• Executives (SVP / VP)
• Managers
• Customer representatives
• Anyone who touches customer
credit card information
• Persistent AES-256 encryption
• Encryption and controls
travel with the file
• All file activities are fully tracked for
auditability
Case Study: PCI DSS Compliance -
Protecting Customer Personal Data
Customer Overview
American financial services company operating in
business banking, retail banking and wealth management
Payment Card
Industry Data
Security Standard
(PCI DSS)
© 2016 BlackBerry. All Rights Reserved. 13
13
Case Study: Agent Network Regulatory Audit
USERSBUSINESS NEED BENEFITS
 Each of the 2,500 agencies must
undergo regulatory audit every 18
months
 Requires collection of policies
from 10-20 customers, approx. 20
documents per customer
 No secure standard process for
sharing files
 Auditors (India)
 Audit Manager
 Regional Sales Manager
 Independent Agency
 Minimize security risk by
standardizing the process.
 Control who has access, how long,
what they can do with the file, etc.
 Track activity for access to
sensitive data. Export audit logs for
records.
Customer Overview
Global provider of insurance, annuities and employee benefit programs, serving 90 million customers.
© 2016 BlackBerry. All Rights Reserved. 14
14
USERSBUSINESS NEED BENEFITS
Need to protect business documents
for transactions.
• Replace Intralinks with a mobile-
friendly solution
• Globally accessible by 1,000
internal users and 15,000 limited
partners
• Board members
• Internal employees and contractors:
Sales, PR, Legal
• Limited partners
• Rolled out globally
• Easily integrated with existing portal
with APIs – no change to user
experience
• Added security controls on
business documents
Case Study: Securing Investor Relations
Customer Overview
One of the world’s largest private equity firms.
© 2016 BlackBerry. All Rights Reserved. 15
15
Case Study: Wealth Management Advisors
USERSBUSINESS NEED BENEFITS
Establish a mobility strategy
• Securely share and work on
mobile devices
• WMAs spent hours printing &
shredding files
• Must be easy enough to use for
senior executives and board
members
• Wealth Management Advisors
(WMA)
• Clients
• Senior executives and board
members
• Reduce the amount of paper used,
resulting in $440K worth of carbon
credits
• Save time to spend with clients,
doing more value-added work
Customer Overview
Large European bank, operating in more
than 50 countries globally.
What Next?
© 2016 BlackBerry. All Rights Reserved. 17
17
Perform a Security Audit and Review
BlackBerry Shield Security Audit and Review Program
 Option One: Online Self-Assessment
 Option Two: 90-Minute Detailed Personal Review
For more information:
https://us.blackberry.com/enterprise/security/mobile-security-best-practices
• Device security policy management
• Security administrator controls
• OS integrity and malware controls
• Encryption (at rest, in transit)
• Authentication
• Data leak prevention
• Secure communications and content protection
• Application security
• Availability
Technical Controls Administrative Controls
• Mobile Device Lifecycle Management
• Application security
• Organizational security structure
• Security configuration change management
• Risk assessment
• Security incident and response
• Governance/HR and Legal
• Security awareness training
BlackBerry Offers a FREE Security Audit
Thank You…
Questions?

Weitere ähnliche Inhalte

Was ist angesagt?

James Okarimia Aligning Finance , Risk and Compliance to Meet Regulation
James Okarimia   Aligning Finance , Risk and Compliance to Meet RegulationJames Okarimia   Aligning Finance , Risk and Compliance to Meet Regulation
James Okarimia Aligning Finance , Risk and Compliance to Meet RegulationJAMES OKARIMIA
 
James Okarimia - Aligning Finance , Risk and Data Analytics in Meeting the R...
James Okarimia -  Aligning Finance , Risk and Data Analytics in Meeting the R...James Okarimia -  Aligning Finance , Risk and Data Analytics in Meeting the R...
James Okarimia - Aligning Finance , Risk and Data Analytics in Meeting the R...JAMES OKARIMIA
 
Achieving IT Strategic Directives When Evaluating a New Promotional Content E...
Achieving IT Strategic Directives When Evaluating a New Promotional Content E...Achieving IT Strategic Directives When Evaluating a New Promotional Content E...
Achieving IT Strategic Directives When Evaluating a New Promotional Content E...Cognizant
 
e-book-transforming-product-disclosure
e-book-transforming-product-disclosuree-book-transforming-product-disclosure
e-book-transforming-product-disclosureDavid Evans
 
Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...Md. Khukan Miah
 
Data Standardization: Implications for Competition Enforcement (Daniel L. Rub...
Data Standardization: Implications for Competition Enforcement (Daniel L. Rub...Data Standardization: Implications for Competition Enforcement (Daniel L. Rub...
Data Standardization: Implications for Competition Enforcement (Daniel L. Rub...FSR Communications and Media
 
Packaging Artwork: An Important Value Chain Process-17 SEP 2012
Packaging Artwork: An Important Value Chain Process-17 SEP 2012Packaging Artwork: An Important Value Chain Process-17 SEP 2012
Packaging Artwork: An Important Value Chain Process-17 SEP 2012Lora Cecere
 
Care Management Platforms for Population Health: Seven Real-World Best Practices
Care Management Platforms for Population Health: Seven Real-World Best PracticesCare Management Platforms for Population Health: Seven Real-World Best Practices
Care Management Platforms for Population Health: Seven Real-World Best PracticesCognizant
 
SAP Sapphire 2012: Integrated Global Packaging, Artwork and Labeling
SAP Sapphire 2012: Integrated Global Packaging, Artwork and LabelingSAP Sapphire 2012: Integrated Global Packaging, Artwork and Labeling
SAP Sapphire 2012: Integrated Global Packaging, Artwork and LabelingVedant Borse
 
Data Governance That Drives the Bottom Line
Data Governance That Drives the Bottom LineData Governance That Drives the Bottom Line
Data Governance That Drives the Bottom LinePrecisely
 
About pellustro - The cloud-based platform for assessments
About pellustro - The cloud-based platform for assessmentsAbout pellustro - The cloud-based platform for assessments
About pellustro - The cloud-based platform for assessmentsElement22
 
lecture 1 information systems and business strategy
lecture 1  information systems and business strategylecture 1  information systems and business strategy
lecture 1 information systems and business strategyNorazila Mat
 

Was ist angesagt? (16)

James Okarimia Aligning Finance , Risk and Compliance to Meet Regulation
James Okarimia   Aligning Finance , Risk and Compliance to Meet RegulationJames Okarimia   Aligning Finance , Risk and Compliance to Meet Regulation
James Okarimia Aligning Finance , Risk and Compliance to Meet Regulation
 
James Okarimia - Aligning Finance , Risk and Data Analytics in Meeting the R...
James Okarimia -  Aligning Finance , Risk and Data Analytics in Meeting the R...James Okarimia -  Aligning Finance , Risk and Data Analytics in Meeting the R...
James Okarimia - Aligning Finance , Risk and Data Analytics in Meeting the R...
 
Achieving IT Strategic Directives When Evaluating a New Promotional Content E...
Achieving IT Strategic Directives When Evaluating a New Promotional Content E...Achieving IT Strategic Directives When Evaluating a New Promotional Content E...
Achieving IT Strategic Directives When Evaluating a New Promotional Content E...
 
e-book-transforming-product-disclosure
e-book-transforming-product-disclosuree-book-transforming-product-disclosure
e-book-transforming-product-disclosure
 
Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...Report on strategic rules of Information System for changing the bases of com...
Report on strategic rules of Information System for changing the bases of com...
 
Data Standardization: Implications for Competition Enforcement (Daniel L. Rub...
Data Standardization: Implications for Competition Enforcement (Daniel L. Rub...Data Standardization: Implications for Competition Enforcement (Daniel L. Rub...
Data Standardization: Implications for Competition Enforcement (Daniel L. Rub...
 
Packaging Artwork: An Important Value Chain Process-17 SEP 2012
Packaging Artwork: An Important Value Chain Process-17 SEP 2012Packaging Artwork: An Important Value Chain Process-17 SEP 2012
Packaging Artwork: An Important Value Chain Process-17 SEP 2012
 
Realize the Full Value
Realize the Full ValueRealize the Full Value
Realize the Full Value
 
C-2014-4-Meijer-EN
C-2014-4-Meijer-ENC-2014-4-Meijer-EN
C-2014-4-Meijer-EN
 
30120130406016
3012013040601630120130406016
30120130406016
 
Why Data Standards?
Why Data Standards?Why Data Standards?
Why Data Standards?
 
Care Management Platforms for Population Health: Seven Real-World Best Practices
Care Management Platforms for Population Health: Seven Real-World Best PracticesCare Management Platforms for Population Health: Seven Real-World Best Practices
Care Management Platforms for Population Health: Seven Real-World Best Practices
 
SAP Sapphire 2012: Integrated Global Packaging, Artwork and Labeling
SAP Sapphire 2012: Integrated Global Packaging, Artwork and LabelingSAP Sapphire 2012: Integrated Global Packaging, Artwork and Labeling
SAP Sapphire 2012: Integrated Global Packaging, Artwork and Labeling
 
Data Governance That Drives the Bottom Line
Data Governance That Drives the Bottom LineData Governance That Drives the Bottom Line
Data Governance That Drives the Bottom Line
 
About pellustro - The cloud-based platform for assessments
About pellustro - The cloud-based platform for assessmentsAbout pellustro - The cloud-based platform for assessments
About pellustro - The cloud-based platform for assessments
 
lecture 1 information systems and business strategy
lecture 1  information systems and business strategylecture 1  information systems and business strategy
lecture 1 information systems and business strategy
 

Ähnlich wie File Sharing Use Cases in Financial Services

Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...FinTechLabs.io
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Cloud Standards Customer Council
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial ServicesCloudera, Inc.
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesBenjamin Canner
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliancesAhmadi Madi
 
Monitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmyMonitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmySolarWinds
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptwebhostingguy
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptwebhostingguy
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyCloud Standards Customer Council
 
GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?QualiQuali
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the CloudRapidScale
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationInvestorSymantec
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...Jeff Kelly
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera
 
1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptx1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptxssuserc1c6091
 

Ähnlich wie File Sharing Use Cases in Financial Services (20)

Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
Open Banking UK “Identity Product” Internals #fapisum - Japan/UK Open Banking...
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Ping Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial ServicesPing Identity: Corporate Overview Financial Services
Ping Identity: Corporate Overview Financial Services
 
Aplication data security compliances
Aplication data security compliancesAplication data security compliances
Aplication data security compliances
 
Monitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US ArmyMonitoring and Securing Active Directory Government Webinar for the US Army
Monitoring and Securing Active Directory Government Webinar for the US Army
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?GDPR Compliance Countdown - Is your Application environment ready?
GDPR Compliance Countdown - Is your Application environment ready?
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
Symantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentationSymantec to-acquire-blue-coat-investor-presentation
Symantec to-acquire-blue-coat-investor-presentation
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020
 
IAM
IAMIAM
IAM
 
1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptx1ID2-KeyBank-CapitalOne.pptx
1ID2-KeyBank-CapitalOne.pptx
 

Mehr von BlackBerry

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner BenefitsBlackBerry
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneBlackBerry
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)BlackBerry
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointBlackBerry
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry SecureBlackBerry
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapBlackBerry
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our LivesBlackBerry
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeBlackBerry
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkBlackBerry
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...BlackBerry
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...BlackBerry
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry
 

Mehr von BlackBerry (20)

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner Benefits
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car Scene
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting Point
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry Secure
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of Things
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives
 
Mobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat LandscapeMobile Security: Preparing for the 2017 Threat Landscape
Mobile Security: Preparing for the 2017 Threat Landscape
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to Work
 
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
Business-Class Productivity Meets Certified Security: BlackBerry Enterprise M...
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & Manufacturing
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile Applications
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for Healthcare
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for Government
 

Kürzlich hochgeladen

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Kürzlich hochgeladen (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate AgentsRyan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
Ryan Mahoney - Will Artificial Intelligence Replace Real Estate Agents
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

File Sharing Use Cases in Financial Services

  • 1. © 2016 BlackBerry. All Rights Reserved. 1 1 File Sharing Use Cases in Financial Services Jeff Holleran Vice President, Corporate Strategy July, 2017
  • 2. © 2016 BlackBerry. All Rights Reserved. 2 2 Agenda  Secure File Sharing in Financial Services  Financial Services Use Cases  Next Steps
  • 3. Secure File Sharing in Financial Services
  • 4. © 2016 BlackBerry. All Rights Reserved. 4 4 Financial Services: Key File Security Drivers  Regulations - Multiple Requirements:  Data Security and Encryption  Strong Authentication and User Management  Protection of Customer Data  Chain of Custody and Compliance Reporting  DLP Support  Intellectual Property Protection  Internal Technology and Systems  Management and Maintenance of Client IP  Corporate Governance and Confidentiality  Mergers and Acquisitions  Executive-Level Communications  Maintenance of Mandated Internal Business Firewalls  Threat Intelligence Sharing
  • 5. © 2016 BlackBerry. All Rights Reserved. 5 5 Regulatory Requirements NYDFS 500 GLBA/ FFIEC PCI DSS GDPR Protection of Customer Info X X X X Encryption X X X X Access Controls X X X X Compliance Logging and Reporting X X X X Oversight of External Users X X X X Incident Monitoring and Reporting X X X Section 500.15 Encryption of Nonpublic Information. (a) As part of its cybersecurity program, based on its Risk Assessment, each Covered Entity shall implement controls, including encryption, to protect Nonpublic Information held or transmitted by the Covered Entity both in transit over external networks and at rest.
  • 6. © 2016 BlackBerry. All Rights Reserved. 6 6 Best-Practices Security Standards  ISO/IEC 27001 Certification  ISO 27001 was developed to "provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system."  SOC2 Type 2 external audits against AICPA auditing standards  A SOC 2 report helps to address third-party risk concerns by evaluating internal controls, policies, and procedures that directly relate to the security of a system at a service organization.  FIPS 140-2  U.S. government (NIST) computer security standard used to approve cryptographic modules. Financial Services firms and their technology partners should conform to the following standards: The following standards provide best-practices security benchmarks for technology providers:  US DoD ITAR & DFARS Compliance (NIST 800-53 and NIST 800-171)  US HIPAA compliance and reporting  UK Cyber Essentials Standards
  • 7. © 2016 BlackBerry. All Rights Reserved. 7 7 File Sharing Throughout the FS Enterprise CEO Board of Directors • SEC filings • Tax/audit filings • SOX reports • Placements • Board reports CIO / CTO Investment Banking Human Resources • Compliance reports: GLBA, SOX, PCI, etc. • Contracts • Proprietary systems • Compensation • Bonus data • Employee equity grants CFO Market Research Legal Real Estate Services • Contracts • Corp dev/M&A • eDiscovery • Outside counsel Business Partners Investors Banking Customers M&A Parties Banking Services • Board documents • Strategy plans EXTERNAL • Buy-side research • Sell-side research • Advisory Services • M&A deal materials • Mortgage documents • Ecological assessment documents • Property debt documents • Loans, Letter of Credit • Performance report • Wealth Management/ Investment fund performance data Regulators Outsourced Operations Industry Groups Outside Attorneys Risk Assessment Sharing
  • 8. © 2016 BlackBerry. All Rights Reserved. 8 8 File Sharing Today: Major Risk Factors The average organization has 13 file sync applications in use – most not approved or managed by IT 13 76% of organizations send traffic to Dropbox (2GB/mo. on average) 76% Source: Netskope, Palo Alto Networks, Gartner Of non-sanctioned cloud services used in FS firms are cloud storage and webmail apps 40% Of cloud DLP violations at FS Firms involve Webmail, Cloud Storage or Collaboration Apps 72%
  • 9. © 2016 BlackBerry. All Rights Reserved. 9 Secure Enterprise File Sharing Requirements Security & Compliance Productivity  File Encryption  Encryption at rest, in transit and in use  FIPS 140-2 certified crypto-modules  File Access and Usage Controls  Only Authorized Users May Access Data and Files  Restrict File Redistribution  DRM, watermarking and online-only mode  Administrative Controls  Fine-Grained User and Policy Management  Ability to Revoke or Change Access Automatically or Manually  Logging and Auditing  All Data Access Events Must Be Captured and Logged  Flexible Compliance Reporting  DLP Integration and Support  Collaborative Workspaces  Accessible via browser and apps  Cross-Platform Support  Platform Agnostic  Secure Access, Productivity and Synchronization  Extend and Secure Existing Repositories  “Protect-in-Place”  Provide Access and Sharing W/O File Migration  Support Existing Workflows & Systems  Robust Integration Architecture  Development API’s and SDK’s
  • 11. © 2016 BlackBerry. All Rights Reserved. 11 11 Common Financial Services Requirements SHARING TO AGENTS / MERCHANTS EXTERNAL AUDIT REPORTING M&A / COMMERCIAL TRANSACTIONS LOAN / CREDIT INFORMATION Remote access / mobile productivity • Control sensitive / regulated information shared to agents • Capture data from remote locations on mobile devices • Securely synced folders Securely collaborate with 3rd parties • Sharing spreadsheets, models, numbers, etc. • Control how files are used, who is accessing them, when and where • Revoke access to documents after deal Regulated, non-public information • Share confidential, non-public documents with outside auditors • Compliance regulations Protecting customer statements (PII) • Collaborating on loan / credit information throughout lifecycle • Providing regulated statements, capital calls, tax documents LITIGATION / TRAIL CASES Sharing to outside counsel • Simple and secure sharing of files (some large – 10 GB) • Prevent forwarding of information and revoke access after trial
  • 12. © 2016 BlackBerry. All Rights Reserved. 12 12 USERSBUSINESS NEED BENEFITS Requirement 3.4: All credit card data needs to be encrypted or rendered unreadable. • PCI certification on portfolio basis • Already adopted for secure collaboration  Easy to apply to PCI • Executives (SVP / VP) • Managers • Customer representatives • Anyone who touches customer credit card information • Persistent AES-256 encryption • Encryption and controls travel with the file • All file activities are fully tracked for auditability Case Study: PCI DSS Compliance - Protecting Customer Personal Data Customer Overview American financial services company operating in business banking, retail banking and wealth management Payment Card Industry Data Security Standard (PCI DSS)
  • 13. © 2016 BlackBerry. All Rights Reserved. 13 13 Case Study: Agent Network Regulatory Audit USERSBUSINESS NEED BENEFITS  Each of the 2,500 agencies must undergo regulatory audit every 18 months  Requires collection of policies from 10-20 customers, approx. 20 documents per customer  No secure standard process for sharing files  Auditors (India)  Audit Manager  Regional Sales Manager  Independent Agency  Minimize security risk by standardizing the process.  Control who has access, how long, what they can do with the file, etc.  Track activity for access to sensitive data. Export audit logs for records. Customer Overview Global provider of insurance, annuities and employee benefit programs, serving 90 million customers.
  • 14. © 2016 BlackBerry. All Rights Reserved. 14 14 USERSBUSINESS NEED BENEFITS Need to protect business documents for transactions. • Replace Intralinks with a mobile- friendly solution • Globally accessible by 1,000 internal users and 15,000 limited partners • Board members • Internal employees and contractors: Sales, PR, Legal • Limited partners • Rolled out globally • Easily integrated with existing portal with APIs – no change to user experience • Added security controls on business documents Case Study: Securing Investor Relations Customer Overview One of the world’s largest private equity firms.
  • 15. © 2016 BlackBerry. All Rights Reserved. 15 15 Case Study: Wealth Management Advisors USERSBUSINESS NEED BENEFITS Establish a mobility strategy • Securely share and work on mobile devices • WMAs spent hours printing & shredding files • Must be easy enough to use for senior executives and board members • Wealth Management Advisors (WMA) • Clients • Senior executives and board members • Reduce the amount of paper used, resulting in $440K worth of carbon credits • Save time to spend with clients, doing more value-added work Customer Overview Large European bank, operating in more than 50 countries globally.
  • 17. © 2016 BlackBerry. All Rights Reserved. 17 17 Perform a Security Audit and Review BlackBerry Shield Security Audit and Review Program  Option One: Online Self-Assessment  Option Two: 90-Minute Detailed Personal Review For more information: https://us.blackberry.com/enterprise/security/mobile-security-best-practices • Device security policy management • Security administrator controls • OS integrity and malware controls • Encryption (at rest, in transit) • Authentication • Data leak prevention • Secure communications and content protection • Application security • Availability Technical Controls Administrative Controls • Mobile Device Lifecycle Management • Application security • Organizational security structure • Security configuration change management • Risk assessment • Security incident and response • Governance/HR and Legal • Security awareness training BlackBerry Offers a FREE Security Audit