SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Hosted Contact Centre
                                                      Security




                                                                                Jed Hewson
                                                               1Stream Hosted Contact Centre
© 2008 1Stream Managed Technical Solutions Pty Ltd
Security




© 2008 1Stream Managed Technical Solutions Pty Ltd
What is IT security

         • Computer security - protection of information
           and property from theft, corruption, or natural
           disaster and continuance of service.
         • Computer system security - collective processes
           and mechanisms by which sensitive and valuable
           information and services are protected from
           publication, tampering or collapse by
           unauthorized activities or untrustworthy
           individuals and unplanned events

© 2008 1Stream Managed Technical Solutions Pty Ltd
How big is the problem?

         • Early 2011 Sony acknowledged that personal
           information of 77 million play station users had been
           hacked.
         • NHS reports 140 security breaches in 3 months and
           have now closed down part of their IT systems
         • Wikileaks – a leak from within the secret service!
         • Citysights – NY tour operator exposed 100,000 card
           details
         • Is copper an IT security issue?

© 2008 1Stream Managed Technical Solutions Pty Ltd
Cloud security




© 2008 1Stream Managed Technical Solutions Pty Ltd
The Cloud




© 2008 1Stream Managed Technical Solutions Pty Ltd
The Future of the Cloud




© 2008 1Stream Managed Technical Solutions Pty Ltd
Cloud Complexities




© 2008 1Stream Managed Technical Solutions Pty Ltd
The cloud at a glance
                      Cloud Infrastructure           Cloud Infrastructure   Cloud Infrastructure
                                                                                   IaaS            Software as a Service
                                                            PaaS                   PaaS                   (SaaS)
                                  SaaS                      SaaS                   SaaS                Architectures



                      Cloud Infrastructure           Cloud Infrastructure
                                                            IaaS             Platform as a Service (PaaS)
                                  PaaS                      PaaS                     Architectures




                      Cloud Infrastructure
                             IaaS                        Infrastructure as a Service (IaaS)
                                                                    Architectures


© 2008 1Stream Managed Technical Solutions Pty Ltd
Cloud characteristics

         • Private cloud
                   – enterprise owned or leased
         • Community cloud
                   – shared infrastructure for specific community
         • Public cloud
                   – Sold to the public, mega-scale infrastructure
         • Hybrid cloud
                   – composition of two or more clouds

© 2008 1Stream Managed Technical Solutions Pty Ltd
NIST/Cloud security




© 2008 1Stream Managed Technical Solutions Pty Ltd
Call Centre Security




© 2008 1Stream Managed Technical Solutions Pty Ltd
Security in the call centre
         •       Physical security – cameras, access control/turn-styles, lockers
         •       PC security – AV, lock down, firewalls
         •       Internet security – firewalls, white and blacklists.
         •       Logon Access – AD, CRM, email and other applications
         •       Access to databases and file &print servers
         •       Access to call recordings/ screen recordings/other media recordings
         •       Access to call data
         •       Dialing Compliance
         •       FAIS/FSB Compliance
         •       PCI Compliance
         •       Certify to standards such as ISO 27001




© 2008 1Stream Managed Technical Solutions Pty Ltd
Call Centre Security matrix
                        PCI Compliance

                        FAIS / FSB

                        Dialing Compliance

                        Access to recordings

                        Access to databases

                        Internet security

                        Network security

                        PC Security

                        Physical security
                                                                Collection
                                                     Customer




                                                                             Fin. Serv.



                                                                                          Telesales
                                                     Service




                                                                             Sales
                                                                Debt




                                                                                                      PCI
© 2008 1Stream Managed Technical Solutions Pty Ltd
What needs to be considered?

         •       VOIP
         •       Access to recordings
         •       CRM database information
         •       PCI-DSS compliance




© 2008 1Stream Managed Technical Solutions Pty Ltd
VOIP

         •       Encryption – TLS / SRTP
         •       Firewall – STUN (TURN/ICE)
         •       Proxy – complex (non-default) passwords
         •       Break the IP chain (include iSDN)
         •       VLAN/QOS




© 2008 1Stream Managed Technical Solutions Pty Ltd
Recording Access

         •       ECT act
         •       Consider multi-media
         •       Encryption – at least 128 bit
         •       Tamper proof store
         •       Auditable access
         •       Deletion management



© 2008 1Stream Managed Technical Solutions Pty Ltd
CRM
         •       Process more than technology
         •       Physical security
         •       Perimeter defence
         •       Data Encryption
         •       User authentication
         •       Application security
         •       Internal Systems security
         •       Operating system
         •       Database and server management
         •       Back up and Disaster recovery


© 2008 1Stream Managed Technical Solutions Pty Ltd
Payment Card Industry Data Security
                      Standard (PCI-DSS)
         • 36.7% of contact Centres claimed to be fully compliant
           with the Payment Card Industry Data Security Standard
         • (89%) admitted to not understanding PCI DSS, the
           requirements nor penalties
         • The act of recording a call can break the rules of PCI
           DSS
         • Penalties of up to $500 000




© 2008 1Stream Managed Technical Solutions Pty Ltd
PCI-DSS Objectives




© 2008 1Stream Managed Technical Solutions Pty Ltd
Cloud Vs Premise




© 2008 1Stream Managed Technical Solutions Pty Ltd
Cloud Benefits Pros and Cons

         •       Flexibility
         •       On-demand
         •       Access to technology
         •       SLA
         •       Access to skills


         • Cheaper!!

© 2008 1Stream Managed Technical Solutions Pty Ltd
Cloud Benefits Pros and Cons

         • Multi-tenanted
         • 3rd party vendor
         • Limited input to security standards




© 2008 1Stream Managed Technical Solutions Pty Ltd
Summary

         • The world is going “cloud”
         • Organisations must take responsibility
         • Do not assume all providers are the same
         • Hosted providers can offer better
           technology, experience and skills
         • For the majority of call centres the hosted
           provider has more to lose


© 2008 1Stream Managed Technical Solutions Pty Ltd
© 2008 1Stream Managed Technical Solutions Pty Ltd

Weitere ähnliche Inhalte

Was ist angesagt?

Best practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftBest practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftCA Nimsoft
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
 
Managing your Cloud with Confidence
Managing your Cloud with Confidence Managing your Cloud with Confidence
Managing your Cloud with Confidence CA Nimsoft
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Azlan NL
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service providerCisco Public Relations
 
Andy huckridge
Andy huckridgeAndy huckridge
Andy huckridgeCarl Ford
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Arrow ECS UK
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
HwaCom corporateoverview-e
HwaCom   corporateoverview-eHwaCom   corporateoverview-e
HwaCom corporateoverview-eHwaCom
 
El video en un mundo de colaboración
El video en un mundo de colaboraciónEl video en un mundo de colaboración
El video en un mundo de colaboraciónMundo Contact
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOABob Rhubart
 
IT Infrastructure Specialist
IT Infrastructure SpecialistIT Infrastructure Specialist
IT Infrastructure Specialistmomentuminfocare
 
Security & Virtualization in the Data Center
Security & Virtualization in the Data CenterSecurity & Virtualization in the Data Center
Security & Virtualization in the Data CenterCisco Russia
 
Cloud Expo 2013 Techgate + IBM
Cloud Expo 2013 Techgate + IBMCloud Expo 2013 Techgate + IBM
Cloud Expo 2013 Techgate + IBMTechgate plc
 
Technology Development and Innovation at Cisco
Technology Development and Innovation at CiscoTechnology Development and Innovation at Cisco
Technology Development and Innovation at CiscoCisco Canada
 
Why program management is essential for it projects
Why program management is essential for it projectsWhy program management is essential for it projects
Why program management is essential for it projectsbbigelow
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudOpSource
 

Was ist angesagt? (20)

Best practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and NimsoftBest practices for Vblock Monitoring with FusionStorm and Nimsoft
Best practices for Vblock Monitoring with FusionStorm and Nimsoft
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
Managing your Cloud with Confidence
Managing your Cloud with Confidence Managing your Cloud with Confidence
Managing your Cloud with Confidence
 
Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2Build 4 The Cloud By Cisco V Mware2
Build 4 The Cloud By Cisco V Mware2
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
 
Andy huckridge
Andy huckridgeAndy huckridge
Andy huckridge
 
Dataplex Company Overview
Dataplex Company OverviewDataplex Company Overview
Dataplex Company Overview
 
Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4Security brochure 2012_ibm_v1_a4
Security brochure 2012_ibm_v1_a4
 
Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
HwaCom corporateoverview-e
HwaCom   corporateoverview-eHwaCom   corporateoverview-e
HwaCom corporateoverview-e
 
El video en un mundo de colaboración
El video en un mundo de colaboraciónEl video en un mundo de colaboración
El video en un mundo de colaboración
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOA
 
IT Infrastructure Specialist
IT Infrastructure SpecialistIT Infrastructure Specialist
IT Infrastructure Specialist
 
Security & Virtualization in the Data Center
Security & Virtualization in the Data CenterSecurity & Virtualization in the Data Center
Security & Virtualization in the Data Center
 
Cloud Expo 2013 Techgate + IBM
Cloud Expo 2013 Techgate + IBMCloud Expo 2013 Techgate + IBM
Cloud Expo 2013 Techgate + IBM
 
Technology Development and Innovation at Cisco
Technology Development and Innovation at CiscoTechnology Development and Innovation at Cisco
Technology Development and Innovation at Cisco
 
Why program management is essential for it projects
Why program management is essential for it projectsWhy program management is essential for it projects
Why program management is essential for it projects
 
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the CloudPublic, Private and Hybrid: For Enterprise, It's All About the Cloud
Public, Private and Hybrid: For Enterprise, It's All About the Cloud
 

Ähnlich wie Hosted Contact Centre Security

Market Trends and Employment Opportunities
Market Trends and Employment OpportunitiesMarket Trends and Employment Opportunities
Market Trends and Employment OpportunitiesSotiris Karagiannis
 
Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...EMC Forum India
 
Blue Light Support Partnership Presentation
Blue Light Support Partnership PresentationBlue Light Support Partnership Presentation
Blue Light Support Partnership Presentationbluelightsupport
 
Momentum Infocare Corporate Presentation
Momentum Infocare   Corporate PresentationMomentum Infocare   Corporate Presentation
Momentum Infocare Corporate Presentationeraz
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsRon Batra
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012Uni Systems S.M.S.A.
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection CompanyASBIS SK
 
Centros de contacto: las demandas y requerimientos del mercado
Centros de contacto: las demandas y requerimientos del mercadoCentros de contacto: las demandas y requerimientos del mercado
Centros de contacto: las demandas y requerimientos del mercadoMundo Contact
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture shortAvirot Mitamura
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...BIOVIA
 
Presenting our Cloud solution "rapidAID" on Microsoft's Virtualization Day
Presenting our Cloud solution "rapidAID" on Microsoft's Virtualization DayPresenting our Cloud solution "rapidAID" on Microsoft's Virtualization Day
Presenting our Cloud solution "rapidAID" on Microsoft's Virtualization DayThomas Kunz
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Securitytrickey270
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsBob Rhubart
 

Ähnlich wie Hosted Contact Centre Security (20)

Cloud computing 2012
Cloud computing 2012Cloud computing 2012
Cloud computing 2012
 
Monetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless NetworksMonetizing the Enterprise: Borderless Networks
Monetizing the Enterprise: Borderless Networks
 
Market Trends and Employment Opportunities
Market Trends and Employment OpportunitiesMarket Trends and Employment Opportunities
Market Trends and Employment Opportunities
 
Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...Track 1, session 6, accelerating your cloud journey with advanced services ab...
Track 1, session 6, accelerating your cloud journey with advanced services ab...
 
Blue Light Support Partnership Presentation
Blue Light Support Partnership PresentationBlue Light Support Partnership Presentation
Blue Light Support Partnership Presentation
 
VSD Infotech
VSD InfotechVSD Infotech
VSD Infotech
 
Momentum Infocare Corporate Presentation
Momentum Infocare   Corporate PresentationMomentum Infocare   Corporate Presentation
Momentum Infocare Corporate Presentation
 
Oracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud EconomicsOracle Open World Preso on Cloud Economics
Oracle Open World Preso on Cloud Economics
 
Oow con7393
Oow con7393Oow con7393
Oow con7393
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012IDC it security dc_transformation_roadshow2012
IDC it security dc_transformation_roadshow2012
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
Centros de contacto: las demandas y requerimientos del mercado
Centros de contacto: las demandas y requerimientos del mercadoCentros de contacto: las demandas y requerimientos del mercado
Centros de contacto: las demandas y requerimientos del mercado
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
(ATS4-GS03) Partner Session - Intel Balanced Cloud Solutions for the Healthca...
 
Presenting our Cloud solution "rapidAID" on Microsoft's Virtualization Day
Presenting our Cloud solution "rapidAID" on Microsoft's Virtualization DayPresenting our Cloud solution "rapidAID" on Microsoft's Virtualization Day
Presenting our Cloud solution "rapidAID" on Microsoft's Virtualization Day
 
Xaas infotech (2)
Xaas infotech (2)Xaas infotech (2)
Xaas infotech (2)
 
Ultima - Mobile Data Security
Ultima - Mobile Data SecurityUltima - Mobile Data Security
Ultima - Mobile Data Security
 
Presidio Overview
Presidio OverviewPresidio Overview
Presidio Overview
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 

Mehr von Contact Centre Management Group

WELLNESS – the NWOW (NEW-WORLD-OF-WORK*™) chill-pill for mental health?
WELLNESS – the NWOW (NEW-WORLD-OF-WORK*™) chill-pill for mental health? WELLNESS – the NWOW (NEW-WORLD-OF-WORK*™) chill-pill for mental health?
WELLNESS – the NWOW (NEW-WORLD-OF-WORK*™) chill-pill for mental health? Contact Centre Management Group
 
From Covid Crisis to the New Normal: From Favoured Destination to Winning Bus...
From Covid Crisis to the New Normal: From Favoured Destination to Winning Bus...From Covid Crisis to the New Normal: From Favoured Destination to Winning Bus...
From Covid Crisis to the New Normal: From Favoured Destination to Winning Bus...Contact Centre Management Group
 
KNOWLEDGE SHARING: The Impact on Contact Centes of legislation changes
KNOWLEDGE SHARING: The Impact on Contact Centes of legislation changes KNOWLEDGE SHARING: The Impact on Contact Centes of legislation changes
KNOWLEDGE SHARING: The Impact on Contact Centes of legislation changes Contact Centre Management Group
 

Mehr von Contact Centre Management Group (20)

WELLNESS – the NWOW (NEW-WORLD-OF-WORK*™) chill-pill for mental health?
WELLNESS – the NWOW (NEW-WORLD-OF-WORK*™) chill-pill for mental health? WELLNESS – the NWOW (NEW-WORLD-OF-WORK*™) chill-pill for mental health?
WELLNESS – the NWOW (NEW-WORLD-OF-WORK*™) chill-pill for mental health?
 
From Covid Crisis to the New Normal: From Favoured Destination to Winning Bus...
From Covid Crisis to the New Normal: From Favoured Destination to Winning Bus...From Covid Crisis to the New Normal: From Favoured Destination to Winning Bus...
From Covid Crisis to the New Normal: From Favoured Destination to Winning Bus...
 
Presentation: Gerhard Visser (Snr)
Presentation: Gerhard Visser (Snr)Presentation: Gerhard Visser (Snr)
Presentation: Gerhard Visser (Snr)
 
Presentation: Jeff Kian
Presentation: Jeff Kian Presentation: Jeff Kian
Presentation: Jeff Kian
 
Presentation: Patrick Carmody
Presentation: Patrick CarmodyPresentation: Patrick Carmody
Presentation: Patrick Carmody
 
Presentation: Margie Middleton
Presentation: Margie MiddletonPresentation: Margie Middleton
Presentation: Margie Middleton
 
Presentation: Sarina de Beer, Ask Afrika
Presentation: Sarina de Beer, Ask AfrikaPresentation: Sarina de Beer, Ask Afrika
Presentation: Sarina de Beer, Ask Afrika
 
Presentation: Anthony Eva, bizAR Reality
Presentation: Anthony Eva, bizAR RealityPresentation: Anthony Eva, bizAR Reality
Presentation: Anthony Eva, bizAR Reality
 
Presentation: Perry de Jager, Principa
Presentation: Perry de Jager, PrincipaPresentation: Perry de Jager, Principa
Presentation: Perry de Jager, Principa
 
Employer Association procurement standards
Employer Association procurement standardsEmployer Association procurement standards
Employer Association procurement standards
 
KNOWLEDGE SHARING: The Impact on Contact Centes of legislation changes
KNOWLEDGE SHARING: The Impact on Contact Centes of legislation changes KNOWLEDGE SHARING: The Impact on Contact Centes of legislation changes
KNOWLEDGE SHARING: The Impact on Contact Centes of legislation changes
 
The Hero's Journey
The Hero's JourneyThe Hero's Journey
The Hero's Journey
 
Suggested SAQA changes to Professional Body Regulations
Suggested SAQA changes to Professional Body RegulationsSuggested SAQA changes to Professional Body Regulations
Suggested SAQA changes to Professional Body Regulations
 
CCMG Knowledge Sharing Event
CCMG Knowledge Sharing EventCCMG Knowledge Sharing Event
CCMG Knowledge Sharing Event
 
CCMG Employer Association
CCMG Employer AssociationCCMG Employer Association
CCMG Employer Association
 
CCMG BPESA Awards Launch
CCMG BPESA Awards LaunchCCMG BPESA Awards Launch
CCMG BPESA Awards Launch
 
Customers are from Venus, Companies are from Mars
Customers are from Venus, Companies are from Mars Customers are from Venus, Companies are from Mars
Customers are from Venus, Companies are from Mars
 
Professional Bodies: Their reason for being
Professional Bodies: Their reason for beingProfessional Bodies: Their reason for being
Professional Bodies: Their reason for being
 
Skillzbook: Critical Thinking Masterclass
Skillzbook: Critical Thinking MasterclassSkillzbook: Critical Thinking Masterclass
Skillzbook: Critical Thinking Masterclass
 
Callforce: Creating world class contact centres
Callforce: Creating world class contact centresCallforce: Creating world class contact centres
Callforce: Creating world class contact centres
 

Kürzlich hochgeladen

Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 

Kürzlich hochgeladen (20)

Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 

Hosted Contact Centre Security

  • 1. Hosted Contact Centre Security Jed Hewson 1Stream Hosted Contact Centre © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 2. Security © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 3. What is IT security • Computer security - protection of information and property from theft, corruption, or natural disaster and continuance of service. • Computer system security - collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 4. How big is the problem? • Early 2011 Sony acknowledged that personal information of 77 million play station users had been hacked. • NHS reports 140 security breaches in 3 months and have now closed down part of their IT systems • Wikileaks – a leak from within the secret service! • Citysights – NY tour operator exposed 100,000 card details • Is copper an IT security issue? © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 5. Cloud security © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 6. The Cloud © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 7. The Future of the Cloud © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 8. Cloud Complexities © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 9. The cloud at a glance Cloud Infrastructure Cloud Infrastructure Cloud Infrastructure IaaS Software as a Service PaaS PaaS (SaaS) SaaS SaaS SaaS Architectures Cloud Infrastructure Cloud Infrastructure IaaS Platform as a Service (PaaS) PaaS PaaS Architectures Cloud Infrastructure IaaS Infrastructure as a Service (IaaS) Architectures © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 10. Cloud characteristics • Private cloud – enterprise owned or leased • Community cloud – shared infrastructure for specific community • Public cloud – Sold to the public, mega-scale infrastructure • Hybrid cloud – composition of two or more clouds © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 11. NIST/Cloud security © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 12. Call Centre Security © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 13. Security in the call centre • Physical security – cameras, access control/turn-styles, lockers • PC security – AV, lock down, firewalls • Internet security – firewalls, white and blacklists. • Logon Access – AD, CRM, email and other applications • Access to databases and file &print servers • Access to call recordings/ screen recordings/other media recordings • Access to call data • Dialing Compliance • FAIS/FSB Compliance • PCI Compliance • Certify to standards such as ISO 27001 © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 14. Call Centre Security matrix PCI Compliance FAIS / FSB Dialing Compliance Access to recordings Access to databases Internet security Network security PC Security Physical security Collection Customer Fin. Serv. Telesales Service Sales Debt PCI © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 15. What needs to be considered? • VOIP • Access to recordings • CRM database information • PCI-DSS compliance © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 16. VOIP • Encryption – TLS / SRTP • Firewall – STUN (TURN/ICE) • Proxy – complex (non-default) passwords • Break the IP chain (include iSDN) • VLAN/QOS © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 17. Recording Access • ECT act • Consider multi-media • Encryption – at least 128 bit • Tamper proof store • Auditable access • Deletion management © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 18. CRM • Process more than technology • Physical security • Perimeter defence • Data Encryption • User authentication • Application security • Internal Systems security • Operating system • Database and server management • Back up and Disaster recovery © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 19. Payment Card Industry Data Security Standard (PCI-DSS) • 36.7% of contact Centres claimed to be fully compliant with the Payment Card Industry Data Security Standard • (89%) admitted to not understanding PCI DSS, the requirements nor penalties • The act of recording a call can break the rules of PCI DSS • Penalties of up to $500 000 © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 20. PCI-DSS Objectives © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 21. Cloud Vs Premise © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 22. Cloud Benefits Pros and Cons • Flexibility • On-demand • Access to technology • SLA • Access to skills • Cheaper!! © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 23. Cloud Benefits Pros and Cons • Multi-tenanted • 3rd party vendor • Limited input to security standards © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 24. Summary • The world is going “cloud” • Organisations must take responsibility • Do not assume all providers are the same • Hosted providers can offer better technology, experience and skills • For the majority of call centres the hosted provider has more to lose © 2008 1Stream Managed Technical Solutions Pty Ltd
  • 25. © 2008 1Stream Managed Technical Solutions Pty Ltd

Hinweis der Redaktion

  1. So what is security? Wikipedia tell us that it is split into two parts. But it is a huge industry. It covers:Viruses, worms, DOS, spoofing, trojans, phishing, unauthorised access to data, data theft, and involves equipment such as firewalls, security suites, encryption and certification. House hold names have sprung up like Fortinet, Mcaffee, symantec, and of course our own astronaught Mark Shuttlworth who made trillions out of web security. Intel bought mcaffee for $7.7 billion america’s 2nd biggest security company.Computer security is a branch of computer technology known as Information Security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat elusive objective of preventing unwanted computer behavior instead of enabling wanted computer behavior.
  2. And security is on every ones mind. A recent survey showed that 74% of people asked stated that security was their main concern for using on demand services. But lets put this into perspective. Use a house as an analogy!Lets take a local perspective and look at a house in camps bay and a house in Riebeck Casteel. Lets also consider a local security expert providing advice on your home.The message is that you must take responsibility for your own security based on your needs.
  3. Lets talk about the cloud. Big industry and becoming more and more organised. Its here to stay so the question of whether you should go to cloud solution is actually when should you go to a cloud solution.
  4. CRM usually crosses more than one type of technology such as wb browsers, database access and log on authentication. A process needs to be in place.
  5. The message her is that the cloud is complex and coverts anything from software to physical infrastructure.
  6. The message her is that the cloud is complex and coverts anything from software to physical infrastructure.