SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Performance Measurement Strategic
Management
Profit& Process
Improvement
Board& ManagementAdvisory
Services
Financial
Advisory
The Future of Community Banking Conference
Top Five IT Mistakes and How to Avoid Them
September 10, 2015
Jeffrey P. Marsico
Executive Vice President
Office - (973) 299-0300 Ext. 120
jmarsico@KafafianGroup.com
www.KafafianGroup.com
www.jeff-for-banks.blogspot.com
1
 He/she is a mechanic that can fix the car. Not design the car.
 Is he/she a strategic thinker?
 Who do they surround themselves with?
 Idea: EVP of Bank Distribution.
Top 5 Strategic IT Mistakes & How to Avoid Them
Future of Community Banking
1. We Hire a Technician
2
 Square Capital advances more than $1MM per day.
 Lending club originated $4.4B in loans in 2014.
 Mint has over 10 million users.
 Quicken Loans is #3 market share in PA.
 Idea: Create partnerships with FinTech companies.
Top 5 Strategic IT Mistakes & How to Avoid Them
Future of Community Banking
2. We Ignore Non-Bank Technology-Driven Disruptors
3
 Jimmy the new to work like the old.
 Training and reinforcement.
 Employees don’t use customer facing technologies.
 Idea: Compel employees to use your technologies.
 Idea: Negotiate training into new technology contracts.
 Idea: Make loan application and account opening UI’s the same for platform and
customers.
Top 5 Strategic IT Mistakes & How to Avoid Them
Future of Community Banking
3. Employees Don’t/Can’t Use the Technology
4
 Termination
 Conversion/de-conversion
 Training
 Interfaces
 Idea: Be specific in IT contracts and negotiate when your leverage is the greatest… i.e.
far in advance of contract renewal with enough time to shop for alternatives.
Top 5 Strategic IT Mistakes & How to Avoid Them
Future of Community Banking
4. Avoid Landmines in IT Contracts
5
Top 5 Strategic IT Mistakes & How to Avoid Them
Future of Community Banking
5. Sweating the Small Stuff
Definitions:
Hacking is defined as a targeted intrusion into a data network, including skimming.
Data on the Move is defined as “when an electronic storage device, laptop or paper folders leave the office where it is normally stored. This would
include data in transport to a storage location.”
Source: Identify Theft Resource Center
Top Cyber Security Risks
 Scope of Threat – The largest problem
remains the rate at which cyber attacks
continue to evolve and diversify.
 Interconnectivity – The interconnection
of banks and others in the industry, as
well as world wide, is crucial to the
financial system’s functioning, but it’s
also an area of vulnerability when it
comes to cyber security.
 Ideas/Mitigants – Policy and
procedures, password resets, safe
surfing, personal device management,
vendor management, employee
screening.
10.2%
29.0%
7.9%
11.5%
15.1%
10.9%
12.5%
Insider Theft
Hacking
Data on the Move
Accidental Exposure
Subcontractor
Employee Negligence
Physical Theft
6
 Not building a business case for tech investment.
 Prioritizing based on strategy.
 All constituencies in a room.
 Be bent for action, and be timely.
 Idea: Change the IT Steering Committee to be less tactical (or not at all) and more
strategic. Ask standard questions: What is the business case? How does this move us
toward our strategic vision? How long will it take to implement? How will we
measure success?
Top 5 Strategic IT Mistakes & How to Avoid Them
Future of Community Banking
6. Strategic Investments
Performance Measurement Strategic
Management
Profit& Process
Improvement
Board& ManagementAdvisory
Services
Financial
Advisory
The Future of Community Banking Conference
Top Five IT Mistakes and How to Avoid Them
September 10, 2015
Jeffrey P. Marsico
Executive Vice President
Office - (973) 299-0300 Ext. 120
jmarsico@KafafianGroup.com
www.KafafianGroup.com
www.jeff-for-banks.blogspot.com

Weitere ähnliche Inhalte

Was ist angesagt?

cybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-mattcybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-matt
Yigal Behar
 
State of IT security 2012
State of IT security 2012State of IT security 2012
State of IT security 2012
Arun Bhatia
 
IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015
Robert Baldi
 
NACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 publishedNACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 published
Prista Corporation
 
You're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat LandscapeYou're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat Landscape
Resilient Systems
 

Was ist angesagt? (20)

Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce Ensuring Cyber Security Resilience with a Skilled Workforce
Ensuring Cyber Security Resilience with a Skilled Workforce
 
cybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-mattcybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-matt
 
State of IT security 2012
State of IT security 2012State of IT security 2012
State of IT security 2012
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009Deloitte Global Security Survey 2009
Deloitte Global Security Survey 2009
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
 
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
 
Iid infoshare exec_summary final
Iid infoshare exec_summary finalIid infoshare exec_summary final
Iid infoshare exec_summary final
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Cyber-attacks
Cyber-attacksCyber-attacks
Cyber-attacks
 
IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015IIA August Briefing_15AUG2015
IIA August Briefing_15AUG2015
 
Identity Checkpoint
Identity CheckpointIdentity Checkpoint
Identity Checkpoint
 
IT summit 2014-program
IT summit 2014-programIT summit 2014-program
IT summit 2014-program
 
NACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 publishedNACD Directorship Article - Cyber July:Aug 2015 published
NACD Directorship Article - Cyber July:Aug 2015 published
 
How to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's ClothingHow to Catch a Wolf in Sheep's Clothing
How to Catch a Wolf in Sheep's Clothing
 
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
 
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
 
Sfo
SfoSfo
Sfo
 
You're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat LandscapeYou're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat Landscape
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 

Andere mochten auch

Andere mochten auch (13)

#HootMaster - Masterclass sobre Hootsuite
#HootMaster - Masterclass sobre Hootsuite#HootMaster - Masterclass sobre Hootsuite
#HootMaster - Masterclass sobre Hootsuite
 
Antoanvn.com
Antoanvn.comAntoanvn.com
Antoanvn.com
 
Mapa fuentes de dip
Mapa  fuentes de dipMapa  fuentes de dip
Mapa fuentes de dip
 
McHenry water damage emergency
McHenry water damage emergencyMcHenry water damage emergency
McHenry water damage emergency
 
Jose antonio-abarca-cruz-experimento-y-descubrimiento-de-los-neutrones
Jose antonio-abarca-cruz-experimento-y-descubrimiento-de-los-neutronesJose antonio-abarca-cruz-experimento-y-descubrimiento-de-los-neutrones
Jose antonio-abarca-cruz-experimento-y-descubrimiento-de-los-neutrones
 
Masai Rafael
Masai RafaelMasai Rafael
Masai Rafael
 
2. origen químico de la vida en la tierra
2.  origen químico de la vida en la tierra2.  origen químico de la vida en la tierra
2. origen químico de la vida en la tierra
 
Maasais
MaasaisMaasais
Maasais
 
Columna cervical
Columna cervicalColumna cervical
Columna cervical
 
Origen químico de la vida en la tierra
Origen químico de la vida en la tierraOrigen químico de la vida en la tierra
Origen químico de la vida en la tierra
 
CPA Congress Melbourne 2015 - Day Three Wrap Up
CPA Congress Melbourne 2015 - Day Three Wrap UpCPA Congress Melbourne 2015 - Day Three Wrap Up
CPA Congress Melbourne 2015 - Day Three Wrap Up
 
CPA Congress Sydney 2015 - Day Three Wrap Up
CPA Congress Sydney 2015 - Day Three Wrap UpCPA Congress Sydney 2015 - Day Three Wrap Up
CPA Congress Sydney 2015 - Day Three Wrap Up
 
CPA Congress Sydney 2015 - Day One Wrap Up
CPA Congress Sydney 2015 - Day One Wrap UpCPA Congress Sydney 2015 - Day One Wrap Up
CPA Congress Sydney 2015 - Day One Wrap Up
 

Ähnlich wie PACB Future of Community Banking 2015-Marsico

Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
Lydia Shepherd
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
Casey Fleming
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
Sarah Jarvis
 

Ähnlich wie PACB Future of Community Banking 2015-Marsico (20)

Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Scr Tims
Scr TimsScr Tims
Scr Tims
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Building Cyber Resilience
Building Cyber ResilienceBuilding Cyber Resilience
Building Cyber Resilience
 
Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond Technology tech trends 2022 and beyond
Technology tech trends 2022 and beyond
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
 
The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019The 10 most trusted fraud detection solution providers 2019
The 10 most trusted fraud detection solution providers 2019
 
Avg White Paper (4)
Avg White Paper (4)Avg White Paper (4)
Avg White Paper (4)
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – Finance
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Fraud and Risk in Big Data
Fraud and Risk in Big DataFraud and Risk in Big Data
Fraud and Risk in Big Data
 

PACB Future of Community Banking 2015-Marsico

  • 1. Performance Measurement Strategic Management Profit& Process Improvement Board& ManagementAdvisory Services Financial Advisory The Future of Community Banking Conference Top Five IT Mistakes and How to Avoid Them September 10, 2015 Jeffrey P. Marsico Executive Vice President Office - (973) 299-0300 Ext. 120 jmarsico@KafafianGroup.com www.KafafianGroup.com www.jeff-for-banks.blogspot.com
  • 2. 1  He/she is a mechanic that can fix the car. Not design the car.  Is he/she a strategic thinker?  Who do they surround themselves with?  Idea: EVP of Bank Distribution. Top 5 Strategic IT Mistakes & How to Avoid Them Future of Community Banking 1. We Hire a Technician
  • 3. 2  Square Capital advances more than $1MM per day.  Lending club originated $4.4B in loans in 2014.  Mint has over 10 million users.  Quicken Loans is #3 market share in PA.  Idea: Create partnerships with FinTech companies. Top 5 Strategic IT Mistakes & How to Avoid Them Future of Community Banking 2. We Ignore Non-Bank Technology-Driven Disruptors
  • 4. 3  Jimmy the new to work like the old.  Training and reinforcement.  Employees don’t use customer facing technologies.  Idea: Compel employees to use your technologies.  Idea: Negotiate training into new technology contracts.  Idea: Make loan application and account opening UI’s the same for platform and customers. Top 5 Strategic IT Mistakes & How to Avoid Them Future of Community Banking 3. Employees Don’t/Can’t Use the Technology
  • 5. 4  Termination  Conversion/de-conversion  Training  Interfaces  Idea: Be specific in IT contracts and negotiate when your leverage is the greatest… i.e. far in advance of contract renewal with enough time to shop for alternatives. Top 5 Strategic IT Mistakes & How to Avoid Them Future of Community Banking 4. Avoid Landmines in IT Contracts
  • 6. 5 Top 5 Strategic IT Mistakes & How to Avoid Them Future of Community Banking 5. Sweating the Small Stuff Definitions: Hacking is defined as a targeted intrusion into a data network, including skimming. Data on the Move is defined as “when an electronic storage device, laptop or paper folders leave the office where it is normally stored. This would include data in transport to a storage location.” Source: Identify Theft Resource Center Top Cyber Security Risks  Scope of Threat – The largest problem remains the rate at which cyber attacks continue to evolve and diversify.  Interconnectivity – The interconnection of banks and others in the industry, as well as world wide, is crucial to the financial system’s functioning, but it’s also an area of vulnerability when it comes to cyber security.  Ideas/Mitigants – Policy and procedures, password resets, safe surfing, personal device management, vendor management, employee screening. 10.2% 29.0% 7.9% 11.5% 15.1% 10.9% 12.5% Insider Theft Hacking Data on the Move Accidental Exposure Subcontractor Employee Negligence Physical Theft
  • 7. 6  Not building a business case for tech investment.  Prioritizing based on strategy.  All constituencies in a room.  Be bent for action, and be timely.  Idea: Change the IT Steering Committee to be less tactical (or not at all) and more strategic. Ask standard questions: What is the business case? How does this move us toward our strategic vision? How long will it take to implement? How will we measure success? Top 5 Strategic IT Mistakes & How to Avoid Them Future of Community Banking 6. Strategic Investments
  • 8. Performance Measurement Strategic Management Profit& Process Improvement Board& ManagementAdvisory Services Financial Advisory The Future of Community Banking Conference Top Five IT Mistakes and How to Avoid Them September 10, 2015 Jeffrey P. Marsico Executive Vice President Office - (973) 299-0300 Ext. 120 jmarsico@KafafianGroup.com www.KafafianGroup.com www.jeff-for-banks.blogspot.com