security and privacy begin with trust...security and privacy begin with trust evgenia ostrovskaya....

18
Security and privacy begin with trust Evgenia Ostrovskaya Business Development Director, Signature Brands EUROPE Genetec

Upload: others

Post on 06-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

Security and privacy begin with trustEvgenia Ostrovskaya

Business Development Director, Signature Brands EUROPE

Genetec

Page 2: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

Takeaways

Security systems must be cyber secure as well

Evidence management can be simple

GDPR-ready tools for video surveillance exist

Page 3: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

The Evolving Banking Environment

Page 4: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

Banking is changing

The business landscape is changingToday's bank branch: Trusted advisor; Digital ambassador; Problem solver

Security & Fraud Prevention teams are expected to do more… with lessAre your operators empowered within your current security system?

Decision making is more agile and frequent than everAre you tapping into the right resources that extract the intelligence to help you make more informed, real-

time decisions?

Page 5: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

Lock doorsMonitor branch locationsManage alarmsIdentify lossesRun reports

Traditional security systems solve traditional problems

Designed in silos, they work best in silos

Page 6: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

How will you adapt?

Page 7: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

The Connected Bank

Video AnalyticsBe alerted to known offenders

Genetec Retail Sense for banksLeverage video to better understand customer behavior

Omnicast CamerasVideo Management, Facial Recognition

Omnicast CamerasVideo Management, Facial Recognition

ATM Plug-inConnect ATM transaction to video for quick investigations

Unified Solutions Bundle AppliancesAll-in-one solutions connect various systems

Genetec Clearance & Genetec Mission Control Share evidence with partners in an efficient and secure manner

GSOC / Security HubFeed data and video to central location for analysis & problem solving across all branches and ATMs

Transaction System

IntegrationUse analytics to detect exceptional events

Synergis SaaS editionIntegrate panels to Security Center & quickly respond to alarms

Stratocast (Cloud Services)Add cloud services to reduce hardware and IT infrastructure

Page 8: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

Security and privacy should come first!

Page 9: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

Here’s how we can help.GENETEC APPROACH TO CYBER SECURITY

Risk identification1A network of trust 4

Solutions you can rely on 2Transparency and openness 3

and mitigation

Page 10: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

… of systems have at least one camera using default credentials.

23%

Page 11: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

… of cameras use the latest firmware version.30%

Page 12: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

Protect your system from external threats

Track potential risks and close them

Security score widget

Page 13: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

What is the impact of GDPR for retail industry?

Reputational riskAny brand that fails to comply with GDPR will be most likely be publicly vilified

Geographic riskAll organizations offering goods or services to EU markets or monitoring the behavior of EU citizens are subject to the GDPR. This includes all data analytics companies as well.

Huge fines Fines of up to Euro 20 Million or 4% of annual turnover for data breaches will be put in place from that date.

Page 14: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

Personal data captured by security systems • Various methods and measures to protect

personal information need to be implemented.

• Organizations need to protect personal data, and implement tools to facilitate discharging of certain obligations.

License plates captured by license plate recognition systems at parking area

Images of people captured by video monitoring systems

Access control card holders information

Page 15: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

Article 25 “Data protection by design and by default”• The controller shall implement appropriate technical and

organisational measures, such as pseudonymization, which are designed to implement data-protection principles, such as data minimisation

• The controller shall implement appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed.

Page 16: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

Article 15 – “Right of access by the data subject”

3. The controller shall provide a copy of the personal data undergoing processing.

4. The right to obtain a copy referred to in paragraph 3 shall not adversely affect the rights and freedoms of others.

Page 17: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

Takeaways

Security systems must be cyber secure as well

Evidence management can be simple

GDPR-ready tools for video surveillance exist

Page 18: Security and privacy begin with trust...Security and privacy begin with trust Evgenia Ostrovskaya. ... Security systems must be cyber secure as well. Evidence management can be simple

Questions?Booth No. 35