What answer to bring if you try to fight against Data disclosed to unauthorized recipients intentionally ?
Problem
Data is made available or disclosed to unauthorized individuals, entities or processes for fraudulent purposes by an employee in order to steal non-public information:
-
Personal data breaches (e.g. Not following the "Need to know" principle)
-
Data leakage/theft (except IT security breach)
Pain points:
- Inappropriate systems access right management
- Inability to detect and analysis weak signals relating to employees' actions with regards to data management
Answers
Mitigation internal approach:
- Risk management by design
- Machine Learning applied to fraud management
- Alert / Validation by design
- Privacy by design
Technologies:
- Cloud services
- Big Data
- Data Management
Solutions
Callsign
« Tackle the costs of online fraud »
Callsign has built a secure mobile multi-factor authentication and authorisation engine, through the introduction of patented machine-learning biometric, behavioural, geo-location and identity analysis, combined with traditional methods.
Find more about Callsign here.
Senseon
« Self-driving cyber defence platform »
Senseon’s unique ‘AI Triangulation’ technology emulates how a human security analyst thinks and acts to automate the process of threat detection, investigation and response.
Find more about Senseon here.
How Aurexia can help?
PRE-PROJECT: preparation of innovative project
-
Conduct RFP process on business topics
-
Validate data to be proceed by the solution (data preparation)
-
Formalize digital ambitions & business needs
-
Detect relevant business use-cases for specific technology
- Lead ideation workshops to define pain points and needs
DURING PROJECT: End-to-end project delivery
-
Ensure global project management with key stakeholders
-
Design business requirements and adaptive services
-
Review operating model with new solution and business
-
Define IT governance with key stakeholders on new solution deployed
- Promote solution with an awareness plan and change management strategy
AFTER PROJECT: Monitoring project success
-
Ensure change management plan roll-out with users and management
-
Conduct data visualization project to add reporting capabilities
-
Promote the project through a dedicated communication plan
-
Formalize KPI and build project business case
- Identify new project opportunities (same client with other departments