Fight against Data disclosed to unauthorized recipients intentionally

What answer to bring if you try to fight against Data disclosed to unauthorized recipients intentionally ?



Data is made available or disclosed to unauthorized individuals, entities or processes for fraudulent purposes by an employee in order to steal non-public information:

  1. Personal data breaches (e.g. Not following the "Need to know" principle)

  2. Data leakage/theft (except IT security breach)


Pain points:

  • Inappropriate systems access right management
  • Inability to detect and analysis weak signals relating to employees' actions with regards to data management 



Mitigation internal approach:

  • Risk management by design
  • Machine Learning applied to fraud management
  • Alert / Validation by design
  • Privacy by design


  • Cloud services
  • Big Data
  • Data Management




«  Tackle the costs of online fraud   »

Callsign has built a secure mobile multi-factor authentication and authorisation engine, through the introduction of patented machine-learning biometric, behavioural, geo-location and identity analysis, combined with traditional methods.

Find more about Callsign here.



« Self-driving cyber defence platform »

Senseon’s unique ‘AI Triangulation’ technology emulates how a human security analyst thinks and acts to automate the process of threat detection, investigation and response.

Find more about Senseon here.


How Aurexia can help?


PRE-PROJECT: preparation of innovative project

  • Conduct RFP process on business topics

  • Validate data to be proceed by the solution (data preparation)

  • Formalize digital ambitions & business needs

  • Detect relevant business use-cases for specific technology

  • Lead ideation workshops to define pain points and needs


DURING PROJECT: End-to-end project delivery

  • Ensure global project management with key stakeholders

  • Design business requirements and adaptive services

  • Review operating model with new solution and business

  • Define IT governance with key stakeholders on new solution deployed

  • Promote solution with an awareness plan and change management strategy


AFTER PROJECT: Monitoring project success

  • Ensure change management plan roll-out with users and management

  • Conduct data visualization project to add reporting capabilities

  • Promote the project through a dedicated communication plan

  • Formalize KPI and build project business case

  • Identify new project opportunities (same client with other departments


Want to know more? Contact us: