Journ©e d'©tude - 07/11/2016 Transformation digitale : notre r©volution

119
Journée d’étude - 07/11/2016 Transformation digitale : notre révolution !

Transcript of Journ©e d'©tude - 07/11/2016 Transformation digitale : notre r©volution

07112016_ppt_FRConsulting
Mirjam Vermaut, Présidente IPCF
Luc Vanhoutte, Trésorier IPCF
Frédéric Delrue, Vice-Président IPCF
Enquête flash: les résultats
Enquête flash: les résultats
Enquête flash: les résultats
Enquête flash: les résultats
Enquête flash: les résultats
4.Pour vous, transformation digitale représente :
Geert Van Mol, Chief Digital Officer (Digital Strategy & Sales) at Belfius
(Retail & Commercial Banking), Digital Strategy - Retail Commercial
Banking
BIBF/SPCF – 07.11.2016
1930
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
1992
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
1994
07.11.2016 Sensitivity: for internal use & BIBF/IPCF 16
07.11.2016 Sensitivity: for internal use & BIBF/IPCF 17
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
2006
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
2015
07.11.2016 Sensitivity: for internal use & BIBF/IPCF07.11.2016 Sensitivity: for internal use & BIBF/IPCF 22
07.11.2016 Sensitivity: for internal use & BIBF/IPCF07.11.2016 Sensitivity: for internal use & BIBF/IPCF 23
We know that sharks are waiting
under the surface…
Google enters the home environment
07.11.2016 Sensitivity: for internal use & BIBF/IPCF 24
07.11.2016 Sensitivity: for internal use & BIBF/IPCF07.11.2016 Sensitivity: for internal use & BIBF/IPCF 25
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
Facebook dominates P2P communication
07.11.2016 Sensitivity: for internal use & BIBF/IPCF07.11.2016 Sensitivity: for internal use & BIBF/IPCF 28
Amazon is more than retail, they enter the B2B cloud market
07.11.2016 Sensitivity: for internal use & BIBF/IPCF07.11.2016 Sensitivity: for internal use & BIBF/IPCF 29
07.11.2016 Sensitivity: for internal use & BIBF/IPCF07.11.2016 Sensitivity: for internal use & BIBF/IPCF 30
07.11.2016 Sensitivity: for internal use & BIBF/IPCF07.11.2016 Sensitivity: for internal use & BIBF/IPCF 31
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
We’re facing the empowered customer
07.11.2016 Sensitivity: for internal use & BIBF/IPCF 32
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
The empowered customer expects high quality…
07.11.2016 Sensitivity: for internal use & BIBF/IPCF 33
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
… that is always available…
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
… at a low price.
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
So what can we do?
07.11.2016 Sensitivity: for internal use & BIBF/IPCF 36
07.11.2016 Sensitivity: for internal use & BIBF/IPCF 37
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
The “digital first”
mindset needs to
Digital Proximus
Digital Workplace
07.11.2016 Sensitivity: for internal use & BIBF/IPCF07.11.2016 Sensitivity: for internal use & BIBF/IPCF 41
Concretely, how will we achieve this?
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
The world of our
customers is changing rapidly…
07.11.2016 Sensitivity: for internal use & BIBF/IPCF
With Digital Proximus we want to accompany them,
along their full customer journey…
07.11.2016 Sensitivity: for internal use & BIBF/IPCF 43
End-to-End approach
In an omnichannel reality…
Omnichannel sales
Omnichannel servicing
And in a personal way…
07.11.2016 Sensitivity: for internal use & BIBF/IPCF 45
Data-driven
Contextual
A good balance between digital efficiency and
human warmth
Digital adoption
Enterprise servicing
Enablers
47
CRM
“Our industry will
change more in the next 10 years than it did in the
previous 50.”
[email protected]
Jozef Dresselaers, Support coordinator, trainer and consultant
for Small to medium Apple Computer environments
Le bureau mobile du comptable-fiscaliste
Le bureau mobile du comptable-fiscaliste
Synchronisation Cloud
» opaque
» ? rapidité
» ? sécurisé
» ? collaboration
CONDITION Vers 1 point central
A analyser « par service »
Cloud > Documents Office
Oui!
Un mode passe fort et différent pour
chaque « service »!
J’achète toutes les 2 semaines des fleurs pour ma
femme !
Apple > ap, Dropbox > dr, Microsoft > mi, Google > go
Jat2sfpmf!ap Jat2sfpmf!dr Jat2sfpmf!mi Jat2sfpmf!go
Software pour générer des mots de passe et
pour les conserver.
> La vérification en 2 étapes ou 2FA (Two Factor
Authentication)
Une chose que vous connaissez > mot de passe
Une chose que vous avez > code via sms ou via app
Apple, Microsoft, Google, Facebook,
LinkedIn, LastPass, Evernote, Twitter, …
Astuce supplémentaire: Réunion « paperless »
Looking for « peace of mind »?
Confidentiality?
Integrity?
Availability?
Threat actors
Malware
Confidentiality?
Integrity?
Availability?
70
• Parts of the Cybersecurity Strategy of the E.U. EU strives to Boost the overall level of cybersecurity and Foster digital privacy in
Europe.
dedicated to protect personal data stored by the
public and private sectors. http://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32016R0679
• NIS (Network & Information Security Directive) aims
to ensure a higher level of cybersecurity in the EU http://ec.europa.eu/newsroom/dae/document.cfm?doc_id=1666
When will this apply ?
•NIS Official adoption
concerning measures to
of network and information
security across the Union
Who will be concerned ?
Critical Industry
GDPR:
NIS:
Anyone who collect, possess or process personal data of EU residents
What is (sensitive) Personal Data ?
73
Family and demographic information Religious beliefs, racial & ethnic origin, RRN
Home and work information Sexual orientation
Medical records, Health information
Financial information, Union membership
Behavioural patterns and interests
Travel history and location data
Fingerprint or any biometric data for the purpose of uniquely identifying a natural person. Genetic information.
What is (sensitive) Personal Data ?
74
Home and work information Sexual orientation
Medical records, Health information
Financial information, Union membership
Fingerprint, and genetic information
Behavioural patterns and interests
75
76
The disclosure of the Data Breach must contain the following
information's:
Infrastructural requirements
Management of Privileged access
Based on “need to have” and “need to know” for all who use,
interact or interfere with personal data.
Ability to detect Data Breaches and Security Incidents
Data Loss Prevention/Protection
Mobile Device Management
SIEM & Security reporting
79
Delivers business valueDelivers business value
Keep trust-relationshipKeep trust-relationship
Enables better decision-makingEnables better decision-making
Offenses under the GDPR
• Failure to meet time-line for response to Subject Access Request
• Provision of false or inadequate information to the Supervisory Authority
• Fails to respect individual Rights – rectification, erasure, opt out, etc.
• Failure to comply with a formal Notice from the Supervisory Authority
• Failure to notify the Supervisory Authority of a Data Breach
• Failure to appoint a Data Protection Officer, if required
• Failure to carry out a Privacy Impact Assessment
• Failure to maintain appropriate logs and documentation (PIA, etc.)
• Inability to adequately demonstrate the compliance of data processing
• Disclosure of personal data which was obtained without authority
• Inappropriate engagement of a Data Processor (e.g. no contract in place)
The ostrich policy is not anymore an option…
81
Negative publicity will be inevitable in case of breach
You will be held responsible…
So why are we all so overconfident ?
82
83
By Industry
85
We even gave a name to this new market… The Hackonomy
Cyber attacks cost
87
Well organized and prepared…
Relax, solutions do exist…
The 360° Security approach
damages
types Network behavior
Data Signature-
91
Endpoint Mobile device management
Data loss prevention MTP
encryption
The 6 steps of the stairway to heaven…
92
How to translate DGPR into actionable buttons?
93
2. Define Programs or Projects to achieve compliance.
• Asses the current state of GDPR compliance
• Determine GAP’s
• Build a Roadmap
• Identity & access management
• Data Loss Prevention/Protection
• Mobile Device Management
• Assure required security controls are in place to protect your
organization's information and (private) data.
I know, I gave you headache…
94
Proximus Enterprise Security Portfolio
Security analysts
•Services architects
Matthieu Saverys,
Contrôle
Le client – personne privé
placements:
• Approbation des transactions ouvertes
informations
Le client – organisation professionnelle
Le client – organisation professionnelle
logiciel comptable
comptable
Démo
rôles sur compte
• Validation partielle de fichiers
• Exportation au format coda
logiciel comptable
collectifs
Xpenditure : terminée, la corvée des notes de frais!
Expense Management Reinvented
• Slow approval process
•No actual overview of company expenses
•Vulnerable for mistakes
Expense Manual
on Xpenditure servers in EU (Combell)
All data stays accessible and searchable for at least 10 years
for analysis and control
Digital receipt in Xpenditure is accepted as exhibit by authorities
no more paper archive
Power warranty & graceful exit
data export in pdf or xml or long-term storage offering
c c
c c
c c
c c
Global Customers Trust Us
auprès des hôtesses