The Importance of Compliant Identity & Access Management in Insurance Tuncay Küçüktaş - Aksigorta Assistant General Manager, CIO.

Slides:



Advertisements
Similar presentations
Organizational Governance
Advertisements

Business Partnership Model Aligning HR Service with organisation strategy.
IBM Corporate Environmental Affairs and Product Safety
How we work with you. Infrastructure savings Pay only for what you use Labour Costs Match job functions with skill sets Financial Technology Efficient.
Course: e-Governance Project Lifecycle Day 1
LYDIA HARKEY EIR ACCESSIBILITY OFFICER TEXAS A&M UNIVERSITY COMMERCE FALL Implementing Accessibility Strategically at Your Organization.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Control and Accounting Information Systems
Driving Efficient Cross-Border Trade Angela Baumann Solution Management SAP GTS SAP AG, 2005.
“High Performing Financial Institutions and the Keys to Success in an Uncertain Environment”
Outcomes focused regulation and compliance in practice Peter Scott Peter Scott Consulting
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
1 Fundamental Principles of Solution Design and Implementation Chapter 3.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
ECM Base Compliance Input Messaging & Alert Compliance dashboard Compliance Monitoring Internal & External Audit Tracking Access Control Compliance & Financial.
“The Impact of Sarbanes Oxley, An Evolving Best Practice” Ellen C. Wolf Senior Vice President & Chief Financial Officer American Water National Association.
Information Systems Controls for System Reliability -Information Security-
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
MGT-555 PERFORMANCE AND CAREER MANAGEMENT
Information Technology Audit
Internal Auditing and Outsourcing
Compliance April 29, What is Customs Compliance? A program of ‘shared’ responsibility in which Customs requires all importers to demonstrate reasonable.
1 Next Generation ISO Susan LK Briggs Presented to EFCOG/DOE EMS Implementation, Lessons Learned & Best Practices Training Workshop, 3/05.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Welcome to the Cloud Era Mohammed Owais.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Delivering an Architecture for the Social Enterprise Alpesh Doshi, Fintricity Information Age Social&Mobile Business Conference Tuesday 31st January 2012.
Submitted By Tanmoy Mondal IIFT MBA (IB) The future lies on Business transformation & Employee- Organizational Alignment.
SMS Operation.  Internal safety (SMS) audits are used to ensure that the structure of an SMS is sound.  It is also a formal process to ensure continuous.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
VALERIE MATHIEU PAPER NO. 13 Presented By Jared Norrell Service strategies within the manufacturing sector: Benefits, costs and partnership.
Leveraging Speech Analytics for Customer Satisfaction Presented by: Karl Walder, VP – Solutions Noble Systems Corporation.
Bruce Hallas Director Marmalade Box Ltd. UK Business Comparison of Information Security Incidents & Financial Impact Corporate UK SME UK 25% ↓ in number.
Statewide Data Architecture and Exchange. Problem  Data not standardized, consistent, or aligned with business needs  Citizens/Customers of state services.
1 Customer Relationship Management (CRM): The Business Focus.
BUSINESS PROCESS REENGINEERING & ERP
1 Outsourcing and OffShoring January 2004 Sandy Senti.
BIMCO Maritime Environmental & Efficiency Management Seminar - 2 June 2015 ©ecoreflect ltd Why manage environmental issues? Dr Anne-Marie Warris.
The UNIVERSITY of GREENWICH 1 October 2009 L8a Audit and assurance J. E. Spencer-Wood Auditing and assurance Lecture 8a Internal audit.
G:\99Q3\9220\PD\AJD2.PPT 1 Harriet P. Pearson Chief Privacy Officer IBM February 7, 2003 IBM.
© 2005 IBM Corporation IBM Business-Centric SOA Event SOA on your terms and our expertise Operational Efficiency Achieved through People and SOA Martin.
Strategic Human Resource Management SHRM. Public administration must meet the challenge of changing social needs and priorities, new directions in public.
Risk Management - “Local Government Pitfalls.” IMFO – Sustainability Workshop Risk Management 30 March
1 Accounting systems design & evaluation Karen Lau 25 Feb 2002.
 2015 Intercultural Services | Standard Modules Since 1994 Intercultural Services offers Cultural Intelligence to help companies  Attract and integrate.
A short introduction to the Strengthened Approach to supporting PFM reforms.
TREASURY REGULATIONS’ CHANGES AND POTENTIAL IMPACT
© 2009 IBM Corporation Smarter Decisions for Optimized Performance IBM Global Executive Forum Panel Discussion Business Analytics and Optimization Fred.
B-I-C-T Security Strategy Introducing a new framework November 19, 2015 Aman Raheja
Confidential 1 HIPAA Compliance at Blue Cross Blue Shield of Minnesota: A Case Study Tim Wittenburg Director of Corporate Architecture & Data Management.
Foundations of Information Systems in Business. System ® System  A system is an interrelated set of business procedures used within one business unit.
Kathy Corbiere Service Delivery and Performance Commission
Identity Management and Enterprise Single Sign-On (ESSO)
Risk Management for Small & Medium Sized Enterprises
FST Media Technology & Innovation – the Future of Insurance & Wealth Management Conference Four Pillars of the CIO Role Strategy, Governance, Risk and.
Legal framework Look at the legal compliance and framework a business is subject to.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Understand Systems Integration Chao-Hsien Chu, Ph.D. School of Information Sciences and Technology The Pennsylvania State University How Hierarchy Why.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
CLOUD-BASED VIDS A CIO’S PERSPECTIVE Stephen Alford, CIO WEP, Inc.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Agenda © 2015 | Tel: (980) | Big Data: Types of data and benefits Implementation Challenges / Risks Tools & Platforms.
Building a Sound Security and Compliance Environment for Dynamics AX Frank Vukovits Dennis Christiansen Fastpath, Inc.
JMFIP Financial Management Conference
Identity and Access Management
Management Information Systems
Attention CFOs How to tighten your belt and still survive May 18, 2017.
The EDUCAUSE 2018 Top 10 IT Issues
Capex to Opex: Are You Ready?
GRC - A Strategic Approach
Presentation transcript:

The Importance of Compliant Identity & Access Management in Insurance Tuncay Küçüktaş - Aksigorta Assistant General Manager, CIO

What is Compliant Identity & Access Management ? Tuncay Küçüktaş / 2.. should be designed to initiate, modify, track, record, and terminate the specific identifiers associated with each account, whether human or nonhuman, by making use of the organization’s IT resources..is the key enabler and fundamental to Security and compliance.. is the security discipline that enables the right individuals to access the right resources at the right times for the right reasons..is about the end-to- end life cycle management of digital identities.. is the set of business processes information and technology for managing and using digital identities

The Importance of Compliant IAM in Insurance Tuncay Küçüktaş / 3

Why important ? Tuncay Küçüktaş / 4

Why important ? Tuncay Küçüktaş / 5

Why important ? Tuncay Küçüktaş / 6

Why important ? Tuncay Küçüktaş / 7

How IAM Supports Compliancy Identity and access management (IAM) technology and methods provide direct support for the compliancy requirements for;  fraud reduction  policy enforcement  risk assessment  compliance & auditing Tuncay Küçüktaş / 8

Typical IAM Framework - Today

IAM and GRC Complements Each Other

Typical User Challenges Source : SAPTuncay Küçüktaş / 11

Source : SAPTuncay Küçüktaş / 12 Compliant, Business-Driven Identity Management Process Flow

Common IAM areas (business value & risk reduction) Tuncay Küçüktaş / 13

How to Implement Compliant IAM ? Tuncay Küçüktaş / 14 Develop a strategy Don’t think of Compliant IAM as an IT-only initiative Be prepared for objections and concerns Avoid the “Big Bang” approach Don’t rush Create your inventories Start with enterprise-level roles first

Potential Impacts of NonCompliancy  Severe penalties in cases of noncompliance  High financial costs to comply with regulatory requirements  Diversion of executive attention as effort is focused on compliance activities rather than business priorities  Lower costs and higher productivity  Flexibility  Compliance  Improved life cycle of employees, partners, and customers  Moving the management responsibility from IT to business process owners Tuncay Küçüktaş / 15

Challenges  Incorrect Strategy  Staff resistance  Cultural and political realities  Lack of skills  Bureaucracy  Scope creep  Inappropriate automation Tuncay Küçüktaş / 16

Tuncay Küçüktaş / 17 By year-end 2020, 80% of user access will be shaped by new mobile and non-PC architectures that service all identity types regardless of origin

Tuncay Küçüktaş / 18 By 2020, 60% of all digital identities interacting with enterprises will come from external identity providers through a competitive marketplace

Tuncay Küçüktaş / 19 By 2020, the Internet of Things will redefine the concept of identity management to include what people own, share and use

 Cloud and Mobility  The Internet of Things  Growing more digitalized marketplace  Identity Analytics

THANK YOU