Intelligent CISO Issue 10 - Page 62

KNOWING YOUR CUSTOMER – SEVEN BUSINESS-CRITICAL OUTCOMES Observed annually on the third Thursday of every quarter, ‘Get to Know Your Customer Day’ reminds businesses, large and small, to take the time to better understand their customers – in the world of technology, these are their ‘users’. But knowing the users is of critical importance every day in order to enable providers to manage and mitigate risks such as data loss, fraud, viruses and malware, to keep their data, identity and networks safe. Intelligent CISO spoke with seven technology industry experts on the subject. Here is what they said. 1. 1. Building consumer trust RUPERT SPIEGELBERG, CEO AT IDNOW As we do more online, knowing your customers has become more important than ever before, particularly in the banking sector. Digital IDs are becoming the new currency, so companies need an easy, trusted and compliant way of finding out who their customers really are. But with diverse, international customer bases, growing regulation and a whole host of other challenges to contend with, doing that is much easier said than done. Online identity verification is a growth market because, from a consumer perspective, it enables customers to ID themselves in a fast, convenient manner on the same device they will use to 62 transact with a particular supplier and from a supplier perspective, it can satisfy local regulation requirements that the potential customer is who they say they are, as well as onboard new customers with ease and speed. In short, knowing your customer technology is building consumer trust and helping make the connected world a safer place. 2. Striking the right balance between security and user needs ANURAG KAHOL, CTO AT BITGLASS Mobility. Flexibility. Accessibility. These are some of the most important words that underpin the requirements of today’s workforce. Failure to provide a working environment that supports these requirements can mean the difference between attracting and retaining staff – or being left on the proverbial shelf. The mobile security challenges have been exacerbated in recent years by the rapid uptake of BYOD. These unmanaged or employee- owned devices require access to corporate data but this increases the risk of sensitive data being leaked, especially if a device is lost or stolen. A further vulnerability is that BYOD devices represent a potential entry point for introducing viruses and malware to the rest of a corporate network. Issue 10 | www.intelligentciso.com