KNOWING YOUR
CUSTOMER
–
SEVEN BUSINESS-CRITICAL OUTCOMES
Observed annually on the third Thursday of every quarter, ‘Get to
Know Your Customer Day’ reminds businesses, large and small, to
take the time to better understand their customers – in the world
of technology, these are their ‘users’. But knowing the users is
of critical importance every day in order to enable providers to
manage and mitigate risks such as data loss, fraud, viruses and
malware, to keep their data, identity and networks safe. Intelligent
CISO spoke with seven technology industry experts on the
subject. Here is what they said.
1.
1. Building consumer trust
RUPERT SPIEGELBERG, CEO
AT IDNOW
As we do more online, knowing
your customers has become more
important than ever before, particularly
in the banking sector. Digital IDs
are becoming the new currency, so
companies need an easy, trusted and
compliant way of finding out who their
customers really are.
But with diverse, international customer
bases, growing regulation and a whole
host of other challenges to contend
with, doing that is much easier said
than done.
Online identity verification is a growth
market because, from a consumer
perspective, it enables customers to ID
themselves in a fast, convenient manner
on the same device they will use to
62
transact with a particular supplier and
from a supplier perspective, it can satisfy
local regulation requirements that the
potential customer is who they say they
are, as well as onboard new customers
with ease and speed.
In short, knowing your customer
technology is building consumer trust
and helping make the connected world a
safer place.
2. Striking the right balance
between security and user needs
ANURAG KAHOL, CTO
AT BITGLASS
Mobility. Flexibility. Accessibility. These
are some of the most important words
that underpin the requirements of
today’s workforce. Failure to provide
a working environment that supports
these requirements can mean the
difference between attracting and
retaining staff – or being left on the
proverbial shelf. The mobile security
challenges have been exacerbated in
recent years by the rapid uptake of
BYOD. These unmanaged or employee-
owned devices require access to
corporate data but this increases the
risk of sensitive data being leaked,
especially if a device is lost or stolen.
A further vulnerability is that BYOD
devices represent a potential entry point
for introducing viruses and malware to
the rest of a corporate network.
Issue 10
|
www.intelligentciso.com