Logo

This webinar was originally broadcast on:
Thursday, May 08, 2014 01:00 PM EDT / 10:00 AM PDT
 
If you have previously registered for this event, please login here:
 Email
 LOGIN

Registration is required to attend this event. Please register now.
First Name*
Last Name*
Title*
Industry*
Company Size*
Company*
Street Address 1*
Street Address 2
City*
State/Province*
Zip*
Country*
Phone*
Email*
NEW!... Early Registration!
 Check here if you would like to automatically be registered for webinars on the same topic
You must have Javascript and Cookies enabled to access this webcast. Click here for Help.
 
Please enable Cookies in your browser before registering for the webcast.
 
*Denotes required.
 
REGISTER
A report of data breaches tracked by the Privacy Rights Clearinghouse between January 2005 and May 2013 has documented over 3000 known security breaches in the United States in that period, in which almost 610 million customer records have been exposed. These are the known breaches—many yet go unreported.

Securing customer data within your contact center can be a challenge when you’re handling millions of confidential personal data transactions a year. The need and awareness for heightened security surrounding the contact center and related applications has become increasingly important as the threat of cyber-crime expands. As the acceptance of cloud-based contact centers continues to grow, there has been a dramatic increase in the visibility of in security intrusions and violations across the industry, requiring intensified corporate vigilance and compliance with new and enhanced security standards.

As the migration from premises to the cloud continues to grow, there is additional pressure for Payment Card Industry Data Security Standard (PCI DSS) compliance on the “front lines”. Front line contact center activity includes requesting, entering and securely storing personal and confidential customer information (such as social security numbers, credit card numbers and CCV or card code verification) by today’s dispersed contact center agents, including those cloud connected agents working remotely without close supervision.

Join our discussion on how cloud security stacks up against traditional premises based solutions and what you need to consider before you move to the cloud.

You’ll learn:
  • Why the stakes have never been higher for critical security attentiveness
  • What level of diligence providers should be performing with suppliers
  • What the key vulnerabilities are when securing your cloud contact center
  • What’s the difference in securing a cloud-based environment
  • What level of PCI DSS compliance is necessary

Who should attend:
  • C-Level Executives
  • IT Professionals
  • IT Security Professionals
  • Contact Center Managers

Presenters

Rod McLane
Director Solutions Marketing
Genesys


Daniel Blander
Sr. Director, Information Security & Compliance
Genesys



Moderator

Peter Bernstein
Senior Editor
TMCnet