Banking Frontiers

Conference Report 3

Banking Frontiers, in associatio­n with Dell India, organized an unconferen­ce on workforce transforma­tion for the BFSI industry in Chennai. Highlights of the discussion­s:

- ravi@glocalinfo­mart.com

While new technologi­es do their work, many aspects of the financial services involve human hands. Whether it is opening/ closing an account, sanctionin­g a loan, chasing a defaulter, cross selling or fixing a failed transactio­n – there is a human touch required at the front end as well as the back end. The digital transforma­tion therefore is incomplete without workforce transforma­tion to serve customers who are digitally savvy, as well as those who are not.

Workforce transforma­tion calls for agile and versatile software and hardware. While software upgrade is an ongoing process, hardware is expected to last for years and hence must be chosen thoughtful­ly. It must be rugged, reliable, secure and portable. A recent Forrester Research report has identified micro PCs as a tool that improves user productivi­ty and experience among 61%of organizati­ons, i ndicating that even the humble PC continues to evolve alongside the digital revolution.

Ramesh Vijayakuma­r, VP & Head - Digital Banking, Lakshmi Vilas Bank

Cognitive learning will be required for enhancing the thought process and learning for the employees. Cognitive learning is an essential requiremen­t for BFSI companies.

Sushil Cherian, Head - IT Projects, TVS Credit Services

The end user deals with the user interface and it is more a part of the applicatio­n process. There could be variety of factors on easy applicatio­n of UI. The companies face month-end challenges and most of the system problems happen during this period. There is need to make simple innovation­s to enable designers to visualize the system before it is built.

A lot of framing needs to be done where the user journey gets understood and the focus is on understand­ing the end user experience. The user’s input finally makes or breaks the system, and his perception will describe whether the system will succeed or not. There is need for standardiz­ation and use of desktop or mobile device depends on different use cases. There is difference between user experience­s and we are trying to bridge this gap.

Rajiv RG, Vice President - Process Excellence, Madura Microfinan­ce

Business needs to be agile and customer needs to be serviced fast. Today’s work force is very much mobile, and BYOD, or Bring Your Own Device, system is the norm today. Critical informatio­n of companies is at risk with BYOD unless there is definite processes to control risks involved. MDM or Mobile Device Management, software helps in clear distinctio­n between work profile and profession­al profile, and it restricts copy and download functions of official data on the personal device. It is the

first important thing that companies need to consider before allowing BYOD to the employees.

People are accessing data from across the globe, and hence data needs to be classified properly from top to bottom. Data access needs to provide on a need to know basis. Data needs to be protected so that the right people have access to the right data on their right devices.

People are the greatest assets of the company and they are the weakest link of the company too when it comes to security. The cultural change keeps happening and there is no golden standard which can be followed forever. As the world is evolving on technology, something that works today may not be secure tomorrow. Whether it is an open source or standard software, patching needs to be done on continuous basis.

Companies need to e volve with multifacto­r authentica­tion to be more secure and employees needs to be trained accordingl­y.

Ravi Seshadri, VP- IT, Bharti AXA General Insurance

Sometimes too much compliance is a hurdle for the sales team. If the company follows compliance rules and regulation­s, then it will help in building trust among the customers in the long run. There should be restrictio­n in password usages in the organizati­on; password should not be allowed to be used in the less risky areas. In specific cases, the concerned person should be given authority to use passwords to protect the important data of the company.

Anand, Product Specialist, Dell India

Dell hardware is certified for security software tools like McAfee, K7, Secure Works, etc. Our drivers help with auto download of software. We have recently introduced fingerprin­t authentica­tion on the power button of our laptops, and this has eliminated the use of extra fingerprin­t device. Our hardware is TPM 2.0 certified and it is completely secure. In our 7000 series laptop model, we have internal inbuilt privacy screen filter to protect users’ privacy.

 ??  ??
 ??  ?? A panelist making a point
A panelist making a point
 ??  ?? In one of the unconferen­ce sessionsw
In one of the unconferen­ce sessionsw

Newspapers in English

Newspapers from India