Securing Information for a Shared Services Infrastructure

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Compliance storyboard: Classifying & controlling content at the input device.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Automating Crosswalk between SP 800, 20 Critical Controls, and Australian Government.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
Persistent Protection Using E-DRM Technology Jason Fasoo 06/18/2008.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Security+ Guide to Network Security Fundamentals
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Sophos / Utimaco Data Loss Prevention Peter Szendröi, SOPHOS Nordics Jan 20, 2010.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Alfresco Solutions Introducing Alfresco Workdesk Streamline your document-centric business processes. Build repeatable solutions John Powell Founder Alfresco.
New Data Regulation Law 201 CMR TJX Video.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
1 © Copyright 2008 EMC Corporation. All rights reserved. David Mendel Sr. Product Marketing Manager EMC Corporation June 2008 EMC Documentum Information.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Security considerations for mobile devices in GoRTT
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls.
Note1 (Admi1) Overview of administering security.
Business Productivity Infrastructure Optimization Campaign 1 Agenda: BPIO Partner Sales Readiness Workshop Day 3: Topic: Enterprise Content management.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Riding the Cloud Storm – Responding to Cloud Risks David Rawle Technical Director.
White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Cybersecurity - What’s Next? June 2017
Juniper Software-Defined Secure Network
92% of the world’s data was created in the past 2 years
Document Management June 1st 2011 Michel Lapointe Mario Poirier
Azure Information Protection Strategy and Roadmap
Deployment Planning Services
Impact of IT Consumerisation on Enterprise Security
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Migrate SharePoint to the cloud the Microsoft IT way
CIS 502 Education for Service-- tutorialrank.com
Company Overview & Strategy
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
How to Mitigate the Consequences What are the Countermeasures?
IS4680 Security Auditing for Compliance
IN THE PAST, THE FIREWALL WAS THE SECURITY PERIMETER devicesdata users apps On-premises.
By: Dorian Lockhart Wilston Johnston
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Microsoft Data Insights Summit
In the attack index…what number is your Company?
Strengthening the GDPR business opportunity with Microsoft 365
Cryptography and Network Security
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Security Insights: Secure Messaging
Presentation transcript:

Securing Information for a Shared Services Infrastructure Rick Freeman Mgr, Professional Services Richard.freeman@ricoh.ca Connie Tidy, EW Solutions Consultant 587-225-2472 Connie.tidy@ricoh.ca © 2012 Ricoh Americas Corporation. All Rights Reserved.

Making Information Work SCAN Secure Institutional Knowledge Collaborate Anytime Anywhere SCAN FAX JPG PDF XLS DOC Mobile worker Information mobility On premise Work From Anywhere, on Any Mobile Device PDF Digital SEARCH Archive Turn Trapped Information Into Useful Data Unlock Data & Insights From Information Silos Optimize Workflows Improve Processes © 2016 Ricoh USA, Inc. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. Digital Transformation © 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. The Digital Dilemma © 2012 Ricoh Americas Corporation. All Rights Reserved.

Gaps in Current Technologies Firewalls Virus Protection YOUR DATA VPN End Point Encryption DLP

Constant Risk of Data Loss http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

© 2012 Ricoh Americas Corporation. All Rights Reserved. The End Result © 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. Content is Everywhere © 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. New Challenges Tightened regulations and compliance Losing intellectual property & trade secrets Threats by insiders & authorized users Security in cloud, mobile & social computing © 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. Relationships Don’t Last Forever © 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. Top Insider Threats © 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. Most Vulnerable Applications © 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. The Rise of Insider Attacks © 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. Focus on Deterrence © 2012 Ricoh Americas Corporation. All Rights Reserved.

Enterprise Digital Rights Management Multi-layered Approach The Three Phases of Data Wide Data/Document Policy Enterprise Digital Rights Management Multi-layered Approach Internal use External use VPN Network Transport Encryption Controlled Perimeter Enterprise Content Management Data Loss Prevention Full Disk Encryption Narrow Data at Rest Data in Transit Data in Use Controlled Phase © 2012 Ricoh Americas Corporation. All Rights Reserved.

Prevent unintended information disclosure or exposure What is Enterprise DRM? Prevent unintended information disclosure or exposure File encryption – persistent document security Permission control – prevent unauthorized use of digital files Audit trail – consistent protection and verification © 2012 Ricoh Americas Corporation. All Rights Reserved.

How Enterprise DRM Works Title Month Year How Enterprise DRM Works VIEW Corporate VPN Partner Network Author Partner Review Internet Unauthorized User Content Server EDRM Policy Server © 2012 Ricoh Americas Corporation. All Rights Reserved.

Covering Document Lifecycle Sales Mary Revoke Partner Tina Create Edit 30 days Legal Ethan Edit VP Mark Revoke Finance Chris Content Repository View Edit Print Print Chris Peters 9:37 11/7/2018 172.16.125.21 © 2012 Ricoh Americas Corporation. All Rights Reserved.

Regardless of its location! Control Your Content Regardless of its location! © 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. Canadian Implications © 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. Mandatory Reporting © 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. Provinces © 2012 Ricoh Americas Corporation. All Rights Reserved.

Classify, Prioritize and Protect © 2012 Ricoh Americas Corporation. All Rights Reserved.

Value Proposition Protects valuable information beyond controlled boundaries using data-centric security strategies Ensures valuable digital assets are viewed only by the intended audience with file-level permission control and unauthorized users cannot access the digital assets Reduces the risk of intellectual property loss from insiders or while collaborating with 3rd parties Most effective tools for insider threat management Suitable for diversified collaboration environment in cloud and mobile Last resort against possible Advanced Persistent Threat (APT) attacks © 2012 Ricoh Americas Corporation. All Rights Reserved.

© 2012 Ricoh Americas Corporation. All Rights Reserved. Summary © 2012 Ricoh Americas Corporation. All Rights Reserved.

May is the IA awareness month

IIA-Calgary / Upcoming Events May 16-19 = IIA-Canada Training Week in Vancouver, BC May 17 = “EHS Auditing - Environmental Auditing in Oil & Gas: A look back and a look ahead” Brownbag @ UofC Downtown Campus ALMOST SOLD OUT May (TBA) = AGM Meeting & Summer Social @ National 8th June 15 = “Governance and Audit Oversight within Canadian Municipalities” - Afternoon session from 16h00 to 17h30 @ UofC Downtown Campus

Calgary Chapter’s Partner Ask for a Quote ! Home & Auto Insurance Rates negotiated for the IIA Calgary Chapter’s members Daniel Engman FCIP, CRM Business Development Advisor

© 2012 Ricoh Americas Corporation. All Rights Reserved.