COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.

Slides:



Advertisements
Similar presentations
Internet Futures. Here I am channelling Anders Rockstrom of Telia Sonera, whose presentation at the.se event in October 2006 had a profound impact on.
Advertisements

TOPIC LEARNING BTEC Level 3 Unit 28 Websites L01- All students will understand the web architecture and components which allow the internet and websites.
Privacy: Facebook, Twitter
ICT iGCSE.  You should be able to describe the use of Internet developments such as:  Web 2.0  blogs  wikis  digital media uploading websites  social.
Maximise Your Online Presence SEO & Social Media Strategies For Local Business Owners.
© 2007 IBM Corporation Innovation That Matters Web 2.0: the current generation of Internet capabilities Christopher Perrien
The Future of Social Collaboration Randy Williams Enterprise Trainer and Evangelist AvePoint.
By Christopher Tonkin. What is Web 2.0? Web 2.0 is made up of many things. Eg. Web applications, social-networking sites, video-sharing sites, wikis and.
An Integration Platform of Social Networking Applications to Support Life Long Learning in Rural Territories: the “SoRuraLL Virtual Learning World” Environment.
Social Media: Communicating Your Message November 8, 2010 > Tina Lambert, CAE | VSCPA Vice President of Member & Public Relations.
Web 2.0 Web 2.0 is the term given to describe a second generation of the World Wide Web (WWW) that is focused on the ability for people to collaborate.
Communicator’s Council Feb. 28, 2011 Blogs and Social Media.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
1 | Social Media at EEREeere.energy.gov Public Service of Colorado Ponnequin Wind Farm Social Media at EERE Allison Casey National Renewable Energy Laboratory.
Adriana Iordan Web Marketing Manager / Avangate Social Networking Media How the software authors should use it?
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
SOCIAL MEDIA FOR BUSINESS reqSmart. Some Facts about Social Media - I Years to reach 50 million users. Radio – 38 years Television – 13 years Internet.
Item Web 2.0 application relevant to teacher’s work.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
The Google Cloud EDTEC 572. History & Overview Cloud Computing Grid Computing Parallel Computing Distributed Computing Ubiquitous Computing Mobil phon.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
How many are using social media? Which channel? When? How? Why?
How BT uses social media with internal communications Mark Morrell – BT Intranet manager
1 Moderator: Thomas N. Shorter, Godfrey & Kahn, S.C. Panelists: Nancy Davis, Ministry Health Care Lee Kadel, Wheaton Franciscan Healthcare Ralph Topinka,
Chapter 8: Collaborating with Technology Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter
1 Web 2.0 Library 2.0 Librarian 2.0 Presented for EINIRAS – 9 October 2007 byby Ran Hock Online Strategies.
Social Media is: ? Social Media: are media designed to be disseminated through social interaction, created using highly accessible and scalable publishing.
Webroot Web Security SaaS A Better Approach to Web Security
In general, the cloud is the concept of remotely hosted IT services (cloud apps) provided by a supplier (cloud providers)
Web 2.0 and Internet Safety for Educators 3/2/20111Region 1.
CHAPTER 1 THE READ/WRITE WEB Marquita Friend Resa Garvin October 17, 2012 EDUC 303.
Use of Electronic and Internet advertising options Standard 3.4.
The Changing World of Endpoint Protection
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
By – What is "the Web", a hypertext system that operates over the Internet Web 2.0, a perceived transition of the Web from a collection.
Where the Wild Things (And People) Are: Facebook for Beginners.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Social Networking Presentation to Department Heads January 21, 2010.
Workshop site:
Leveraging Web 2.0 for Prelicensure Education A Presentation for the 2009 CNIA Conference Christine A. Hudak, Ph.D., RN-BC, CPHIMS Case Western Reserve.
Top 15 Online Tools Cliff Hutto Columbus State University.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
Parenting 2.0 Raising Responsible Digital Citizens.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Defining Social Media Social Media Marketing Communications Digital Marketing Characteristics Types of Internet Advertising Mobile Marketing Social Behavior.
Principles of Marketing
McGraw-Hill/Irwin © The McGraw-Hill Companies, All Rights Reserved CHAPTER 15 Creating Collaborative Partnerships.
Lecture 5 Web 2.0 Teaser Instructor: Jie Yang Department of Computer Science University of Massachusetts Lowell Exploring the Internet, Fall 2011.
Web 2.0 Rachel Coombes.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
Introduction to Social Media October 28, 2010 Green County High School Vickie Buckman.
Blue Coat Confidential Web and Mobile Application Controls Timothy Chiu Director of Product Marketing, Security July 2012.
By Samantha Kozar.  What are social networks?  What is Facebook?  What is Gowalla?  What are the capabilities of these sites?  Privacy Settings 
Chapter 8 Team Critique Will Beichner and MaFe Menendez.
Social Media – Why It Matters & Why You Should CONNECT to.
Online Communications This is about different ways that people & businesses communicate online You will already be very familar with most ways.
Key business enablers of Growth and ICT at the forefront Andre Joubert9 June 2016.
PATLIB2009: building on best practices 23 June 2016Karen Blakeman Photo taken by podoboqhttp://
13 Social Media and Networking. Introduction Social Media Types of Social Media Benefits and Challenges Measuring Social Media Performance.
What is your Customer Effort? Lou Ann Jones Contact Center Specialist.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
BUILD SECURE PRODUCTS AND SERVICES
COMPETITIVE ANALYSIS D CUSTOM TEMPLATE.
Web 2.0 and Internet Safety for Educators
Securely run and grow your business with Microsoft 365 Business
Brian Kelly UKOLN University of Bath Bath, UK
Use of social media and other communication tools
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Presentation transcript:

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit June 2009 COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Lee Kelly M.S., CISSP Security Engineer Patriot Technologies

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Agenda Technology Shift –Traditional apps – Web Based apps Web 2.0 –Adobe AIR –Mashups – iGoogle Questions to Consider

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Desktop of Yesterday Local applications and data Network applications and data Basic Web Applications Static Websites

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Desktop of Today Local applications and data Network applications and data       Corporate Webmail       Instant Messaging       Hosted Applications Blogs       Local Weather             Hosted Security Security YouTube Videos             Networking User Generated Applications Hosted Security Hosted Applications and Data User Generated Content Web-Based Mashup

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Web 2.0 is a Hot Topic 96% of companies are using Web 2.0 technologies find them valuable -Forrester survey Web 2.0 can provide a competitive edge and address customer demand. - McKinsey survey We encourage employees to develop new methods of relationship- building, learning and collaboration. - IBM Internet-use policy (company has over 33,000 Facebook accounts) Companies have made the leap into Web 2.0 without thinking about security - Forrester survey AJAX flings open the door to new malware propagation methods” - Richard McManus, ZDNet AJAX flings open the door to new malware propagation methods” - Richard McManus, ZDNet “This stuff scares the hell out of me.” - Paypal CISO Web 2.0 security is seriously flawed - PCWorld

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Business Growth Driving Web 2.0 Adoption in the Workplace 6 Web 2.0 includes –Social Networking –Hosted Applications –Blogs, Wikis –File Sharing –RSS Feeds New technologies allow users to –Create, Post –Modify, Edit –Interact –Share Information Web 2.0 includes –Social Networking –Hosted Applications –Blogs, Wikis –File Sharing –RSS Feeds New technologies allow users to –Create, Post –Modify, Edit –Interact –Share Information    Corporate Webmail    Instant Messaging    Hosted Applications Blogs    Local Weather    File Sharing YouTube Videos    Networking

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Users are utilizing Web 2.0 in the Workplace 7 74% of IT managers allow access to mashups 71% allow wikis 56% allow access to photo uploading sites 49% allow access to social networking sites 74% of IT managers allow access to mashups 71% allow wikis 56% allow access to photo uploading sites 49% allow access to social networking sites    Corporate Webmail    Instant Messaging    Hosted Applications Blogs    Local Weather    File Sharing YouTube Videos    Networking

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS The Web 2.0 Problem Web 2.0 is Happening Companies face increasing demands to adopt Web 2.0 Technologies enable efficiency, better communication and service Increasingly, employees will use it anyway Web 2.0 is Scary Web 2.0 breaks legacy security models Reactive systems can’t keep up with dynamic content and threats Deployments are outpacing security solutions

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS What are Risks of Web 2.0? Reputation systems know what used to be on a site – not what was just posted AV signatures are reactive – waiting until the damage is done Simplistic, non-granular policies can lead to over- blocking and frustration Examples : –Facebook = BAD, block all pages –Wikipedia = GOOD, allow unrestricted access 9 Many security systems rely on looking backwards

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Adobe AIR

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS iGoogle

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS iGoogle Hotmail Yahoo Twitter Chats IM

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS iGoogle

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS iGoogle

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Web Security is Changing URL filtering has become commoditized Many vendors adding filtering to core offerings – cheap or free Web 2.0 is game changing –Dynamic user-generated content creates many new security risks –Need to prevent the bad content from coming in and the good content from going out Web Filtering Web Security Value Time Today

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS New Security Requirements: Shift to a Data-Centric Focus It’s all about the data Internal threats cost more than external Employee 2.0 meets Web 2.0 Internet as a business enabler Traditional security is ineffective Guard infrastructure against inbound attacks – not against outbound data loss Single communication channel, no collaboration to examine content and context in real-time Reactive, static, signature-based Lack business context, don’t know “who” and “what” goes “where” and “how”

COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Questions to Consider Are you planning to use Web 2.0 technologies to support business initiatives? What are those business initiatives? What Web 2.0 projects do you have on your roadmap? –Mobile users, customer intimacy/extranets What are your concerns about Web 2.0? –Privacy, Information leaks, New threat vector What security measures are you using to effectively control usage of Web 2.0 technologies and websites? How will Web 2.0 impact your risk profile? Compliance programs? Is blocking Web 2.0 hindering business opportunities?