® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Bobby Caudill Solution Architect, Global Government August 2008 Adobe Solutions for Government.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Advertisements

Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Internet of Things Security Architecture
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
1 CLOUD AND SaaS-BASED PLATFORMS: ENSURING DATA PRIVACY May, 2011.
Identity Management Realities in Higher Education NET Quarterly Meeting January 12, 2005.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
The Challenge of Collaboration Jim Ferguson Business Productivity Advisor Microsoft Government.
Chapter 17 Controls and Security Measures
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
02/12/00 E-Business Architecture
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Copyright 2009 Adobe Systems Incorporated. All rights reserved. ® Online Tax Filing Made Easier and More Efficient With Less Expensive Infrastructure Ronny.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Do More In Less Time Will Schoen Microsoft Corporation April 12, 2011 Realize the future of government productivity with online and.
Empowering Small Businesses: Microsoft Office 365 P-Suite Danny Burlage MVP Office 365 Wortell.
Live Meeting APIs Robert Devine Program Manager Microsoft Corporation.
Bcbc Paperless Trade Alfie Taylor Adobe ® An Intelligent Document Perspective Director, Government Practice EMEA 21 June 2005.
Public Key Infrastructure Ammar Hasayen ….
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Multimedia Communication and Information Logistics for AFTER-SALES AND PRODUCT LIFE- CYCLE SUPPORT Click to edit Master title style
Automating 100 Processes with Interneer Apps Chris Condon – Director, IT Innovation and Solutions, Los Angeles Firemen’s Credit Union.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
SharePoint Server 2013 Features and Scenarios for IT Professionals First Lastname, Title March, 2014 Software Assurance Planning Services.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
2008 Adobe Systems Incorporated. All Rights Reserved. Acrobat 9 & BPM 11.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
2006 Adobe Systems Incorporated. All Rights Reserved. 1 Adobe RIA Technologies: Adobe Flex 3 Cornel Creanga Platform Evangelist
© 2010 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. A+ Communication Strategies Emily Timmerman | Adobe Connect Solutions Consultant.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
Chapter 2 Securing Network Server and User Workstations.
DIGITAL SIGNATURE.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cyber in the Cloud & Network Enabling Offense and Defense Mark Odell April 28, 2015.
IS3220 Information Technology Infrastructure Security
© 2015 Adobe Systems Incorporated. All Rights Reserved. Adobe Confidential. About this Presentation  How to use this deck:  This is the Global Channel.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Integration and Forms Tools for Laserfiche from TCi IS124 Kevin Pederson & Chris Sharp.
OFFICE OF VA ENTERPRISE ARCHITECTURE VA EA Cybersecurity Content Line of Sight Report April 29, 2016.
Information Management System Ali Saeed Khan 29 th April, 2016.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
© Akaza Research, LLC : 1 :: 10 Professional open source for clinical research.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
HUB International: Software & Common Applications
CERES UNIFIED TECHNOLOGY SERVICES UPDATE
Identity and Access Management
Streamline your HR document management processes
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Overview of Zero-Knowledge Systems Inc
E-cert (Digital Certificate)
Presentation transcript:

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Bobby Caudill Solution Architect, Global Government August 2008 Adobe Solutions for Government Information Assurance to Protect PII for Employees and Veteran

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Personally Identifiable Information

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Federal Laws  Privacy Act of 2005  Information Protection and Security Act  Identity Theft Prevention Act of 2005  Online Privacy Protection Act of 2005  Consumer Privacy Protection Act of 2005  Anti-phishing Act of 2005  Social Security Number Protection Act of 2005  Wireless 411 Privacy Act  US 'Safe Harbor' Rules (EU Harmonisation)  Title 18 of the United States Code, section 1028d(7)

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. OMB M Protection of Sensitive Agency Information 1. Encrypt all data on mobile computers/devices which carry agency data unless the data is determined to be non-sensitive, in writing, by your Deputy Secretary or an individual he/she may designate in writing; 2. Allow remote access only with two-factor authentication where one of the factors is provided by a device separate from the computer gaining access; 3. Use a “time-out” function for remote access and mobile devices requiring user re-authentication after 30 minutes inactivity; and 4. Log all computer-readable data extracts from databases holding sensitive information and verify each extract including sensitive data has been erased within 90 days or its use is still required.

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. GAO Protection of Sensitive Agency Information  Encrypt all data on mobile computers/devices which carry agency data unless the data is determined to be non-sensitive, in writing, by your Deputy Secretary or an individual he/she may designate in writing 22 agencies had developed policies  Allow remote access only with two-factor authentication where one of the factors is provided by a device separate from the computer gaining access 14 agencies had developed policies  Use a “time-out” function for remote access and mobile devices requiring user re- authentication after 30 minutes inactivity 15 agencies had developed policies  Log all computer-readable data extracts from databases holding sensitive information and verify each extract including sensitive data has been erased within 90 days or its use is still required 11 agencies had developed policies

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Engagement en·gage to induce to participate

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. The Engagement Challenges  Ease of use  Trust  Outdated  Mismatched expectations  Effective follow up  Speed of change 7

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. The Engagement Gap Citizens Suppliers Other Agencies ERP CRM HRM Financial LOB Core Applications Self-Enrollment Tax Filing Emergency Response Public Safety HR/Recruiting Compliance Reporting Citizen Portals Permits & Licenses Grants

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Engagement Building Blocks Collaboration & Training Dynamic Document Gen Guided Experiences Secure Info Sharing Rich Internet Apps Intuitive Data Capture Adobe Reader® Adobe Flash® HTML Adobe AIR™

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Adobe client software is deployed globally, today. 900 million PCs and devices Cross Platform Hardware / Browser ✓

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Engagement Building Blocks Collaboration & Training Dynamic Document Gen Guided Experiences Secure Info Sharing Rich Internet Apps Intuitive Data Capture Adobe Reader® Adobe Flash® HTML Adobe AIR™ Intuitive Data Capture

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Store, Process Pre-populate Document Routing Rights management XML Form Fragments Print & Fill Print & Read Dynamic Collection Data Capture Guided Experiences Fill & Print Text Fields Fill, Sign, Submit Typed Fields Validations 2D bar codes Digital Signatures Interactive eForm Dynamic eForm Paper Form Basic eForm Form Guide Data Capture: Spectrum Intelligence

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. PDF – It’s more than a pretty picture CRM ERP Digital IDs Digital to Paper

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. 14 LiveCycle Reader Extensions - How it works

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Engagement Building Blocks Collaboration & Training Dynamic Document Gen Guided Experiences Secure Info Sharing Rich Internet Apps Intuitive Data Capture Adobe Reader® Adobe Flash® HTML Adobe AIR™ Secure Info Sharing

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. 16 Freedom of Information Act – Redaction  Redact at an XML level  Redact in batch using “patterns”

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. The Last Line of Defense Managed Environment (CMS, ERP) Network Perimeter

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Document Security  Dynamic Control  Persistent Protection  Authentic Documents  Verifiable Transactions  Acceptable Approvals  Legally Binding Agreements Rights Management Certification Decision Accountability Risks  Confidentiality and Control  Reliability  Repudiation Information Integrated Risk Mitigation

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Engagement Building Blocks Collaboration & Training Dynamic Document Gen Guided Experiences Secure Info Sharing Rich Internet Apps Intuitive Data Capture Adobe Reader® Adobe Flash® HTML Adobe AIR™ Collaboration & Training

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Blended Solutions To One (Asynchronous)  eLearning  On-Demand Presentations  Public Service Announcements Together (Synchronous)  Web Conference  Tele-work  Virtual Classroom Collaborate, Present and Train Online – Live and On-Demand To One (Asynchronous)  eLearning  On-Demand Presentations  Public Service Announcements Together (Synchronous)  Web Conference  Tele-work  Virtual Classroom Blended Solutions Maximize Productivity

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Bringing It all Together  Synchronous Collaboration  Asynchronous Collaboration  Shared Desktop  Information Visualization  Presence & Awareness  Shared Reviews  Personalized Experiences  Familiar Metaphor  Online/Offline  Reader Enabled  Geospatially Enabled  Rights Management  Certified Documents  Accountable Decisions  Doc Generation  Process Automation Collaboration and Training Intuitive Data Capture Secure Information Sharing ++ = Synergy

® Copyright 2008 Adobe Systems Incorporated. All rights reserved. 22 DEMONSTRATION

® Copyright 2008 Adobe Systems Incorporated. All rights reserved.