IT RISK IT Managers Roundtable event – 06/24/15 Presentation by Simon Cousins.

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

Security for Mobile Devices
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
511NY Mobile Application NYSDOT. Objectives The Project Lessons Learned Dealing with the App Stores Contact information.
SANS Technology Institute - Candidate for Master of Science Degree Design Phase 1 of an iPhone Rollout Mark Baggett, Jim Horwath June 2010.
FRAAME Client Update November, Overview FileVision 5.5 Mobile Solution Policy Management Social Transparency Healthcare Technology Trends.
Help enable mobile productivity. For years, companies have leveraged Microsoft solutions for their productivity needs. In an evolving cloud-first and mobile-first.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
What is Cloud Computing? o Cloud computing:- is a style of computing in which dynamically scalable and often virtualized resources are provided as a service.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
Cloud Computing Guide & Handbook SAI USA Madhav Panwar.
Devices 1 billion smartphones by 2016, 350M of those being used at work People 82 % of the world's online population engages in social networking Cloud.
Solution Briefing Business Productivity in Action Keynote.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
CLOUD STORAGE HOW TO STORE FILES IN A VIRTUAL CLOUD Leila B.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
For more notes and topics visit:
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Anil Karmel Deputy Chief Technology Officer National Nuclear Security Administration Streamlined Application Management The Intersection of Cloud and Mobility.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Enterprise Cloud Computing
The Benefits of Indigo SMS Aumne, Inc. Tel: Fax: Commerce Ct Suite 200, Lisle, IL USA.
MOBILE DEVICE MANAGEMENT Intracol Technologies AD.
FFIEC Cyber Security Assessment Tool
IT Pro Day MDMC Daniel von Büren V-TSP / Senior Consultant / CTO, redtoo ag Modern Device Management through the Cloud.
Information Systems in Organizations 5.2 Cloud Computing.
13% of information workers say they use tablets at work… … but IT is aware of only 6% 13% of information workers say they use tablets at work… … but.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Sponsored by: 1 The State of Corporate A Survey of IT Professionals October 2013.
DO NOW Working on the Cloud Do you have a lot of files on your computer but don’t have the space to store them? Do you worry about losing files? Do you.
Jamie Bakert Account Technology Strategist- Education Microsoft Corporation.
Cloud Computing HOW PROFITABLY CLOUD COMPUTING IS TO YOUR BUSINESS?
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
How to Sync Android Phone to Computer (PC/Mac)? Are you a person that always has your Android phone in your hands? Nowadays, a cell phone is not just for.
Total Enterprise Mobility Comprehensive Management and Security
OFFICE 365 APP BUILDER PROFILE: Druva
Lucidchart Extends Collaborative, Cross-Platform Diagramming Solution for Individuals, SMBs, and Enterprises with New Microsoft Office 365 Add-Ins OFFICE.
The time to address enterprise mobility is now
File Management in the Cloud
WorkDiff Mobile, Scenario-Based Collaboration Solution WorkDiff Allows Users to Work Differently While Using Familiar Functions of Microsoft Office 365.
ESign365 Add-In Gives Enterprises and Their Users the Power to Seamlessly Edit and Send Documents for e-Signature Within Office 365 OFFICE 365 APP BUILDER.
StreetSmart Mobile Workforce App Incorporates Microsoft Office 365 Outlook Add-In for Improved Field Worker Scheduling and Streamlined Invoicing OFFICE.
Transforming business
Utilize Internal Data via Mobile Business Apps
Best Cloud Storage Provider for your Data
Mobile Device Management options in Office 365 and beyond
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
OneDrive for Business User Guide
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Threat Landscape for Data Security
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Securely run and grow your business with Microsoft 365 Business
Which is right for your business, Office 365 or Microsoft 365?
PostBeyond Delivers an Enterprise Solution That Strengthens Communications with Employees and Integrates Seamlessly with Microsoft Office 365 OFFICE 365.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Which is right for your business, Office 365 or Microsoft 365?
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
The Jamespot for Office 365 Application Attaches Business Processes to Docs and Syncs Them to OneDrive to Simplify Collaboration and Sharing OFFICE 365.
Searchable. Secure. Simple.
Microsoft Virtual Academy
Done by:Thikra abdullah
Microsoft Virtual Academy
Presentation transcript:

IT RISK IT Managers Roundtable event – 06/24/15 Presentation by Simon Cousins

Some Current Day Risks How do companies remain current with technological advances, attracting the next generations of employees, while mitigating risk associated with emerging and modern tech ? How do companies manage BYOD ? Where should company data be ? Is the Cloud an option ?

Use Of A Risk Matrix A very useful tool for heat map risk analysis A useful resource can be found at The Risk Management Guide k-profile.htm

Discussion Point - BYOD iOS-Apple Android-Google Window Phone-Microsoft Are devices in your company… Company owned ? Employee owned ? Mixed ? Unknown ? Considerations What is your risk tolerance ? Where are your biggest risks ?

Discussion Point – BYOD – IT Considerations Managing and securing data. While the devices themselves are one concern, the data flowing back and forth between the devices, the corporate network, and the cloud is another major issue. Even if IT has a handle on which devices are accessing the network and their risk postures, controlling what information the device accesses and what happens to that information once it leaves the enterprise network can be very tricky. Consider the following common scenario: An employee opens an attachment from his/her corporate box and chooses to save it to a personal cloud storage service, such as iCloud or Dropbox. When employees transfer enterprise data into public cloud services, IT usually loses its ability to manage the data from that point forward. Another potential issue is employees forwarding or sending sensitive information from mobile devices to parties that should not have access to that information. This may happen via or through a cloud storage and collaboration service. In either case, IT needs some way to manage what employees can and cannot do with content accessed on mobile devices. Managing risks from apps. Apps themselves present a risk. It has been well documented that the prevalence of Android malware has spiked right along with the popularity of the platform. This is less of a problem on iOS devices because of the closed nature of the Apple ecosystem, but it's not a nonexistent issue. When employees download consumer applications to their personal devices, enterprises have no way of knowing the risk profile of that application. An app could be full of malware — which could then corrupt the entire device OS, putting the information on all the other apps at risk — and it could also be asking for information that a company would prefer it didn't have access to, such as contacts. Understanding the risk profile of various applications is an important step to safeguarding the overall health of the device. Source : IDC Market Spotlight – The Evolution of Enterprise Mobility Management: Protection Enables Productivity

Discussion Point – Cloud Storage & Services Why The Cloud ? PAAS (Platform As A Service) SAAS (Software As A Service) Consumer grade (Unmanaged) Where is your data and what is your strategy ? Consider industry regulations Protection of intellectual property Transmission and sharing of data

Discussion Point – Employees How do companies remain current with technological advances, attracting the next generations of employees, while mitigating risk associated with emerging and modern tech ? Recruiting and retaining employees who maintain existing systems and employees who implement new and future technologies overlaps.

Discussion Point – The Next Thing ? The Internet Of Things is happening all around us. Smoke detectors Smart Thermostats Refrigerators that order food Medication reminders More information at things-examples things-examples The sharing of data, location, environments and other PII is evolving at a rapid pace. The associated risks of managing the surge in the world of IOT needs to be managed.

IT RISK Resources NIST PMI.org Has some good articles general risk management from a project mgmt. standpoint Harvard Business Review E&Y COBIT COSO ISACA ISC2