SlideShare a Scribd company logo
1 of 12
Download to read offline
IMPROVING
DATA & APP
SECURITY
Presented by Arvo Bowen,
Security Admin, Xerox
AGENDA
 About Xerox
 Full Service Indexing for
Georgia Counties
 App & Challenge with
Employee Logging
 Use cases for user
activity monitoring @
Xerox Arvo Bowen
Atlanta, Georgia
Xerox ACS
CUSTOMERSPEAKER
ABOUT XEROX
 Acquired Digital Information Systems
Co. (DISC) in 2002.
 Acquired Affiliated Computer Services
(ACS) in 2010.
 Provides business process and
document management services and
IT outsourcing
 By 2017, business services and IT
outsourcing that stem from ACS are
expected to account for two of every
three dollars Xerox brings in.
 Xerox services can be found all over
the world; if you’ve booked airline
ticket, paid parking ticket, filed a
health insurance claim, applied for a
car loan or even in the local Atlanta
airport.
FULL SERVICE INDEXING
FOR GEORGIA COUNTIES
 We transformed the time-
consuming paper process of
recording land records into a
secure, efficient service.
 All vital records are scanned
and converted, and are now
available on the State’s
website.
 This allows over 159 Counties
to digitize land records and
record real property documents
– as well as vital statistics
records, including birth
certificates, death certificates,
marriage licenses and more.
APP & CHALLENGE WITH
EMPLOYEE PRODUCTION
 Our application allows
employees to abstract and
key sensitive information
 Rolling out work-at-home
model to boost
productivity
 Several started reporting
system issues, providing
generic error information,
and saying they were
unable to work
USER ACTIVITY LOGS &
MONITORING
 User Activity Logs ensure that
you know exactly who is doing
what with your sensitive data,
systems and applications
 Needed to see employees 24/7
without watching them over
their shoulders all day long to
view all transaction processing
 Recordings of user actions
provide faster IT
troubleshooting and incident
response with bullet-proof
visual forensics
USE CASES FOR USER
ACTIVITY MONITORING
 Gain Visibility; Into
Application Usage
 Improve
Productivity;
Reports & Usage
 Data Audit; Alerting
& Investigating
GAIN VISIBILITY; INTO
APPLICATION USAGE
1. Start with a handful of
Users – High-Risk
Employees or Contractors
 Poor performing
 Two weeks’ notice
 Pending layoffs
 New hire(s)
2. Start with monitoring a
population of users for a
specific application
IMPROVE PRODUCTIVITY;
REPORTS & USAGE
 Improved documentation
and reporting of
application usage during
data entry
 Visual forensics eliminate
the need to invest the
extensive labor required
on cases
 Case creation process
from the research
department
DATA AUDIT; ALERTING &
INVESTIGATING
 Management wanted to know
when users are logging on
from home
 Management gets an email
notification every time
someone logs on or starts
performing activity that is
after hours and weekends
 Management keeps all alerts
in a outlook folder to log
activity
 Know who’s touching what
data and what they are doing
with it, deleting a file
LESSONS LEARNED
 Auditing what users do within
sensitive business
applications is critical for
security and troubleshooting
 You will be surprised how
users actually interact with
your app and the type of
risky activity that exists
 If you don’t have visual
evidence & User Activity Logs,
it’s hard to prove things
Arvo Bowen
Atlanta, Georgia
Xerox ACS
THANK YOU!
TRYIT YOURSELF:
observeit.com/tryitnow
Q&A

More Related Content

What's hot

Ctc rick ryan prezi 3 2016
Ctc rick ryan prezi 3 2016Ctc rick ryan prezi 3 2016
Ctc rick ryan prezi 3 2016Courtney King
 
Absolute software-for-healthcare
Absolute software-for-healthcareAbsolute software-for-healthcare
Absolute software-for-healthcareRay Treurniet
 
How a UEM solution can help the healthcare industry
How a UEM solution can help the healthcare industryHow a UEM solution can help the healthcare industry
How a UEM solution can help the healthcare industryHexnode
 
Remote Monitoring and Management FAQs
Remote Monitoring and Management FAQsRemote Monitoring and Management FAQs
Remote Monitoring and Management FAQsHexnode
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveGaurav Awasthi
 
Final Presentation
Final PresentationFinal Presentation
Final Presentationchris odle
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillTheAnfieldGroup
 
Electronic Signatures Under 21CFR§11
Electronic Signatures Under 21CFR§11Electronic Signatures Under 21CFR§11
Electronic Signatures Under 21CFR§11EMMAIntl
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB
 
2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0
2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.02018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0
2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0Enzo M. Tieghi
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend
 
Acc 626 slidecast Mobile Devices
Acc 626 slidecast Mobile DevicesAcc 626 slidecast Mobile Devices
Acc 626 slidecast Mobile DevicesWendy Wang
 
Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisisPrime Infoserv
 
Digitize Safety with Field ID
Digitize Safety with Field IDDigitize Safety with Field ID
Digitize Safety with Field IDField-ID
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudGuy Vinograd ☁
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist PriyaNemade
 
Room automation using android
Room automation using androidRoom automation using android
Room automation using androidsaikat sen
 

What's hot (20)

Ctc rick ryan prezi 3 2016
Ctc rick ryan prezi 3 2016Ctc rick ryan prezi 3 2016
Ctc rick ryan prezi 3 2016
 
Absolute software-for-healthcare
Absolute software-for-healthcareAbsolute software-for-healthcare
Absolute software-for-healthcare
 
Finance
FinanceFinance
Finance
 
How a UEM solution can help the healthcare industry
How a UEM solution can help the healthcare industryHow a UEM solution can help the healthcare industry
How a UEM solution can help the healthcare industry
 
Remote Monitoring and Management FAQs
Remote Monitoring and Management FAQsRemote Monitoring and Management FAQs
Remote Monitoring and Management FAQs
 
Internet of Things - An Architectural Perspective
Internet of Things - An Architectural PerspectiveInternet of Things - An Architectural Perspective
Internet of Things - An Architectural Perspective
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
Electronic Signatures Under 21CFR§11
Electronic Signatures Under 21CFR§11Electronic Signatures Under 21CFR§11
Electronic Signatures Under 21CFR§11
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
 
2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0
2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.02018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0
2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldusPrimend praktiline konverents - Pilveteenuste ja BYOD haldus
Primend praktiline konverents - Pilveteenuste ja BYOD haldus
 
Acc 626 slidecast Mobile Devices
Acc 626 slidecast Mobile DevicesAcc 626 slidecast Mobile Devices
Acc 626 slidecast Mobile Devices
 
Face Recognition under COVID19 crisis
Face Recognition under COVID19 crisisFace Recognition under COVID19 crisis
Face Recognition under COVID19 crisis
 
Digitize Safety with Field ID
Digitize Safety with Field IDDigitize Safety with Field ID
Digitize Safety with Field ID
 
Iio t security std
Iio t security stdIio t security std
Iio t security std
 
Best practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloudBest practices for connecting medical devices to the cloud
Best practices for connecting medical devices to the cloud
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
Room automation using android
Room automation using androidRoom automation using android
Room automation using android
 

Viewers also liked

Symnatec ha in virtualization
Symnatec ha in virtualizationSymnatec ha in virtualization
Symnatec ha in virtualizationAtif Malik
 
Nowy katalog Avecava - z cenami!
Nowy katalog Avecava - z cenami!Nowy katalog Avecava - z cenami!
Nowy katalog Avecava - z cenami!AVECAVA.pl
 
#3 Information extraction from news to conversations
#3 Information extraction from news to conversations#3 Information extraction from news to conversations
#3 Information extraction from news to conversationsBerlin Language Technology
 
GEOMETRI ANALITIK BIDANG
GEOMETRI ANALITIK BIDANGGEOMETRI ANALITIK BIDANG
GEOMETRI ANALITIK BIDANGFebri Arianti
 

Viewers also liked (8)

Symnatec ha in virtualization
Symnatec ha in virtualizationSymnatec ha in virtualization
Symnatec ha in virtualization
 
MATEMATIKA DISKRIT
MATEMATIKA DISKRITMATEMATIKA DISKRIT
MATEMATIKA DISKRIT
 
Nowy katalog Avecava - z cenami!
Nowy katalog Avecava - z cenami!Nowy katalog Avecava - z cenami!
Nowy katalog Avecava - z cenami!
 
Komputer Statistik
Komputer StatistikKomputer Statistik
Komputer Statistik
 
#3 Information extraction from news to conversations
#3 Information extraction from news to conversations#3 Information extraction from news to conversations
#3 Information extraction from news to conversations
 
Logarithm
LogarithmLogarithm
Logarithm
 
Seminar kkn
Seminar kknSeminar kkn
Seminar kkn
 
GEOMETRI ANALITIK BIDANG
GEOMETRI ANALITIK BIDANGGEOMETRI ANALITIK BIDANG
GEOMETRI ANALITIK BIDANG
 

Similar to Xerox: Improving Data & App Security

Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
How eSignatures Enable Remote Work to be a Success | DrySign
How eSignatures Enable Remote Work to be a Success | DrySignHow eSignatures Enable Remote Work to be a Success | DrySign
How eSignatures Enable Remote Work to be a Success | DrySignDrysign By Exela
 
IRJET- Event Compass - An Event Management Application
IRJET- Event Compass - An Event Management ApplicationIRJET- Event Compass - An Event Management Application
IRJET- Event Compass - An Event Management ApplicationIRJET Journal
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODEIRJET Journal
 
Final proposal land
Final proposal landFinal proposal land
Final proposal landebunsoft
 
INSPECTRA - Native Mobile Apps Inspection Management System
INSPECTRA - Native Mobile Apps Inspection Management SystemINSPECTRA - Native Mobile Apps Inspection Management System
INSPECTRA - Native Mobile Apps Inspection Management SystemJaafar Sarjo
 
INSPECTRA - Inspection Management System
INSPECTRA - Inspection Management SystemINSPECTRA - Inspection Management System
INSPECTRA - Inspection Management SystemJaafar Sarjo
 
Benefits and Functionality of Claims Processing Software
Benefits and Functionality of Claims Processing SoftwareBenefits and Functionality of Claims Processing Software
Benefits and Functionality of Claims Processing SoftwareSteven M Richard
 
Miwp mobile capture-firststep_2013
Miwp mobile capture-firststep_2013Miwp mobile capture-firststep_2013
Miwp mobile capture-firststep_2013Liberteks
 
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析Cheer Chain Enterprise Co., Ltd.
 
Sales_2015_IBS_NoMatrix
Sales_2015_IBS_NoMatrixSales_2015_IBS_NoMatrix
Sales_2015_IBS_NoMatrixGreg Adcock
 
Tasker supports Field Service Technicians
Tasker supports Field Service TechniciansTasker supports Field Service Technicians
Tasker supports Field Service TechniciansTom Klaasen
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanDavid J Rosenthal
 
Mobility solutions brochure ScaleFocus
Mobility solutions brochure ScaleFocusMobility solutions brochure ScaleFocus
Mobility solutions brochure ScaleFocusScaleFocus
 

Similar to Xerox: Improving Data & App Security (20)

Ntuc income
Ntuc incomeNtuc income
Ntuc income
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
mobile application security
mobile application securitymobile application security
mobile application security
 
How eSignatures Enable Remote Work to be a Success | DrySign
How eSignatures Enable Remote Work to be a Success | DrySignHow eSignatures Enable Remote Work to be a Success | DrySign
How eSignatures Enable Remote Work to be a Success | DrySign
 
IRJET- Event Compass - An Event Management Application
IRJET- Event Compass - An Event Management ApplicationIRJET- Event Compass - An Event Management Application
IRJET- Event Compass - An Event Management Application
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 
Final proposal land
Final proposal landFinal proposal land
Final proposal land
 
INSPECTRA - Native Mobile Apps Inspection Management System
INSPECTRA - Native Mobile Apps Inspection Management SystemINSPECTRA - Native Mobile Apps Inspection Management System
INSPECTRA - Native Mobile Apps Inspection Management System
 
INSPECTRA - Inspection Management System
INSPECTRA - Inspection Management SystemINSPECTRA - Inspection Management System
INSPECTRA - Inspection Management System
 
Benefits and Functionality of Claims Processing Software
Benefits and Functionality of Claims Processing SoftwareBenefits and Functionality of Claims Processing Software
Benefits and Functionality of Claims Processing Software
 
Miwp mobile capture-firststep_2013
Miwp mobile capture-firststep_2013Miwp mobile capture-firststep_2013
Miwp mobile capture-firststep_2013
 
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
SpectorSoft Spector 360 資料移失防護及網路活動監控軟體產品介紹及應用分析
 
Sales_2015_IBS_NoMatrix
Sales_2015_IBS_NoMatrixSales_2015_IBS_NoMatrix
Sales_2015_IBS_NoMatrix
 
Tasker supports Field Service Technicians
Tasker supports Field Service TechniciansTasker supports Field Service Technicians
Tasker supports Field Service Technicians
 
GPS based attendance
GPS based attendanceGPS based attendance
GPS based attendance
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
Blackberry in Government
Blackberry in GovernmentBlackberry in Government
Blackberry in Government
 
Mobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - AtidanMobile Device Management for Office 365 - Atidan
Mobile Device Management for Office 365 - Atidan
 
Mobility solutions brochure ScaleFocus
Mobility solutions brochure ScaleFocusMobility solutions brochure ScaleFocus
Mobility solutions brochure ScaleFocus
 

More from ObserveIT

Observe it v67 webinar v5
Observe it v67 webinar v5Observe it v67 webinar v5
Observe it v67 webinar v5ObserveIT
 
ObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT
 
Insider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionInsider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionObserveIT
 
How to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramHow to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramObserveIT
 
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...ObserveIT
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsObserveIT
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT
 
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security StrategyObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security StrategyObserveIT
 
Cloud Security Allianz Webinar
Cloud Security Allianz WebinarCloud Security Allianz Webinar
Cloud Security Allianz WebinarObserveIT
 
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionObserveIT
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityObserveIT
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes ObserveIT
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?ObserveIT
 
Prevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity MonitoringPrevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity MonitoringObserveIT
 
Ins and outs of ObserveIT
Ins and outs of ObserveITIns and outs of ObserveIT
Ins and outs of ObserveITObserveIT
 
Super User or Super Threat?
Super User or Super Threat?Super User or Super Threat?
Super User or Super Threat?ObserveIT
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection WebinarObserveIT
 
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...ObserveIT
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data BreachObserveIT
 

More from ObserveIT (20)

Observe it v67 webinar v5
Observe it v67 webinar v5Observe it v67 webinar v5
Observe it v67 webinar v5
 
ObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release HighlightsObserveIT Version 6.7 Release Highlights
ObserveIT Version 6.7 Release Highlights
 
Insider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and ProtectionInsider Threat Law: Balancing Privacy and Protection
Insider Threat Law: Balancing Privacy and Protection
 
How to Implement an Insider Threat Program
How to Implement an Insider Threat ProgramHow to Implement an Insider Threat Program
How to Implement an Insider Threat Program
 
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
You've caught an Insider Threat, now what? The Human Side of Insider Threat I...
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
 
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security StrategyObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
 
Cloud Security Allianz Webinar
Cloud Security Allianz WebinarCloud Security Allianz Webinar
Cloud Security Allianz Webinar
 
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric ColeObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
 
Prevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity MonitoringPrevent Insider Threats with User Activity Monitoring
Prevent Insider Threats with User Activity Monitoring
 
Ins and outs of ObserveIT
Ins and outs of ObserveITIns and outs of ObserveIT
Ins and outs of ObserveIT
 
Super User or Super Threat?
Super User or Super Threat?Super User or Super Threat?
Super User or Super Threat?
 
Data Protection Webinar
Data Protection WebinarData Protection Webinar
Data Protection Webinar
 
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
User Activity Monitoring: Identify and Manage the Risk of Your Users - ISACA ...
 
2014: The Year of the Data Breach
2014: The Year of the Data Breach2014: The Year of the Data Breach
2014: The Year of the Data Breach
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Xerox: Improving Data & App Security

  • 1. IMPROVING DATA & APP SECURITY Presented by Arvo Bowen, Security Admin, Xerox
  • 2. AGENDA  About Xerox  Full Service Indexing for Georgia Counties  App & Challenge with Employee Logging  Use cases for user activity monitoring @ Xerox Arvo Bowen Atlanta, Georgia Xerox ACS CUSTOMERSPEAKER
  • 3. ABOUT XEROX  Acquired Digital Information Systems Co. (DISC) in 2002.  Acquired Affiliated Computer Services (ACS) in 2010.  Provides business process and document management services and IT outsourcing  By 2017, business services and IT outsourcing that stem from ACS are expected to account for two of every three dollars Xerox brings in.  Xerox services can be found all over the world; if you’ve booked airline ticket, paid parking ticket, filed a health insurance claim, applied for a car loan or even in the local Atlanta airport.
  • 4. FULL SERVICE INDEXING FOR GEORGIA COUNTIES  We transformed the time- consuming paper process of recording land records into a secure, efficient service.  All vital records are scanned and converted, and are now available on the State’s website.  This allows over 159 Counties to digitize land records and record real property documents – as well as vital statistics records, including birth certificates, death certificates, marriage licenses and more.
  • 5. APP & CHALLENGE WITH EMPLOYEE PRODUCTION  Our application allows employees to abstract and key sensitive information  Rolling out work-at-home model to boost productivity  Several started reporting system issues, providing generic error information, and saying they were unable to work
  • 6. USER ACTIVITY LOGS & MONITORING  User Activity Logs ensure that you know exactly who is doing what with your sensitive data, systems and applications  Needed to see employees 24/7 without watching them over their shoulders all day long to view all transaction processing  Recordings of user actions provide faster IT troubleshooting and incident response with bullet-proof visual forensics
  • 7. USE CASES FOR USER ACTIVITY MONITORING  Gain Visibility; Into Application Usage  Improve Productivity; Reports & Usage  Data Audit; Alerting & Investigating
  • 8. GAIN VISIBILITY; INTO APPLICATION USAGE 1. Start with a handful of Users – High-Risk Employees or Contractors  Poor performing  Two weeks’ notice  Pending layoffs  New hire(s) 2. Start with monitoring a population of users for a specific application
  • 9. IMPROVE PRODUCTIVITY; REPORTS & USAGE  Improved documentation and reporting of application usage during data entry  Visual forensics eliminate the need to invest the extensive labor required on cases  Case creation process from the research department
  • 10. DATA AUDIT; ALERTING & INVESTIGATING  Management wanted to know when users are logging on from home  Management gets an email notification every time someone logs on or starts performing activity that is after hours and weekends  Management keeps all alerts in a outlook folder to log activity  Know who’s touching what data and what they are doing with it, deleting a file
  • 11. LESSONS LEARNED  Auditing what users do within sensitive business applications is critical for security and troubleshooting  You will be surprised how users actually interact with your app and the type of risky activity that exists  If you don’t have visual evidence & User Activity Logs, it’s hard to prove things
  • 12. Arvo Bowen Atlanta, Georgia Xerox ACS THANK YOU! TRYIT YOURSELF: observeit.com/tryitnow Q&A