Your SlideShare is downloading. ×
Meet john
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Meet john

577
views

Published on

Published in: Technology, Business

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
577
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • \n
  • Transcript

    • 1. meet john
    • 2. A.K.A...
    • 3. mr. security
    • 4. john lives in...
    • 5. he runs the IT security of...
    • 6. and cares for...
    • 7. john should ensure compliance with...
    • 8. and makes time for...
    • 9. john is prepared against...
    • 10. but concerns for...
    • 11. “ fraud ’’“identity “customer hijacking data leak ’’ ’’
    • 12. because of...
    • 13. insider threat
    • 14. his visibility look like...
    • 15. when itshould look like...
    • 16. johndoesn’t knowany better.
    • 17. john, meet mary.
    • 18. ms. security
    • 19. mary also lives in...
    • 20. she runs the IT security of...
    • 21. and cares for...
    • 22. mary should ensure compliance with...
    • 23. and makes time for...
    • 24. mary is also confident about...
    • 25. but, is great to...
    • 26. Monitor internal activity✔ to detect fraud Collaborate with physical✔ security division to prevent insider thread Optimize use of limited✔ IT/security resources
    • 27. Monitor internal activity✔ to detect fraud Collaborate with physical✔ security division to prevent insider thread Optimize use of limited✔ IT/security resources
    • 28. Monitor internal activity✔ to detect fraud Collaborate with physical✔ security division to prevent insider thread Optimize use of limited✔ IT/security resources
    • 29. why?
    • 30. she knows how to...
    • 31. get all system &application logs
    • 32. see importantdata
    • 33. use it for animmediate &intelligentresponse
    • 34. this is mary
    • 35. she gots a...
    • 36. 360 insight
    • 37. because of...

    ×