SlideShare a Scribd company logo
1 of 34
Protect Your Customers and Your Business with Secure Business Communications Jon Gatrell VP, Product Management 12.16.2009
[object Object],[object Object],[object Object],[object Object],Business Risks and Realities
IT Realities ,[object Object],[object Object],[object Object],[object Object]
` Breaches happen everyday – 11.16.2009
FTP alone is not a viable option to give you the insight, security and performance and, ultimately, the risk mitigation necessary to  responsibly conduct business .
Because e-mail connects through many routers and mail servers on its way to the recipient, it is inherently vulnerable to both physical and  virtual eavesdropping . Current industry  standards do not place emphasis on security ; information is transferred in  plain text , and mail servers regularly conduct unprotected backups of e-mail that passes through.
Another take on email privacy… In personal email communications, there has always been, and always should be,  an expectation of privacy  between the sender and the intended recipients of a message,  enabling open communication  with friends, colleagues, family, and others….. Let's be clear: there are issues with email privacy , and most of these issues are common to all email providers. The main issue is that the contents of your messages are stored on mail servers for some period of time; there is always a danger that these messages can be obtained and  used for purposes that may harm you , such as possible misuse of your information…
Understanding the scale of data breaches ,[object Object],[object Object],Source: Ponemon Institute
The Impact to Businesses ,[object Object],[object Object],[object Object],[object Object]
Source: Ponemon Institute, LLC  Number of Data Records Lost It’s just money….
It happens to the best of us…  ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Governmental Requirements
[object Object],It’s not just government, it’s also professional standards AICPA Code of Professional Conduct - Rule 301
Be concerned about all of these items ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
252,474,509  people affected since 1/15/05
Best Practices to Avoid Exposure ,[object Object],[object Object],[object Object]
Know who received what messages and files
Historical and Real-Time Visibility into Messaging
Manage Users and their access
Proactively Manage groups and understand their activity
 
Productivity & Privacy
Financial information Board of directors or just internally
Customer records and files No matter what size
Do you retain PHI? Security inside and outside required
Supporting your customers Confidential environment and operational data is exchanged
 
Access and Controls The right systems, the right platforms, the people and the right partners
The Benefits of an Easy to Use Secure Communications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Your solution must…
THANKS! www.scribbos.com   www.stonebranch.com   managedfiletransfer.wordpress.com Secure Communications: Enterprise Automation: MFT Blog:

More Related Content

What's hot

Visitor management system
Visitor management systemVisitor management system
Visitor management systemmikeecholscyber
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Securityphanleson
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6annwhyjay
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Jim Brashear
 
Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Jonathan Sinclair
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?Echoworx
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
 
The ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutionsThe ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutionsDan Michaluk
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityJamie Hutt
 
Litchfield County Computer – An Introduction
Litchfield County Computer – An IntroductionLitchfield County Computer – An Introduction
Litchfield County Computer – An IntroductionMatt Smith
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information ProtectionPECB
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Rob Levey
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Securitysatyakam_biswas
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance Hubbard Insurance Group
 

What's hot (20)

Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Security
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
 
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
Raising the Bar for Email Security: Confidentiality and Privacy Standards tha...
 
The standard for email communications
The standard for email communicationsThe standard for email communications
The standard for email communications
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011Cloud Compliance Auditing - Closer 2011
Cloud Compliance Auditing - Closer 2011
 
Lkm 2011
Lkm 2011Lkm 2011
Lkm 2011
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
How Much Do You Trust Email?
How Much Do You Trust Email?How Much Do You Trust Email?
How Much Do You Trust Email?
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
The ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutionsThe ugly, the bad and the good of cloud computing for government institutions
The ugly, the bad and the good of cloud computing for government institutions
 
M6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And SecurityM6 - E Commerce - Integrity And Security
M6 - E Commerce - Integrity And Security
 
Litchfield County Computer – An Introduction
Litchfield County Computer – An IntroductionLitchfield County Computer – An Introduction
Litchfield County Computer – An Introduction
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10Catelas Security Webinar 12 14 10
Catelas Security Webinar 12 14 10
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 

Viewers also liked

2014 dm no. 0607-doodle 4 google competition
2014 dm no. 0607-doodle 4 google competition2014 dm no. 0607-doodle 4 google competition
2014 dm no. 0607-doodle 4 google competitionMelanio Florino
 
Meetings modernsamplefinal
Meetings modernsamplefinalMeetings modernsamplefinal
Meetings modernsamplefinalAndrew Schwartz
 
WiPromo Overview
WiPromo OverviewWiPromo Overview
WiPromo OverviewAlex Tilt
 
Lou tulga's president obama's foreclosure relief program outline 2012
Lou tulga's president obama's  foreclosure relief program outline 2012Lou tulga's president obama's  foreclosure relief program outline 2012
Lou tulga's president obama's foreclosure relief program outline 2012Professional Education Services
 
Topics In Critical Pedagogy
Topics In Critical PedagogyTopics In Critical Pedagogy
Topics In Critical PedagogyGlen Gatin
 
Martin karlssons vykortssamling st per
Martin karlssons vykortssamling   st perMartin karlssons vykortssamling   st per
Martin karlssons vykortssamling st perhembygdsigtuna
 
120619 cul knowledge based bus inno v03
120619 cul knowledge based bus inno v03120619 cul knowledge based bus inno v03
120619 cul knowledge based bus inno v03Michele Missikoff
 
Spring 3 - Der dritte Frühling
Spring 3 - Der dritte FrühlingSpring 3 - Der dritte Frühling
Spring 3 - Der dritte FrühlingThorsten Kamann
 
Slovakia Powerpoint Country
Slovakia Powerpoint CountrySlovakia Powerpoint Country
Slovakia Powerpoint CountryAndrew Schwartz
 
Lou tulga's president obama's foreclosure relief program outline 2012
Lou tulga's president obama's  foreclosure relief program outline 2012Lou tulga's president obama's  foreclosure relief program outline 2012
Lou tulga's president obama's foreclosure relief program outline 2012Professional Education Services
 
A Journey Into Wholeness Final
A Journey Into Wholeness  FinalA Journey Into Wholeness  Final
A Journey Into Wholeness Finalmsainfo
 
Expansion of Information Extraction System to the Russian language
Expansion of Information Extraction System to the Russian languageExpansion of Information Extraction System to the Russian language
Expansion of Information Extraction System to the Russian languageLidia Pivovarova
 
Relevance Ranking of Learning Objects
Relevance Ranking of Learning ObjectsRelevance Ranking of Learning Objects
Relevance Ranking of Learning Objectsguesta52c89
 

Viewers also liked (19)

2014 dm no. 0607-doodle 4 google competition
2014 dm no. 0607-doodle 4 google competition2014 dm no. 0607-doodle 4 google competition
2014 dm no. 0607-doodle 4 google competition
 
Meetings modernsamplefinal
Meetings modernsamplefinalMeetings modernsamplefinal
Meetings modernsamplefinal
 
WiPromo Overview
WiPromo OverviewWiPromo Overview
WiPromo Overview
 
Italy Powepoint Country
Italy Powepoint CountryItaly Powepoint Country
Italy Powepoint Country
 
Lou tulga's president obama's foreclosure relief program outline 2012
Lou tulga's president obama's  foreclosure relief program outline 2012Lou tulga's president obama's  foreclosure relief program outline 2012
Lou tulga's president obama's foreclosure relief program outline 2012
 
Jax 2011 keynote
Jax 2011 keynoteJax 2011 keynote
Jax 2011 keynote
 
Boyarsky
BoyarskyBoyarsky
Boyarsky
 
Topics In Critical Pedagogy
Topics In Critical PedagogyTopics In Critical Pedagogy
Topics In Critical Pedagogy
 
Martin karlssons vykortssamling st per
Martin karlssons vykortssamling   st perMartin karlssons vykortssamling   st per
Martin karlssons vykortssamling st per
 
120619 cul knowledge based bus inno v03
120619 cul knowledge based bus inno v03120619 cul knowledge based bus inno v03
120619 cul knowledge based bus inno v03
 
Spring 3 - Der dritte Frühling
Spring 3 - Der dritte FrühlingSpring 3 - Der dritte Frühling
Spring 3 - Der dritte Frühling
 
Slovakia Powerpoint Country
Slovakia Powerpoint CountrySlovakia Powerpoint Country
Slovakia Powerpoint Country
 
Retrospectiva
RetrospectivaRetrospectiva
Retrospectiva
 
Lou tulga's president obama's foreclosure relief program outline 2012
Lou tulga's president obama's  foreclosure relief program outline 2012Lou tulga's president obama's  foreclosure relief program outline 2012
Lou tulga's president obama's foreclosure relief program outline 2012
 
2010 ims slides
2010 ims slides2010 ims slides
2010 ims slides
 
A Journey Into Wholeness Final
A Journey Into Wholeness  FinalA Journey Into Wholeness  Final
A Journey Into Wholeness Final
 
Expansion of Information Extraction System to the Russian language
Expansion of Information Extraction System to the Russian languageExpansion of Information Extraction System to the Russian language
Expansion of Information Extraction System to the Russian language
 
Relevance Ranking of Learning Objects
Relevance Ranking of Learning ObjectsRelevance Ranking of Learning Objects
Relevance Ranking of Learning Objects
 
Ch11
Ch11Ch11
Ch11
 

Similar to Understand Risk in Communications and Data Breach

Securing Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of UsersSecuring Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of UsersJon Gatrell
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!Caroline Johnson
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalVivek Ahuja
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantClio - Cloud-Based Legal Technology
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsCSantosConleyha
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsCAbbyWhyte974
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationOpenText Information Exchange
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 

Similar to Understand Risk in Communications and Data Breach (20)

Securing Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of UsersSecuring Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of Users
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
 
Law Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay CompliantLaw Firm Security: How to Protect Your Client Data and Stay Compliant
Law Firm Security: How to Protect Your Client Data and Stay Compliant
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC1. Original Post by Catherine JohnsonCryptographic MethodsC
1. Original Post by Catherine JohnsonCryptographic MethodsC
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the Organization
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
IBM X-Force.PDF
IBM X-Force.PDFIBM X-Force.PDF
IBM X-Force.PDF
 

More from Jon Gatrell

What is a Good Product Manager?
What is a Good Product Manager?What is a Good Product Manager?
What is a Good Product Manager?Jon Gatrell
 
Define Your Career Roadmap
Define Your Career RoadmapDefine Your Career Roadmap
Define Your Career RoadmapJon Gatrell
 
Product Management Career Planning: Set Your Path
Product Management Career Planning: Set Your PathProduct Management Career Planning: Set Your Path
Product Management Career Planning: Set Your PathJon Gatrell
 
What is your career plan as a tech marketer?
What is your career plan as a tech marketer?What is your career plan as a tech marketer?
What is your career plan as a tech marketer?Jon Gatrell
 
What is Your Career Plan in Tech Marketing?
What is Your Career Plan in Tech Marketing?What is Your Career Plan in Tech Marketing?
What is Your Career Plan in Tech Marketing?Jon Gatrell
 
Listen to the Market
Listen to the MarketListen to the Market
Listen to the MarketJon Gatrell
 
Social Insights: Listen to the Voice of the Market
Social Insights: Listen to the Voice of the MarketSocial Insights: Listen to the Voice of the Market
Social Insights: Listen to the Voice of the MarketJon Gatrell
 
Social Capital Death Match
Social Capital Death MatchSocial Capital Death Match
Social Capital Death MatchJon Gatrell
 
What is your product's social strategy?
What is your product's social strategy?What is your product's social strategy?
What is your product's social strategy?Jon Gatrell
 
Social Insights from the Market
Social Insights from the MarketSocial Insights from the Market
Social Insights from the MarketJon Gatrell
 
Top 25 Innovators 2010: A Case Study in Brand Awareness
Top 25 Innovators 2010: A Case Study in Brand AwarenessTop 25 Innovators 2010: A Case Study in Brand Awareness
Top 25 Innovators 2010: A Case Study in Brand AwarenessJon Gatrell
 
Social Products Require Social Marketers.
Social Products Require Social Marketers.Social Products Require Social Marketers.
Social Products Require Social Marketers.Jon Gatrell
 
Top 25 Retail Brands - Kantar Retail
Top 25 Retail Brands - Kantar RetailTop 25 Retail Brands - Kantar Retail
Top 25 Retail Brands - Kantar RetailJon Gatrell
 
No Such Thing As Social Products
No Such Thing As Social ProductsNo Such Thing As Social Products
No Such Thing As Social ProductsJon Gatrell
 
Stupid Things In Product Management
Stupid Things In Product ManagementStupid Things In Product Management
Stupid Things In Product ManagementJon Gatrell
 
Measuring Social Media For B2B
Measuring Social Media For B2BMeasuring Social Media For B2B
Measuring Social Media For B2BJon Gatrell
 
Irrational Loss Aversion
Irrational Loss AversionIrrational Loss Aversion
Irrational Loss AversionJon Gatrell
 
Twitter Personas: Bot or Not?
Twitter Personas: Bot or Not?Twitter Personas: Bot or Not?
Twitter Personas: Bot or Not?Jon Gatrell
 
Christmas is for Cookies
Christmas is for CookiesChristmas is for Cookies
Christmas is for CookiesJon Gatrell
 
White House Process and Data Concerns
White House Process and Data ConcernsWhite House Process and Data Concerns
White House Process and Data ConcernsJon Gatrell
 

More from Jon Gatrell (20)

What is a Good Product Manager?
What is a Good Product Manager?What is a Good Product Manager?
What is a Good Product Manager?
 
Define Your Career Roadmap
Define Your Career RoadmapDefine Your Career Roadmap
Define Your Career Roadmap
 
Product Management Career Planning: Set Your Path
Product Management Career Planning: Set Your PathProduct Management Career Planning: Set Your Path
Product Management Career Planning: Set Your Path
 
What is your career plan as a tech marketer?
What is your career plan as a tech marketer?What is your career plan as a tech marketer?
What is your career plan as a tech marketer?
 
What is Your Career Plan in Tech Marketing?
What is Your Career Plan in Tech Marketing?What is Your Career Plan in Tech Marketing?
What is Your Career Plan in Tech Marketing?
 
Listen to the Market
Listen to the MarketListen to the Market
Listen to the Market
 
Social Insights: Listen to the Voice of the Market
Social Insights: Listen to the Voice of the MarketSocial Insights: Listen to the Voice of the Market
Social Insights: Listen to the Voice of the Market
 
Social Capital Death Match
Social Capital Death MatchSocial Capital Death Match
Social Capital Death Match
 
What is your product's social strategy?
What is your product's social strategy?What is your product's social strategy?
What is your product's social strategy?
 
Social Insights from the Market
Social Insights from the MarketSocial Insights from the Market
Social Insights from the Market
 
Top 25 Innovators 2010: A Case Study in Brand Awareness
Top 25 Innovators 2010: A Case Study in Brand AwarenessTop 25 Innovators 2010: A Case Study in Brand Awareness
Top 25 Innovators 2010: A Case Study in Brand Awareness
 
Social Products Require Social Marketers.
Social Products Require Social Marketers.Social Products Require Social Marketers.
Social Products Require Social Marketers.
 
Top 25 Retail Brands - Kantar Retail
Top 25 Retail Brands - Kantar RetailTop 25 Retail Brands - Kantar Retail
Top 25 Retail Brands - Kantar Retail
 
No Such Thing As Social Products
No Such Thing As Social ProductsNo Such Thing As Social Products
No Such Thing As Social Products
 
Stupid Things In Product Management
Stupid Things In Product ManagementStupid Things In Product Management
Stupid Things In Product Management
 
Measuring Social Media For B2B
Measuring Social Media For B2BMeasuring Social Media For B2B
Measuring Social Media For B2B
 
Irrational Loss Aversion
Irrational Loss AversionIrrational Loss Aversion
Irrational Loss Aversion
 
Twitter Personas: Bot or Not?
Twitter Personas: Bot or Not?Twitter Personas: Bot or Not?
Twitter Personas: Bot or Not?
 
Christmas is for Cookies
Christmas is for CookiesChristmas is for Cookies
Christmas is for Cookies
 
White House Process and Data Concerns
White House Process and Data ConcernsWhite House Process and Data Concerns
White House Process and Data Concerns
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Understand Risk in Communications and Data Breach

  • 1. Protect Your Customers and Your Business with Secure Business Communications Jon Gatrell VP, Product Management 12.16.2009
  • 2.
  • 3.
  • 4. ` Breaches happen everyday – 11.16.2009
  • 5. FTP alone is not a viable option to give you the insight, security and performance and, ultimately, the risk mitigation necessary to responsibly conduct business .
  • 6. Because e-mail connects through many routers and mail servers on its way to the recipient, it is inherently vulnerable to both physical and virtual eavesdropping . Current industry standards do not place emphasis on security ; information is transferred in plain text , and mail servers regularly conduct unprotected backups of e-mail that passes through.
  • 7. Another take on email privacy… In personal email communications, there has always been, and always should be, an expectation of privacy between the sender and the intended recipients of a message, enabling open communication with friends, colleagues, family, and others….. Let's be clear: there are issues with email privacy , and most of these issues are common to all email providers. The main issue is that the contents of your messages are stored on mail servers for some period of time; there is always a danger that these messages can be obtained and used for purposes that may harm you , such as possible misuse of your information…
  • 8.
  • 9.
  • 10.
  • 11. Source: Ponemon Institute, LLC Number of Data Records Lost It’s just money….
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. 252,474,509 people affected since 1/15/05
  • 17.
  • 18.
  • 19.
  • 20. Know who received what messages and files
  • 21. Historical and Real-Time Visibility into Messaging
  • 22. Manage Users and their access
  • 23. Proactively Manage groups and understand their activity
  • 24.  
  • 26. Financial information Board of directors or just internally
  • 27. Customer records and files No matter what size
  • 28. Do you retain PHI? Security inside and outside required
  • 29. Supporting your customers Confidential environment and operational data is exchanged
  • 30.  
  • 31. Access and Controls The right systems, the right platforms, the people and the right partners
  • 32.
  • 33.
  • 34. THANKS! www.scribbos.com www.stonebranch.com managedfiletransfer.wordpress.com Secure Communications: Enterprise Automation: MFT Blog:

Editor's Notes

  1. http://mail.google.com/mail/help/about_privacy.html
  2. 95% of businesses suffering a data breach were required to notify data subjects whose information was lost or stolen.
  3. Federal regulations – Alex
  4. AICP Code of Professional Conduct
  5. HR sends sensitive data that should be secured, as should procurement information! Bank routing data and alike.
  6. HIPAA HITECH AARA
  7. Software help desks should communicate securely. Your customers may have PCI or PHI information in their databases you exchange for support purposes
  8. Lawyers, designers anyone should send confidential information securely
  9. Please feel free to ask questions, we will address them at the end. As business continues to move at a faster pace you use more and more tools to communicate with colleagues, business partners, and customers. Whether its email, mobile apps or FTP you send and receive confidnetional info at the blink of an eye. It may make you concerned if these methods of communication are secure. With recent data braaches in the headlines becoming increasly commen, there is a real business issue regarding infomation security. That‘s why we are hear today.