SlideShare a Scribd company logo
1 of 27
How to bring your communication
infrastructure into the future without
sacrificing security.
The ticking time bomb
of shadow IT
Rasmus Holst
Chief Revenue Officer
rasmus@wire.com
+1 628 252 9359
@holst on Wire
The most secure collaboration platform.
© 2018 Wire Swiss GmbH
What are the problems with contemporary communication solutions?
EXECUTIVES
© 2018 Wire Swiss GmbH
Employees spend far too much time on emails
This is the single biggest cost in knowledge companies and collaboration tools
help optimize this significantly
90.000 hours /43 FTEs
SOURCE: Washington Post Research
3
Washington Post Research says 4.1 hours of email per day. 220 workdays and 2080 hours for an FTE.
Per year, a 100 people company will spend
on emails alone.
© 2018 Wire Swiss GmbH
Emails are not just a productivity killer – they are also the single largest source of attacks
This is the single biggest security risk in enterprises
SOURCE: PhishMe Research
4
91%
of cyberattacks and the resulting data breach begin with a spear phishing email.
93%
of the adult population cannot recognize a phishing email.
© 2018 Wire Swiss GmbH
A whole generation is moving off email as the “closed circle” communications tool
5
Use Snapchat daily to
keep in touch with friends
Of over 16 use mobile as
primary device
46% 93%
Use Instagram daily to
check and share pictures
Use Facebook daily to
check in and set updates
38%32%
Email and PC are not even on the radar — but neither is security
© 2018 Wire Swiss GmbH
Organizations are following the trend and offer “social tools” in the workplace
The revolution is happening and CEOs have recognized the challenge
SOURCE: NoJitter Research 2018
Have implemented social/collaboration tools Many deploy more than one collaboration tool
Yes
No
© 2018 Wire Swiss GmbH
So why not use run-off-the-mill social tools?
EXECUTIVES
© 2018 Wire Swiss GmbH
Why not WhatsApp?
Enterprises recognize this and have made both Whatsapp and Facebook Messenger one
of the 5 most frequently blacklisted apps
Messengers like WhatsApp have become the go-to form of communication, even in business.
But consumer-grade messengers simply aren’t fit for business use
No control
There is no team admin and no control over who has access to information.
No privacy
Data on you and clients you speak to are shared with Facebook to build an in-depth profile for advertising.
Non-compliance
The entire address book is sent to the servers, thus making any use of WhatsApp in business non compliant with GDPR.
© 2018 Wire Swiss GmbH
Why not Skype?
No encrypted conferencing
Calls over skype are not encrypted and prone to data breaches
Not secure by default
While Skype offers “Private Conversations” they need to be enabled by every contributing individual, and are only available in 1:1
Collects customer data
Skype collects data on its users and
A collaboration tool fit for business use requires default security settings that
don’t stand in the way of usability
© 2018 Wire Swiss GmbH
Tell us why this makes economic sense ?
EXECUTIVES
© 2018 Wire Swiss GmbH 11
If productivity is of CEO concern then information moves faster than ever
From implementing messenger style collaboration tools
SOURCE: https://michaelhyatt.com/category/main/productivity/
Fewer words
per similar message
Reduction in email
73%83%
© 2018 Wire Swiss GmbH 12
What do you need to “get it right”
Lessons from NoJitter Research
25% Concerned with security
25% Organizational Readiness
19% No need
16% Cloud Avoidance
6% Cost
Marrying social speed with a secure fabric is the “trick” to get it right
SOURCE: NoJitter Research 2018
© 2018 Wire Swiss GmbH 13
Do we know we protect the information
71% of UK companies have no cyber
insurance — while 81% of executives
deeming it “vital”
Breaches costs European companies 400bn GBP per year
— the problem is serious and growing
SOURCE: Computer Weekly
© 2018 Wire Swiss GmbH
CISO
Tell me how I answer the question if this is secure before I even consider this
© 2018 Wire Swiss GmbH 15
But what if the cloud is decentralized - no central storage
Security is always a concern when all is stored
centrally in the cloud and on breach destroys all
But what if the cloud is not storing all in the middle
+60% of breaches come from inside the organization
and most email server are only encrypted at rest or transit — back-ups often not at all
© 2018 Wire Swiss GmbH
We don’t know where our data is used or goes
16
Open Source — does not mean open for break
in — it means transparency and strong
cryptography algorithms
Most of the current collaboration vendors do not provide transparency
on where the data go — Gmail, Yahoo, WhatsApp etc. have all been caught in
scanning data for advertising purposes
© 2018 Wire Swiss GmbH 17
You have nothing central but I can break into devices
Each message can be its own fortress with
forward secrecy and a double ratchet
algorithm
Try to break the 90.000 man hours of work one by one - do you even want to try
© 2018 Wire Swiss GmbH 18
All vendors say they are secure. How do I audit that?
Ensure that the audits are public and not hidden away.
If you need to ask for them - be concerned.
© 2018 Wire Swiss GmbH 19
Answer the most difficult question according to the ModernCISO ranking
I know we are secure because it is an architecture that has not been hacked
and the effort involved to get ALL messages is almost insurmountable
Open Source
End to End Encryption
Public Audits
Message fortress
SOURCE: ModernCISO
Are we secure? How do we know? 61%141
How do we know if we have been hacked or breached? 48%122
Are we spending the right amount on your cybersecurity program? 39%107
How do we compare to peers within the same industry? 48%98
How effective is our security program? 39%98
Is our investment in cybersecurity going towards the right priorities? 43%97
© 2018 Wire Swiss GmbH
TEAM
Hey — answer the question — now you told me how to be secure —
now I want social speed and mobile @ work
© 2018 Wire Swiss GmbH 21
… now you know it is secure — now learn from where to meet people
The generation are mobile natives
Make it mobile
© 2018 Wire Swiss GmbH 22
Include emotions and reactions
Learn from the social media to keep them engaged
Create engagement
© 2018 Wire Swiss GmbH 23
Include externals — partners, customers, consultants
Internal communication is “non-revenue”— generating extend the
platform to external to avoid shadow IT like WhatsApp
Open up
© 2018 Wire Swiss GmbH 24
… not everything is worth saving
Internal and notifications might not be worthwhile saving —
next generations understand that from social networks
Ephemeral is understood
© 2018 Wire Swiss GmbH 25
… turn on the pace
Short bursts of messages makes it more likely for colleagues
and customers/partners to respond
Make it fast-paced
● Makes economic sense and
increases productivity
● Lessens insurance
requirement and risk
In conclusion … contrary to intuition might make the workplace safer
● Creates an risk to effort
equation that is in the
organizations favor
● Builds a framework of
privacy and security
— that engages
● Helps transform work to
make it secure, mobile,
inclusive and fast-paced
Now we can all answer the question — why are we secure
The most secure collaboration platform.
Wire is the most secure collaboration platform. We are transforming the
way business’ communicate in the same way and speed that our founders
disrupted telephony with Skype.
Wire is consistently delivering groundbreaking first - from our unique
“message fortress” architecture to encrypted video conferences and guest
rooms - our customers rely on Wire to be at the forefront of secure, private
yet sleek collaboration.
We are a 70 people strong organization with offices in Berlin, San Francisco
and Zug. We proudly serve over 300 customers on five continents - from
the biggest brand names over non-profits to small medium business’.
About Wire
Rasmus Holst
Chief Revenue Officer
e rasmus@wire.com
m +1 628 252 9359
@holst on Wire
Contact me for questions

More Related Content

What's hot

State of the Cloud in 2015
State of the Cloud in 2015State of the Cloud in 2015
State of the Cloud in 2015Skyhigh Networks
 
Zero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is deadZero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is deadJochen Kressin
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access ModelAkamai Technologies
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
A10 presentation overcoming the industrys insecurity complex
A10 presentation   overcoming the industrys insecurity complexA10 presentation   overcoming the industrys insecurity complex
A10 presentation overcoming the industrys insecurity complexDr. Wilfred Lin (Ph.D.)
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNSC42 Ltd
 
In Cloud We Trust
In Cloud We TrustIn Cloud We Trust
In Cloud We TrustRapidScale
 
Cybersecurity in the Workplace is Everyone's Business
 Cybersecurity in the Workplace is Everyone's Business  Cybersecurity in the Workplace is Everyone's Business
Cybersecurity in the Workplace is Everyone's Business Symantec
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectNetskope
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene Microsoft
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityFlexera
 
EMA Network Security Survey and Recommendations
EMA Network Security Survey and RecommendationsEMA Network Security Survey and Recommendations
EMA Network Security Survey and RecommendationsLora O'Haver
 

What's hot (16)

State of the Cloud in 2015
State of the Cloud in 2015State of the Cloud in 2015
State of the Cloud in 2015
 
Zero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is deadZero trusted networks: Why permiterer security is dead
Zero trusted networks: Why permiterer security is dead
 
3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model3 Reasons It's Time for a New Remote Access Model
3 Reasons It's Time for a New Remote Access Model
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
A10 presentation overcoming the industrys insecurity complex
A10 presentation   overcoming the industrys insecurity complexA10 presentation   overcoming the industrys insecurity complex
A10 presentation overcoming the industrys insecurity complex
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC ConferenceNsc42 - is the cloud secure - is easy if you do it smart ECC Conference
Nsc42 - is the cloud secure - is easy if you do it smart ECC Conference
 
In Cloud We Trust
In Cloud We TrustIn Cloud We Trust
In Cloud We Trust
 
Cybersecurity in the Workplace is Everyone's Business
 Cybersecurity in the Workplace is Everyone's Business  Cybersecurity in the Workplace is Everyone's Business
Cybersecurity in the Workplace is Everyone's Business
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Data Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier EffectData Breach: The Cloud Multiplier Effect
Data Breach: The Cloud Multiplier Effect
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology ComplexityWebinar: Maximizing the ROI of IT by Simplifying Technology Complexity
Webinar: Maximizing the ROI of IT by Simplifying Technology Complexity
 
EMA Network Security Survey and Recommendations
EMA Network Security Survey and RecommendationsEMA Network Security Survey and Recommendations
EMA Network Security Survey and Recommendations
 

Similar to The ticking time bomb of shadow it

Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Enterprise Management Associates
 
Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveCyber Watching
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018Match-Maker Ventures
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000finance40
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?NUS-ISS
 
Information Security for Translation Services
Information Security for Translation ServicesInformation Security for Translation Services
Information Security for Translation ServicesHans Pich
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalRobertPike
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkAppian
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...Cloudflare
 
Application & Mobile App Development for Start-ups
Application & Mobile App Development for Start-upsApplication & Mobile App Development for Start-ups
Application & Mobile App Development for Start-upsAditya Joshi
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
Application & Mobile App Development for Start-ups by pliXos
Application & Mobile App Development for Start-ups by pliXosApplication & Mobile App Development for Start-ups by pliXos
Application & Mobile App Development for Start-ups by pliXospliXos GmbH
 
Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Prayukth K V
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 

Similar to The ticking time bomb of shadow it (20)

Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Addressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspectiveAddressing cyber risk managment from SME perspective
Addressing cyber risk managment from SME perspective
 
MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018MMV Webinar 3. Cybersecurity Perspectives. March 2018
MMV Webinar 3. Cybersecurity Perspectives. March 2018
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
symc_annual2000
symc_annual2000symc_annual2000
symc_annual2000
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
NUS-ISS Learning Day 2019- AI and Cybersecurity – Solution or Threat?
 
Information Security for Translation Services
Information Security for Translation ServicesInformation Security for Translation Services
Information Security for Translation Services
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
HARTMANN and Cloudflare Learn how healthcare providers can build resilient in...
 
dcb1203CyberNDI
dcb1203CyberNDIdcb1203CyberNDI
dcb1203CyberNDI
 
Application & Mobile App Development for Start-ups
Application & Mobile App Development for Start-upsApplication & Mobile App Development for Start-ups
Application & Mobile App Development for Start-ups
 
16231
1623116231
16231
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Application & Mobile App Development for Start-ups by pliXos
Application & Mobile App Development for Start-ups by pliXosApplication & Mobile App Development for Start-ups by pliXos
Application & Mobile App Development for Start-ups by pliXos
 
Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015Cloud adoption and risk report Europe q1 2015
Cloud adoption and risk report Europe q1 2015
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 

Recently uploaded

Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio managementJunaidKhan750825
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherPerry Belcher
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creationsnakalysalcedo61
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...lizamodels9
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCRsoniya singh
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 

Recently uploaded (20)

Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio management
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry BelcherA.I. Bot Summit 3 Opening Keynote - Perry Belcher
A.I. Bot Summit 3 Opening Keynote - Perry Belcher
 
Marketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet CreationsMarketing Management Business Plan_My Sweet Creations
Marketing Management Business Plan_My Sweet Creations
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
Call Girls In Kishangarh Delhi ❤️8860477959 Good Looking Escorts In 24/7 Delh...
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 

The ticking time bomb of shadow it

  • 1. How to bring your communication infrastructure into the future without sacrificing security. The ticking time bomb of shadow IT Rasmus Holst Chief Revenue Officer rasmus@wire.com +1 628 252 9359 @holst on Wire The most secure collaboration platform.
  • 2. © 2018 Wire Swiss GmbH What are the problems with contemporary communication solutions? EXECUTIVES
  • 3. © 2018 Wire Swiss GmbH Employees spend far too much time on emails This is the single biggest cost in knowledge companies and collaboration tools help optimize this significantly 90.000 hours /43 FTEs SOURCE: Washington Post Research 3 Washington Post Research says 4.1 hours of email per day. 220 workdays and 2080 hours for an FTE. Per year, a 100 people company will spend on emails alone.
  • 4. © 2018 Wire Swiss GmbH Emails are not just a productivity killer – they are also the single largest source of attacks This is the single biggest security risk in enterprises SOURCE: PhishMe Research 4 91% of cyberattacks and the resulting data breach begin with a spear phishing email. 93% of the adult population cannot recognize a phishing email.
  • 5. © 2018 Wire Swiss GmbH A whole generation is moving off email as the “closed circle” communications tool 5 Use Snapchat daily to keep in touch with friends Of over 16 use mobile as primary device 46% 93% Use Instagram daily to check and share pictures Use Facebook daily to check in and set updates 38%32% Email and PC are not even on the radar — but neither is security
  • 6. © 2018 Wire Swiss GmbH Organizations are following the trend and offer “social tools” in the workplace The revolution is happening and CEOs have recognized the challenge SOURCE: NoJitter Research 2018 Have implemented social/collaboration tools Many deploy more than one collaboration tool Yes No
  • 7. © 2018 Wire Swiss GmbH So why not use run-off-the-mill social tools? EXECUTIVES
  • 8. © 2018 Wire Swiss GmbH Why not WhatsApp? Enterprises recognize this and have made both Whatsapp and Facebook Messenger one of the 5 most frequently blacklisted apps Messengers like WhatsApp have become the go-to form of communication, even in business. But consumer-grade messengers simply aren’t fit for business use No control There is no team admin and no control over who has access to information. No privacy Data on you and clients you speak to are shared with Facebook to build an in-depth profile for advertising. Non-compliance The entire address book is sent to the servers, thus making any use of WhatsApp in business non compliant with GDPR.
  • 9. © 2018 Wire Swiss GmbH Why not Skype? No encrypted conferencing Calls over skype are not encrypted and prone to data breaches Not secure by default While Skype offers “Private Conversations” they need to be enabled by every contributing individual, and are only available in 1:1 Collects customer data Skype collects data on its users and A collaboration tool fit for business use requires default security settings that don’t stand in the way of usability
  • 10. © 2018 Wire Swiss GmbH Tell us why this makes economic sense ? EXECUTIVES
  • 11. © 2018 Wire Swiss GmbH 11 If productivity is of CEO concern then information moves faster than ever From implementing messenger style collaboration tools SOURCE: https://michaelhyatt.com/category/main/productivity/ Fewer words per similar message Reduction in email 73%83%
  • 12. © 2018 Wire Swiss GmbH 12 What do you need to “get it right” Lessons from NoJitter Research 25% Concerned with security 25% Organizational Readiness 19% No need 16% Cloud Avoidance 6% Cost Marrying social speed with a secure fabric is the “trick” to get it right SOURCE: NoJitter Research 2018
  • 13. © 2018 Wire Swiss GmbH 13 Do we know we protect the information 71% of UK companies have no cyber insurance — while 81% of executives deeming it “vital” Breaches costs European companies 400bn GBP per year — the problem is serious and growing SOURCE: Computer Weekly
  • 14. © 2018 Wire Swiss GmbH CISO Tell me how I answer the question if this is secure before I even consider this
  • 15. © 2018 Wire Swiss GmbH 15 But what if the cloud is decentralized - no central storage Security is always a concern when all is stored centrally in the cloud and on breach destroys all But what if the cloud is not storing all in the middle +60% of breaches come from inside the organization and most email server are only encrypted at rest or transit — back-ups often not at all
  • 16. © 2018 Wire Swiss GmbH We don’t know where our data is used or goes 16 Open Source — does not mean open for break in — it means transparency and strong cryptography algorithms Most of the current collaboration vendors do not provide transparency on where the data go — Gmail, Yahoo, WhatsApp etc. have all been caught in scanning data for advertising purposes
  • 17. © 2018 Wire Swiss GmbH 17 You have nothing central but I can break into devices Each message can be its own fortress with forward secrecy and a double ratchet algorithm Try to break the 90.000 man hours of work one by one - do you even want to try
  • 18. © 2018 Wire Swiss GmbH 18 All vendors say they are secure. How do I audit that? Ensure that the audits are public and not hidden away. If you need to ask for them - be concerned.
  • 19. © 2018 Wire Swiss GmbH 19 Answer the most difficult question according to the ModernCISO ranking I know we are secure because it is an architecture that has not been hacked and the effort involved to get ALL messages is almost insurmountable Open Source End to End Encryption Public Audits Message fortress SOURCE: ModernCISO Are we secure? How do we know? 61%141 How do we know if we have been hacked or breached? 48%122 Are we spending the right amount on your cybersecurity program? 39%107 How do we compare to peers within the same industry? 48%98 How effective is our security program? 39%98 Is our investment in cybersecurity going towards the right priorities? 43%97
  • 20. © 2018 Wire Swiss GmbH TEAM Hey — answer the question — now you told me how to be secure — now I want social speed and mobile @ work
  • 21. © 2018 Wire Swiss GmbH 21 … now you know it is secure — now learn from where to meet people The generation are mobile natives Make it mobile
  • 22. © 2018 Wire Swiss GmbH 22 Include emotions and reactions Learn from the social media to keep them engaged Create engagement
  • 23. © 2018 Wire Swiss GmbH 23 Include externals — partners, customers, consultants Internal communication is “non-revenue”— generating extend the platform to external to avoid shadow IT like WhatsApp Open up
  • 24. © 2018 Wire Swiss GmbH 24 … not everything is worth saving Internal and notifications might not be worthwhile saving — next generations understand that from social networks Ephemeral is understood
  • 25. © 2018 Wire Swiss GmbH 25 … turn on the pace Short bursts of messages makes it more likely for colleagues and customers/partners to respond Make it fast-paced
  • 26. ● Makes economic sense and increases productivity ● Lessens insurance requirement and risk In conclusion … contrary to intuition might make the workplace safer ● Creates an risk to effort equation that is in the organizations favor ● Builds a framework of privacy and security — that engages ● Helps transform work to make it secure, mobile, inclusive and fast-paced Now we can all answer the question — why are we secure
  • 27. The most secure collaboration platform. Wire is the most secure collaboration platform. We are transforming the way business’ communicate in the same way and speed that our founders disrupted telephony with Skype. Wire is consistently delivering groundbreaking first - from our unique “message fortress” architecture to encrypted video conferences and guest rooms - our customers rely on Wire to be at the forefront of secure, private yet sleek collaboration. We are a 70 people strong organization with offices in Berlin, San Francisco and Zug. We proudly serve over 300 customers on five continents - from the biggest brand names over non-profits to small medium business’. About Wire Rasmus Holst Chief Revenue Officer e rasmus@wire.com m +1 628 252 9359 @holst on Wire Contact me for questions