-The Current Global Digital Threat Climate
-Cyber-Trends Against The U.S. Financial Service Sector
-Considerations Prior To Outsourcing
-Pitfalls In International Partnerships
-Communications, Connections, And Security Considerations Between Locations
-Dealing With Data Exposures
-5 Things You Can Do To Protect Your Existing Outsourcing Right Now
Session 2 10:30am-11:30am
-Technology Outsourcing Trends
-Secure Outsourcing Technologies
-Collaboration Methods With Remote Teams
-How To Connect People With The Right Information At The Right Time And The Right Place
-How To Connect People With Fellow Employees, Vendors, Partners Or Other External Contacts Outside Of the Organization
-Project Management Technology Of Remote Resources
The AES Investment Code - the go-to counsel for the most well-informed, wise...
Digital Outsourcing: Risks, Pitfalls, and Security Considerations
1. I NTER D YN Innovative Solutions, Proven Results Digital Outsourcing Presented by: Robert J. Bagnall, CEO Maverick-Security, LLC Peter Ward, Business Collaboration Manager InterDyn AKA Risks, Pitfalls, and Security Considerations for Doing It Right
2.
3.
4. About Maverick Maverick provides customized, personal and corporate security and brand defense services to High-Profile Individuals, small businesses, and a few select corporate clients. Our patented methodology and processes encompass over 15 years of cyber-security and intelligence experience in the government and commercial sectors. Services include Personal Brand Defense (PBD), the SPF Assessment Program, and Global Digital Threat Intelligence.
9. Threats By Region Region-1: North & Central America> Although the most regulated, the United States is also still the country with the largest quantity of SPAM site hosts. Mexico and Central America hold regional ideological movements that transcend to the cyber environment. THREATS: Economic, Ideological, Opportunistic, Criminal Region-2: South America & Caribbean> South America is a growing digital threat, with Brazil leading the way. In five short years, Brazil has gone from script kiddie web site defacements to a formidable hacker-for-hire. THREATS: Criminal, Opportunistic, Ideological Region-3: Europe> Although ideological threats persist within this region, the majority of the threat comes from the open practice of cyber-espionage and business intelligence against competitors. THREATS: Economic, Opportunistic, Ideological
10. Threats By Region Region-4: Russia & Eurasia> Organized crime is by far the biggest threat in Region 4. The Russian and eastern European mafias, tacitly and sometimes openly supported by government, operate fraud, SPAM, hacker-for-hire, and digital extortion with near impunity. THREATS: Criminal, Economic, Ideological, Opportunistic Region-5: MidEast & Southwest Asia> Rising rapidly since 2003, the Middle East threat is almost entirely ideological. Southwest Asia sees economic and criminal activity as well due to ethnic and religious differences within the region. THREATS: Ideological, Economic, Criminal Region-6: Africa> Africa remains the slowest region to rise in terms of global digital threat. Much of the activity within the region is more associated with the infusion of outside influence (religious and criminal) than internal capability. The largest threat here remains scams and other criminal activity, though a spike in ideological hacking activity is being seen today. THREATS: Criminal, Ideological
11. Threats By Region Region-7: Central & Southeast Asia> China is a formidable digital threat. Regardless of the fact that America and China share extensive economic relationships, Chinese military doctrine states that they plan and execute for cyber war to emerge as the global power. THREATS: Nationalism, Economic, Opportunistic Region-8: Australia> While Australia shares a close personal relationship with the United States, economic and opportunistic threats still exist. THREATS: Economic, Opportunism
12.
13.
14.
15.
16.
17.
18.
19. The Last Word Outsourcing is a viable, necessary, and soon-to-be integral part of American business – particularly in critical infrastructures like financial and medical services. But the risks can be untenable if you are not properly prepared. If you take your organization into it with eyes wide open then you stand a good chance of having a strong, positive experience with minimal disruption. When the day is done, no matter how big your organization or what type, we are all on the same team. It does not pay to create fiefdoms or hold information close. Together we are better. This security stuff is not rocket science. It takes sound practices and the right technology implemented and executed with tireless vigilance. You will never stop cyber-attacks completely, so get used to this being an on-going process. But that does not mean that you cannot prevent most of the pain you face today.
22. Servers Slide 18: On the upper pie, change Office 12 to the updated logo. You can even put the Windows Sharepoint Services Logo in the center of the pie to get the point across. I do want to use this slide because this is how Bill has been talking about all the server capabilities. It’s not very different from 32, especially when you consider the story that Bill normally tells here. The 2007 Microsoft Office System Evolution Collaboration Content management Streamlined processes Portals Business intelligence Search Word processing Business modeling Presentations Business data management Information Management
23. Definition of a portal Microsoft Confidential The Presentation Layer of information to lines of business Internal Apps External Apps Accounting Sales HR PMO Office
32. Office Groove Server 2007 A peer to peer network. No server required A ‘Napster’ on steroids The true virtual office Mobile Employee External Partner Knowledge Worker What is Groove? Groove is desktop software that allows teams of people to work together securely over the network as if they were in the same physical location… Enter the age of the virtual office
33.
34.
35.
36. Role-based Enterprise Policies Seamless integration with Active Directory to quickly add or remove users or groups to policies Roles can prohibit full access rights to the document author while giving full access to others in the policy Expiration date can be set by calendar date or number of days from document publication date Allows use of protected content when disconnected from the policy server, optionally for a specified number of days
37. Activity Reporting On End User Actions Activity reports deliver results based on user-selected queries Results detail access and usage based on Role-based policies Reports provide complete details on file access and usage by user Use with 3 rd party reporting tools
38. Liquid Machines Document Control Overview Liquid Machines Agent Policy Administration Auditing & Reporting Liquid Machines Policy Server CEO Full Rights Employee Edit, Print Contractor Read Only Policies Audit Logs Key Management