SlideShare a Scribd company logo
1 of 45
I NTER D YN Innovative Solutions, Proven Results Digital Outsourcing Presented by: Robert J. Bagnall, CEO Maverick-Security, LLC Peter Ward, Business Collaboration Manager InterDyn AKA Risks, Pitfalls, and Security Considerations for Doing It Right
About InterDyn AKA ,[object Object],Dynamics GP, Dynamics CRM, and Dynamics AX Office 2007: SharePoint, Project Server, Project Portfolio Server, InfoPath, Forms Server Custom Application Development
About InterDyn AKA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
About Maverick Maverick provides customized, personal and corporate security and brand defense services to High-Profile Individuals, small businesses, and a few select corporate clients.  Our patented methodology and processes encompass over 15 years of cyber-security and intelligence experience in the government and commercial sectors.  Services include Personal Brand Defense (PBD), the SPF Assessment Program, and Global Digital Threat Intelligence.
Topics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Current Global Digital Threat Climate
3 Most Common Exploitation Types ,[object Object],[object Object],[object Object]
Primary Motivators ,[object Object],[object Object],[object Object],[object Object],[object Object]
Threats By Region Region-1: North & Central America> Although the most regulated, the United States is also still the country with the largest quantity of SPAM site hosts.  Mexico and Central America hold regional ideological movements that transcend to the cyber environment.  THREATS: Economic, Ideological, Opportunistic, Criminal  Region-2: South America & Caribbean>  South America is a growing digital threat, with Brazil leading the way.  In five short years, Brazil has gone from script kiddie web site defacements to a formidable hacker-for-hire.  THREATS: Criminal, Opportunistic, Ideological  Region-3: Europe> Although ideological threats persist within this region, the majority of the threat comes from the open practice of cyber-espionage and business intelligence against competitors.  THREATS: Economic, Opportunistic, Ideological
Threats By Region Region-4: Russia & Eurasia> Organized crime is by far the biggest threat in Region 4.  The Russian and eastern European mafias, tacitly and sometimes openly supported by government, operate fraud, SPAM, hacker-for-hire, and digital extortion with near impunity.  THREATS: Criminal, Economic, Ideological, Opportunistic  Region-5: MidEast & Southwest Asia>  Rising rapidly since 2003, the Middle East threat is almost entirely ideological.  Southwest Asia sees economic and criminal activity as well due to ethnic and religious differences within the region.  THREATS: Ideological, Economic, Criminal  Region-6: Africa> Africa remains the slowest region to rise in terms of global digital threat.  Much of the activity within the region is more associated with the infusion of outside influence (religious and criminal) than internal capability.  The largest threat here remains scams and other criminal activity, though a spike in ideological hacking activity is being seen today.  THREATS: Criminal, Ideological
Threats By Region Region-7: Central & Southeast Asia> China is a formidable digital threat.  Regardless of the fact that America and China share extensive economic relationships, Chinese military doctrine states that they plan and execute for cyber war to emerge as the global power.  THREATS: Nationalism, Economic, Opportunistic  Region-8: Australia>  While Australia shares a close personal relationship with the United States, economic and opportunistic threats still exist.  THREATS: Economic, Opportunism
Exploitation Categories ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyber-Trends Against The U.S. Financial Service Sector ,[object Object],[object Object],[object Object],[object Object]
Considerations Prior To Outsourcing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Pitfalls in Outsourcing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Communications,   Connections, and Security Considerations Between Locations ,[object Object],Trusted Insiders Trusted  Outsiders Untrusted Insiders Untrusted Outsiders
Dealing With Data Exposures ,[object Object],[object Object],[object Object],[object Object],[object Object]
5 Things You Can Do To Protect Your Existing Outsourcing Right Now   ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Last Word Outsourcing is a viable, necessary, and soon-to-be integral part of American business – particularly in critical infrastructures like financial and medical services.  But the risks can be untenable if you are not properly prepared.  If you take your organization into it with eyes wide open then you stand a good chance of having a strong, positive experience with minimal disruption.  When the day is done, no matter how big your organization or what type, we are all on the same team.  It does not pay to create fiefdoms or hold information close.  Together we are better.  This security stuff is not rocket science.  It takes sound practices and the right technology implemented and executed with tireless vigilance.  You will never stop cyber-attacks completely, so get used to this being an on-going process.  But that does not mean that you cannot prevent most of the pain you face today.
Quick Questions
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Agenda
Servers Slide 18: On the upper pie, change Office 12 to the updated logo.  You can even put the Windows Sharepoint Services Logo in the center of the pie to get the point across.  I do want to use this slide because this is how Bill has been talking about all the server capabilities.  It’s not very different from 32, especially when you consider the story that Bill normally tells here. The 2007 Microsoft Office System Evolution Collaboration Content management Streamlined processes Portals Business intelligence Search Word  processing Business  modeling Presentations Business data management Information Management
Definition of a portal Microsoft Confidential The Presentation Layer of information to lines of business Internal Apps External Apps Accounting Sales HR PMO Office
The Microsoft Office 2007
Out-Of-Box Workflow
InfoPath Forms In Browser
SharePoint Portal Server 2007 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Project  Server 2007 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Project  Server 2007 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],What gets measured get done
Portfolio Server 2007 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Portfolio Server 2007 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Office Groove Server 2007   A peer to peer network.  No server required A ‘Napster’ on steroids The true virtual office Mobile Employee External Partner Knowledge Worker What is Groove? Groove is desktop software that allows teams of people to work together securely over the network as if they were in the same physical location… Enter the age of the    virtual office
Liquid Machines Document Control ,[object Object],[object Object],[object Object],[object Object],[object Object]
Liquid Machines Policy Droplet™  ,[object Object]
Liquid Machines File share Gateway ,[object Object],Policy X Policy Y and Z
Role-based Enterprise Policies Seamless integration with Active Directory to quickly add or remove users or groups to policies Roles can prohibit full access rights to the document author while giving full access to others in the policy Expiration date can  be set by calendar date or number of days from document publication date Allows use of protected content when disconnected from the policy server, optionally for a specified number of days
Activity Reporting On End User Actions Activity reports deliver results based on user-selected queries  Results detail access and usage based on Role-based policies  Reports provide complete details on file access and usage by user Use with 3 rd  party reporting tools
Liquid Machines Document Control Overview Liquid Machines Agent Policy Administration Auditing & Reporting Liquid Machines Policy Server CEO Full Rights Employee Edit, Print Contractor Read Only Policies Audit Logs Key Management
Glossary of terms ,[object Object],[object Object],[object Object],[object Object]
Applying this technology to outsourcing
SharePoint Portal Server 2007 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scenario  ,[object Object],[object Object],[object Object]
Scenario  ,[object Object],[object Object],[object Object]
Summarize the presentation  ,[object Object],[object Object],[object Object],[object Object]
Questions

More Related Content

What's hot

Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offeringeeaches
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
 
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No ShoesCarolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoescentralohioissa
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTripwire
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsTripwire
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistMatthew Rosenquist
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworksJohn Arnold
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point FinalBen Rothke
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergySec
 
Deral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail LaterDeral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail Latercentralohioissa
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Puneet Kukreja
 
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseEnergySec
 

What's hot (20)

Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No ShoesCarolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
Security architecture frameworks
Security architecture frameworksSecurity architecture frameworks
Security architecture frameworks
 
Info Sec2007 End Point Final
Info Sec2007   End Point FinalInfo Sec2007   End Point Final
Info Sec2007 End Point Final
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 
Deral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail LaterDeral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail Later
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
Establishing an insider threat programme: Know your Snowden - Puneet Kukreja,...
 
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber DefenseGary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
 

Similar to Digital Outsourcing: Risks, Pitfalls, and Security Considerations

Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...PECB
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalVivek Ahuja
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015CBIZ, Inc.
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItEmerson Exchange
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Jay Kesan
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSRandall Chase
 

Similar to Digital Outsourcing: Risks, Pitfalls, and Security Considerations (20)

Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
ISO/IEC 27032 vs. ISO 31000 – How do they help towards Cybersecurity Risk Man...
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 
MP_OneSheet_VulnThreat
MP_OneSheet_VulnThreatMP_OneSheet_VulnThreat
MP_OneSheet_VulnThreat
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
DeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without ItDeltaV Security - Don’t Let Your Business Be Caught Without It
DeltaV Security - Don’t Let Your Business Be Caught Without It
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Riverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentationRiverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentation
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 

More from Peter1020

Share point no coding bi
Share point no coding biShare point no coding bi
Share point no coding biPeter1020
 
Nj sharepoint user group
Nj sharepoint user groupNj sharepoint user group
Nj sharepoint user groupPeter1020
 
Ct user group governance
Ct  user group governanceCt  user group governance
Ct user group governancePeter1020
 
Going green kl presentation
Going green kl presentationGoing green kl presentation
Going green kl presentationPeter1020
 
Sps philly 2011 1-designer
Sps philly 2011 1-designerSps philly 2011 1-designer
Sps philly 2011 1-designerPeter1020
 
SharePoint Governance
SharePoint GovernanceSharePoint Governance
SharePoint GovernancePeter1020
 
Share point 2010 next gen of collaboration
Share point 2010   next gen of collaborationShare point 2010   next gen of collaboration
Share point 2010 next gen of collaborationPeter1020
 
Share Point Ax
Share Point AxShare Point Ax
Share Point AxPeter1020
 
Share Point For Gp Paperchase
Share Point For Gp PaperchaseShare Point For Gp Paperchase
Share Point For Gp PaperchasePeter1020
 
Share Point For Gp Paperchase
Share Point For Gp PaperchaseShare Point For Gp Paperchase
Share Point For Gp PaperchasePeter1020
 
Crm Data To Share Point Reports
Crm Data To Share Point  ReportsCrm Data To Share Point  Reports
Crm Data To Share Point ReportsPeter1020
 
Gp Data To Share Point Reports
Gp Data To Share Point  ReportsGp Data To Share Point  Reports
Gp Data To Share Point ReportsPeter1020
 
Share Point Project Management 2.0
Share Point  Project Management 2.0Share Point  Project Management 2.0
Share Point Project Management 2.0Peter1020
 
Share Point Business Portal
Share Point  Business PortalShare Point  Business Portal
Share Point Business PortalPeter1020
 
Sp Contracts Ts
Sp  Contracts TsSp  Contracts Ts
Sp Contracts TsPeter1020
 
Share Point Project Management 2.0 A And E
Share Point  Project Management 2.0  A And EShare Point  Project Management 2.0  A And E
Share Point Project Management 2.0 A And EPeter1020
 
Leverage The Economy
Leverage The EconomyLeverage The Economy
Leverage The EconomyPeter1020
 
Share Point Project Management 2.0
Share Point  Project Management 2.0Share Point  Project Management 2.0
Share Point Project Management 2.0Peter1020
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights ManagementPeter1020
 
Paperless Office Upload
Paperless Office UploadPaperless Office Upload
Paperless Office UploadPeter1020
 

More from Peter1020 (20)

Share point no coding bi
Share point no coding biShare point no coding bi
Share point no coding bi
 
Nj sharepoint user group
Nj sharepoint user groupNj sharepoint user group
Nj sharepoint user group
 
Ct user group governance
Ct  user group governanceCt  user group governance
Ct user group governance
 
Going green kl presentation
Going green kl presentationGoing green kl presentation
Going green kl presentation
 
Sps philly 2011 1-designer
Sps philly 2011 1-designerSps philly 2011 1-designer
Sps philly 2011 1-designer
 
SharePoint Governance
SharePoint GovernanceSharePoint Governance
SharePoint Governance
 
Share point 2010 next gen of collaboration
Share point 2010   next gen of collaborationShare point 2010   next gen of collaboration
Share point 2010 next gen of collaboration
 
Share Point Ax
Share Point AxShare Point Ax
Share Point Ax
 
Share Point For Gp Paperchase
Share Point For Gp PaperchaseShare Point For Gp Paperchase
Share Point For Gp Paperchase
 
Share Point For Gp Paperchase
Share Point For Gp PaperchaseShare Point For Gp Paperchase
Share Point For Gp Paperchase
 
Crm Data To Share Point Reports
Crm Data To Share Point  ReportsCrm Data To Share Point  Reports
Crm Data To Share Point Reports
 
Gp Data To Share Point Reports
Gp Data To Share Point  ReportsGp Data To Share Point  Reports
Gp Data To Share Point Reports
 
Share Point Project Management 2.0
Share Point  Project Management 2.0Share Point  Project Management 2.0
Share Point Project Management 2.0
 
Share Point Business Portal
Share Point  Business PortalShare Point  Business Portal
Share Point Business Portal
 
Sp Contracts Ts
Sp  Contracts TsSp  Contracts Ts
Sp Contracts Ts
 
Share Point Project Management 2.0 A And E
Share Point  Project Management 2.0  A And EShare Point  Project Management 2.0  A And E
Share Point Project Management 2.0 A And E
 
Leverage The Economy
Leverage The EconomyLeverage The Economy
Leverage The Economy
 
Share Point Project Management 2.0
Share Point  Project Management 2.0Share Point  Project Management 2.0
Share Point Project Management 2.0
 
Microsoft Rights Management
Microsoft Rights ManagementMicrosoft Rights Management
Microsoft Rights Management
 
Paperless Office Upload
Paperless Office UploadPaperless Office Upload
Paperless Office Upload
 

Recently uploaded

Introduction to Health Economics Dr. R. Kurinji Malar.pptx
Introduction to Health Economics Dr. R. Kurinji Malar.pptxIntroduction to Health Economics Dr. R. Kurinji Malar.pptx
Introduction to Health Economics Dr. R. Kurinji Malar.pptxDrRkurinjiMalarkurin
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》rnrncn29
 
Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...Amil baba
 
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...Amil baba
 
Guard Your Investments- Corporate Defaults Alarm.pdf
Guard Your Investments- Corporate Defaults Alarm.pdfGuard Your Investments- Corporate Defaults Alarm.pdf
Guard Your Investments- Corporate Defaults Alarm.pdfJasper Colin
 
10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdf10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdfglobusfinanza
 
Financial analysis on Risk and Return.ppt
Financial analysis on Risk and Return.pptFinancial analysis on Risk and Return.ppt
Financial analysis on Risk and Return.ppttadegebreyesus
 
Unveiling Poonawalla Fincorp’s Phenomenal Performance Under Abhay Bhutada’s L...
Unveiling Poonawalla Fincorp’s Phenomenal Performance Under Abhay Bhutada’s L...Unveiling Poonawalla Fincorp’s Phenomenal Performance Under Abhay Bhutada’s L...
Unveiling Poonawalla Fincorp’s Phenomenal Performance Under Abhay Bhutada’s L...beulahfernandes8
 
Role of Information and technology in banking and finance .pptx
Role of Information and technology in banking and finance .pptxRole of Information and technology in banking and finance .pptx
Role of Information and technology in banking and finance .pptxNarayaniTripathi2
 
Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024Devarsh Vakil
 
NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...
NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...
NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...Amil baba
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Commonwealth
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderThe Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderArianna Varetto
 
Gender and caste discrimination in india
Gender and caste discrimination in indiaGender and caste discrimination in india
Gender and caste discrimination in indiavandanasingh01072003
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfMichael Silva
 
Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...
Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...
Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...Amil baba
 
Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.Precize Formely Leadoff
 
The AES Investment Code - the go-to counsel for the most well-informed, wise...
The AES Investment Code -  the go-to counsel for the most well-informed, wise...The AES Investment Code -  the go-to counsel for the most well-informed, wise...
The AES Investment Code - the go-to counsel for the most well-informed, wise...AES International
 

Recently uploaded (20)

Introduction to Health Economics Dr. R. Kurinji Malar.pptx
Introduction to Health Economics Dr. R. Kurinji Malar.pptxIntroduction to Health Economics Dr. R. Kurinji Malar.pptx
Introduction to Health Economics Dr. R. Kurinji Malar.pptx
 
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
《加拿大本地办假证-寻找办理Dalhousie毕业证和达尔豪斯大学毕业证书的中介代理》
 
Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
Uae-NO1 Pakistani Amil Baba Real Amil baba In Pakistan Najoomi Baba in Pakist...
 
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
 
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth AdvisorsQ1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
 
Guard Your Investments- Corporate Defaults Alarm.pdf
Guard Your Investments- Corporate Defaults Alarm.pdfGuard Your Investments- Corporate Defaults Alarm.pdf
Guard Your Investments- Corporate Defaults Alarm.pdf
 
10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdf10 QuickBooks Tips 2024 - Globus Finanza.pdf
10 QuickBooks Tips 2024 - Globus Finanza.pdf
 
Financial analysis on Risk and Return.ppt
Financial analysis on Risk and Return.pptFinancial analysis on Risk and Return.ppt
Financial analysis on Risk and Return.ppt
 
Unveiling Poonawalla Fincorp’s Phenomenal Performance Under Abhay Bhutada’s L...
Unveiling Poonawalla Fincorp’s Phenomenal Performance Under Abhay Bhutada’s L...Unveiling Poonawalla Fincorp’s Phenomenal Performance Under Abhay Bhutada’s L...
Unveiling Poonawalla Fincorp’s Phenomenal Performance Under Abhay Bhutada’s L...
 
Role of Information and technology in banking and finance .pptx
Role of Information and technology in banking and finance .pptxRole of Information and technology in banking and finance .pptx
Role of Information and technology in banking and finance .pptx
 
Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024
 
NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...
NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...
NO1 Certified Black Magic Removal in Uk kala jadu Specialist kala jadu for Lo...
 
Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]Economic Risk Factor Update: April 2024 [SlideShare]
Economic Risk Factor Update: April 2024 [SlideShare]
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderThe Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
 
Gender and caste discrimination in india
Gender and caste discrimination in indiaGender and caste discrimination in india
Gender and caste discrimination in india
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdf
 
Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...
Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...
Uae-NO1 Rohani Amil In Islamabad Amil Baba in Rawalpindi Kala Jadu Amil In Ra...
 
Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.Overview of Inkel Unlisted Shares Price.
Overview of Inkel Unlisted Shares Price.
 
The AES Investment Code - the go-to counsel for the most well-informed, wise...
The AES Investment Code -  the go-to counsel for the most well-informed, wise...The AES Investment Code -  the go-to counsel for the most well-informed, wise...
The AES Investment Code - the go-to counsel for the most well-informed, wise...
 

Digital Outsourcing: Risks, Pitfalls, and Security Considerations

  • 1. I NTER D YN Innovative Solutions, Proven Results Digital Outsourcing Presented by: Robert J. Bagnall, CEO Maverick-Security, LLC Peter Ward, Business Collaboration Manager InterDyn AKA Risks, Pitfalls, and Security Considerations for Doing It Right
  • 2.
  • 3.
  • 4. About Maverick Maverick provides customized, personal and corporate security and brand defense services to High-Profile Individuals, small businesses, and a few select corporate clients. Our patented methodology and processes encompass over 15 years of cyber-security and intelligence experience in the government and commercial sectors. Services include Personal Brand Defense (PBD), the SPF Assessment Program, and Global Digital Threat Intelligence.
  • 5.
  • 6. The Current Global Digital Threat Climate
  • 7.
  • 8.
  • 9. Threats By Region Region-1: North & Central America> Although the most regulated, the United States is also still the country with the largest quantity of SPAM site hosts. Mexico and Central America hold regional ideological movements that transcend to the cyber environment. THREATS: Economic, Ideological, Opportunistic, Criminal Region-2: South America & Caribbean> South America is a growing digital threat, with Brazil leading the way. In five short years, Brazil has gone from script kiddie web site defacements to a formidable hacker-for-hire. THREATS: Criminal, Opportunistic, Ideological Region-3: Europe> Although ideological threats persist within this region, the majority of the threat comes from the open practice of cyber-espionage and business intelligence against competitors. THREATS: Economic, Opportunistic, Ideological
  • 10. Threats By Region Region-4: Russia & Eurasia> Organized crime is by far the biggest threat in Region 4. The Russian and eastern European mafias, tacitly and sometimes openly supported by government, operate fraud, SPAM, hacker-for-hire, and digital extortion with near impunity. THREATS: Criminal, Economic, Ideological, Opportunistic Region-5: MidEast & Southwest Asia> Rising rapidly since 2003, the Middle East threat is almost entirely ideological. Southwest Asia sees economic and criminal activity as well due to ethnic and religious differences within the region. THREATS: Ideological, Economic, Criminal Region-6: Africa> Africa remains the slowest region to rise in terms of global digital threat. Much of the activity within the region is more associated with the infusion of outside influence (religious and criminal) than internal capability. The largest threat here remains scams and other criminal activity, though a spike in ideological hacking activity is being seen today. THREATS: Criminal, Ideological
  • 11. Threats By Region Region-7: Central & Southeast Asia> China is a formidable digital threat. Regardless of the fact that America and China share extensive economic relationships, Chinese military doctrine states that they plan and execute for cyber war to emerge as the global power. THREATS: Nationalism, Economic, Opportunistic Region-8: Australia> While Australia shares a close personal relationship with the United States, economic and opportunistic threats still exist. THREATS: Economic, Opportunism
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. The Last Word Outsourcing is a viable, necessary, and soon-to-be integral part of American business – particularly in critical infrastructures like financial and medical services. But the risks can be untenable if you are not properly prepared. If you take your organization into it with eyes wide open then you stand a good chance of having a strong, positive experience with minimal disruption. When the day is done, no matter how big your organization or what type, we are all on the same team. It does not pay to create fiefdoms or hold information close. Together we are better. This security stuff is not rocket science. It takes sound practices and the right technology implemented and executed with tireless vigilance. You will never stop cyber-attacks completely, so get used to this being an on-going process. But that does not mean that you cannot prevent most of the pain you face today.
  • 21.
  • 22. Servers Slide 18: On the upper pie, change Office 12 to the updated logo. You can even put the Windows Sharepoint Services Logo in the center of the pie to get the point across. I do want to use this slide because this is how Bill has been talking about all the server capabilities. It’s not very different from 32, especially when you consider the story that Bill normally tells here. The 2007 Microsoft Office System Evolution Collaboration Content management Streamlined processes Portals Business intelligence Search Word processing Business modeling Presentations Business data management Information Management
  • 23. Definition of a portal Microsoft Confidential The Presentation Layer of information to lines of business Internal Apps External Apps Accounting Sales HR PMO Office
  • 26. InfoPath Forms In Browser
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Office Groove Server 2007 A peer to peer network. No server required A ‘Napster’ on steroids The true virtual office Mobile Employee External Partner Knowledge Worker What is Groove? Groove is desktop software that allows teams of people to work together securely over the network as if they were in the same physical location… Enter the age of the virtual office
  • 33.
  • 34.
  • 35.
  • 36. Role-based Enterprise Policies Seamless integration with Active Directory to quickly add or remove users or groups to policies Roles can prohibit full access rights to the document author while giving full access to others in the policy Expiration date can be set by calendar date or number of days from document publication date Allows use of protected content when disconnected from the policy server, optionally for a specified number of days
  • 37. Activity Reporting On End User Actions Activity reports deliver results based on user-selected queries Results detail access and usage based on Role-based policies Reports provide complete details on file access and usage by user Use with 3 rd party reporting tools
  • 38. Liquid Machines Document Control Overview Liquid Machines Agent Policy Administration Auditing & Reporting Liquid Machines Policy Server CEO Full Rights Employee Edit, Print Contractor Read Only Policies Audit Logs Key Management
  • 39.
  • 40. Applying this technology to outsourcing
  • 41.
  • 42.
  • 43.
  • 44.