SlideShare a Scribd company logo
1 of 16
Download to read offline
securing cloud content:
are your policies
restricting innovation?

               brian gleeson
               august 21, 2012
agenda




•    the landscape
•    the real challenge
•    framework for moving forward




no, really
the landscape




 •  myriad cloud services
 •  byod mixed reviews

 •  how consumerized can IT get?

 •  no simple answers for security
cloud security == oxymoron?


 Dropbox Admits Spam	

                                    Zappos customer data accessed
 Was Due to Security	

                                    In security breach
 Breach	

                                                                   Sony’s Security Breach May Be
                                                                   The Biggest Personal Data Heist
                                                                   in History
Researchers uncover AWS security
vulnerabilities


                                                                        Foursquare	
  security	
  
 Another	
  black	
  eye	
  for	
  Amazon?	
  Hackers	
  may	
          breach	
  exposes	
  
 have	
  used	
  AWS	
  in	
  crippling	
  Sony	
  attack	
             875,000	
  check-­‐ins	
  
one approach to the problem




•    bans Dropbox, iCloud and other ‘public cloud
     content services’
•    ’we found a tremendous lack of awareness as to
     what constitutes risk. we’re trying to make
     people aware’ ibm cio jeannette horan
•    employees now use IBM-hosted MyMobileHub
the reality – workers will circumvent IT solutions




•    50% of workers say they have better
     technology at home
                        source: forrester, ‘enablement not control,’ june 2012
                        	
  
an example from the real world




                             •    operate in 30+ countries
                             •    content is core asset
                             •    IT solution (FTP) viewed
                                  as complex and
                                  incomplete
                             •    employees had already
                                  embraced the cloud
getting the balance right




 productivity               security
what do workers want




•    usability
•    flexibility
•    security
•    holistic solutions
security basics for cloud content collaboration


•    centrally managed policies
•    encryption device to data center
•    mobile device controls
•    regulatory standards compliance
•    auditing, reporting, e-discovery
getting the balance right: are we asking the right questions?




 business needs
 productivity                                          IT solutions
                                                           security
content collaboration is evolving in real time



•    mobile, enterprise social, sharepoint evolution
•    email is dead, long live email!
•    consolidation?
•    no one size fits all…
•    case in point – Procter and Gamble
framework for secure cloud content sharing


                                                •    what belongs in cloud?
                                                •    what’s at risk?
                                                •    responsible behavior

                                      educate

                                                               •    enable workers
•     start simply                                             •    delightful user experience
•     audit user activity                                      •    fits users’ workflows
•     establish policies    audit &                            •    enhance productivity
•     plan for change
                            manage         empower
                                                               •    culture of trust
a success story


                  •    international ad agency
                  •    empowered workers to
                       work smarter with clients
                  •    secure, online file-sharing
                       for campaigns,
                       commercials
                  •    simplified collaboration with
                       enterprise class security
summary


•    what content belongs in the cloud?
•    what does the business need?
•    can vendors be accountable on security?
•    are you educating users on security risks?
•    what is your policy on auditing content sharing?
thank you!


             Contact
             brian.gleeson@yousendit.com

More Related Content

What's hot

Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16TechSoup
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Social Transformation: Accelerating Industry at the Pace of Social
Social Transformation: Accelerating Industry at the Pace of SocialSocial Transformation: Accelerating Industry at the Pace of Social
Social Transformation: Accelerating Industry at the Pace of SocialBlue Economy Agency
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramNetIQ
 
Reinforce business continuity - Securely share files online with Ideolve
Reinforce business continuity - Securely share files online with IdeolveReinforce business continuity - Securely share files online with Ideolve
Reinforce business continuity - Securely share files online with IdeolveMithi Software Technologies Pvt Ltd
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS
 
Info sec for startups
Info sec for startupsInfo sec for startups
Info sec for startupsKesava Reddy
 
Myth Busting: 4 Common Myths About Cloud UC
Myth Busting: 4 Common Myths About Cloud UCMyth Busting: 4 Common Myths About Cloud UC
Myth Busting: 4 Common Myths About Cloud UCthinkingphones
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the CloudNeil Readshaw
 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Robi Sen
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
Designing Resilient Products for the Internet of Things
Designing Resilient Products for the Internet of ThingsDesigning Resilient Products for the Internet of Things
Designing Resilient Products for the Internet of ThingsLogMeIn
 
Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?Stuart Barr
 
CloudCamp Chicago - November 2013 Fighting Cloud FUD
CloudCamp Chicago - November 2013 Fighting Cloud FUDCloudCamp Chicago - November 2013 Fighting Cloud FUD
CloudCamp Chicago - November 2013 Fighting Cloud FUDCloudCamp Chicago
 

What's hot (20)

Cloud computing slideshare
Cloud computing slideshareCloud computing slideshare
Cloud computing slideshare
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
Lean Hunting
Lean HuntingLean Hunting
Lean Hunting
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
Social Transformation: Accelerating Industry at the Pace of Social
Social Transformation: Accelerating Industry at the Pace of SocialSocial Transformation: Accelerating Industry at the Pace of Social
Social Transformation: Accelerating Industry at the Pace of Social
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
Reinforce business continuity - Securely share files online with Ideolve
Reinforce business continuity - Securely share files online with IdeolveReinforce business continuity - Securely share files online with Ideolve
Reinforce business continuity - Securely share files online with Ideolve
 
BYOD
BYODBYOD
BYOD
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guideNUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
NUS-ISS Learning Day 2019-Complying with new IoT cyber security guide
 
Byod
ByodByod
Byod
 
Info sec for startups
Info sec for startupsInfo sec for startups
Info sec for startups
 
Myth Busting: 4 Common Myths About Cloud UC
Myth Busting: 4 Common Myths About Cloud UCMyth Busting: 4 Common Myths About Cloud UC
Myth Busting: 4 Common Myths About Cloud UC
 
Protecting Data in the Cloud
Protecting Data in the CloudProtecting Data in the Cloud
Protecting Data in the Cloud
 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
Designing Resilient Products for the Internet of Things
Designing Resilient Products for the Internet of ThingsDesigning Resilient Products for the Internet of Things
Designing Resilient Products for the Internet of Things
 
Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?Secure, social, cloud - mutually exclusive or perfect partners?
Secure, social, cloud - mutually exclusive or perfect partners?
 
CloudCamp Chicago - November 2013 Fighting Cloud FUD
CloudCamp Chicago - November 2013 Fighting Cloud FUDCloudCamp Chicago - November 2013 Fighting Cloud FUD
CloudCamp Chicago - November 2013 Fighting Cloud FUD
 

Viewers also liked

Primavera 5
Primavera 5Primavera 5
Primavera 5iva1962
 
Workshop on educational vc banco mundial 2002
Workshop on educational vc   banco mundial 2002Workshop on educational vc   banco mundial 2002
Workshop on educational vc banco mundial 2002Datasus
 
Presentatie Test
Presentatie TestPresentatie Test
Presentatie TestKolk & Dijk
 
Facebook Group as Project Management Tool
Facebook Group as Project Management ToolFacebook Group as Project Management Tool
Facebook Group as Project Management ToolJohn Fitzpatrick
 
Global Airline Creative Advertising Cases - SLAVA for Air transport marketing...
Global Airline Creative Advertising Cases - SLAVA for Air transport marketing...Global Airline Creative Advertising Cases - SLAVA for Air transport marketing...
Global Airline Creative Advertising Cases - SLAVA for Air transport marketing...John Fitzpatrick
 
14 relatório fazenda
14 relatório fazenda14 relatório fazenda
14 relatório fazendaEdinho Silva
 
FUTURE PERFECT PLATFORMS russian
FUTURE PERFECT PLATFORMS russianFUTURE PERFECT PLATFORMS russian
FUTURE PERFECT PLATFORMS russianJohn Fitzpatrick
 
Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterBrian Gleeson
 

Viewers also liked (10)

Scenes In Ne Mn
Scenes In Ne MnScenes In Ne Mn
Scenes In Ne Mn
 
Primavera 5
Primavera 5Primavera 5
Primavera 5
 
Workshop on educational vc banco mundial 2002
Workshop on educational vc   banco mundial 2002Workshop on educational vc   banco mundial 2002
Workshop on educational vc banco mundial 2002
 
Presentatie Test
Presentatie TestPresentatie Test
Presentatie Test
 
Facebook Group as Project Management Tool
Facebook Group as Project Management ToolFacebook Group as Project Management Tool
Facebook Group as Project Management Tool
 
Global Airline Creative Advertising Cases - SLAVA for Air transport marketing...
Global Airline Creative Advertising Cases - SLAVA for Air transport marketing...Global Airline Creative Advertising Cases - SLAVA for Air transport marketing...
Global Airline Creative Advertising Cases - SLAVA for Air transport marketing...
 
Business Inspiration
Business InspirationBusiness Inspiration
Business Inspiration
 
14 relatório fazenda
14 relatório fazenda14 relatório fazenda
14 relatório fazenda
 
FUTURE PERFECT PLATFORMS russian
FUTURE PERFECT PLATFORMS russianFUTURE PERFECT PLATFORMS russian
FUTURE PERFECT PLATFORMS russian
 
Securing the Enterprise Mobile Perimeter
Securing the Enterprise Mobile PerimeterSecuring the Enterprise Mobile Perimeter
Securing the Enterprise Mobile Perimeter
 

Similar to Cloud content security vs innovation 2012_0821

Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013Bill Burns
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trustArun Gopinath
 
Ibm cloud security who do you trust thought leadership white paper-ibm
Ibm cloud security who do you trust thought leadership white paper-ibmIbm cloud security who do you trust thought leadership white paper-ibm
Ibm cloud security who do you trust thought leadership white paper-ibmNone
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook EraJohn Mancini
 
Durso - Going Mobile: Managing a Diverse and Dispersed Workforce
Durso - Going Mobile:  Managing a Diverse and Dispersed WorkforceDurso - Going Mobile:  Managing a Diverse and Dispersed Workforce
Durso - Going Mobile: Managing a Diverse and Dispersed WorkforceHR Florida State Council, Inc.
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021Doug Newdick
 
A future history of content management
A future history of content managementA future history of content management
A future history of content managementJohn Mancini
 
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...bugcrowd
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4Valencell, Inc.
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourleyGovCloud Network
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021Adam Shostack
 
Social business and innovation
Social business and innovationSocial business and innovation
Social business and innovationJohn Mancini
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsBluelock
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOpsShannon Lietz
 
Best Practices in Leveraging Virtual Environments for Learning
Best Practices in Leveraging Virtual Environments for Learning Best Practices in Leveraging Virtual Environments for Learning
Best Practices in Leveraging Virtual Environments for Learning Human Capital Media
 
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITEE2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITEe2-labs
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0Amazon Web Services
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Livingstone Advisory
 

Similar to Cloud content security vs innovation 2012_0821 (20)

Ciso executive forum 2013
Ciso executive forum 2013Ciso executive forum 2013
Ciso executive forum 2013
 
Cloud computing white paper who do you trust
Cloud computing white paper who do you trustCloud computing white paper who do you trust
Cloud computing white paper who do you trust
 
Ibm cloud security who do you trust thought leadership white paper-ibm
Ibm cloud security who do you trust thought leadership white paper-ibmIbm cloud security who do you trust thought leadership white paper-ibm
Ibm cloud security who do you trust thought leadership white paper-ibm
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook Era
 
Durso - Going Mobile: Managing a Diverse and Dispersed Workforce
Durso - Going Mobile:  Managing a Diverse and Dispersed WorkforceDurso - Going Mobile:  Managing a Diverse and Dispersed Workforce
Durso - Going Mobile: Managing a Diverse and Dispersed Workforce
 
ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021ICT and Cybersecurity for Lawyers August 2021
ICT and Cybersecurity for Lawyers August 2021
 
A future history of content management
A future history of content managementA future history of content management
A future history of content management
 
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...[Webinar] Building a Product Security Incident Response Team: Learnings from ...
[Webinar] Building a Product Security Incident Response Team: Learnings from ...
 
Extending security in the cloud network box - v4
Extending security in the cloud   network box - v4Extending security in the cloud   network box - v4
Extending security in the cloud network box - v4
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Threat Modeling In 2021
Threat Modeling In 2021Threat Modeling In 2021
Threat Modeling In 2021
 
Social business and innovation
Social business and innovationSocial business and innovation
Social business and innovation
 
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid CloudsDoes Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
Does Hybrid Cloud Work? 5 Success Stories with VMware Hybrid Clouds
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
The Journey to DevSecOps
The Journey to DevSecOpsThe Journey to DevSecOps
The Journey to DevSecOps
 
Best Practices in Leveraging Virtual Environments for Learning
Best Practices in Leveraging Virtual Environments for Learning Best Practices in Leveraging Virtual Environments for Learning
Best Practices in Leveraging Virtual Environments for Learning
 
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITEE2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
E2 Labs: ADVANCED PROGRAM ON: THE SECURITY OF A WEBSITE
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Cloud content security vs innovation 2012_0821

  • 1. securing cloud content: are your policies restricting innovation? brian gleeson august 21, 2012
  • 2. agenda •  the landscape •  the real challenge •  framework for moving forward no, really
  • 3. the landscape •  myriad cloud services •  byod mixed reviews •  how consumerized can IT get? •  no simple answers for security
  • 4. cloud security == oxymoron? Dropbox Admits Spam Zappos customer data accessed Was Due to Security In security breach Breach Sony’s Security Breach May Be The Biggest Personal Data Heist in History Researchers uncover AWS security vulnerabilities Foursquare  security   Another  black  eye  for  Amazon?  Hackers  may   breach  exposes   have  used  AWS  in  crippling  Sony  attack   875,000  check-­‐ins  
  • 5. one approach to the problem •  bans Dropbox, iCloud and other ‘public cloud content services’ •  ’we found a tremendous lack of awareness as to what constitutes risk. we’re trying to make people aware’ ibm cio jeannette horan •  employees now use IBM-hosted MyMobileHub
  • 6. the reality – workers will circumvent IT solutions •  50% of workers say they have better technology at home source: forrester, ‘enablement not control,’ june 2012  
  • 7. an example from the real world •  operate in 30+ countries •  content is core asset •  IT solution (FTP) viewed as complex and incomplete •  employees had already embraced the cloud
  • 8. getting the balance right productivity security
  • 9. what do workers want •  usability •  flexibility •  security •  holistic solutions
  • 10. security basics for cloud content collaboration •  centrally managed policies •  encryption device to data center •  mobile device controls •  regulatory standards compliance •  auditing, reporting, e-discovery
  • 11. getting the balance right: are we asking the right questions? business needs productivity IT solutions security
  • 12. content collaboration is evolving in real time •  mobile, enterprise social, sharepoint evolution •  email is dead, long live email! •  consolidation? •  no one size fits all… •  case in point – Procter and Gamble
  • 13. framework for secure cloud content sharing •  what belongs in cloud? •  what’s at risk? •  responsible behavior educate •  enable workers •  start simply •  delightful user experience •  audit user activity •  fits users’ workflows •  establish policies audit & •  enhance productivity •  plan for change manage empower •  culture of trust
  • 14. a success story •  international ad agency •  empowered workers to work smarter with clients •  secure, online file-sharing for campaigns, commercials •  simplified collaboration with enterprise class security
  • 15. summary •  what content belongs in the cloud? •  what does the business need? •  can vendors be accountable on security? •  are you educating users on security risks? •  what is your policy on auditing content sharing?
  • 16. thank you! Contact brian.gleeson@yousendit.com