How To Eliminate Security Exposures
in Office 365
John Challis
Founder and CEO/CTO
Concept Searching
john@conceptsearching...
Agenda
• Challenges of security and how we meet them
• conceptClassifier for Office 365
• Identifying unknown security or ...
• Company founded in 2002
• Product launched in 2003
• Focus on management of structured and unstructured information
• Te...
70% of data breaches are due to a mistake or malicious
intent by end users
Poneman Institute
88% are attributed to neglige...
86% said that their job would be at risk if a security incident
were to occur,
24% reported that the CEO’s or other execut...
The Typical Information Security Approach
• Many global organizations do not have an information security strategy
• You m...
The Intelligent Information Security Approach
• The Concept Searching approach is fully customizable and identifies
unique...
The Benefits
• Reduces organizational costs associated with data exposures,
remediation, litigation, and fines and sanctio...
Demonstration
Next How To Webinar
How To Address Records Management in Office 365
Date: Wednesday, May 14th
Time: 11:30 - 11:45 AM EDT
T...
Thank You
Find recordings of all the product webinars
in our How To series on our website here
John Challis
Founder and CE...
Upcoming SlideShare
Loading in …5
×

How To Eliminate Security Exposures in Office 365 Webinar

846 views

Published on

Most Office 365 organizations think they are safe because they are ‘only’ using collaboration in the cloud. Think again.

Join Concept Searching for a 15 minute webinar that describes the challenge of cyber security and shows you how we solve it. conceptClassifier for Office 365 identifies unknown security or confidential exposures in real-time from diverse repositories. Identification of not only standard descriptors but also organizationally defined vocabulary are also be identified. Once identified they are routed to a repository and removed from unauthorized access and portability.

Use stand-alone or integrate with your security package. We invite you to see how it works.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
846
On SlideShare
0
From Embeds
0
Number of Embeds
151
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

How To Eliminate Security Exposures in Office 365 Webinar

  1. 1. How To Eliminate Security Exposures in Office 365 John Challis Founder and CEO/CTO Concept Searching john@conceptsearching.com Twitter @conceptsearch
  2. 2. Agenda • Challenges of security and how we meet them • conceptClassifier for Office 365 • Identifying unknown security or confidential exposures • In real time • From diverse repositories • Stand-alone or integrated with your security package • Demonstration • How to set up a taxonomy • Identification and tagging of sensitive information • Building the rules • Applying an automatic content type update • Applying an automatic action, move, notification, information rights management
  3. 3. • Company founded in 2002 • Product launched in 2003 • Focus on management of structured and unstructured information • Technology Platform • Delivered as a web service • Automatic concept identification, content tagging, auto-classification, taxonomy management • Only statistical vendor that can extract conceptual metadata • 2009, 2010, 2011, 2012, 2013, 2014 ‘100 Companies that Matter in KM’ KMWorld and Trend Setting product of 2009, 2010, 2011, 2012, 2013 • Authority to Operate enterprise wide US Air Force and enterprise wide NETCON US Army • Locations: US, UK, and South Africa • Client base: Fortune 500/1000 organizations • Microsoft Business-Critical SharePoint Program partner, Gold Certification in Application Development • Smart Content Framework™ for Information Governance comprising • Five Building Blocks for success • Product Platforms: conceptClassifier for SharePoint, conceptClassifier for Office 365, conceptClassifier, and Concept Searching Technology The Global Leader in Managed Metadata Solutions
  4. 4. 70% of data breaches are due to a mistake or malicious intent by end users Poneman Institute 88% are attributed to negligence Wharton Information Security Best Practices Conference Average cost per exposed record is $197 and ranges from $90 to $305 Poneman Institute 34% of executives reported that confidential information has been posted on a social networking site Dynamic Markets Survey Data Privacy – The Challenges
  5. 5. 86% said that their job would be at risk if a security incident were to occur, 24% reported that the CEO’s or other executives' confidential data had been breached, 34% reported losing data needed for compliance, Nearly 37% said that data has been lost by employees. Websense Survey Data Privacy – The Risks
  6. 6. The Typical Information Security Approach • Many global organizations do not have an information security strategy • You may think your organization is protected – most likely it’s not • The issue is not the security architecture or strategy – it’s the inability to identify potential sensitive information exposures that are unknown • Sensitive information exists in documents, scanned items, faxed items, emails, and could be in any unstructured or semi-structured content • Most exposures are caused by an organization’s own staff • This is costly, damages the brand, and increases organizational risk
  7. 7. The Intelligent Information Security Approach • The Concept Searching approach is fully customizable and identifies unique or industry standard descriptors • Content is automatically meta-tagged and classified to the appropriate node in the taxonomy • Based upon descriptors, phrases, or keywords from within the content • Once tagged and classified, content can be managed in accordance with regulatory or government guidelines • Proactive identification and protection of unknown privacy exposures before they occur • Monitor in real time organizationally defined vocabulary and descriptors in content as it is created or ingested
  8. 8. The Benefits • Reduces organizational costs associated with data exposures, remediation, litigation, and fines and sanctions • Eliminates the risk associated with end user non-compliance issues • Eliminates manual metadata tagging and human inconsistencies that prohibit accurate identification and • Protection of unknown privacy/confidential data assets • Protects an organization by identifying and securing unknown data privacy/confidential information and preventing the portability and electronic transmission of secured assets
  9. 9. Demonstration
  10. 10. Next How To Webinar How To Address Records Management in Office 365 Date: Wednesday, May 14th Time: 11:30 - 11:45 AM EDT This webinar will focus on Records Management challenges in Office 365 and hybrid environments. Learn why you don’t want to use Office 365 as a records repository, but why you do want to address records declaration in the cloud to ensure enterprise-wide information governance. Attend to get an overview of the challenges and see how we solve them. Seeing is believing. Hope you can attend. Speaker: Don Miller, Vice President of Sales at Concept Searching To Register: https://www3.gotomeeting.com/register/378808886
  11. 11. Thank You Find recordings of all the product webinars in our How To series on our website here John Challis Founder and CEO/CTO Concept Searching john@conceptsearching.com Twitter @conceptsearch

×