SlideShare a Scribd company logo
1 of 36
New technology The threat to our corporate information
I work in corporate communications. My job is to make sure the information we have is  correct.
The risk of wrong information is huge – think of  compliance information security reputational risk
It keeps me  awake  at night
It’s part of my job to be on the lookout for new risks to our corporate information. The advent of  new technology  has led to new risks
Now we face the  gravest threat  to the accuracy and compliance of our information. It’s called …
The ‘ telephone ’
The name comes from the greek words for ‘faraway’ and ‘sound’
There isn’t just one ‘telephone’ – there are many variations
But they all mean you can have a conversation with someone many miles away  AS IF THEY WERE IN THE SAME ROOM
The telephone is no respecter of corporate or even national  boundaries
One person can even speak to  many  at once in so-called ‘conference calls’
In the right hands it could be a valuable business tool
We can talk directly to our customers as if we were in their homes With the correct controls and firewalls in place we could allow them to talk to us
But think of it in the wrong hands …
Wrong information  can pass easily and undetected from employee to employee
Non-compliant information can be spread  outside  of the company itself It’s as simple as pushing some buttons and speaking
This isn’t tomorrow – it’s now Your children could well be using the new ‘mobile phone’ technology  right now . How do you know who they’re talking to?
This isn’t paranoia – it’s real There’s reliable evidence that  terrorists  have used the telephone to plan atrocities
How much damage has been done already?
We don’t know
How many people in our organisations own telephones and have used them during work time?
We don’t know
How much  MISLEADING NON-COMPLIANT downright  FALSE information is being passed on as you look at this?
We simply don’t know
Across the developed world, companies are struggling to impose  order  on this new frontier
And it’s not just hard facts – corporate values and morale are vulnerable
One top 50 company reported that an individual was overheard on the telephone referring to a challenge as a  problem !
We need to be able to monitor - who’s talking - to whom - what they’re saying The  risk  to the company is too great to just ‘trust in people and hope for the best’
Until we have suitable controls in place …
It’s essential that we rely on accountable methods of communication, with visible audit trails …
Wikis, blogs and forums are the tried and tested ways. Every entry is named and  attributable , and can be corrected if wrong. All corporate communication should take place this way
How do you update and correct a telephone conversation when it’s done ? You can’t!
In time the telephone may form part of an integrated communication strategy Until then …
Use only web 2.0 technology  - you’ve been warned !
Norman Lamont Lloyds Banking Group

More Related Content

Similar to New technology - the threat to our information

Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Group
 
Fife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFifeCollege
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkRichard Common
 
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...Dana Gardner
 
Think like a hacker for better security awareness
Think like a hacker for better security awarenessThink like a hacker for better security awareness
Think like a hacker for better security awarenessCOMSATS
 
Mmcpmerged 100628150159-phpapp01
Mmcpmerged 100628150159-phpapp01Mmcpmerged 100628150159-phpapp01
Mmcpmerged 100628150159-phpapp01FairfieldJ
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...Dana Gardner
 
Table of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber SecurityTable of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber SecurityAaron Lancaster
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Dana Gardner
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...Dana Gardner
 
Fraud in e marketing sem4
Fraud in e marketing sem4Fraud in e marketing sem4
Fraud in e marketing sem4Venus Khurana
 

Similar to New technology - the threat to our information (20)

Infothreat 1234962412749938-1
Infothreat 1234962412749938-1Infothreat 1234962412749938-1
Infothreat 1234962412749938-1
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attack
 
E commerce-securityy
E commerce-securityyE commerce-securityy
E commerce-securityy
 
Fife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good Presentation
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...
Liberty Mutual Insurance Melds Regulatory Compliance with Security Awareness ...
 
Think like a hacker for better security awareness
Think like a hacker for better security awarenessThink like a hacker for better security awareness
Think like a hacker for better security awareness
 
Prof transcript
Prof transcriptProf transcript
Prof transcript
 
Worker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumesWorker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumes
 
Mmcp merged
Mmcp mergedMmcp merged
Mmcp merged
 
Mmcpmerged 100628150159-phpapp01
Mmcpmerged 100628150159-phpapp01Mmcpmerged 100628150159-phpapp01
Mmcpmerged 100628150159-phpapp01
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
Defining the New State for Comprehensive Enterprise Security Using CSC Servic...
 
Table of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber SecurityTable of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber Security
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
 
Fraud in e marketing sem4
Fraud in e marketing sem4Fraud in e marketing sem4
Fraud in e marketing sem4
 

Recently uploaded

batwheels_01batwheels_01batwheels_01batwheels_01
batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01
batwheels_01batwheels_01batwheels_01batwheels_01Patricia Pham
 
plantillas-powerpoint-hello-kitty.pptx.n
plantillas-powerpoint-hello-kitty.pptx.nplantillas-powerpoint-hello-kitty.pptx.n
plantillas-powerpoint-hello-kitty.pptx.nMayu Eliz
 
PPT aviator (A small guide on spinmatch).pptx
PPT aviator (A small guide on spinmatch).pptxPPT aviator (A small guide on spinmatch).pptx
PPT aviator (A small guide on spinmatch).pptxspinmatch13
 
A KING’S HEART THE STORY OF TSAR BORIS III (Drama) (Feature Film Project in D...
A KING’S HEART THE STORY OF TSAR BORIS III (Drama) (Feature Film Project in D...A KING’S HEART THE STORY OF TSAR BORIS III (Drama) (Feature Film Project in D...
A KING’S HEART THE STORY OF TSAR BORIS III (Drama) (Feature Film Project in D...Art Feeling Films
 
Driving & Racing Games Online for Free_ Explore the Excitement with ATM HTML ...
Driving & Racing Games Online for Free_ Explore the Excitement with ATM HTML ...Driving & Racing Games Online for Free_ Explore the Excitement with ATM HTML ...
Driving & Racing Games Online for Free_ Explore the Excitement with ATM HTML ...ATM HTML Games
 
Get the Best Online Lotus ID from the Top Betting ID Provider.
Get the Best Online Lotus ID from the Top Betting ID Provider.Get the Best Online Lotus ID from the Top Betting ID Provider.
Get the Best Online Lotus ID from the Top Betting ID Provider.virat777exch786
 
The Ultimate Guide to Choosing the Best HD IPTV Service in 2024.pdf
The Ultimate Guide to Choosing the Best HD IPTV Service in 2024.pdfThe Ultimate Guide to Choosing the Best HD IPTV Service in 2024.pdf
The Ultimate Guide to Choosing the Best HD IPTV Service in 2024.pdfXtreame HDTV
 
一比一原版(Westminster毕业证)威斯敏斯特大学毕业证成绩单
一比一原版(Westminster毕业证)威斯敏斯特大学毕业证成绩单一比一原版(Westminster毕业证)威斯敏斯特大学毕业证成绩单
一比一原版(Westminster毕业证)威斯敏斯特大学毕业证成绩单utykdaq
 
一比一原版(UCL毕业证)伦敦大学学院毕业证成绩单
一比一原版(UCL毕业证)伦敦大学学院毕业证成绩单一比一原版(UCL毕业证)伦敦大学学院毕业证成绩单
一比一原版(UCL毕业证)伦敦大学学院毕业证成绩单utykdaq
 
Top Best IPTV Providers in the UK for 2024.pdf
Top Best IPTV Providers in the UK for 2024.pdfTop Best IPTV Providers in the UK for 2024.pdf
Top Best IPTV Providers in the UK for 2024.pdfXtreame HDTV
 
Vector Methods.pptxjjjjjjjjjjjjjjjjjjjjjj
Vector Methods.pptxjjjjjjjjjjjjjjjjjjjjjjVector Methods.pptxjjjjjjjjjjjjjjjjjjjjjj
Vector Methods.pptxjjjjjjjjjjjjjjjjjjjjjjjoshuaclack73
 
一比一原版(UAL毕业证)伦敦艺术大学毕业证成绩单
一比一原版(UAL毕业证)伦敦艺术大学毕业证成绩单一比一原版(UAL毕业证)伦敦艺术大学毕业证成绩单
一比一原版(UAL毕业证)伦敦艺术大学毕业证成绩单utykdaq
 
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pureBromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pureamy56318795
 
一比一原版(OSU毕业证)俄亥俄州立大学哥伦布分校毕业证成绩单
一比一原版(OSU毕业证)俄亥俄州立大学哥伦布分校毕业证成绩单一比一原版(OSU毕业证)俄亥俄州立大学哥伦布分校毕业证成绩单
一比一原版(OSU毕业证)俄亥俄州立大学哥伦布分校毕业证成绩单utykdaq
 
Pushpa 2 Release Date not Postponed According to the Makers.pdf
Pushpa 2 Release Date not Postponed According to the Makers.pdfPushpa 2 Release Date not Postponed According to the Makers.pdf
Pushpa 2 Release Date not Postponed According to the Makers.pdfkigaya33
 
Present Social Bread Company Profile.pdf
Present Social Bread Company Profile.pdfPresent Social Bread Company Profile.pdf
Present Social Bread Company Profile.pdfmichaelvandeburg099
 
The Gaming Quiz - 17th April 2024, Quiz Club NITW
The Gaming Quiz - 17th April 2024,  Quiz Club NITWThe Gaming Quiz - 17th April 2024,  Quiz Club NITW
The Gaming Quiz - 17th April 2024, Quiz Club NITWQuiz Club NITW
 
"My Silence, My Grave: The Making Of" Booklet
"My Silence, My Grave: The Making Of" Booklet"My Silence, My Grave: The Making Of" Booklet
"My Silence, My Grave: The Making Of" BookletDontLarry
 
the red riding girl story fkjgoifdjgijogifdoin
the red riding girl story fkjgoifdjgijogifdointhe red riding girl story fkjgoifdjgijogifdoin
the red riding girl story fkjgoifdjgijogifdoinkomalbattersea123
 

Recently uploaded (20)

batwheels_01batwheels_01batwheels_01batwheels_01
batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01batwheels_01
batwheels_01batwheels_01batwheels_01batwheels_01
 
plantillas-powerpoint-hello-kitty.pptx.n
plantillas-powerpoint-hello-kitty.pptx.nplantillas-powerpoint-hello-kitty.pptx.n
plantillas-powerpoint-hello-kitty.pptx.n
 
PPT aviator (A small guide on spinmatch).pptx
PPT aviator (A small guide on spinmatch).pptxPPT aviator (A small guide on spinmatch).pptx
PPT aviator (A small guide on spinmatch).pptx
 
A KING’S HEART THE STORY OF TSAR BORIS III (Drama) (Feature Film Project in D...
A KING’S HEART THE STORY OF TSAR BORIS III (Drama) (Feature Film Project in D...A KING’S HEART THE STORY OF TSAR BORIS III (Drama) (Feature Film Project in D...
A KING’S HEART THE STORY OF TSAR BORIS III (Drama) (Feature Film Project in D...
 
Driving & Racing Games Online for Free_ Explore the Excitement with ATM HTML ...
Driving & Racing Games Online for Free_ Explore the Excitement with ATM HTML ...Driving & Racing Games Online for Free_ Explore the Excitement with ATM HTML ...
Driving & Racing Games Online for Free_ Explore the Excitement with ATM HTML ...
 
Get the Best Online Lotus ID from the Top Betting ID Provider.
Get the Best Online Lotus ID from the Top Betting ID Provider.Get the Best Online Lotus ID from the Top Betting ID Provider.
Get the Best Online Lotus ID from the Top Betting ID Provider.
 
The Ultimate Guide to Choosing the Best HD IPTV Service in 2024.pdf
The Ultimate Guide to Choosing the Best HD IPTV Service in 2024.pdfThe Ultimate Guide to Choosing the Best HD IPTV Service in 2024.pdf
The Ultimate Guide to Choosing the Best HD IPTV Service in 2024.pdf
 
一比一原版(Westminster毕业证)威斯敏斯特大学毕业证成绩单
一比一原版(Westminster毕业证)威斯敏斯特大学毕业证成绩单一比一原版(Westminster毕业证)威斯敏斯特大学毕业证成绩单
一比一原版(Westminster毕业证)威斯敏斯特大学毕业证成绩单
 
kiff2
kiff2kiff2
kiff2
 
一比一原版(UCL毕业证)伦敦大学学院毕业证成绩单
一比一原版(UCL毕业证)伦敦大学学院毕业证成绩单一比一原版(UCL毕业证)伦敦大学学院毕业证成绩单
一比一原版(UCL毕业证)伦敦大学学院毕业证成绩单
 
Top Best IPTV Providers in the UK for 2024.pdf
Top Best IPTV Providers in the UK for 2024.pdfTop Best IPTV Providers in the UK for 2024.pdf
Top Best IPTV Providers in the UK for 2024.pdf
 
Vector Methods.pptxjjjjjjjjjjjjjjjjjjjjjj
Vector Methods.pptxjjjjjjjjjjjjjjjjjjjjjjVector Methods.pptxjjjjjjjjjjjjjjjjjjjjjj
Vector Methods.pptxjjjjjjjjjjjjjjjjjjjjjj
 
一比一原版(UAL毕业证)伦敦艺术大学毕业证成绩单
一比一原版(UAL毕业证)伦敦艺术大学毕业证成绩单一比一原版(UAL毕业证)伦敦艺术大学毕业证成绩单
一比一原版(UAL毕业证)伦敦艺术大学毕业证成绩单
 
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pureBromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
Bromazolam CAS 71368-80-4 high quality opiates, Safe transportation, 99% pure
 
一比一原版(OSU毕业证)俄亥俄州立大学哥伦布分校毕业证成绩单
一比一原版(OSU毕业证)俄亥俄州立大学哥伦布分校毕业证成绩单一比一原版(OSU毕业证)俄亥俄州立大学哥伦布分校毕业证成绩单
一比一原版(OSU毕业证)俄亥俄州立大学哥伦布分校毕业证成绩单
 
Pushpa 2 Release Date not Postponed According to the Makers.pdf
Pushpa 2 Release Date not Postponed According to the Makers.pdfPushpa 2 Release Date not Postponed According to the Makers.pdf
Pushpa 2 Release Date not Postponed According to the Makers.pdf
 
Present Social Bread Company Profile.pdf
Present Social Bread Company Profile.pdfPresent Social Bread Company Profile.pdf
Present Social Bread Company Profile.pdf
 
The Gaming Quiz - 17th April 2024, Quiz Club NITW
The Gaming Quiz - 17th April 2024,  Quiz Club NITWThe Gaming Quiz - 17th April 2024,  Quiz Club NITW
The Gaming Quiz - 17th April 2024, Quiz Club NITW
 
"My Silence, My Grave: The Making Of" Booklet
"My Silence, My Grave: The Making Of" Booklet"My Silence, My Grave: The Making Of" Booklet
"My Silence, My Grave: The Making Of" Booklet
 
the red riding girl story fkjgoifdjgijogifdoin
the red riding girl story fkjgoifdjgijogifdointhe red riding girl story fkjgoifdjgijogifdoin
the red riding girl story fkjgoifdjgijogifdoin
 

New technology - the threat to our information

  • 1. New technology The threat to our corporate information
  • 2. I work in corporate communications. My job is to make sure the information we have is correct.
  • 3. The risk of wrong information is huge – think of compliance information security reputational risk
  • 4. It keeps me awake at night
  • 5. It’s part of my job to be on the lookout for new risks to our corporate information. The advent of new technology has led to new risks
  • 6. Now we face the gravest threat to the accuracy and compliance of our information. It’s called …
  • 8. The name comes from the greek words for ‘faraway’ and ‘sound’
  • 9. There isn’t just one ‘telephone’ – there are many variations
  • 10. But they all mean you can have a conversation with someone many miles away AS IF THEY WERE IN THE SAME ROOM
  • 11. The telephone is no respecter of corporate or even national boundaries
  • 12. One person can even speak to many at once in so-called ‘conference calls’
  • 13. In the right hands it could be a valuable business tool
  • 14. We can talk directly to our customers as if we were in their homes With the correct controls and firewalls in place we could allow them to talk to us
  • 15. But think of it in the wrong hands …
  • 16. Wrong information can pass easily and undetected from employee to employee
  • 17. Non-compliant information can be spread outside of the company itself It’s as simple as pushing some buttons and speaking
  • 18. This isn’t tomorrow – it’s now Your children could well be using the new ‘mobile phone’ technology right now . How do you know who they’re talking to?
  • 19. This isn’t paranoia – it’s real There’s reliable evidence that terrorists have used the telephone to plan atrocities
  • 20. How much damage has been done already?
  • 22. How many people in our organisations own telephones and have used them during work time?
  • 24. How much MISLEADING NON-COMPLIANT downright FALSE information is being passed on as you look at this?
  • 26. Across the developed world, companies are struggling to impose order on this new frontier
  • 27. And it’s not just hard facts – corporate values and morale are vulnerable
  • 28. One top 50 company reported that an individual was overheard on the telephone referring to a challenge as a problem !
  • 29. We need to be able to monitor - who’s talking - to whom - what they’re saying The risk to the company is too great to just ‘trust in people and hope for the best’
  • 30. Until we have suitable controls in place …
  • 31. It’s essential that we rely on accountable methods of communication, with visible audit trails …
  • 32. Wikis, blogs and forums are the tried and tested ways. Every entry is named and attributable , and can be corrected if wrong. All corporate communication should take place this way
  • 33. How do you update and correct a telephone conversation when it’s done ? You can’t!
  • 34. In time the telephone may form part of an integrated communication strategy Until then …
  • 35. Use only web 2.0 technology - you’ve been warned !
  • 36. Norman Lamont Lloyds Banking Group