SlideShare a Scribd company logo
1 of 33
Business & IT: From Infrastructure to People
Business and IT Realities ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Green IT Security & Compliance Business Process Business Continuity Risk Management ITIL Cost Management Process Maturity Capacity Planning Service Delivery Contingency Planning Supply-Chain Management Disaster Recovery Data Management Enterprise to Enterprise Collaboration Business Value IT Pain Management Performance Value for IT Revenue Enhancement Strategic Value Strategic Advantage Revenue Growth Profit Growth Cost Reduction Business Agility Server Consolidation Virtualization IT Automation Workload Optimization  Data Management Risk Management Capacity Planning SOX HIPAA Basel II Healthcare Information Exchange Fax Business Service Management EDI provisioning X.509
Communications Landscape: The Reality Latency Content/Context Batch Real-Time Bulk Transactional Documents Messages ,[object Object],[object Object],[object Object],[object Object],Meta Group / Gartner
The Impact: Communications Chaos Limited Visibility | Enforcement Issues | Operational Risk email ftp sms files messages fax B2B
1: MFT Ain’t Just for Technologist ,[object Object]
Where’s your data? FTP alone is not a viable option to give you the insight, security and performance and, ultimately, the risk mitigation necessary to  responsibly conduct business . iPhone's  problems concerns a new  SMS vulnerability  that could allow an attacker to remotely install and run unsigned software code with root access to the iPhone. Because e-mail connects through many routers and mail servers on its way to the recipient, it is inherently vulnerable to both physical and  virtual eavesdropping . Current industry  standards do not place emphasis on security ; information is transferred in  plain text , and mail servers regularly conduct unprotected backups of e-mail that passes through.
2. Modernization isn’t Only a Platform Decision ,[object Object]
Modernization is about Extending Value
The modernizing automating communication improves… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Operations Processes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
3. IT is the bottleneck! ,[object Object]
One size does not fit all Business processes and people have different requirements and capabilities
Users Think Out of the IT Box For Communications and File Exchange
Users have Options that don’t require IT or Budget authorization!
 
It won’t happen to me….  The University of Miami announced that a case of six computer backup tapes containing the personal health information of some 2.1 million patients was stolen from a vehicle on 17 March. The data included information on hospital patients dating back to 1 January 1999.  2.1M  patient records stolen NY Presbyterian Hospital employee stole patient information as part of an identity theft ring. The patient admissions rep accessed the personal health information of nearly 50,000 patients. He began to access the files and sell the information in early 2006.  Hospital employee sells  50K  patient records Health insurer WellPoint confirmed that the Social Security numbers, pharmacy and prescription records, and other personal health information for approximately 130,000 of its customers were left unsecured on the public Internet.  Insurer leaves  130K  records unsecured
4. Compliance drives Value ,[object Object]
Changing Processes It’s about continued compliance and improved agility, not technology
Changing Healthcare Compliance ,[object Object],[object Object],[object Object],[object Object]
TARP
5. Process is as Process Does ,[object Object]
Where’s your file? Multiple Platforms & Tools = Complexity
Connections are EVERYWHERE! Infrastructure, Files and People
Unified Communications: Processes, Payloads & People
A Single Platform for Platforms Payload and People ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],INDESCA INFITRAN Scribbos
So what are you going to do?
One size does not fit all Different capabilities, scale and value
Benefits of Strategic MFT Approach ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Benefits of a Centralized Solution ,[object Object],[object Object],Single Operational Environment ,[object Object],[object Object],Single Governance Environment ,[object Object],[object Object],Better  Audit Capability ,[object Object],[object Object],Better Corporate Security
Questions? Please use the chat features of the webinar

More Related Content

What's hot

Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
Corporate presentation emea slideshare
Corporate presentation emea slideshareCorporate presentation emea slideshare
Corporate presentation emea slideshareLembit
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 
Creating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookCreating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookLumension
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lessonAnne ndolo
 
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentHipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentParshant Tyagi
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4Anne ndolo
 
Intranet,extranet& edi mdims
Intranet,extranet& edi mdimsIntranet,extranet& edi mdims
Intranet,extranet& edi mdimsShafeeq Maipady
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security ProgramRaymond Cunningham
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Securitysatyakam_biswas
 
Database & Data Security
Database & Data SecurityDatabase & Data Security
Database & Data SecurityCloudbells.com
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06gbroadbent67
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepointpabatan
 

What's hot (18)

Task 3
Task 3Task 3
Task 3
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
Corporate presentation emea slideshare
Corporate presentation emea slideshareCorporate presentation emea slideshare
Corporate presentation emea slideshare
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Chapter 5 MIS
Chapter 5 MISChapter 5 MIS
Chapter 5 MIS
 
Creating Your Red Flags Rule Playbook
Creating Your Red Flags Rule PlaybookCreating Your Red Flags Rule Playbook
Creating Your Red Flags Rule Playbook
 
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATIONHOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
HOW INFORMATION SYSTEM IS EFFECT ON AN ORGANIZATION
 
Information 2nd lesson
Information 2nd lessonInformation 2nd lesson
Information 2nd lesson
 
Hipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviromentHipaa auditing in cloud computing enviroment
Hipaa auditing in cloud computing enviroment
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
Intranet,extranet& edi mdims
Intranet,extranet& edi mdimsIntranet,extranet& edi mdims
Intranet,extranet& edi mdims
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 
Database & Data Security
Database & Data SecurityDatabase & Data Security
Database & Data Security
 
M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06M014 Confluence Presentation 08 15 06
M014 Confluence Presentation 08 15 06
 
Bcs consumerisation
Bcs consumerisationBcs consumerisation
Bcs consumerisation
 
Task 2
Task 2Task 2
Task 2
 
Digital Rights Management One For Sharepoint
Digital Rights Management One For SharepointDigital Rights Management One For Sharepoint
Digital Rights Management One For Sharepoint
 

Viewers also liked

Slovakia Powerpoint Country
Slovakia Powerpoint CountrySlovakia Powerpoint Country
Slovakia Powerpoint CountryAndrew Schwartz
 
The future of the Adobe Flash platform
The future of the Adobe Flash platformThe future of the Adobe Flash platform
The future of the Adobe Flash platformMichael Chaize
 
онтологии верхнего уровня
онтологии верхнего уровняонтологии верхнего уровня
онтологии верхнего уровняLidia Pivovarova
 
Back From MAX in London for CQ5 users
Back From MAX in London for CQ5 usersBack From MAX in London for CQ5 users
Back From MAX in London for CQ5 usersMichael Chaize
 
Listen to the Market
Listen to the MarketListen to the Market
Listen to the MarketJon Gatrell
 
Banca Long Tail I Noves TendèNcies
Banca   Long Tail I Noves TendèNciesBanca   Long Tail I Noves TendèNcies
Banca Long Tail I Noves TendèNciesjalicarte
 
Valos ideju megoldasok realtime ods és database in memory tapasztalatok
Valos ideju megoldasok realtime ods és database in memory tapasztalatokValos ideju megoldasok realtime ods és database in memory tapasztalatok
Valos ideju megoldasok realtime ods és database in memory tapasztalatokDaniel Sef
 
Martin karlssons vykortssamling munken och prästgatan
Martin karlssons vykortssamling   munken och prästgatanMartin karlssons vykortssamling   munken och prästgatan
Martin karlssons vykortssamling munken och prästgatanhembygdsigtuna
 
La3 Computer Network
La3 Computer NetworkLa3 Computer Network
La3 Computer NetworkCma Mohd
 
مناظرات الإنتداب بالقطاع العمومي
مناظرات الإنتداب بالقطاع العموميمناظرات الإنتداب بالقطاع العمومي
مناظرات الإنتداب بالقطاع العموميSlim Hmaied
 
AIIM Conf - Work, Content and Next 10 Years
AIIM Conf - Work, Content and Next 10 YearsAIIM Conf - Work, Content and Next 10 Years
AIIM Conf - Work, Content and Next 10 YearsJohn Newton
 
Graphics Of The 509
Graphics Of The 509Graphics Of The 509
Graphics Of The 509guestd37bca
 
你的桶子有多滿
你的桶子有多滿你的桶子有多滿
你的桶子有多滿nonnon
 
Baker Wedding Slideshow Review
Baker Wedding Slideshow ReviewBaker Wedding Slideshow Review
Baker Wedding Slideshow Reviewmattwjohnson
 
LOCAL DEVELOPER DAY ’09/Winter
LOCAL DEVELOPER DAY ’09/WinterLOCAL DEVELOPER DAY ’09/Winter
LOCAL DEVELOPER DAY ’09/WinterAtsushi Nakatsugawa
 

Viewers also liked (20)

Milieu
MilieuMilieu
Milieu
 
Slovakia Powerpoint Country
Slovakia Powerpoint CountrySlovakia Powerpoint Country
Slovakia Powerpoint Country
 
The future of the Adobe Flash platform
The future of the Adobe Flash platformThe future of the Adobe Flash platform
The future of the Adobe Flash platform
 
онтологии верхнего уровня
онтологии верхнего уровняонтологии верхнего уровня
онтологии верхнего уровня
 
Lou Tulga Transaction Brokerage in NM real estate
Lou Tulga Transaction Brokerage in NM real estateLou Tulga Transaction Brokerage in NM real estate
Lou Tulga Transaction Brokerage in NM real estate
 
Back From MAX in London for CQ5 users
Back From MAX in London for CQ5 usersBack From MAX in London for CQ5 users
Back From MAX in London for CQ5 users
 
Listen to the Market
Listen to the MarketListen to the Market
Listen to the Market
 
Banca Long Tail I Noves TendèNcies
Banca   Long Tail I Noves TendèNciesBanca   Long Tail I Noves TendèNcies
Banca Long Tail I Noves TendèNcies
 
Valos ideju megoldasok realtime ods és database in memory tapasztalatok
Valos ideju megoldasok realtime ods és database in memory tapasztalatokValos ideju megoldasok realtime ods és database in memory tapasztalatok
Valos ideju megoldasok realtime ods és database in memory tapasztalatok
 
Martin karlssons vykortssamling munken och prästgatan
Martin karlssons vykortssamling   munken och prästgatanMartin karlssons vykortssamling   munken och prästgatan
Martin karlssons vykortssamling munken och prästgatan
 
La3 Computer Network
La3 Computer NetworkLa3 Computer Network
La3 Computer Network
 
Knocknarea
KnocknareaKnocknarea
Knocknarea
 
مناظرات الإنتداب بالقطاع العمومي
مناظرات الإنتداب بالقطاع العموميمناظرات الإنتداب بالقطاع العمومي
مناظرات الإنتداب بالقطاع العمومي
 
AIIM Conf - Work, Content and Next 10 Years
AIIM Conf - Work, Content and Next 10 YearsAIIM Conf - Work, Content and Next 10 Years
AIIM Conf - Work, Content and Next 10 Years
 
Graphics Of The 509
Graphics Of The 509Graphics Of The 509
Graphics Of The 509
 
你的桶子有多滿
你的桶子有多滿你的桶子有多滿
你的桶子有多滿
 
Flex et Php Afup
Flex et Php AfupFlex et Php Afup
Flex et Php Afup
 
Ch01
Ch01Ch01
Ch01
 
Baker Wedding Slideshow Review
Baker Wedding Slideshow ReviewBaker Wedding Slideshow Review
Baker Wedding Slideshow Review
 
LOCAL DEVELOPER DAY ’09/Winter
LOCAL DEVELOPER DAY ’09/WinterLOCAL DEVELOPER DAY ’09/Winter
LOCAL DEVELOPER DAY ’09/Winter
 

Similar to Securing Business: Strategic Enablement of Users

Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Secure Healthcare Data Management
Secure Healthcare Data ManagementSecure Healthcare Data Management
Secure Healthcare Data Managementjgatrell
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPLuke Arrington
 
Chap001
Chap001Chap001
Chap001rpvgb
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerZia Consulting
 
The Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture RoadmapThe Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture RoadmapTamim Rahman
 
Turn Five Communications Industry Challenges into Real Competitive Opportunities
Turn Five Communications Industry Challenges into Real Competitive OpportunitiesTurn Five Communications Industry Challenges into Real Competitive Opportunities
Turn Five Communications Industry Challenges into Real Competitive OpportunitiesPerficient, Inc.
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationOpenText Information Exchange
 
Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015ExtraHop Networks
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesEchoworx
 
Chapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-TermChapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-TermEstelaJeffery653
 
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docxChapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docxcravennichole326
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docxcurwenmichaela
 
Intro.Linkedin.Mar09
Intro.Linkedin.Mar09Intro.Linkedin.Mar09
Intro.Linkedin.Mar09nlumwilson
 
Information-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptxInformation-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptxAhimsaBhardwaj
 

Similar to Securing Business: Strategic Enablement of Users (20)

Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Secure Healthcare Data Management
Secure Healthcare Data ManagementSecure Healthcare Data Management
Secure Healthcare Data Management
 
Vertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WPVertex_Why_Software_Non_Negotiable_WP
Vertex_Why_Software_Non_Negotiable_WP
 
Chap001
Chap001Chap001
Chap001
 
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) AnswerContent Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
Content Chaos: Why SharePoint and Office 365 Aren't the (only) Answer
 
Evolving with Corporate IM Compliance Regulations
Evolving with Corporate IM Compliance RegulationsEvolving with Corporate IM Compliance Regulations
Evolving with Corporate IM Compliance Regulations
 
The Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture RoadmapThe Government of New Brunswick Enterprise Architecture Roadmap
The Government of New Brunswick Enterprise Architecture Roadmap
 
Turn Five Communications Industry Challenges into Real Competitive Opportunities
Turn Five Communications Industry Challenges into Real Competitive OpportunitiesTurn Five Communications Industry Challenges into Real Competitive Opportunities
Turn Five Communications Industry Challenges into Real Competitive Opportunities
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the Organization
 
Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015Clinical and Business Analytics - HIMSS 2015
Clinical and Business Analytics - HIMSS 2015
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Solving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial ServicesSolving the Encryption Conundrum in Financial Services
Solving the Encryption Conundrum in Financial Services
 
Chapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-TermChapter 2Data Governance and IT Architecture Support Long-Term
Chapter 2Data Governance and IT Architecture Support Long-Term
 
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docxChapter 2Data Governance and IT Architecture Support Long-Term.docx
Chapter 2Data Governance and IT Architecture Support Long-Term.docx
 
ePlus Healthcare
ePlus HealthcareePlus Healthcare
ePlus Healthcare
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
Intro.Linkedin.Mar09
Intro.Linkedin.Mar09Intro.Linkedin.Mar09
Intro.Linkedin.Mar09
 
Information-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptxInformation-Systems-and-Technology.pptx
Information-Systems-and-Technology.pptx
 

More from Jon Gatrell

What is a Good Product Manager?
What is a Good Product Manager?What is a Good Product Manager?
What is a Good Product Manager?Jon Gatrell
 
Define Your Career Roadmap
Define Your Career RoadmapDefine Your Career Roadmap
Define Your Career RoadmapJon Gatrell
 
Product Management Career Planning: Set Your Path
Product Management Career Planning: Set Your PathProduct Management Career Planning: Set Your Path
Product Management Career Planning: Set Your PathJon Gatrell
 
What is your career plan as a tech marketer?
What is your career plan as a tech marketer?What is your career plan as a tech marketer?
What is your career plan as a tech marketer?Jon Gatrell
 
What is Your Career Plan in Tech Marketing?
What is Your Career Plan in Tech Marketing?What is Your Career Plan in Tech Marketing?
What is Your Career Plan in Tech Marketing?Jon Gatrell
 
Social Insights: Listen to the Voice of the Market
Social Insights: Listen to the Voice of the MarketSocial Insights: Listen to the Voice of the Market
Social Insights: Listen to the Voice of the MarketJon Gatrell
 
Social Capital Death Match
Social Capital Death MatchSocial Capital Death Match
Social Capital Death MatchJon Gatrell
 
What is your product's social strategy?
What is your product's social strategy?What is your product's social strategy?
What is your product's social strategy?Jon Gatrell
 
Social Insights from the Market
Social Insights from the MarketSocial Insights from the Market
Social Insights from the MarketJon Gatrell
 
Top 25 Innovators 2010: A Case Study in Brand Awareness
Top 25 Innovators 2010: A Case Study in Brand AwarenessTop 25 Innovators 2010: A Case Study in Brand Awareness
Top 25 Innovators 2010: A Case Study in Brand AwarenessJon Gatrell
 
Social Products Require Social Marketers.
Social Products Require Social Marketers.Social Products Require Social Marketers.
Social Products Require Social Marketers.Jon Gatrell
 
Top 25 Retail Brands - Kantar Retail
Top 25 Retail Brands - Kantar RetailTop 25 Retail Brands - Kantar Retail
Top 25 Retail Brands - Kantar RetailJon Gatrell
 
No Such Thing As Social Products
No Such Thing As Social ProductsNo Such Thing As Social Products
No Such Thing As Social ProductsJon Gatrell
 
Stupid Things In Product Management
Stupid Things In Product ManagementStupid Things In Product Management
Stupid Things In Product ManagementJon Gatrell
 
Measuring Social Media For B2B
Measuring Social Media For B2BMeasuring Social Media For B2B
Measuring Social Media For B2BJon Gatrell
 
Irrational Loss Aversion
Irrational Loss AversionIrrational Loss Aversion
Irrational Loss AversionJon Gatrell
 
Twitter Personas: Bot or Not?
Twitter Personas: Bot or Not?Twitter Personas: Bot or Not?
Twitter Personas: Bot or Not?Jon Gatrell
 
Christmas is for Cookies
Christmas is for CookiesChristmas is for Cookies
Christmas is for CookiesJon Gatrell
 
White House Process and Data Concerns
White House Process and Data ConcernsWhite House Process and Data Concerns
White House Process and Data ConcernsJon Gatrell
 
Gartner Influenced by Marketing
Gartner Influenced by MarketingGartner Influenced by Marketing
Gartner Influenced by MarketingJon Gatrell
 

More from Jon Gatrell (20)

What is a Good Product Manager?
What is a Good Product Manager?What is a Good Product Manager?
What is a Good Product Manager?
 
Define Your Career Roadmap
Define Your Career RoadmapDefine Your Career Roadmap
Define Your Career Roadmap
 
Product Management Career Planning: Set Your Path
Product Management Career Planning: Set Your PathProduct Management Career Planning: Set Your Path
Product Management Career Planning: Set Your Path
 
What is your career plan as a tech marketer?
What is your career plan as a tech marketer?What is your career plan as a tech marketer?
What is your career plan as a tech marketer?
 
What is Your Career Plan in Tech Marketing?
What is Your Career Plan in Tech Marketing?What is Your Career Plan in Tech Marketing?
What is Your Career Plan in Tech Marketing?
 
Social Insights: Listen to the Voice of the Market
Social Insights: Listen to the Voice of the MarketSocial Insights: Listen to the Voice of the Market
Social Insights: Listen to the Voice of the Market
 
Social Capital Death Match
Social Capital Death MatchSocial Capital Death Match
Social Capital Death Match
 
What is your product's social strategy?
What is your product's social strategy?What is your product's social strategy?
What is your product's social strategy?
 
Social Insights from the Market
Social Insights from the MarketSocial Insights from the Market
Social Insights from the Market
 
Top 25 Innovators 2010: A Case Study in Brand Awareness
Top 25 Innovators 2010: A Case Study in Brand AwarenessTop 25 Innovators 2010: A Case Study in Brand Awareness
Top 25 Innovators 2010: A Case Study in Brand Awareness
 
Social Products Require Social Marketers.
Social Products Require Social Marketers.Social Products Require Social Marketers.
Social Products Require Social Marketers.
 
Top 25 Retail Brands - Kantar Retail
Top 25 Retail Brands - Kantar RetailTop 25 Retail Brands - Kantar Retail
Top 25 Retail Brands - Kantar Retail
 
No Such Thing As Social Products
No Such Thing As Social ProductsNo Such Thing As Social Products
No Such Thing As Social Products
 
Stupid Things In Product Management
Stupid Things In Product ManagementStupid Things In Product Management
Stupid Things In Product Management
 
Measuring Social Media For B2B
Measuring Social Media For B2BMeasuring Social Media For B2B
Measuring Social Media For B2B
 
Irrational Loss Aversion
Irrational Loss AversionIrrational Loss Aversion
Irrational Loss Aversion
 
Twitter Personas: Bot or Not?
Twitter Personas: Bot or Not?Twitter Personas: Bot or Not?
Twitter Personas: Bot or Not?
 
Christmas is for Cookies
Christmas is for CookiesChristmas is for Cookies
Christmas is for Cookies
 
White House Process and Data Concerns
White House Process and Data ConcernsWhite House Process and Data Concerns
White House Process and Data Concerns
 
Gartner Influenced by Marketing
Gartner Influenced by MarketingGartner Influenced by Marketing
Gartner Influenced by Marketing
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Securing Business: Strategic Enablement of Users

  • 1. Business & IT: From Infrastructure to People
  • 2.
  • 3. Green IT Security & Compliance Business Process Business Continuity Risk Management ITIL Cost Management Process Maturity Capacity Planning Service Delivery Contingency Planning Supply-Chain Management Disaster Recovery Data Management Enterprise to Enterprise Collaboration Business Value IT Pain Management Performance Value for IT Revenue Enhancement Strategic Value Strategic Advantage Revenue Growth Profit Growth Cost Reduction Business Agility Server Consolidation Virtualization IT Automation Workload Optimization Data Management Risk Management Capacity Planning SOX HIPAA Basel II Healthcare Information Exchange Fax Business Service Management EDI provisioning X.509
  • 4.
  • 5. The Impact: Communications Chaos Limited Visibility | Enforcement Issues | Operational Risk email ftp sms files messages fax B2B
  • 6.
  • 7. Where’s your data? FTP alone is not a viable option to give you the insight, security and performance and, ultimately, the risk mitigation necessary to responsibly conduct business . iPhone's problems concerns a new SMS vulnerability that could allow an attacker to remotely install and run unsigned software code with root access to the iPhone. Because e-mail connects through many routers and mail servers on its way to the recipient, it is inherently vulnerable to both physical and virtual eavesdropping . Current industry standards do not place emphasis on security ; information is transferred in plain text , and mail servers regularly conduct unprotected backups of e-mail that passes through.
  • 8.
  • 9. Modernization is about Extending Value
  • 10.
  • 11.
  • 12. One size does not fit all Business processes and people have different requirements and capabilities
  • 13. Users Think Out of the IT Box For Communications and File Exchange
  • 14. Users have Options that don’t require IT or Budget authorization!
  • 15.  
  • 16. It won’t happen to me…. The University of Miami announced that a case of six computer backup tapes containing the personal health information of some 2.1 million patients was stolen from a vehicle on 17 March. The data included information on hospital patients dating back to 1 January 1999. 2.1M patient records stolen NY Presbyterian Hospital employee stole patient information as part of an identity theft ring. The patient admissions rep accessed the personal health information of nearly 50,000 patients. He began to access the files and sell the information in early 2006. Hospital employee sells 50K patient records Health insurer WellPoint confirmed that the Social Security numbers, pharmacy and prescription records, and other personal health information for approximately 130,000 of its customers were left unsecured on the public Internet. Insurer leaves 130K records unsecured
  • 17.
  • 18. Changing Processes It’s about continued compliance and improved agility, not technology
  • 19.
  • 20. TARP
  • 21.
  • 22. Where’s your file? Multiple Platforms & Tools = Complexity
  • 23. Connections are EVERYWHERE! Infrastructure, Files and People
  • 24.
  • 26.
  • 27. So what are you going to do?
  • 28.
  • 29.
  • 30. One size does not fit all Different capabilities, scale and value
  • 31.
  • 32.
  • 33. Questions? Please use the chat features of the webinar

Editor's Notes

  1. Overtime things get implemented as one offs --- these one off solutions create a “hairball” of processes and data exchange across systems, data centers and geographies. Not good.
  2. Stonebranch simplifies this
  3. Just re-iterate tha with the security, monitoring and support for ad-hoc Stonebranch can be a single platform for securing the enterprise and the “people”.