SlideShare una empresa de Scribd logo
1 de 30
Descargar para leer sin conexión
Thank you.
DIGITAL
MARKETING IN
THE “SECURE
AGE”
Christopher Geiser
Chief Technology Officer – The Garrigan Lyman Group
GLG Fun Facts
• 24 years young
• Privately held
• Grew up digital
• Headquartered in Seattle, WA with offices in Boise, and NYC
• About 125 employees
• Enterprise and SMB clients
GLG Clients
GLG Services
Data and insights
Brand strategy
User experience
Digital retail
Advertising
Media strategy
Creative and content
Search and social
Systems integration
Web development
E-commerce
Managed services
Achieving Balance
Fast	IT
Core	IT
Guiding Principles
simplicityscale performanceextensibility security
• Meet current
needs
• Evolve as
market
conditions
change
• Take on new
data sources
• Reach across
components
• Increase the
value of each
component
• Perform to
standards
• Make
technology
invisible
• Protect
customer data
• Protect
intellectual
property
• Minimal
customizations
• Minimal work-
arounds
Skillsets
Enterprise code frameworks and repeatable patterns that follow industry
best practices without sacrificing innovation.
Responsive, mobile-first front-end frameworks that allow for innovation
and extensibility.
Managed services such as hosting, content delivery network, security, and
active monitoring.
Actionable analytics and managed data services (MDS) that tell the key
performance indicator (KPI) story and provide a clear path to opportunity
and optimization.
The Team
Technology
Development
Operations
IT
Implementation
Quality	Assurance
The Wayback Machine
The Wayback Machine
1999
GLG starts hosting
websites
Enterprise Clients
2005
National
Product
Launches
2011
Enterprise Clients
start ”truing it up”
01/2012
UH OH
Award
2000 12/2012
Present-
Continued
Maturation
2012
Hosting
• Different from other agencies – wanted the hosting business
• Hosting offered clients a turnkey solved problem
• Performance and security needed to go hand-in-hand
• Applications and sites became progressively more complex
- Gradually – and then – Suddenly
• More data = more danger – no risk, no reward
Sometimes it takes a meltdown….
• Security minded, but not security mature
• Projects were treated individually based on perceived risk
• No holistic approach to “what’s in the box” from a security
perspective
• Meltdown pointed out the flaws in that thinking
• We forgot it was there
“Act as if…”
• …it’s enterprise
• …it has compliance needs
• …it is a target
• …the data is sensitive – all data is sensitive
What was working?
• Turnkey solution with a hosting provider – already running
solutions like Alert Logic
• Sites were secured by default, with measures put in when the
stack was lit up
• Breaking down the model revealed the path to success
• Leveraging compliance requirements from clients allowed us to
reverse engineer our way to maturity, and into the cloud
Current and Evolving State
• Compliance minded – cloud driven
• Owning the shared responsibility model
• Guiding principles drive the design process
• We don’t know what we don’t know – partnerships are critical
• There is no such thing as a small incident
• It never stops!
Case Studies
Thank You.

Más contenido relacionado

La actualidad más candente

It courses in glasgow are your best technology partner
It courses in glasgow are your best technology partnerIt courses in glasgow are your best technology partner
It courses in glasgow are your best technology partnerIT Professional Training
 
Agility\'s Work with Financial Institutions
Agility\'s Work with Financial InstitutionsAgility\'s Work with Financial Institutions
Agility\'s Work with Financial Institutionscharlesadams
 
Accelerating Digital Transformation using Cloud Native Solutions
Accelerating Digital Transformation using Cloud Native SolutionsAccelerating Digital Transformation using Cloud Native Solutions
Accelerating Digital Transformation using Cloud Native SolutionsDataStax
 
What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6IANS
 
In Cloud We Encrypt #GHC15
In Cloud We Encrypt #GHC15In Cloud We Encrypt #GHC15
In Cloud We Encrypt #GHC15Intuit Inc.
 
Dynamics Day 2016 keynote: Achieving true platform productivity
Dynamics Day 2016 keynote: Achieving true platform productivityDynamics Day 2016 keynote: Achieving true platform productivity
Dynamics Day 2016 keynote: Achieving true platform productivityIntergen
 
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Corporation
 
Real Time Customer Experience for today's Right-Now Economy
Real Time Customer Experience for today's Right-Now EconomyReal Time Customer Experience for today's Right-Now Economy
Real Time Customer Experience for today's Right-Now EconomyDataStax
 
DWM Consulting Services
DWM Consulting ServicesDWM Consulting Services
DWM Consulting ServicesGDPR SMEs
 
Some Benefits of Cloud Computing Many Overlook
Some Benefits of Cloud Computing Many OverlookSome Benefits of Cloud Computing Many Overlook
Some Benefits of Cloud Computing Many OverlookNexiilabs
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...CloudIDSummit
 
How to Integrate Data to Drive Customer Success
How to Integrate Data to Drive Customer SuccessHow to Integrate Data to Drive Customer Success
How to Integrate Data to Drive Customer SuccessGainsight
 
NWN Corporate Presentation
NWN Corporate PresentationNWN Corporate Presentation
NWN Corporate PresentationNWNCorporation
 
Cubodrom profile
Cubodrom profileCubodrom profile
Cubodrom profilecubodrom
 
Session 12 it investment
Session 12 it investmentSession 12 it investment
Session 12 it investmentYoungjin Yoo
 
The truth is out there
The truth is out thereThe truth is out there
The truth is out thereMike Davis
 
IANS Connector Event Deck: Factor 6
IANS Connector Event Deck: Factor 6IANS Connector Event Deck: Factor 6
IANS Connector Event Deck: Factor 6Andrew Sanders
 
Webinar: The future of collaboration for law firms and their clients
Webinar: The future of collaboration for law firms and their clientsWebinar: The future of collaboration for law firms and their clients
Webinar: The future of collaboration for law firms and their clientsHighQ
 
How to Evaluate Cloud Databases for eCommerce
How to Evaluate Cloud Databases for eCommerceHow to Evaluate Cloud Databases for eCommerce
How to Evaluate Cloud Databases for eCommerceDataStax
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...Dell World
 

La actualidad más candente (20)

It courses in glasgow are your best technology partner
It courses in glasgow are your best technology partnerIt courses in glasgow are your best technology partner
It courses in glasgow are your best technology partner
 
Agility\'s Work with Financial Institutions
Agility\'s Work with Financial InstitutionsAgility\'s Work with Financial Institutions
Agility\'s Work with Financial Institutions
 
Accelerating Digital Transformation using Cloud Native Solutions
Accelerating Digital Transformation using Cloud Native SolutionsAccelerating Digital Transformation using Cloud Native Solutions
Accelerating Digital Transformation using Cloud Native Solutions
 
What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6What is an IANS Connector Event? - Factor 6
What is an IANS Connector Event? - Factor 6
 
In Cloud We Encrypt #GHC15
In Cloud We Encrypt #GHC15In Cloud We Encrypt #GHC15
In Cloud We Encrypt #GHC15
 
Dynamics Day 2016 keynote: Achieving true platform productivity
Dynamics Day 2016 keynote: Achieving true platform productivityDynamics Day 2016 keynote: Achieving true platform productivity
Dynamics Day 2016 keynote: Achieving true platform productivity
 
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
Softchoice Webinar: Virtual Whiteboard Session on Hybrid Cloud
 
Real Time Customer Experience for today's Right-Now Economy
Real Time Customer Experience for today's Right-Now EconomyReal Time Customer Experience for today's Right-Now Economy
Real Time Customer Experience for today's Right-Now Economy
 
DWM Consulting Services
DWM Consulting ServicesDWM Consulting Services
DWM Consulting Services
 
Some Benefits of Cloud Computing Many Overlook
Some Benefits of Cloud Computing Many OverlookSome Benefits of Cloud Computing Many Overlook
Some Benefits of Cloud Computing Many Overlook
 
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...The Industrial Internet, the Identity of Everything and the Industrial Enterp...
The Industrial Internet, the Identity of Everything and the Industrial Enterp...
 
How to Integrate Data to Drive Customer Success
How to Integrate Data to Drive Customer SuccessHow to Integrate Data to Drive Customer Success
How to Integrate Data to Drive Customer Success
 
NWN Corporate Presentation
NWN Corporate PresentationNWN Corporate Presentation
NWN Corporate Presentation
 
Cubodrom profile
Cubodrom profileCubodrom profile
Cubodrom profile
 
Session 12 it investment
Session 12 it investmentSession 12 it investment
Session 12 it investment
 
The truth is out there
The truth is out thereThe truth is out there
The truth is out there
 
IANS Connector Event Deck: Factor 6
IANS Connector Event Deck: Factor 6IANS Connector Event Deck: Factor 6
IANS Connector Event Deck: Factor 6
 
Webinar: The future of collaboration for law firms and their clients
Webinar: The future of collaboration for law firms and their clientsWebinar: The future of collaboration for law firms and their clients
Webinar: The future of collaboration for law firms and their clients
 
How to Evaluate Cloud Databases for eCommerce
How to Evaluate Cloud Databases for eCommerceHow to Evaluate Cloud Databases for eCommerce
How to Evaluate Cloud Databases for eCommerce
 
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
If You Are Not Embedding Analytics Into Your Day To Day Processes, You Are Do...
 

Similar a Digital Marketing in the "Secure Age"

Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Starting your digital transformation strategy
Starting your digital transformation strategyStarting your digital transformation strategy
Starting your digital transformation strategyJames Milne
 
Dont let governance risk and compliance be a roll of the dice | ESPC22
Dont let governance risk and compliance be a roll of the dice |  ESPC22 Dont let governance risk and compliance be a roll of the dice |  ESPC22
Dont let governance risk and compliance be a roll of the dice | ESPC22 Nikki Chapple
 
Optimize your info-driven business processes. How to move from paper to digital
Optimize your info-driven business processes. How to move from paper to digitalOptimize your info-driven business processes. How to move from paper to digital
Optimize your info-driven business processes. How to move from paper to digitalChristiana Kozakou
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsNCC Group
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Bianca Mueller, LL.M.
 
Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...
Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...
Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...DataWorks Summit
 
bh-win-04-conacher.ppt
bh-win-04-conacher.pptbh-win-04-conacher.ppt
bh-win-04-conacher.pptRakesh Kumar
 
The 2014 AWS Enterprise Summit - Enabling the New IT Org
The 2014 AWS Enterprise Summit - Enabling the New IT Org The 2014 AWS Enterprise Summit - Enabling the New IT Org
The 2014 AWS Enterprise Summit - Enabling the New IT Org Amazon Web Services
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest riskEvan Francen
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsSam Bowne
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast Logikcull.com
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 
How Global Records Management Practices and Standards Are Evolving for Busine...
How Global Records Management Practices and Standards Are Evolving for Busine...How Global Records Management Practices and Standards Are Evolving for Busine...
How Global Records Management Practices and Standards Are Evolving for Busine...AIIM International
 

Similar a Digital Marketing in the "Secure Age" (20)

Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Starting your digital transformation strategy
Starting your digital transformation strategyStarting your digital transformation strategy
Starting your digital transformation strategy
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
Dont let governance risk and compliance be a roll of the dice | ESPC22
Dont let governance risk and compliance be a roll of the dice |  ESPC22 Dont let governance risk and compliance be a roll of the dice |  ESPC22
Dont let governance risk and compliance be a roll of the dice | ESPC22
 
Optimize your info-driven business processes. How to move from paper to digital
Optimize your info-driven business processes. How to move from paper to digitalOptimize your info-driven business processes. How to move from paper to digital
Optimize your info-driven business processes. How to move from paper to digital
 
Current & Emerging Cyber Security Threats
Current & Emerging Cyber Security ThreatsCurrent & Emerging Cyber Security Threats
Current & Emerging Cyber Security Threats
 
Belgina ism-v3 3
Belgina ism-v3 3Belgina ism-v3 3
Belgina ism-v3 3
 
Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data? Everyone is talking Cloud - How secure is your data?
Everyone is talking Cloud - How secure is your data?
 
Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...
Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...
Data Offload for the Chief Data Officer – how to move data onto Hadoop withou...
 
CIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento totalCIO 360 grados: empoderamiento total
CIO 360 grados: empoderamiento total
 
bh-win-04-conacher.ppt
bh-win-04-conacher.pptbh-win-04-conacher.ppt
bh-win-04-conacher.ppt
 
The 2014 AWS Enterprise Summit - Enabling the New IT Org
The 2014 AWS Enterprise Summit - Enabling the New IT Org The 2014 AWS Enterprise Summit - Enabling the New IT Org
The 2014 AWS Enterprise Summit - Enabling the New IT Org
 
Security Analytics Beyond Cyber
Security Analytics Beyond CyberSecurity Analytics Beyond Cyber
Security Analytics Beyond Cyber
 
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
44CON 2014 - Security Analytics Beyond Cyber, Phil Huggins
 
People are the biggest risk
People are the biggest riskPeople are the biggest risk
People are the biggest risk
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
 
ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast ACEDS-Zylab 4-3-15 Webcast
ACEDS-Zylab 4-3-15 Webcast
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
How Global Records Management Practices and Standards Are Evolving for Busine...
How Global Records Management Practices and Standards Are Evolving for Busine...How Global Records Management Practices and Standards Are Evolving for Busine...
How Global Records Management Practices and Standards Are Evolving for Busine...
 

Más de Alert Logic

Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsAlert Logic
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Alert Logic
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and ResponseAlert Logic
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Alert Logic
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 
Reducing Your Attack Surface
Reducing Your Attack SurfaceReducing Your Attack Surface
Reducing Your Attack SurfaceAlert Logic
 
Reality Check: Security in the Cloud
Reality Check: Security in the CloudReality Check: Security in the Cloud
Reality Check: Security in the CloudAlert Logic
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOpsAlert Logic
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Security Spotlight: Presidio
Security Spotlight: PresidioSecurity Spotlight: Presidio
Security Spotlight: PresidioAlert Logic
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOpsAlert Logic
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Security Spotlight: Rent-A-Center
Security Spotlight: Rent-A-CenterSecurity Spotlight: Rent-A-Center
Security Spotlight: Rent-A-CenterAlert Logic
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionAlert Logic
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the CloudAlert Logic
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOpsAlert Logic
 
Security Spotlight: Presidio
Security Spotlight: PresidioSecurity Spotlight: Presidio
Security Spotlight: PresidioAlert Logic
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionAlert Logic
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the CloudAlert Logic
 

Más de Alert Logic (20)

Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Reducing Your Attack Surface
Reducing Your Attack SurfaceReducing Your Attack Surface
Reducing Your Attack Surface
 
Reality Check: Security in the Cloud
Reality Check: Security in the CloudReality Check: Security in the Cloud
Reality Check: Security in the Cloud
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Security Spotlight: Presidio
Security Spotlight: PresidioSecurity Spotlight: Presidio
Security Spotlight: Presidio
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Security Spotlight: Rent-A-Center
Security Spotlight: Rent-A-CenterSecurity Spotlight: Rent-A-Center
Security Spotlight: Rent-A-Center
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 
Security Spotlight: Presidio
Security Spotlight: PresidioSecurity Spotlight: Presidio
Security Spotlight: Presidio
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 

Último

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Digital Marketing in the "Secure Age"

  • 2. DIGITAL MARKETING IN THE “SECURE AGE” Christopher Geiser Chief Technology Officer – The Garrigan Lyman Group
  • 3. GLG Fun Facts • 24 years young • Privately held • Grew up digital • Headquartered in Seattle, WA with offices in Boise, and NYC • About 125 employees • Enterprise and SMB clients
  • 5. GLG Services Data and insights Brand strategy User experience Digital retail Advertising Media strategy Creative and content Search and social Systems integration Web development E-commerce Managed services
  • 7. Guiding Principles simplicityscale performanceextensibility security • Meet current needs • Evolve as market conditions change • Take on new data sources • Reach across components • Increase the value of each component • Perform to standards • Make technology invisible • Protect customer data • Protect intellectual property • Minimal customizations • Minimal work- arounds
  • 8. Skillsets Enterprise code frameworks and repeatable patterns that follow industry best practices without sacrificing innovation. Responsive, mobile-first front-end frameworks that allow for innovation and extensibility. Managed services such as hosting, content delivery network, security, and active monitoring. Actionable analytics and managed data services (MDS) that tell the key performance indicator (KPI) story and provide a clear path to opportunity and optimization.
  • 11. The Wayback Machine 1999 GLG starts hosting websites Enterprise Clients 2005 National Product Launches 2011 Enterprise Clients start ”truing it up” 01/2012 UH OH Award 2000 12/2012 Present- Continued Maturation 2012
  • 12. Hosting • Different from other agencies – wanted the hosting business • Hosting offered clients a turnkey solved problem • Performance and security needed to go hand-in-hand • Applications and sites became progressively more complex - Gradually – and then – Suddenly • More data = more danger – no risk, no reward
  • 13. Sometimes it takes a meltdown…. • Security minded, but not security mature • Projects were treated individually based on perceived risk • No holistic approach to “what’s in the box” from a security perspective • Meltdown pointed out the flaws in that thinking • We forgot it was there
  • 14. “Act as if…” • …it’s enterprise • …it has compliance needs • …it is a target • …the data is sensitive – all data is sensitive
  • 15. What was working? • Turnkey solution with a hosting provider – already running solutions like Alert Logic • Sites were secured by default, with measures put in when the stack was lit up • Breaking down the model revealed the path to success • Leveraging compliance requirements from clients allowed us to reverse engineer our way to maturity, and into the cloud
  • 16. Current and Evolving State • Compliance minded – cloud driven • Owning the shared responsibility model • Guiding principles drive the design process • We don’t know what we don’t know – partnerships are critical • There is no such thing as a small incident • It never stops!
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.