aiim webinar content security at the fulcrum of innovation and risk

Post on 18-Nov-2014

2.003 Views

Category:

Business

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

An overview of the state-of-the-art in securing online content in a way that enables collaboration while minimizing risk

TRANSCRIPT

Thank You to Our Underwriters

Thank You to Our Underwriters

Content Security StrategyContent Security Strategy

Control& Secure

Collaborate& Innovate

Risk vs.Benefit

Thank You to Our Underwriters

The Traditional View to The Traditional View to Information SecurityInformation Security

• Perimeter: "Traditional" Network Security

• Core: Desktops, Servers, Machines, OSes, Applications

• Standard policy is:OUTSIDE = UNTRUSTEDINSIDE = (COMPLETELY) TRUSTED

• Content: Content in all forms, whether at rest or in motion

Perimeter

Core

Content

Thank You to Our Underwriters

Application-Level SecurityApplication-Level Security• Document/Content

Management provides access into repositories with document/user level controls - a mini perimeter

• Records Management provides lifecycle management for Archive and Destruction

• Content is free to go where it will once it is out of those systems

Thank You to Our Underwriters

Content SecurityContent Security

• Policy-based

• Imposed at the document/user/application level (context)

• Omni-present

• Auto-auditing

• Content Authentication

• User Authentication

• Encryption

POLICY

Thank You to Our Underwriters

Content Security StrategyContent Security Strategy

Thank You to Our Underwriters

Content Security StrategyContent Security Strategy

Thank You to Our Underwriters

Content Security Component Content Security Component TechnologiesTechnologies

• Records Management

• Document Management

• Web Content Management

• Workflow/BPM

• E-mail Management

• Enterprise Rights Management/Digital Rights Management

• Identity Management/User Authentication

• Content Authentication

• Content Addressed Storage

• Trusted Time Stamps

• Data Loss/Leak Prevention

• Public Key Infrastructure (PKI)

• Digital Signatures

• Hierarchical Storage Management

Thank You to Our Underwriters

Developing a StrategyDeveloping a Strategy

Control& Secure

Collaborate& Innovate

Thank You to Our Underwriters

Enterprise Content Security Enterprise Content Security StrategyStrategy

• Aligned to/Foundation of Corporate Governance• Lifecycle• Policy Driven

– Less is More • File Type Agnostic• Automated to the Degree Practical

Thank You to Our Underwriters

Market RealityMarket Reality

Source: AIIM Content Security Market IQ, 2007

Is Your Organization’s Content Security Strategy Driven More by a Desire to Lock Is Your Organization’s Content Security Strategy Driven More by a Desire to Lock Down Content or to Enable Secure Collaboration?Down Content or to Enable Secure Collaboration?

Thank You to Our Underwriters

Market RealityMarket Reality

0% 7.5% 15.0% 22.5% 30.0%

Well Aware and areExpressly Addressing It

Vaguely Familiar and Understandits Relationship to the BroaderTopic of Security

Not Sure How This is DifferentForm Security in General

No Clear How Understanding

How Well is Content Security Understood in Your Organization?How Well is Content Security Understood in Your Organization?

Source: AIIM Content Security Market IQ, 2007

Well aware and are expressly addressing it.

Vaguely familiar and understand its relationship to the broader topic of security.

Not sure how this is different from security in general.

No clear how understanding.

Thank You to Our Underwriters

Within the Last 2 Years Has Content Been Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally?Either Deliberately or Accidentally?

Source: AIIM Content Security Market IQ, 2007

Market RealityMarket Reality

Thank You to Our Underwriters

Within the Last 2 Years Has Content Within the Last 2 Years Has Content Been Inappropriately Accessed by an Been Inappropriately Accessed by an Unauthorized Individual Either Unauthorized Individual Either Deliberately or Accidentally?Deliberately or Accidentally?

Source: AIIM Content Security Market IQ, 2007

Market RealityMarket Reality

Thank You to Our Underwriters

Is There an Is There an Appreciation for Appreciation for the Potential Cost the Potential Cost Associated with Associated with the Risk of the Risk of Unsecured Unsecured Content in Your Content in Your Organization?Organization?

There is No Appreciation

$0 - $5,000 Annually

$5,000 - $25,000 Annually

$25,000 - $100,000 Annually

$100,000 - $500,000 Annually

$500,000 - $1,000,000 Annually

$1,000,000 + Annually

0% 17.5% 35.0% 52.5% 70.0%

Market RealityMarket Reality

Source: AIIM Content Security Market IQ, 2007

Thank You to Our Underwriters

Who Owns The Content Security Initiative in Your Organization?Who Owns The Content Security Initiative in Your Organization?

Source: AIIM Content Security Market IQ, 2007

Market RealityMarket Reality

Thank You to Our Underwriters

Market RealityMarket Reality

What is Your Organization’s Current What is Your Organization’s Current Involvement With Content Security?Involvement With Content Security?

Source: AIIM Content Security Market IQ, 2007

Thank You to Our Underwriters

Do You Have a Specific Do You Have a Specific Group Within Your Group Within Your Organization to Address Organization to Address Content Security?Content Security?

Source: AIIM Content Security Market IQ, 2007

Market RealityMarket Reality

Thank You to Our Underwriters

Assuming Budget is Available, What are the Primary Obstacles to Assuming Budget is Available, What are the Primary Obstacles to Implementing Content Security?Implementing Content Security?

Lack of Understanding/Appreciation

Complexity of Solution

User Resistance

Lack of Business Interest

Lack of IT Support for the Initiative

Lack of a Business Case

Management Resistance

Other

0% 10% 20% 30% 40%

Market RealityMarket Reality

Source: AIIM Content Security Market IQ, 2007

Thank You to Our Underwriters

Why Care?Why Care?• Security is a major issue for CxOs

– Flexible, Comprehensive Enterprise Governance• Knowledge Management, Innovation Management, Collaborative

Teams, Enterprise 2.0• M&A, e-Discovery, Conflict of Interest, Minimizing Mistakes &

Embarrassment• Strategic deployment and alignment with business provides

competitive advantage, holistic benefit – Responsiveness– Reduced Costs– Increased Access

• Content Security is critical but requires positioning and education

Thank You to Our Underwriters

Market EducationMarket Education

Thank You to Our Underwriters

Q & ACarl Frappaolo

Vice President, Market Intelligencecfrappaolo@aiim.org

Thank You

top related