Download - Michael Blackin Sales Consulting Director
![Page 1: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/1.jpg)
<Insert Picture Here>
Michael BlackinSales Consulting Director
Ohio Digital Government Summit
![Page 2: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/2.jpg)
Security Critical To Business Continuity
1997
• Amateur hackers
• Web site defacement
• Viruses
• Infrequent attacks
2007
• Organized crime
• Sensitive data
• Identity theft
• Constant threat
![Page 3: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/3.jpg)
Security Breaches Front Page News
![Page 4: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/4.jpg)
![Page 5: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/5.jpg)
Security: A Preventive Control
• Examine information lifecycle and secure every point throughout
• Do not limit yourself to structured data
• Automate your controls whenever possible to lower costs
![Page 6: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/6.jpg)
Lockdown Information
Control Access Points
Manage Exceptions
Secure Data Lifecycle Management
Secure Origination
Data Destruction
![Page 7: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/7.jpg)
Lockdown Information
Control Access Points
Manage Exceptions
Secure Data Lifecycle Management
Secure Origination
Data Destruction
![Page 8: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/8.jpg)
Secure Origination
Authentication
Admin
Application access controls
Unstructured data
Request and approval process
Segregation of duties
Classification of asset
![Page 9: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/9.jpg)
Lockdown Information
Control Access Points
Manage Exceptions
Secure Data Lifecycle Management
Secure Origination
Data Destruction
![Page 10: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/10.jpg)
Data
Lockdown InformationStructured Data
Encrypted Data at Rest
ComprehensiveAuditing
Encrypted DataIn Motion
Network
Users
AuthenticateAuthorize
Audit
AccessControl
KNOX 12029
KYTE 17045
CAREY 12032
HOECHST 18029
PIERMAR 17170
SCOTT 14220
KING 18031
Org 10
Org 20
Admin
Org 30
Segregation of Duties
(What about Privileged Users?)
![Page 11: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/11.jpg)
But…
Structured Information Unstructured Information
10% 90%Most sensitive data is unstructured… Printed reports not shredded Documents on thumb drives Sensitive email Lack of control
Source Gartner: 2005
![Page 12: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/12.jpg)
Lockdown InformationUnstructured Data
Information Rights Management
Sealing documents and emails protects them wherever they go
Central server manages rules - even for copies of documents that leave your network
Central server audits usage – even for copies of documents that leave your network
![Page 13: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/13.jpg)
Lockdown Information
Control Access Points
Manage Exceptions
Secure Data Lifecycle Management
Secure Origination
Data Destruction
![Page 14: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/14.jpg)
Control Access Points
Other Agencies
Federation
Service Providers
Service Oriented Architecture
Structured Data
Unstructured Data
Users andAdministrators
Applications
•Authentication
•Authorization
•Audit
•WS-Security
•Web Services Mgmt
•Audit
•Policy
•Encryption
•Audit
•Authentication
•Authorization
•Audit
Analysts
Executives
Business Intelligence
![Page 15: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/15.jpg)
Lockdown Information
Control Access Points
Manage Exceptions
Secure Data Lifecycle Management
Secure Origination
Data Destruction
![Page 16: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/16.jpg)
Manage ExceptionsConsolidate and Tamper-Proof your Audit Repository
ApplicationDirectory
DatastoreService
Monitor Policies
Reports Security
Collect and Consolidate Audit Data
Automate Compliance Reporting
Detect and Prevent Insider Threats
Monitor, Test, Adjust
Lower IT Costs With Audit Policies
![Page 17: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/17.jpg)
Lockdown Information
Control Access Points
Manage Exceptions
Secure Data Lifecycle Management
Secure Origination
Data Destruction
![Page 18: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/18.jpg)
Data Destruction
Authentication
Admin
Application access controls
Unstructured data
Request and approval process
Segregation of duties
Classification of asset
![Page 19: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/19.jpg)
Key Takeaways
• Focus on both Structured and Unstructured data• Secure information at rest and in motion• Take a long look at privileged users• Examine business process touch points• Enforce Non-repudiation• Eliminate sensitive information anywhere not required
![Page 20: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/20.jpg)
For more information…
Kevin Wallace
Account Manager
614.343.3794
Ed Pinkin
FMW Account Manager
617.645.8943
![Page 21: Michael Blackin Sales Consulting Director](https://reader035.vdocuments.us/reader035/viewer/2022062314/5681389e550346895da0584f/html5/thumbnails/21.jpg)