CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Email Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

IT Security Policy Framework
The World Internet Security Company ID Management in e-Health February 2007.
Driving change in information risk within the financial services industry Subtitle Date.
HIPAA Vendor Conference Greg Moody Executive Assistant for Health and Human Services Office of Ohio Governor Bob Taft.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
Building an Effective Compliance Architecture Alan Weintraub Sr. Director Hummingbird
Confidentiality and Privacy Controls
Confidentiality, Ethics, Privacy, and Access REPORT FROM CONFIDENTIALITY, ETHICS, PRIVACY AND ACCESS Group B.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Il-Sung Lee Senior Program Manager Microsoft Corporation SESSION CODE: DAT302.
Security Controls – What Works
Chapter 17 Controls and Security Measures
Adoption of PKI Where are we, where should we be, what’s holding us back, and where do we want to go? And: what about authentication vs. authorization?
E-Commerce: Legal and Practical Issues Legal Issues: Security – December 2, 2005 Stephen M. Foxman Philadelphia.
1 SAP Security and Controls Use of Security Compliance Tools to Detect and Prevent Security and Controls Violations.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Business Plug-In B7 Ethics.
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Olivier Amiot Director, Enterprise Marketing Sierra Wireless mHealth.
Evolving IT Framework Standards (Compliance and IT)
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
COPYRIGHT © 2007, PATRIOT TECHNOLOGIES, INC. THIRD PARTY BRANDS & NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS Maryland Digital Government Summit.
STORAGE MANAGEMENT/ EXECUTIVE: Managing a Compliant Infrastructure Processes and Procedures Mike Casey Principal Analyst Contoural Inc.
1 Copyright © 2014 M. E. Kabay. All rights reserved. CSH5 Chapter 67 “Developing Classification Policies for Data” Karthik Raman & Kevin Beets Classification.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
7-Oct-15 Threat on personal data Let the user be aware Privacy and protection.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
1 ZIXCORP The Criticality of Security Kevin Cloutier Oct 2015.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Beyond the Fortress Fortify Your Content Before it Travels Beyond the Firm Walls.
Robert Guerra Director, CryptoRights Foundation Implementing Privacy Implementing Privacy: Rules of the Game for Developers Mac-Crypto Conference on Macintosh.
Information Systems Security New Faculty Orientation Day Queen’s University August 2011 George Farah, GIAC/GSEC Gold, CRISC, CISA University Information.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Information Systems, Security, and e-Commerce* ACCT7320, Controllership C. Bailey *Ch in Controllership : The Work of the Managerial Accountant,
Managing your Institution-Specific HIPAA Compliance Policies and Procedures Cutting Edge Issues Thursday, December 13, 2007.
Energize Your Workflow! ©2006 Merge eMed. All Rights Reserved User Group Meeting “Energize Your Workflow” May 7-9, Security.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
MIS5001: Information Technology Management Ethics and Continuity Management Larry Brandolph
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Table of Contents. Lessons 1. Introduction to HIPAA Go Go 2. The Privacy Rule Go Go.
Cybersecurity Presentation Insert Name CSIA 412. Agenda 0 Purpose of Legislation 0 Influence of Legislation 0 Legislation vs. Other Regulatory Demands.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Encrypted from CDS Office Technologies
E&O Risk Management: Meeting the Challenge of Change
Confidentiality and Privacy Controls
Corporate Encryption:
Presentation transcript:

CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts

© 2006 Echoworx Corporation 2 Agenda  What is driving the need for secure ?  Ubiquity verses Silo approaches.  What are the key issues in managing encryption?  What are the key issues in managing content?  Where is the separation – or should there be separation?  Conclusions.  Q&A

© 2006 Echoworx Corporation 3 Issue: s are Postcards The Problem A traditional clear text can be intercepted and read or altered by anyone The Solution The contents of an encrypted cannot be viewed by anyone other than the intended recipients Readily Available Hacking Tools

© 2006 Echoworx Corporation 4 Why Encrypt Your ?  Confidentiality of electronic communications -Protection of trusted relationships -Prevent brand damage and reputation risks -Associate your brand with security  Digital signatures -Non-repudiation -Assurance of sender’s identity  Protect businesses & consumers -Privacy and personal security -Corporate governance  Comply with privacy legislation and adhere to ethical and fiduciary duties -Sarbanes-Oxley Act (SOX) -FDA 21 CFR Part 11 -Gramm-Leach-Bliley Act (GLBA) -Heath Insurance Portability and Accountability Act (HIPAA)

© 2006 Echoworx Corporation 5 Issues with Adoption  Corporate policy and restrictions (do not use – insecure)  Cost  Convenience and efficiency  Fear of consequences (legal, personal) -Privacy invasion -Phishing attacks -Identity Theft  Elimination of personal touch and relationship between parties -Is appropriate for provider / patient communications? -Is appropriate for provider / provider communications?

© 2006 Echoworx Corporation 6 Technology Adoption Examples  Telephone Solutions for Financial Services?  Telephone Solutions for Healthcare Providers?  Telephone Solutions for Government?  Telephone Solutions for Manufacturing?  Telephone Solutions for Consumers? OR telephones are telephones are telephones, very standard A ubiquitous method of communicating, securely Right of privacy is “assumed”

© 2006 Echoworx Corporation 7 Barriers to Adoption in Healthcare  Solutions for Financial Services?  Solutions for Healthcare Providers?  Solutions for Government?  Solutions for Manufacturing?  Solutions for Consumers? OR is is A ubiquitous, standard method of exchanging information Should it be secure? Should it be easy? Should it be universal?

© 2006 Echoworx Corporation 8 Infrastructure Issues and Concerns  Compliance, Hygiene and Content Solutions for Healthcare  Compliance, Hygiene and Content Solutions for Financial Services  Compliance, Hygiene and Content Solutions for Government  Hygiene and Content Solutions for Consumers Very specific, regulatory based, industry focused solutions  Market focused business demands  Varying regulatory requirements  Unique technology deployments

© 2006 Echoworx Corporation 9 Should there be separation – User Perspective  growth as a primary communication vehicle – all industries  is a ubiquitous, standards based communication vehicle  Security and privacy is a “right”, not just limited to healthcare  Technology costs significantly decrease when commoditized  Adoption significantly increases when commoditization occurs As a user, why should I have different systems for different purposes? Perhaps, my “providers” (health, financial services, legal etc) should adopt a standard approach and get back to business

CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Q&A Thank you!