Beruflich Dokumente
Kultur Dokumente
and Technology
Andy Papadopoulos
Fighting Fraud
Go after low hanging fruit
– start with the most sensitive data and the
areas where they are vulnerable
- then work outwards
Trust
Confidence to transact
Confidentiality
Ensure privacy of user information
and transmission
Workplace E-mail Stats
Weighted
Emails per day (%) 100+ ≥50 31-49
Total
Estimate the percentage 21 18 10 16
email increase in the past
12 months (2002-3)
In your opinion, is email No 0 27 58 35
communication at your Potentially 14 20 17 21
workplace out of control?
Yes 86 53 25 44
Should elimination of bad Yes 90 86 67 78
email habits be a No 10 6 3 9
corporate responsibility?
Don’t know 0 7 29 13
Christina Cavanagh
Professor, Richard Ivey School of Business
Keeping it Confidential
New User
User ID Creation Password Mgmt
Credential Issuance Strong Passwords
Access Rights “Lost” Password
Password Reset
Account Changes
Promotions
Transfers
New Privileges
Attribute Changes
Identity Business Impact
24% lower productivity
End user spends 16 minutes a day logging in to various system
Provisioning new users take 28 hours longer than business
requirements
Increased IT Operational Costs
Roughly 48% of help desk calls are password resets ($45-$153 each)
User management consumers 5.25% of all IT productivity
Most admin tasks (moves, adds, changes) take 10x longer than necessary
Workforce is mobile
VPN Connection
Internal
Mobile Laptop Remote Access Network
Dialup Server
Internet
Cable Modem
or DSL
Home Machine
Internet and PC Usage Policy
Download from:
www.securityguidance.com
A Layered Approach to
Compliance
Engages the entire
business for Legislation
success Policies
Allows for the Procedures
allocation of Physical Controls
controls outside of Application
IT Features
Inherent
System
Capabilities
A Layered Approach to Security
andy@legendcorp.com
Summary
Leverage investments already made with
Microsoft Technology