Professional Documents
Culture Documents
People, Process and Technology
People, Process and Technology
Technology
Andy Papadopoulos
Fighting Fraud
Go after low hanging fruit
– start with the most sensitive data and the areas
where they are vulnerable
- then work outwards
Trust
Confidence to transact
Confidentiality
Ensure privacy of user information
and transmission
Workplace E-mail Stats
Christina Cavanagh
Professor, Richard Ivey School of Business
Keeping it Confidential
New User
User ID Creation Password Mgmt
Credential Issuance Strong Passwords
Access Rights “Lost” Password
Password Reset
Account Changes
Promotions
Transfers
New Privileges
Attribute Changes
Identity Business Impact
24% lower productivity
End user spends 16 minutes a day logging in to various system
Provisioning new users take 28 hours longer than business requirements
Increased IT Operational Costs
Roughly 48% of help desk calls are password resets ($45-$153 each)
User management consumers 5.25% of all IT productivity
Most admin tasks (moves, adds, changes) take 10x longer than necessary
Workforce is mobile
VPN Connection
Internal
Mobile Laptop Remote Access Network
Dialup Server
Internet
Cable Modem
or DSL
Home Machine
Internet and PC Usage Policy
Download from:
www.securityguidance.com
A Layered Approach to
Compliance
Engages the entire
business for success Legislation
Inherent
System
Capabilities
A Layered Approach to Security
andy@legendcorp.com
Summary
Leverage investments already made with
Microsoft Technology