SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Acceptable Use PoliciesBalancing Productivity and Compliance “Employees expect personal internet access at work. This raises security, productivity, HR, compliance, bandwidth and legal issues which cross multiple departmental boundaries” “Organizationsneed to create, implement and monitor an Acceptable Use Policy (AUP) which governs the use of company infrastructure and which is backed up by both effective tools, regular monitoring and comprehensive training” “This presentation discusses some of the background issues that affect the management of a balanced  AUP which employees understand and works with Risk Based Regulation” Knowledgeframe e-safe business
Acceptable Use PoliciesBalancing Productivity and Compliance As society becomes increasingly connected so professional service firms have to adapt to, and take advantage of, the business benefits of online communication, connectivity and collaboration. Email VOIP Professional Services  Firm Mobile Phone Web Conferencing Instant Messaging Social Networking
Acceptable Use PoliciesBalancing Productivity and Compliance Clients are more demanding This change is accelerating, its scope is broadening and its impact is global. Regulatory pressures are escalating Competition is fierce and recruitment is increasingly difficult
Society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent. Internet Mobile Phone Web Conferencing VOIP Social Networking I.M. PDAs E-mail
The Organization Productivity For most of us, not having online access would severely impact our productivity. For a growing percentage, full time, instant, multi-device connectivity is mission critical. Connectedness Connectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy.
The Organization Demographics At the same time workplace demographics are changing Existing staff members are being replaced by a new generation of knowledge workers Connectedness They have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones, they are naturally collaborative and connected.
60%
The Organization Demographics In order to compete for this valuable talent base every organization has to offer an always on, connected, collaborative environment  At the same time workplace demographics are changing Connectedness It has to support the way in which the “everyone, everything, everywhere, connected” generation, live and work.
VOIP Web Conferencing Text Messaging In today's environment workers use social networking sites and online communities for business communications 60% 60% use social  networking sites at work 5% 10% 25% Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer.
These changes will have a profound effect not only will you have to understand and manage these new connectivity tools but also: Manage the behaviour of users
These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: Manage the behaviour of users balance security and network reliability
These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: Manage the behaviour of users Maintain employee productivity and safety balance security and network reliability
These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: Manage the behaviour of users Ensure compliance with regulatory rules and guidelines. Maintain employee productivity and safety balance security and network reliability
The risks fall into two main categories: ,[object Object],for example, the loss of client data, IP contravention, breach of data protection law, negative tweets & blogs ,[object Object],In particular the employees’ right to work within a secure,  regulated and protected online environment together with developing policies and strategies which  help connected employees maintain a work/life balance.
“Organizationsneed to develop a strategy, driven by the business needs of the practice which balances increased regulation, enhanced security and improved productivity with the social and work needs of permanently connected employees.”
Both Lexcel V4 and Risk Based Regulation from the SRA impose additional monitoring and reporting burdens on law firms. Lexcel V4 SRA
Both Lexcel V4 and Risk Based Regulation from the SRA impose additional monitoring and reporting burdens on law firms. Lexcel V4 Regulatory Burden SRA
Both internal governance and exterior regulation impose additional monitoring and reporting burdens . Internal Regulatory Cost Regulatory Burden Regulation in particular appears to be moving away from the “yearly snapshot” approach to a continuous monitoring model with a form of credit scoring applied in real time. External
This impacts costs and possibly even ability to attract clients and recruit talent. There is, therefore, a direct link between a clearly written Acceptable Use Policy, continuous compliance monitoring and profit.
Being compliant is a business imperative.  However monitoring and managing ongoing compliance together with reporting to regulators has the potential to take up valuable management time. e-safe business reconciles Acceptable Use with Lexcel V4 and Risk Based Regulation to provide a largely automated monitoring, managing and reporting environment which addresses the issues facing growing law firms adapting to the new regulatory environment.
[object Object]
Data Security
Avoiding discriminationAUP E-safe Monitoring & Reporting ,[object Object]
Operational Risks
Regulatory Risks
Business Management
 Equality & Diversity
 Risk Based Regulatione-safe business reconciles the Acceptable Use Policy with Risk Based Regulation to provide a largely automated monitoring, managing and reporting environment which addresses the issues faced in addressing the ever expanding regulatory environment.
Lexcel/LSC/SRA 01.Lexcel V4 ,[object Object]
Operational Risks
Regulatory RisksLexcel V4 4A.4 e-mail policy 4A-5 website use 4A.6 internet use AUP E-safe Monitoring & Reporting There is overlap between Lexcel, LSC and SRA rules and guidelines. e-safe business from eSafe Systems

Weitere ähnliche Inhalte

Was ist angesagt?

ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeSean Varga
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecJessica Lavery Pozerski
 
Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Symantec
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativeChris Pepin
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them Chris Pepin
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Sarah Nirschl
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...Atle Skjekkeland
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee StudyHiten Sethi
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustAccenture Insurance
 
The advantages of Cloud Application Control
The advantages of Cloud Application ControlThe advantages of Cloud Application Control
The advantages of Cloud Application ControlWeb Werks Data Centers
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodesciccone
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacySymantec
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast- Mark - Fullbright
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Edelman
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds
 

Was ist angesagt? (20)

ultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracodeultimate-guide-to-getting-started-with-appsec-veracode
ultimate-guide-to-getting-started-with-appsec-veracode
 
Ultimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSecUltimate_Guide_to_getting_started_with_AppSec
Ultimate_Guide_to_getting_started_with_AppSec
 
Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15Wearables and Internet of Things (IoT) - MWC15
Wearables and Internet of Things (IoT) - MWC15
 
Pulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiativePulse 2013 - How to run a successful BYOD initiative
Pulse 2013 - How to run a successful BYOD initiative
 
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them #EPICFAIL:  The biggest mistakes with mobile initiatives and how to avoid them
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
 
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
Securing the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for TrustSecuring the Digital Economy: Reinventing the Internet for Trust
Securing the Digital Economy: Reinventing the Internet for Trust
 
The advantages of Cloud Application Control
The advantages of Cloud Application ControlThe advantages of Cloud Application Control
The advantages of Cloud Application Control
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
INFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data PrivacyINFOGRAPHIC: The Evolution of Data Privacy
INFOGRAPHIC: The Evolution of Data Privacy
 
2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast2014 Data Breach Industry Forecast
2014 Data Breach Industry Forecast
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
 

Andere mochten auch

Protection for Single PCs
Protection for Single PCsProtection for Single PCs
Protection for Single PCsiansadler
 
Audit PC content
Audit PC content Audit PC content
Audit PC content iansadler
 
Boses Ng Kabataan Competition Paper
Boses Ng Kabataan Competition PaperBoses Ng Kabataan Competition Paper
Boses Ng Kabataan Competition Paperguest6b6bedc
 
大學生之於吃
大學生之於吃大學生之於吃
大學生之於吃songla
 
Presentation1
Presentation1Presentation1
Presentation1Rasha.g
 
Free software
Free softwareFree software
Free softwareseravb
 
Präs baujournal
Präs baujournalPräs baujournal
Präs baujournalTom Treber
 
Regio alueyhteistyömalli 2012
Regio alueyhteistyömalli 2012Regio alueyhteistyömalli 2012
Regio alueyhteistyömalli 2012Vesa Sarmia
 
Lenguajes programacionalternativos
Lenguajes programacionalternativosLenguajes programacionalternativos
Lenguajes programacionalternativosseravb
 
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802Vesa Sarmia
 
19271931 dove-final-presentation-1
19271931 dove-final-presentation-119271931 dove-final-presentation-1
19271931 dove-final-presentation-1suraj333
 

Andere mochten auch (16)

Komm 2.0
Komm 2.0Komm 2.0
Komm 2.0
 
Protection for Single PCs
Protection for Single PCsProtection for Single PCs
Protection for Single PCs
 
Audit PC content
Audit PC content Audit PC content
Audit PC content
 
Boses Ng Kabataan Competition Paper
Boses Ng Kabataan Competition PaperBoses Ng Kabataan Competition Paper
Boses Ng Kabataan Competition Paper
 
大學生之於吃
大學生之於吃大學生之於吃
大學生之於吃
 
Presentation1
Presentation1Presentation1
Presentation1
 
Free software
Free softwareFree software
Free software
 
Präs baujournal
Präs baujournalPräs baujournal
Präs baujournal
 
Regio alueyhteistyömalli 2012
Regio alueyhteistyömalli 2012Regio alueyhteistyömalli 2012
Regio alueyhteistyömalli 2012
 
Lenguajes programacionalternativos
Lenguajes programacionalternativosLenguajes programacionalternativos
Lenguajes programacionalternativos
 
Llibre ksandra
Llibre ksandraLlibre ksandra
Llibre ksandra
 
Präs plank
Präs plankPräs plank
Präs plank
 
C:\Fakepath\Impress
C:\Fakepath\ImpressC:\Fakepath\Impress
C:\Fakepath\Impress
 
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802
 
19271931 dove-final-presentation-1
19271931 dove-final-presentation-119271931 dove-final-presentation-1
19271931 dove-final-presentation-1
 
X ray diffraction
X ray diffractionX ray diffraction
X ray diffraction
 

Ähnlich wie Va\\lue of e-safebusiness solutions

CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalRobertPike
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityRahul Tyagi
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisionsAlireza Ghahrood
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application SecurityVeracode
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessAyham Kochaji
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...Symantec
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Enterprise Management Associates
 
Why Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdfWhy Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdfBytecode Security
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersEMC
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfSolviosTechnology
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityNiamh Hughes
 
Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Hiten Sethi
 
HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION Andrea Vallavanti
 
S sdlc datasheet q1-2015 v fnl
S sdlc datasheet q1-2015 v fnlS sdlc datasheet q1-2015 v fnl
S sdlc datasheet q1-2015 v fnlSally Chan
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperMarco Essomba
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceVMware
 
A security requirement quality
A security requirement qualityA security requirement quality
A security requirement qualityijseajournal
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 

Ähnlich wie Va\\lue of e-safebusiness solutions (20)

CyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) finalCyberSecurityCompliance-Aug2016-V10 (002) final
CyberSecurityCompliance-Aug2016-V10 (002) final
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Cyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe SecurityCyber Risk Quantification | Safe Security
Cyber Risk Quantification | Safe Security
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
Selling Your Organization on Application Security
Selling Your Organization on Application SecuritySelling Your Organization on Application Security
Selling Your Organization on Application Security
 
Integrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-EffectivenessIntegrating-Cyber-Security-for-Increased-Effectiveness
Integrating-Cyber-Security-for-Increased-Effectiveness
 
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
 
Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends Responding to the Pandemic: Information Security and Technology Trends
Responding to the Pandemic: Information Security and Technology Trends
 
Why Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdfWhy Do We Need To Secure Web Applications.pdf
Why Do We Need To Secure Web Applications.pdf
 
Business-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach MattersBusiness-Driven Identity and Access Governance: Why This New Approach Matters
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
 
ICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber securityICT eGuide: Switching foundation technology for better cyber security
ICT eGuide: Switching foundation technology for better cyber security
 
Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011Risk & Compliance Outlook 2011
Risk & Compliance Outlook 2011
 
HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION HUMAN FACTOR AND IT/OT CORRELATION
HUMAN FACTOR AND IT/OT CORRELATION
 
S sdlc datasheet q1-2015 v fnl
S sdlc datasheet q1-2015 v fnlS sdlc datasheet q1-2015 v fnl
S sdlc datasheet q1-2015 v fnl
 
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaperClearswift f5 information_visibility_reducing_business_risk_whitepaper
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
 
Level Up to a Seamless End-User Experience
Level Up to a Seamless End-User ExperienceLevel Up to a Seamless End-User Experience
Level Up to a Seamless End-User Experience
 
A security requirement quality
A security requirement qualityA security requirement quality
A security requirement quality
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 

Va\\lue of e-safebusiness solutions

  • 1. Acceptable Use PoliciesBalancing Productivity and Compliance “Employees expect personal internet access at work. This raises security, productivity, HR, compliance, bandwidth and legal issues which cross multiple departmental boundaries” “Organizationsneed to create, implement and monitor an Acceptable Use Policy (AUP) which governs the use of company infrastructure and which is backed up by both effective tools, regular monitoring and comprehensive training” “This presentation discusses some of the background issues that affect the management of a balanced AUP which employees understand and works with Risk Based Regulation” Knowledgeframe e-safe business
  • 2. Acceptable Use PoliciesBalancing Productivity and Compliance As society becomes increasingly connected so professional service firms have to adapt to, and take advantage of, the business benefits of online communication, connectivity and collaboration. Email VOIP Professional Services Firm Mobile Phone Web Conferencing Instant Messaging Social Networking
  • 3. Acceptable Use PoliciesBalancing Productivity and Compliance Clients are more demanding This change is accelerating, its scope is broadening and its impact is global. Regulatory pressures are escalating Competition is fierce and recruitment is increasingly difficult
  • 4. Society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent. Internet Mobile Phone Web Conferencing VOIP Social Networking I.M. PDAs E-mail
  • 5. The Organization Productivity For most of us, not having online access would severely impact our productivity. For a growing percentage, full time, instant, multi-device connectivity is mission critical. Connectedness Connectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy.
  • 6. The Organization Demographics At the same time workplace demographics are changing Existing staff members are being replaced by a new generation of knowledge workers Connectedness They have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones, they are naturally collaborative and connected.
  • 7. 60%
  • 8. The Organization Demographics In order to compete for this valuable talent base every organization has to offer an always on, connected, collaborative environment At the same time workplace demographics are changing Connectedness It has to support the way in which the “everyone, everything, everywhere, connected” generation, live and work.
  • 9. VOIP Web Conferencing Text Messaging In today's environment workers use social networking sites and online communities for business communications 60% 60% use social networking sites at work 5% 10% 25% Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer.
  • 10. These changes will have a profound effect not only will you have to understand and manage these new connectivity tools but also: Manage the behaviour of users
  • 11. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: Manage the behaviour of users balance security and network reliability
  • 12. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: Manage the behaviour of users Maintain employee productivity and safety balance security and network reliability
  • 13. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to: Manage the behaviour of users Ensure compliance with regulatory rules and guidelines. Maintain employee productivity and safety balance security and network reliability
  • 14.
  • 15. “Organizationsneed to develop a strategy, driven by the business needs of the practice which balances increased regulation, enhanced security and improved productivity with the social and work needs of permanently connected employees.”
  • 16. Both Lexcel V4 and Risk Based Regulation from the SRA impose additional monitoring and reporting burdens on law firms. Lexcel V4 SRA
  • 17. Both Lexcel V4 and Risk Based Regulation from the SRA impose additional monitoring and reporting burdens on law firms. Lexcel V4 Regulatory Burden SRA
  • 18. Both internal governance and exterior regulation impose additional monitoring and reporting burdens . Internal Regulatory Cost Regulatory Burden Regulation in particular appears to be moving away from the “yearly snapshot” approach to a continuous monitoring model with a form of credit scoring applied in real time. External
  • 19. This impacts costs and possibly even ability to attract clients and recruit talent. There is, therefore, a direct link between a clearly written Acceptable Use Policy, continuous compliance monitoring and profit.
  • 20. Being compliant is a business imperative. However monitoring and managing ongoing compliance together with reporting to regulators has the potential to take up valuable management time. e-safe business reconciles Acceptable Use with Lexcel V4 and Risk Based Regulation to provide a largely automated monitoring, managing and reporting environment which addresses the issues facing growing law firms adapting to the new regulatory environment.
  • 21.
  • 23.
  • 27. Equality & Diversity
  • 28. Risk Based Regulatione-safe business reconciles the Acceptable Use Policy with Risk Based Regulation to provide a largely automated monitoring, managing and reporting environment which addresses the issues faced in addressing the ever expanding regulatory environment.
  • 29.
  • 31. Regulatory RisksLexcel V4 4A.4 e-mail policy 4A-5 website use 4A.6 internet use AUP E-safe Monitoring & Reporting There is overlap between Lexcel, LSC and SRA rules and guidelines. e-safe business from eSafe Systems
  • 32.
  • 34.
  • 35. Equality & Diversity
  • 36. Risk Based RegulationLexcel V4 4A.4 e-mail policy 4A-5 website use 4A.6 internet use AUP E-safe Monitoring & Reporting SRA Rule 5.01(1)g Rule 5.01(1)h Rule 5.01(1)i There is overlap between Lexcel, LSC and SRA rules and guidelines. The Acceptable Use Policy and e-safe business, work together to manage this relationship. e-safe business from eSafe Systems
  • 37.
  • 39.
  • 40. Equality & Diversity
  • 41.
  • 44. E-safe business improves productivity, reduces risk and improves security by modifying user behaviour.
  • 45.
  • 46. Chat
  • 48. Email
  • 50.
  • 54. Race,
  • 56. Sex,
  • 59. Bypassing firewalls & proxy avoidance,
  • 61.
  • 62.
  • 65. mobile phones whenever an attempt is made to connect them to the network helping to prevent data theft and the introduction of viruses, worms and Trojans.
  • 66. e-safe business improves productivity, reduces risk and improves security by modifying user behaviour. Training – Deploying e-safe is not, in itself, sufficient to provide the level of control or changes in behaviour necessary to ensure your AUP is adhered to and ongoing regulatory compliance maintained and improved. It’s important that everyone in the organisation understands the reasons why e-safe business has been deployed and how non compliance with rules impacts reputation, costs and profit. e-safe provides comprehensive training showing how to introduce e-safe business and configure it to provide the level of protection you need.
  • 67. e-safe business can be installed onto your network Or provided as a managed service from our UK based servers with fully qualified and accredited support