aiim webinar content security at the fulcrum of innovation and risk
DESCRIPTION
An overview of the state-of-the-art in securing online content in a way that enables collaboration while minimizing riskTRANSCRIPT
![Page 1: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/1.jpg)
Thank You to Our Underwriters
![Page 2: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/2.jpg)
Thank You to Our Underwriters
Content Security StrategyContent Security Strategy
Control& Secure
Collaborate& Innovate
Risk vs.Benefit
![Page 3: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/3.jpg)
Thank You to Our Underwriters
The Traditional View to The Traditional View to Information SecurityInformation Security
• Perimeter: "Traditional" Network Security
• Core: Desktops, Servers, Machines, OSes, Applications
• Standard policy is:OUTSIDE = UNTRUSTEDINSIDE = (COMPLETELY) TRUSTED
• Content: Content in all forms, whether at rest or in motion
Perimeter
Core
Content
![Page 4: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/4.jpg)
Thank You to Our Underwriters
Application-Level SecurityApplication-Level Security• Document/Content
Management provides access into repositories with document/user level controls - a mini perimeter
• Records Management provides lifecycle management for Archive and Destruction
• Content is free to go where it will once it is out of those systems
![Page 5: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/5.jpg)
Thank You to Our Underwriters
Content SecurityContent Security
• Policy-based
• Imposed at the document/user/application level (context)
• Omni-present
• Auto-auditing
• Content Authentication
• User Authentication
• Encryption
POLICY
![Page 6: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/6.jpg)
Thank You to Our Underwriters
Content Security StrategyContent Security Strategy
![Page 7: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/7.jpg)
Thank You to Our Underwriters
Content Security StrategyContent Security Strategy
![Page 8: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/8.jpg)
Thank You to Our Underwriters
Content Security Component Content Security Component TechnologiesTechnologies
• Records Management
• Document Management
• Web Content Management
• Workflow/BPM
• E-mail Management
• Enterprise Rights Management/Digital Rights Management
• Identity Management/User Authentication
• Content Authentication
• Content Addressed Storage
• Trusted Time Stamps
• Data Loss/Leak Prevention
• Public Key Infrastructure (PKI)
• Digital Signatures
• Hierarchical Storage Management
![Page 9: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/9.jpg)
Thank You to Our Underwriters
Developing a StrategyDeveloping a Strategy
Control& Secure
Collaborate& Innovate
![Page 10: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/10.jpg)
Thank You to Our Underwriters
Enterprise Content Security Enterprise Content Security StrategyStrategy
• Aligned to/Foundation of Corporate Governance• Lifecycle• Policy Driven
– Less is More • File Type Agnostic• Automated to the Degree Practical
![Page 11: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/11.jpg)
Thank You to Our Underwriters
Market RealityMarket Reality
Source: AIIM Content Security Market IQ, 2007
Is Your Organization’s Content Security Strategy Driven More by a Desire to Lock Is Your Organization’s Content Security Strategy Driven More by a Desire to Lock Down Content or to Enable Secure Collaboration?Down Content or to Enable Secure Collaboration?
![Page 12: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/12.jpg)
Thank You to Our Underwriters
Market RealityMarket Reality
0% 7.5% 15.0% 22.5% 30.0%
Well Aware and areExpressly Addressing It
Vaguely Familiar and Understandits Relationship to the BroaderTopic of Security
Not Sure How This is DifferentForm Security in General
No Clear How Understanding
How Well is Content Security Understood in Your Organization?How Well is Content Security Understood in Your Organization?
Source: AIIM Content Security Market IQ, 2007
Well aware and are expressly addressing it.
Vaguely familiar and understand its relationship to the broader topic of security.
Not sure how this is different from security in general.
No clear how understanding.
![Page 13: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/13.jpg)
Thank You to Our Underwriters
Within the Last 2 Years Has Content Been Within the Last 2 Years Has Content Been Updated/Deleted by an Unauthorized Individual Updated/Deleted by an Unauthorized Individual Either Deliberately or Accidentally?Either Deliberately or Accidentally?
Source: AIIM Content Security Market IQ, 2007
Market RealityMarket Reality
![Page 14: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/14.jpg)
Thank You to Our Underwriters
Within the Last 2 Years Has Content Within the Last 2 Years Has Content Been Inappropriately Accessed by an Been Inappropriately Accessed by an Unauthorized Individual Either Unauthorized Individual Either Deliberately or Accidentally?Deliberately or Accidentally?
Source: AIIM Content Security Market IQ, 2007
Market RealityMarket Reality
![Page 15: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/15.jpg)
Thank You to Our Underwriters
Is There an Is There an Appreciation for Appreciation for the Potential Cost the Potential Cost Associated with Associated with the Risk of the Risk of Unsecured Unsecured Content in Your Content in Your Organization?Organization?
There is No Appreciation
$0 - $5,000 Annually
$5,000 - $25,000 Annually
$25,000 - $100,000 Annually
$100,000 - $500,000 Annually
$500,000 - $1,000,000 Annually
$1,000,000 + Annually
0% 17.5% 35.0% 52.5% 70.0%
Market RealityMarket Reality
Source: AIIM Content Security Market IQ, 2007
![Page 16: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/16.jpg)
Thank You to Our Underwriters
Who Owns The Content Security Initiative in Your Organization?Who Owns The Content Security Initiative in Your Organization?
Source: AIIM Content Security Market IQ, 2007
Market RealityMarket Reality
![Page 17: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/17.jpg)
Thank You to Our Underwriters
Market RealityMarket Reality
What is Your Organization’s Current What is Your Organization’s Current Involvement With Content Security?Involvement With Content Security?
Source: AIIM Content Security Market IQ, 2007
![Page 18: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/18.jpg)
Thank You to Our Underwriters
Do You Have a Specific Do You Have a Specific Group Within Your Group Within Your Organization to Address Organization to Address Content Security?Content Security?
Source: AIIM Content Security Market IQ, 2007
Market RealityMarket Reality
![Page 19: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/19.jpg)
Thank You to Our Underwriters
Assuming Budget is Available, What are the Primary Obstacles to Assuming Budget is Available, What are the Primary Obstacles to Implementing Content Security?Implementing Content Security?
Lack of Understanding/Appreciation
Complexity of Solution
User Resistance
Lack of Business Interest
Lack of IT Support for the Initiative
Lack of a Business Case
Management Resistance
Other
0% 10% 20% 30% 40%
Market RealityMarket Reality
Source: AIIM Content Security Market IQ, 2007
![Page 20: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/20.jpg)
Thank You to Our Underwriters
Why Care?Why Care?• Security is a major issue for CxOs
– Flexible, Comprehensive Enterprise Governance• Knowledge Management, Innovation Management, Collaborative
Teams, Enterprise 2.0• M&A, e-Discovery, Conflict of Interest, Minimizing Mistakes &
Embarrassment• Strategic deployment and alignment with business provides
competitive advantage, holistic benefit – Responsiveness– Reduced Costs– Increased Access
• Content Security is critical but requires positioning and education
![Page 21: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/21.jpg)
Thank You to Our Underwriters
Market EducationMarket Education
![Page 22: AIIM Webinar Content Security at the Fulcrum of Innovation and Risk](https://reader033.vdocument.in/reader033/viewer/2022051816/546c29e5b4af9f932c8b4ebb/html5/thumbnails/22.jpg)
Thank You to Our Underwriters
Q & ACarl Frappaolo
Vice President, Market [email protected]
Thank You