Ubiquity of Email Security Compliance and Content Management



Similar documents
Page 1 Disclaimer: None of the provisions of this document constitute legal advice. If you need legal advice on the provisions of the laws listed,

Compliance in the Corporate World

HIPAA PRIVACY AND SECURITY AWARENESS

MASSIVE NETWORKS Online Backup Compliance Guidelines Sarbanes-Oxley (SOX) SOX Requirements... 2

Security Controls What Works. Southside Virginia Community College: Security Awareness

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

Security Awareness Training Policy

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Security in Fax: Minimizing Breaches and Compliance Risks

Encryption Services

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

Compliance Quick Reference Guide

ITUS Med Solutions. HITECH & HIPAA Compliance Guide

Design of Database Security Policy In Enterprise Systems

Self-Service SOX Auditing With S3 Control

Compliance in 5 Steps

Word Secure Messaging User Guide. Version 3.0

BANKING SECURITY and COMPLIANCE

STERLING COMMERCE WHITE PAPER. Four Keys to Effectively Monitor and Control Secure File Transfer

White paper. Why Encrypt? Securing without compromising communications

Closing the Security Gap Extending Microsoft SharePoint, OCS, and Exchange to Support Secure File Transfer

MESSAGING SECURITY GATEWAY. Detect attacks before they enter your network

Why Encryption is Essential to the Safety of Your Business

HOW ENCRYPTION STRENGTHENS SECURITY. THE LEADER IN ENCRYPTION

Encryption Services

Langara College PCI Awareness Training

Weighing in on the Benefits of a SAS 70 Audit for Third Party Data Centers

Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been

Deploying DLP and Encryption

CoSign for 21CFR Part 11 Compliance

Weighing in on the Benefits of a SAS 70 Audit for Payroll Service Providers

kamai Technologies Inc. Commonly Accepted Security Practices and Recommendations (CASPR)

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

ZixCorp. The Market Leader in Encryption Services. Adam Lipkowitz ZixCorp (781)

White Paper. Ensuring Network Compliance with NetMRI. An Opportunity to Optimize the Network. Netcordia

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Cloud Security and Managing Use Risks

Four keys to effectively monitor and control secure file transfer

Information Security Policy

Data security: A growing liability threat

Best Practices for Choosing a Content Control Solution

ESET Secure Authentication

White Paper. Document Security and Compliance. April Enterprise Challenges and Opportunities. Comments or Questions?

Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014

SecureSend File Transfer Portal Usage Guide

Cisco SAFE: A Security Reference Architecture

College of DuPage Information Technology. Information Security Plan

How To Protect Yourself From A Hacker Attack

Achieving Regulatory Compliance

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

As simple as and as secure as postal mail.

Harmonizing Your Compliance and Security Objectives. Bonnie A. Goins Adjunct Professor, Illinois Institute of Technology

Pennsylvania Department of Public Welfare. Bureau of Information Systems OBSOLETE. Secure User Guide. Version 1.0.

CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. rny@crlaw.com Phone: (336)

No More FTP. Eliminate FTP Issues with a Secure File Transfer Appliance. Accellion, Inc. Tel Embarcadero Road Fax

How To Use Zixselect In Outlook 2003

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Did security go out the door with your mobile workforce? Help protect your data and brand, and maintain compliance from the outside

Allianz Global Corporate & Specialty. Cyber Risks. Recent Trends. AIRMIC 15 th June 2015

Business Issues in the implementation of Digital signatures

SecurityMetrics. PCI Starter Kit

CASPR Commonly Accepted Security Practices and Recommendations

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

APPROVED BY: DATE: NUMBER: PAGE: 1 of 9

INFORMATION SECURITY FOR YOUR AGENCY

Transcription:

CIBC Global Services Ubiquity of Email Security Compliance and Content Management Stephen Dodd Director Enterprise Accounts dodd@echoworx.com 416-226-8616 404-551-3077 2006, Echoworx Corporation

Agenda What is driving the need for secure email? Ubiquity verses Silo approaches. What are the key issues in managing encryption? What are the key issues in managing email content? Where is the separation or should there be separation? Conclusions. Q&A 2 2006 Echoworx Corporation

Issue: Emails are Postcards The Problem A traditional clear text email can be intercepted and read or altered by anyone Readily Available Hacking Tools The Solution The contents of an encrypted email cannot be viewed by anyone other than the intended recipients 3 2006 Echoworx Corporation

Why Encrypt Your Email? Confidentiality of electronic communications - Protection of trusted relationships - Prevent brand damage and reputation risks - Associate your brand with security Digital signatures - Non-repudiation - Assurance of sender s identity Protect businesses & consumers - Privacy and personal security - Corporate governance Comply with privacy legislation and adhere to ethical and fiduciary duties - Sarbanes-Oxley Act (SOX) - FDA 21 CFR Part 11 - Gramm-Leach-Bliley Act (GLBA) - Heath Insurance Portability and Accountability Act (HIPAA) 4 2006 Echoworx Corporation

Issues with Adoption Corporate policy and restrictions (do not use email insecure) Cost Convenience and efficiency Fear of consequences (legal, personal) - Privacy invasion - Phishing attacks - Identity Theft Elimination of personal touch and relationship between parties - Is email appropriate for provider / patient communications? - Is email appropriate for provider / provider communications? 5 2006 Echoworx Corporation

Technology Adoption Examples Telephone Solutions for Financial Services? Telephone Solutions for Healthcare Providers? Telephone Solutions for Government? Telephone Solutions for Manufacturing? Telephone Solutions for Consumers? OR telephones are telephones are telephones, very standard A ubiquitous method of communicating, securely Right of privacy is assumed 6 2006 Echoworx Corporation

Barriers to Email Adoption in Healthcare Email Solutions for Financial Services? Email Solutions for Healthcare Providers? Email Solutions for Government? Email Solutions for Manufacturing? Email Solutions for Consumers? OR email is email is email A ubiquitous, standard method of exchanging information Should it be secure? Should it be easy? Should it be universal? 7 2006 Echoworx Corporation

Infrastructure Issues and Concerns Compliance, Hygiene and Content Solutions for Healthcare Compliance, Hygiene and Content Solutions for Financial Services Compliance, Hygiene and Content Solutions for Government Hygiene and Content Solutions for Consumers Very specific, regulatory based, industry focused solutions Market focused business demands Varying regulatory requirements Unique technology deployments 8 2006 Echoworx Corporation

Should there be separation User Perspective Email growth as a primary communication vehicle all industries Email is a ubiquitous, standards based communication vehicle Security and privacy is a right, not just limited to healthcare Technology costs significantly decrease when commoditized Adoption significantly increases when commoditization occurs As a user, why should I have different systems for different purposes? Perhaps, my providers (health, financial services, legal etc) should adopt a standard approach and get back to business 9 2006 Echoworx Corporation

Ubiquity CIBC Global Services of Email Security Compliance and Content Management Q&A Thank you! 2006, Echoworx Corporation