Nov 092012
 

This meeting was excellent on 11/9/2012. Todd Herman talked with us. Todd is a Big Data Expert and Crowd Verb Founder. He was also the Chief Digital Strategist, RNC| Former General Manager, Media Strategy & Monetization, Microsoft | We covered how the CIO can align with the CMO and start to use Big Data Analytics to drive:

  • Marketing Impact
  • Advertising Efficacy
  • Product features, differences, and differentiators
  • Pricing Strategy
  • Messaging Testing
  • Business partner analysis
  • Etc

 

One of the quote from a CIO attendee was, “Strategic plans are created now based on the
data. Big Data tools are a good tool tovalidate strategic planning decisions to see if we
are going to move in the right direction.”

Nov 092012
 

If DLP ever rears its head keep these questions handy because they will direct the vendor in the
correct direction. I break DLP into two areas:
a) Network (inside the firewall) DLP
b) Untethered user DLP. Here are the questions that need examination in order to
craft the correct solution. I hope they will help you with your own.

  1. Total Users? Easy one
  2. Do you have users using Drop Box? and do you care that users are placing corporate data on Drop Box?
  3. How many of your users are untethered from the network? (Laptops,etc)
  4. Do you want to encrypt outbound email?
  5. Do you want your dlp system to work in conjunction with your encryption?
  6. Is DLP a contract requirement? Or audit requirement?
  7. How many sites do you offer direct internet access to users?
  8. Or do you backhaul internet to corporate?
  9. What data are you concerned about leaking? Strategy docs, credit cards, contract docs
    etc?
  10. Where is the data? 1 central data base at corporate or distributed at each site? File
    systems, web systems etc?
  11. Do you want spam filtering and firewalling to complement your DLP system?
  12. What is most important to secure? Data in Motion or Data at Rest?
  13. Do you want consolidated reporting?
Nov 092012
 
  • Balancing Security Costs with user needs for ease of use.
  • Overlapping functionality of security vendors.
  • Locking down USBs and securing sensitive data at the core of the network. If the
    data is secured at the core.
  • DLP Vendors that focus on Network DL P like CodeGreen and vendors that are
    good with End Point DLP Device Lock for example. We discussed securing data
    at the source and understanding data types so that you can secure it with a DLP
    system. It was not necessary to block all data types with DLP but to make
    management aware of data types that may or may not be a security threat or a breach of
    highly sensitive information but are worth knowing about nonetheless. RedZone’s
    Data Security Analysis tool helps with this.
  • VDI Apps that are BAD – We discussed some Tricks with Microsoft App-V
    , Citrix Xenapp/Desktop, Application
    streaming using Vmware thinapp to support streaming an application to a virtual
    desktop or to a physical desktop for that matter.
  • VDI Reasons Why to Move? Most everyone was looking to move in 2013 to a VDI or Hybrid VDI environment for three reasons: 1) convenience of employees moving around, 2) Remote work capability, 3)Increase the performance of applications.
  • VDI is not Cheaper. Everyone agreed VDI is not cheaper, but there are good benefits!
  • Citrix XenApp/Desktop vs Vmware View5. Familiarity and convenience were the
    primary factors governing decisions on platform.
  • Member Suggestions related to the following : Wireless Security and light weight
    NAC, approaches using: Still Secure and areohive and Sonicwall Integrated Clean
    Wireless
    Remote Site/Branch backup VPN
  • Access to Specialized help