SlideShare une entreprise Scribd logo
1  sur  9
© 2005-2012 NextLabs Inc.
Accelerating Secure SharePoint
Collaboration while Improving Compliance
Lorance Tisdale,
Director, Collaboration Services, BAE Systems
Keno Green
Director, SharePoint Operations, BAE Systems
E.K. Koh
VP, Solution Management, NextLabs
© 2005-2011 NextLabs Inc.Slide 2
Agenda
Common Secure Collaboration Challenges
BAE Case Study
Business Objectives
Requirements
Business
Functional
Solution Approach
Lessons Learned
Demo
Question and Answers
© 2005-2011 NextLabs Inc.Slide 3
Information Risk is Never Far Away…
© 2005-2011 NextLabs Inc.Slide 4
Compliance
Engineering
Manufacturing
Customer
Regulatory
Jurisdictions
Design Partners
Suppliers
SAP
GTS/GRC
SAP PLM
Service
Regulatory
Compliance
 Costly manual compliance
processes
 Need to comply with multiple
regulations
 ITAR, EAR, BAFA, UK
ECA etc
 CWC, DOE/NRC
 PII/ PCI mandates
Protect Customer Data
 Customers require assurance for
intellectual property protection
 Customers expect non-conflict of
interest
IP Protection
 Increase in JVs and global
partnering increases risk of IP
loss
IT Access Mgmt & Data Security
 Privileged user access, offshore and outsourced IT
increase compliance risk
 Mobile, global access increases risk of data loss
SAP CRM
SAP ERP Supply Chain
Manager
Secure Supply Chain
Collaboration
 Global supply chain increases risk of
IP loss & compliance violations
IT Ops
Global Process Coordination
 IP and Export concerns block system
consolidation
 Redundant processes, systems reduce
competitiveness
SAP SCM
Security & Compliance Challenges in Global Collaboration
© 2005-2011 NextLabs Inc.Slide 5
What is the cost of Security or Compliance violations?
 The US Department of State levied more
than $100M in fines for ITAR violation
just in the last 2 years. (source: US Dept
of State)
 In a 2013 study by Ponemon Institute,
the average cost of a data breach is $5.4
million per incident. (source: Ponemon
Institute)
© 2005-2011 NextLabs Inc.Slide 6
Background- BAE Systems, Inc. Overview
Overview
BAE Systems, Inc. is a US subsidiary of BAE Systems plc, a leading
European Aerospace and Defense Prime Contractor, under a
Special Security Agreement (SSA) with the U.S. Government
Approximately 35,000 employees and $15B annual revenues. US
operations in over 30 states. Global operations in Europe, Central
America, and South Africa
Business Sectors
Electronic Systems
Intelligence &Security
Land & Armaments
Support Solutions
Inc (Corporate)
© 2005-2011 NextLabs Inc.Slide 7
Background – Corporate Intranet Objectives
Centralize Communication and Sharing
The Portal for accessing Applications in BAE Systems
Make the right information available to the right people
Support collaboration between BAE Systems employees worldwide
Minimize the number of Portals across BAE Systems
Consolidate a number of Portals that exist within BAE Systems
Reduce Operational Costs
Prevent Data Spills
Automate Audit
Automate Provisioning
Enforce Compliance
© 2005-2011 NextLabs Inc.Slide 8
Business Requirements - Compliance and Security
Export Compliance Requirements
Control uploads of Export Controlled
Information
EAR or ITAR controlled information
posted on the site(s) may be or are
restricted
Procurement/Supplier Management
Requirements
Prevent disclosure of supplier’s competition
sensitive data to a competitor
Where another BAE Systems’
Company may be a potential
competitor to the supplier
Misinterpretation of information if intended
use and intent not clearly defined
Security Requirements
National Security
Control Classified information posted
onto the site
Customer or Company Proprietary
Information
Control Program specific information
General Requirements
Information should be properly classified and
marked to ensure proper handling
Architecture Requirements
Ability to support be extended to other BAE
Systems Domains
Ability to support SharePoint 2010
© 2005-2011 NextLabs Inc.Slide 9
Thank You!
Thank you for viewing a preview of our Webinar: Accelerating Secure
SharePoint Collaboration while Improving Compliance
To watch our complete recording, CLICK HERE.
In the remainder of this webinar, you will see the business requirements
BAE was looking to address, their innovative use of information risk
management technology to drive business value and learn why they were
recognized by CIO Magazine as a CIO 100 Honoree for successfully
leveraging SharePoint for collaboration while improving compliance.

Contenu connexe

En vedette

Mil Pac Solutions Overview
Mil Pac Solutions OverviewMil Pac Solutions Overview
Mil Pac Solutions Overviewbrianaldridge
 
Financial Analysis of BAE Systems and Rolls Royce
Financial Analysis of BAE Systems and Rolls Royce Financial Analysis of BAE Systems and Rolls Royce
Financial Analysis of BAE Systems and Rolls Royce Aanchal Saxena
 
Counterfeit Avoidance Through Purchasing Processes and Supplier Control - Liv...
Counterfeit Avoidance Through Purchasing Processes and Supplier Control - Liv...Counterfeit Avoidance Through Purchasing Processes and Supplier Control - Liv...
Counterfeit Avoidance Through Purchasing Processes and Supplier Control - Liv...pzulueta
 
BAE Tactical Vehicles Overview
BAE Tactical Vehicles OverviewBAE Tactical Vehicles Overview
BAE Tactical Vehicles OverviewJerry Lee Davis
 
UK Spectrum Policy Forum - Jade McCready, BAE Systems -Defence Sector Briefin...
UK Spectrum Policy Forum - Jade McCready, BAE Systems -Defence Sector Briefin...UK Spectrum Policy Forum - Jade McCready, BAE Systems -Defence Sector Briefin...
UK Spectrum Policy Forum - Jade McCready, BAE Systems -Defence Sector Briefin...techUK
 
BAE Systems Naval Ships – MARS to ERM Transformation by Ken McCrae, BAE Systems
BAE Systems Naval Ships – MARS to ERM Transformation by Ken McCrae, BAE SystemsBAE Systems Naval Ships – MARS to ERM Transformation by Ken McCrae, BAE Systems
BAE Systems Naval Ships – MARS to ERM Transformation by Ken McCrae, BAE SystemsAVEVA Group plc
 
Set off and carry forward of losses
Set off and carry forward of losses Set off and carry forward of losses
Set off and carry forward of losses Sunill Bn
 
Macro diagrams and definitions
Macro diagrams and definitionsMacro diagrams and definitions
Macro diagrams and definitions12jostma
 
Resume Mcgregor March 2016
Resume Mcgregor March 2016Resume Mcgregor March 2016
Resume Mcgregor March 2016Arthur McGregor
 
3.4 Demand And Supply Side Policies
3.4   Demand And Supply Side Policies3.4   Demand And Supply Side Policies
3.4 Demand And Supply Side PoliciesAndrew McCarthy
 
Pakistan Education Plan
Pakistan Education PlanPakistan Education Plan
Pakistan Education PlanMinhaaj Rehman
 
Casting and its types
Casting and its typesCasting and its types
Casting and its typesWaqas Ahmed
 
BCG Matrix of Engro foods
BCG Matrix of Engro foodsBCG Matrix of Engro foods
BCG Matrix of Engro foodsMutahir Bilal
 
New forever clean 9 booklet
New forever clean 9 bookletNew forever clean 9 booklet
New forever clean 9 bookletKatalin Hidvegi
 

En vedette (16)

Mil Pac Solutions Overview
Mil Pac Solutions OverviewMil Pac Solutions Overview
Mil Pac Solutions Overview
 
Financial Analysis of BAE Systems and Rolls Royce
Financial Analysis of BAE Systems and Rolls Royce Financial Analysis of BAE Systems and Rolls Royce
Financial Analysis of BAE Systems and Rolls Royce
 
Counterfeit Avoidance Through Purchasing Processes and Supplier Control - Liv...
Counterfeit Avoidance Through Purchasing Processes and Supplier Control - Liv...Counterfeit Avoidance Through Purchasing Processes and Supplier Control - Liv...
Counterfeit Avoidance Through Purchasing Processes and Supplier Control - Liv...
 
BAE Tactical Vehicles Overview
BAE Tactical Vehicles OverviewBAE Tactical Vehicles Overview
BAE Tactical Vehicles Overview
 
UK Spectrum Policy Forum - Jade McCready, BAE Systems -Defence Sector Briefin...
UK Spectrum Policy Forum - Jade McCready, BAE Systems -Defence Sector Briefin...UK Spectrum Policy Forum - Jade McCready, BAE Systems -Defence Sector Briefin...
UK Spectrum Policy Forum - Jade McCready, BAE Systems -Defence Sector Briefin...
 
BAE Systems Naval Ships – MARS to ERM Transformation by Ken McCrae, BAE Systems
BAE Systems Naval Ships – MARS to ERM Transformation by Ken McCrae, BAE SystemsBAE Systems Naval Ships – MARS to ERM Transformation by Ken McCrae, BAE Systems
BAE Systems Naval Ships – MARS to ERM Transformation by Ken McCrae, BAE Systems
 
Set off and carry forward of losses
Set off and carry forward of losses Set off and carry forward of losses
Set off and carry forward of losses
 
Missles flight control systems
Missles flight control systemsMissles flight control systems
Missles flight control systems
 
Macro diagrams and definitions
Macro diagrams and definitionsMacro diagrams and definitions
Macro diagrams and definitions
 
Resume Mcgregor March 2016
Resume Mcgregor March 2016Resume Mcgregor March 2016
Resume Mcgregor March 2016
 
7 Lessons for Aspiring Leaders
7 Lessons for Aspiring Leaders7 Lessons for Aspiring Leaders
7 Lessons for Aspiring Leaders
 
3.4 Demand And Supply Side Policies
3.4   Demand And Supply Side Policies3.4   Demand And Supply Side Policies
3.4 Demand And Supply Side Policies
 
Pakistan Education Plan
Pakistan Education PlanPakistan Education Plan
Pakistan Education Plan
 
Casting and its types
Casting and its typesCasting and its types
Casting and its types
 
BCG Matrix of Engro foods
BCG Matrix of Engro foodsBCG Matrix of Engro foods
BCG Matrix of Engro foods
 
New forever clean 9 booklet
New forever clean 9 bookletNew forever clean 9 booklet
New forever clean 9 booklet
 

Plus de NextLabs, Inc.

SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2NextLabs, Inc.
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights ManagementNextLabs, Inc.
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security NextLabs, Inc.
 
eGRC for Information Export Control
eGRC for Information Export ControleGRC for Information Export Control
eGRC for Information Export ControlNextLabs, Inc.
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC NextLabs, Inc.
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseNextLabs, Inc.
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...NextLabs, Inc.
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...NextLabs, Inc.
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...NextLabs, Inc.
 
Extensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications WebinarExtensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications WebinarNextLabs, Inc.
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...NextLabs, Inc.
 
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...NextLabs, Inc.
 
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PART I of III:  Advanced Authorization for SAP Global Deployments: September ...PART I of III:  Advanced Authorization for SAP Global Deployments: September ...
PART I of III: Advanced Authorization for SAP Global Deployments: September ...NextLabs, Inc.
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIINextLabs, Inc.
 
Advanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIIAdvanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIINextLabs, Inc.
 
Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIINextLabs, Inc.
 
Preview Of Gary Stanley 10 Commandments
Preview  Of Gary Stanley 10 CommandmentsPreview  Of Gary Stanley 10 Commandments
Preview Of Gary Stanley 10 CommandmentsNextLabs, Inc.
 
Preview of Heaney On ITAR Controls
Preview of Heaney On ITAR ControlsPreview of Heaney On ITAR Controls
Preview of Heaney On ITAR ControlsNextLabs, Inc.
 

Plus de NextLabs, Inc. (20)

SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2SharePoint Business Track Part 1 of 2
SharePoint Business Track Part 1 of 2
 
Digital Rights Management
Digital Rights ManagementDigital Rights Management
Digital Rights Management
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
eGRC for Information Export Control
eGRC for Information Export ControleGRC for Information Export Control
eGRC for Information Export Control
 
Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
 
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
Managing Role Explosion with Attribute-based Access Control - Webinar Series ...
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
 
NextLabs Internships
NextLabs InternshipsNextLabs Internships
NextLabs Internships
 
Extensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications WebinarExtensible Authorization for SAP Applications Webinar
Extensible Authorization for SAP Applications Webinar
 
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...Part III of III:  SAP Advanced Authorization for SAP Global Deployments: Octo...
Part III of III: SAP Advanced Authorization for SAP Global Deployments: Octo...
 
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...Part II of III: Advanced Authorization for SAP Global Deployments: September ...
Part II of III: Advanced Authorization for SAP Global Deployments: September ...
 
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
PART I of III:  Advanced Authorization for SAP Global Deployments: September ...PART I of III:  Advanced Authorization for SAP Global Deployments: September ...
PART I of III: Advanced Authorization for SAP Global Deployments: September ...
 
Advanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of IIIAdvanced Authorization for SAP Global Deployments Part III of III
Advanced Authorization for SAP Global Deployments Part III of III
 
Advanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of IIIAdvanced Authorization for SAP Global Deployments Part II of III
Advanced Authorization for SAP Global Deployments Part II of III
 
Advanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of IIIAdvanced Authorization for SAP Global Deployments Part I of III
Advanced Authorization for SAP Global Deployments Part I of III
 
Preview Of Gary Stanley 10 Commandments
Preview  Of Gary Stanley 10 CommandmentsPreview  Of Gary Stanley 10 Commandments
Preview Of Gary Stanley 10 Commandments
 
Preview of Heaney On ITAR Controls
Preview of Heaney On ITAR ControlsPreview of Heaney On ITAR Controls
Preview of Heaney On ITAR Controls
 

Dernier

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 

Dernier (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 

Accelerating Secure SharePoint Collaboration While Improving Compliance

  • 1. © 2005-2012 NextLabs Inc. Accelerating Secure SharePoint Collaboration while Improving Compliance Lorance Tisdale, Director, Collaboration Services, BAE Systems Keno Green Director, SharePoint Operations, BAE Systems E.K. Koh VP, Solution Management, NextLabs
  • 2. © 2005-2011 NextLabs Inc.Slide 2 Agenda Common Secure Collaboration Challenges BAE Case Study Business Objectives Requirements Business Functional Solution Approach Lessons Learned Demo Question and Answers
  • 3. © 2005-2011 NextLabs Inc.Slide 3 Information Risk is Never Far Away…
  • 4. © 2005-2011 NextLabs Inc.Slide 4 Compliance Engineering Manufacturing Customer Regulatory Jurisdictions Design Partners Suppliers SAP GTS/GRC SAP PLM Service Regulatory Compliance  Costly manual compliance processes  Need to comply with multiple regulations  ITAR, EAR, BAFA, UK ECA etc  CWC, DOE/NRC  PII/ PCI mandates Protect Customer Data  Customers require assurance for intellectual property protection  Customers expect non-conflict of interest IP Protection  Increase in JVs and global partnering increases risk of IP loss IT Access Mgmt & Data Security  Privileged user access, offshore and outsourced IT increase compliance risk  Mobile, global access increases risk of data loss SAP CRM SAP ERP Supply Chain Manager Secure Supply Chain Collaboration  Global supply chain increases risk of IP loss & compliance violations IT Ops Global Process Coordination  IP and Export concerns block system consolidation  Redundant processes, systems reduce competitiveness SAP SCM Security & Compliance Challenges in Global Collaboration
  • 5. © 2005-2011 NextLabs Inc.Slide 5 What is the cost of Security or Compliance violations?  The US Department of State levied more than $100M in fines for ITAR violation just in the last 2 years. (source: US Dept of State)  In a 2013 study by Ponemon Institute, the average cost of a data breach is $5.4 million per incident. (source: Ponemon Institute)
  • 6. © 2005-2011 NextLabs Inc.Slide 6 Background- BAE Systems, Inc. Overview Overview BAE Systems, Inc. is a US subsidiary of BAE Systems plc, a leading European Aerospace and Defense Prime Contractor, under a Special Security Agreement (SSA) with the U.S. Government Approximately 35,000 employees and $15B annual revenues. US operations in over 30 states. Global operations in Europe, Central America, and South Africa Business Sectors Electronic Systems Intelligence &Security Land & Armaments Support Solutions Inc (Corporate)
  • 7. © 2005-2011 NextLabs Inc.Slide 7 Background – Corporate Intranet Objectives Centralize Communication and Sharing The Portal for accessing Applications in BAE Systems Make the right information available to the right people Support collaboration between BAE Systems employees worldwide Minimize the number of Portals across BAE Systems Consolidate a number of Portals that exist within BAE Systems Reduce Operational Costs Prevent Data Spills Automate Audit Automate Provisioning Enforce Compliance
  • 8. © 2005-2011 NextLabs Inc.Slide 8 Business Requirements - Compliance and Security Export Compliance Requirements Control uploads of Export Controlled Information EAR or ITAR controlled information posted on the site(s) may be or are restricted Procurement/Supplier Management Requirements Prevent disclosure of supplier’s competition sensitive data to a competitor Where another BAE Systems’ Company may be a potential competitor to the supplier Misinterpretation of information if intended use and intent not clearly defined Security Requirements National Security Control Classified information posted onto the site Customer or Company Proprietary Information Control Program specific information General Requirements Information should be properly classified and marked to ensure proper handling Architecture Requirements Ability to support be extended to other BAE Systems Domains Ability to support SharePoint 2010
  • 9. © 2005-2011 NextLabs Inc.Slide 9 Thank You! Thank you for viewing a preview of our Webinar: Accelerating Secure SharePoint Collaboration while Improving Compliance To watch our complete recording, CLICK HERE. In the remainder of this webinar, you will see the business requirements BAE was looking to address, their innovative use of information risk management technology to drive business value and learn why they were recognized by CIO Magazine as a CIO 100 Honoree for successfully leveraging SharePoint for collaboration while improving compliance.

Notes de l'éditeur

  1. Global businesses face the following challenges:Companies have to comply with multiple regulations such as export control for controlled substances, Critical Info Protection Mandates or employee/vendor PII information.They also need to protect customer IP and sensitive information, such as PCI information They have to ensure data security in a global IT infrastructure. In particular, how do they control access to data that is now globally available? How do they manage what data privileged users, such as IT administrators and help desk, can see?They have to protect their IP such as parts specs, process information, as they collaborate with their multi-level supply chain. They have to protect corporate IP such as design specs, E&P data, ingredients list, process information as they collaborate with partners, JVs, and field service partners in global product developmentTo be compliant, global companies often resort to costly manual checks in the business process, which slows down operations. Take for example:1. Manual Regulatory Compliance eg Export ComplianceEngr who produce a doc needs to get it classifiedRequest for doc by foreign employees or partners need to get approval from Compliance OfficerCompliance officer need to check export licenseCompliance officer need to validate contentUpon approval, you to set up access to document All these could take weeks before the document could be share2. IP Protection example Suppose you have a JV with China You need to decide which products, docs can be shared. It could be based on product line, location of access etc You need to set up roles to decide who can access. Your JVs’ contractors, suppliers may also need access You need to create custom ABAP code to regulate access You need to create audit trail for compliance reporting All this will take months to set up, let alone maintain
  2. Talking points:-Need to talk to what ITAR is