SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
Best of IEF 2015 | Security and the weakest link
Best of IEF 2015:
Security and the weakest link
A look back at the 2015 Softchoice Innovation Executive Forum
Best of IEF 2015 | Security and the weakest link
Security is a topic that never gets old. It’s also one that gets scarier every
day for IT leaders everywhere.
In fact, as businesses modernize for a new digital reality, more sophisticated
threats are emerging. On top of this, users now expect more open,
collaborative work environments, while consumers demand more
personalized, integrated experiences. All of which put security on the line.
After hundreds of technology leaders gathered at multiple events for the
Innovation Executive Forum in 2015, several important insights about this
new world of security emerged.
Best of IEF: Security and the weakest link
Best of IEF 2015 | Security and the weakest link
You are the weakest link
No one opens an email attachment
without first picking up the phone
and making sure that person sent it.
Best of IEF 2015 | Security and the weakest link
People aren’t just the heart of IT success. They are also responsible for its
biggest enemy: security breeches.
Which is why the IT leader in Chicago shared his enormous success with
training his people to be weary of every single email attachment. While the
example might seem extreme, it underlines the crucial truth at the heart of
this discussion. People are the weakest link to every security regime.
Technology leaders would be naïve to think technology alone will be enough to
fend off an attack. What is needed is a focus on culture and training.
IEF Chicago
 Read the full report
Best of IEF 2015 | Security and the weakest link
Enter the shadow
We don’t want you to use us because
you have to. We want you to use us
because we are the best option.
Best of IEF 2015 | Security and the weakest link
IEF Minneapolis
 Read the full report
Call it the consumerism effect, but your workers are expecting more
seamless, easy ways to get their work done. And while many IT leaders
might try and prevent this movement toward more user friendly third party
apps, most modern thinkers know better.
As the IEF discussed at their meeting in Minneapolis, to stop shadow IT you
have to adopt the tools of the enemy. Building user-centric solutions that
are just as easy as the shadow competition is crucial. And sometimes, if
that’s not possible, you need to consider embracing outside services. What
matters is that IT manages to maintain credibility with workers, by always
keeping their interests central. Otherwise the shadow will creep in and you
will have no power to stop it.
Best of IEF 2015 | Security and the weakest link
Guardians of the brand
All it takes is one Tweet
to set off a firestorm.
Best of IEF 2015 | Security and the weakest link
It’s bad enough when your network is breeched. But it’s potentially
catastrophic these days with the speed in which the news will spread online.
This was a key lesson that surfaced at the IEF Atlanta event. The bottom line:
IT leaders today need to recognize a data breech is no longer something that
can be kept out of the public eye. Security, therefore, is central to a brand’s
livelihood.
As serious as this is, there is a silver lining. IT leaders are using the
heightened stakes to implement more robust, far-reaching security solutions
than previously possible. A savvy IT leader will remind stakeholders of how
much is on the line given the sophistication of today’s hackers.
IEF Atlanta
 Read the full report
Best of IEF 2015 | Security and the weakest link
The “pink shirt” approach
No matter how much
training, people simply
don’t ‘get it’
Best of IEF 2015 | Security and the weakest link
That quote refers to the frustrations of one IEF leader in Dallas, discussing
the futility of trying to get users to pick stronger passwords and be more
cautious with email attachments.
But instead of doing the same old warnings, IEF leaders suggested it’s best
to take a few more creative approaches. One of these involved making a
user wear a pink shirt around the office if he/she ever is caught breeching
security protocols, such as downloading attachments from unknown
senders. The take away is simple: IT leaders need to think outside the
box, and play to the realities of their user’s habits, in order to get them to
change risky behaviors.
IEF Dallas
 Read the full report
Best of IEF 2015 | Security and the weakest link
In cloud we trust
Is getting hacked
better in the cloud?
Best of IEF 2015 | Security and the weakest link
Let’s assume you are going to be the next target of a hack. The question is:
Is it better to be in the cloud or an on-premise only business? This was a
question raised at the New York IEF, as one leader discussed the merits of
having another party to point the finger at in case of a breech.
But there are far more compelling reasons to put your faith in the cloud,
and start leveraging it for a more secure environment. Trusting the
enormous experience of the provider (such as Microsoft) is one. And built in
compliancy and regulation requirements is another.
IEF New York
 Read the full report
Best of IEF 2015 | Security and the weakest link
Explore two more curated reports highlighting the best of IEF
thought leadership from 2015.
Want more great advice from the IEF leaders?

Contenu connexe

Plus de Softchoice Corporation

Leveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingLeveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingSoftchoice Corporation
 
Leveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingLeveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingSoftchoice Corporation
 
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...Softchoice Corporation
 
Webinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoveryWebinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoverySoftchoice Corporation
 
Etude Softchoice: la collaboration en action
Etude Softchoice:  la collaboration en actionEtude Softchoice:  la collaboration en action
Etude Softchoice: la collaboration en actionSoftchoice Corporation
 
Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017Softchoice Corporation
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice Corporation
 
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Softchoice Corporation
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice Corporation
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With AzureSoftchoice Corporation
 
Softchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice Corporation
 
Softchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Corporation
 
From Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster ProportionsFrom Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster ProportionsSoftchoice Corporation
 
Pourquoi les solutions de collaboration déçoivent parfois les attentes
Pourquoi les solutions de collaboration déçoivent parfois les attentesPourquoi les solutions de collaboration déçoivent parfois les attentes
Pourquoi les solutions de collaboration déçoivent parfois les attentesSoftchoice Corporation
 
Softchoice Innovation Executive Forum 2015 - Seattle
Softchoice Innovation Executive Forum 2015 - SeattleSoftchoice Innovation Executive Forum 2015 - Seattle
Softchoice Innovation Executive Forum 2015 - SeattleSoftchoice Corporation
 

Plus de Softchoice Corporation (20)

Benchmarking IT Agility Final Report
Benchmarking IT Agility Final ReportBenchmarking IT Agility Final Report
Benchmarking IT Agility Final Report
 
Leveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern LicensingLeveraging Office 365 Through Modern Licensing
Leveraging Office 365 Through Modern Licensing
 
Leveraging Azure Through Modern Licensing
Leveraging Azure Through Modern LicensingLeveraging Azure Through Modern Licensing
Leveraging Azure Through Modern Licensing
 
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
The Softchoice Innovation Report 2018: Four New Roles For CIOS In The Modern ...
 
Webinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recoveryWebinar: Azure backup and disaster recovery
Webinar: Azure backup and disaster recovery
 
Etude Softchoice: la collaboration en action
Etude Softchoice:  la collaboration en actionEtude Softchoice:  la collaboration en action
Etude Softchoice: la collaboration en action
 
Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017Collaboration Unleashed: Softchoice Research Study 2017
Collaboration Unleashed: Softchoice Research Study 2017
 
Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype Webinar | Cloud PBX and Skype
Webinar | Cloud PBX and Skype
 
Softchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security WebinarSoftchoice & Microsoft: Public Cloud Security Webinar
Softchoice & Microsoft: Public Cloud Security Webinar
 
Unleashing the Power of Office 365
Unleashing the Power of Office 365Unleashing the Power of Office 365
Unleashing the Power of Office 365
 
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
Étude Softchoice. Favoriser l’innovation : les actes en disent plus long que ...
 
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...Softchoice  - Microsoft Office 365 - Discussing legal concerns and informatio...
Softchoice - Microsoft Office 365 - Discussing legal concerns and informatio...
 
Improving Application Security With Azure
Improving Application Security With AzureImproving Application Security With Azure
Improving Application Security With Azure
 
Softchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuageSoftchoice | Encore des imprudences dans le nuage
Softchoice | Encore des imprudences dans le nuage
 
Softchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost GovernanceSoftchoice Discovery Series: Cloud Cost Governance
Softchoice Discovery Series: Cloud Cost Governance
 
THE ECONOMICS OF AZURE MANAGEMENT
THE ECONOMICS OF AZURE MANAGEMENTTHE ECONOMICS OF AZURE MANAGEMENT
THE ECONOMICS OF AZURE MANAGEMENT
 
From Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster ProportionsFrom Prosperity to Extinction: A Tale of Blockbuster Proportions
From Prosperity to Extinction: A Tale of Blockbuster Proportions
 
Pourquoi les solutions de collaboration déçoivent parfois les attentes
Pourquoi les solutions de collaboration déçoivent parfois les attentesPourquoi les solutions de collaboration déçoivent parfois les attentes
Pourquoi les solutions de collaboration déçoivent parfois les attentes
 
Trop occupé ou déconnecté?
Trop occupé ou déconnecté?Trop occupé ou déconnecté?
Trop occupé ou déconnecté?
 
Softchoice Innovation Executive Forum 2015 - Seattle
Softchoice Innovation Executive Forum 2015 - SeattleSoftchoice Innovation Executive Forum 2015 - Seattle
Softchoice Innovation Executive Forum 2015 - Seattle
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Softchoice innovation executive forum 2015 review - security

  • 1. Best of IEF 2015 | Security and the weakest link Best of IEF 2015: Security and the weakest link A look back at the 2015 Softchoice Innovation Executive Forum
  • 2. Best of IEF 2015 | Security and the weakest link Security is a topic that never gets old. It’s also one that gets scarier every day for IT leaders everywhere. In fact, as businesses modernize for a new digital reality, more sophisticated threats are emerging. On top of this, users now expect more open, collaborative work environments, while consumers demand more personalized, integrated experiences. All of which put security on the line. After hundreds of technology leaders gathered at multiple events for the Innovation Executive Forum in 2015, several important insights about this new world of security emerged. Best of IEF: Security and the weakest link
  • 3. Best of IEF 2015 | Security and the weakest link You are the weakest link No one opens an email attachment without first picking up the phone and making sure that person sent it.
  • 4. Best of IEF 2015 | Security and the weakest link People aren’t just the heart of IT success. They are also responsible for its biggest enemy: security breeches. Which is why the IT leader in Chicago shared his enormous success with training his people to be weary of every single email attachment. While the example might seem extreme, it underlines the crucial truth at the heart of this discussion. People are the weakest link to every security regime. Technology leaders would be naïve to think technology alone will be enough to fend off an attack. What is needed is a focus on culture and training. IEF Chicago Read the full report
  • 5. Best of IEF 2015 | Security and the weakest link Enter the shadow We don’t want you to use us because you have to. We want you to use us because we are the best option.
  • 6. Best of IEF 2015 | Security and the weakest link IEF Minneapolis Read the full report Call it the consumerism effect, but your workers are expecting more seamless, easy ways to get their work done. And while many IT leaders might try and prevent this movement toward more user friendly third party apps, most modern thinkers know better. As the IEF discussed at their meeting in Minneapolis, to stop shadow IT you have to adopt the tools of the enemy. Building user-centric solutions that are just as easy as the shadow competition is crucial. And sometimes, if that’s not possible, you need to consider embracing outside services. What matters is that IT manages to maintain credibility with workers, by always keeping their interests central. Otherwise the shadow will creep in and you will have no power to stop it.
  • 7. Best of IEF 2015 | Security and the weakest link Guardians of the brand All it takes is one Tweet to set off a firestorm.
  • 8. Best of IEF 2015 | Security and the weakest link It’s bad enough when your network is breeched. But it’s potentially catastrophic these days with the speed in which the news will spread online. This was a key lesson that surfaced at the IEF Atlanta event. The bottom line: IT leaders today need to recognize a data breech is no longer something that can be kept out of the public eye. Security, therefore, is central to a brand’s livelihood. As serious as this is, there is a silver lining. IT leaders are using the heightened stakes to implement more robust, far-reaching security solutions than previously possible. A savvy IT leader will remind stakeholders of how much is on the line given the sophistication of today’s hackers. IEF Atlanta Read the full report
  • 9. Best of IEF 2015 | Security and the weakest link The “pink shirt” approach No matter how much training, people simply don’t ‘get it’
  • 10. Best of IEF 2015 | Security and the weakest link That quote refers to the frustrations of one IEF leader in Dallas, discussing the futility of trying to get users to pick stronger passwords and be more cautious with email attachments. But instead of doing the same old warnings, IEF leaders suggested it’s best to take a few more creative approaches. One of these involved making a user wear a pink shirt around the office if he/she ever is caught breeching security protocols, such as downloading attachments from unknown senders. The take away is simple: IT leaders need to think outside the box, and play to the realities of their user’s habits, in order to get them to change risky behaviors. IEF Dallas Read the full report
  • 11. Best of IEF 2015 | Security and the weakest link In cloud we trust Is getting hacked better in the cloud?
  • 12. Best of IEF 2015 | Security and the weakest link Let’s assume you are going to be the next target of a hack. The question is: Is it better to be in the cloud or an on-premise only business? This was a question raised at the New York IEF, as one leader discussed the merits of having another party to point the finger at in case of a breech. But there are far more compelling reasons to put your faith in the cloud, and start leveraging it for a more secure environment. Trusting the enormous experience of the provider (such as Microsoft) is one. And built in compliancy and regulation requirements is another. IEF New York Read the full report
  • 13. Best of IEF 2015 | Security and the weakest link Explore two more curated reports highlighting the best of IEF thought leadership from 2015. Want more great advice from the IEF leaders?