SlideShare une entreprise Scribd logo
1  sur  22
Télécharger pour lire hors ligne
Secure, social, cloud
                         Mutually exclusive or perfect partners?

                         Stuart Barr




www.highqsolutions.com
Introduction



                         Stuart Barr
                         Director, HighQ

                       ‣ Background in technology, social, legal

                       ‣ HighQ is a leading provider of secure
                         collaboration and publishing software
                         to the legal, banking, life sciences and
                         government sectors.


Photo by Stuart Barr
Can we have our cake and eat it?




                     “          Is cloud-based social
                                software inherently risky for
                                enterprises looking to take
                                advantage of the new wave
                                of technology innovation or
                                is it possible to have your
                                cake and eat it?



Photo by Mushroom and Rooster
A new wave of technology adoption




                       ‣ Cloud computing
                       ‣ Social software
                       ‣ Mobile access




Photo by Stuart Barr
Benefits of the cloud




                      ‣ Reduce costs
                      ‣ Rapid deployment
                      ‣ Flexibility and scalability
                      ‣ Access from anywhere




Photo by The Planet
Accelerating adoption of social tools




                            ‣ Workforce productivity
                            ‣ Communication & collaboration
                            ‣ Knowledge sharing
                            ‣ Internal and external




Image by Gregory Williams
Established cloud players lead the way



                       ‣ Google
                       ‣ Salesforce
                       ‣ Zoho
                       ‣ Amazon
                       ‣ Microsoft
                       ‣ Apple



Photo by Fiona Romeo
In theory, social + cloud = good




                ‣ Cheap, scalable computing
                ‣ Software on demand
                ‣ Cost and resource savings
                ‣ Access to latest innovations
                ‣ Timely deployments




Photo by Lyza
Not so fast




Picture by Natalia & Gabriel Sánchez-Suárez
Photo by Fiona Romeo
Is the cloud secure?




Photo by M I S C H E L L E
Popular misconception no.1




                  “         The cloud is less secure than
                            an in-house solution hosted
                            in my own data centre.




Photo by Martin Sharman
                                                     ”
Consumer-grade services




                   Fantastic – but probably not the best
                   place in the cloud to store your sensitive
                   corporate data… we need something else




Photo by Fiona Romeo
Enterprise-grade services




                           ‣ Specialist providers
                           ‣ Focused on the enterprise
                           ‣ High-grade security & control
                           ‣ Independently audited
                           ‣ Smaller, private clouds




Photo by Steven Shorrock
Specialist cloud providers




                          ‣ Depend on trust of their clients
                          ‣ Must be as secure as on-premise
                          ‣ Robust, reliable, secure services
                          ‣ State-of-the-art technology firms




Photo by Lars Plougmann
Popular misconception no.2




                     “  Social is a waste of time,
                        it’s about sharing and being
                        open, it’s risky and insecure.




Photo by David Sim
                                                  ”
Take the best from the consumer web




‣ Best ideas from consumer tools
‣ Take them into the enterprise
‣ Add new security and controls
Enterprise-grade social tools




‣ Robust and advanced controls
‣ Choose who to share with
‣ Be as open or closed as you need
‣ Various levels of privilege & access
‣ Internal and external users
“Facebook for the enterprise”



‣ File sharing
‣ Wikis & blogs
‣ Microblogs
‣ Tasks & calendars
‣ People profiles
‣ Activity streams
‣ Feeds and filters
What “social” really means




                        ‣ Emphasising people and connections
                        ‣ Enterprise-grade collaboration tools
                        ‣ Convert work product into knowledge
                        ‣ Create and share in the same system
                        ‣ Gain a corporate peripheral vision



Photo by Hans Põldoja
So, I can have my cake and eat it?



                        ‣ Secure, social, cloud is possible
                        ‣ Do your due diligence
                        ‣ Choose your providers carefully
                        ‣ Ask the difficult questions
                        ‣ Demand evidence they are secure




Photo by Frank Gruber
These firms are already doing it




www.highqsolutions.com
Questions
info@highqsolutions.com

www.highqsolutions.com

Contenu connexe

Tendances

The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinCloud Expo
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...FaithWestdorp
 
Cloud computing fact or fiction
Cloud computing fact or fictionCloud computing fact or fiction
Cloud computing fact or fictionsteven hasting
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and auditMarc Vael
 
How Schneider Electric Connects Over 140,000 Employees Around the Globe
How Schneider Electric Connects Over 140,000 Employees Around the GlobeHow Schneider Electric Connects Over 140,000 Employees Around the Globe
How Schneider Electric Connects Over 140,000 Employees Around the Globetibbr
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 
Top 10 Reasons to use Virtual Events
Top 10 Reasons to use Virtual EventsTop 10 Reasons to use Virtual Events
Top 10 Reasons to use Virtual EventsInconnection
 
Regulations in IoT - Innovation Stifle or Urgent Need
Regulations in IoT - Innovation Stifle or Urgent NeedRegulations in IoT - Innovation Stifle or Urgent Need
Regulations in IoT - Innovation Stifle or Urgent NeedRajesh Chitharanjan
 
How to achieve big outcomes on a small IT budget
How to achieve big outcomes on a small IT budgetHow to achieve big outcomes on a small IT budget
How to achieve big outcomes on a small IT budgetRyan Jones
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
Effective Management of Docker Containers
Effective Management of Docker ContainersEffective Management of Docker Containers
Effective Management of Docker ContainersJason Bloomberg
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel VelascoJuanMiguelVelascoWeb
 
The ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social NetworkingThe ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social Networkingtibbr
 
(SEC314) Customer Perspectives on Implementing Security Controls with AWS | A...
(SEC314) Customer Perspectives on Implementing Security Controls with AWS | A...(SEC314) Customer Perspectives on Implementing Security Controls with AWS | A...
(SEC314) Customer Perspectives on Implementing Security Controls with AWS | A...Amazon Web Services
 
Cloud Security For Dummies Netskope
Cloud Security For Dummies NetskopeCloud Security For Dummies Netskope
Cloud Security For Dummies NetskopeSamuel Najar
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Thoughtworks
 
Cloud content security vs innovation 2012_0821
Cloud content security vs innovation 2012_0821Cloud content security vs innovation 2012_0821
Cloud content security vs innovation 2012_0821Brian Gleeson
 
Disasters DO Happen... Protecting/Recovering Your Business with Cloud Technology
Disasters DO Happen... Protecting/Recovering Your Business with Cloud TechnologyDisasters DO Happen... Protecting/Recovering Your Business with Cloud Technology
Disasters DO Happen... Protecting/Recovering Your Business with Cloud TechnologyIntegration Technologies Corp
 

Tendances (19)

The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
 
Cloud computing fact or fiction
Cloud computing fact or fictionCloud computing fact or fiction
Cloud computing fact or fiction
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
How Schneider Electric Connects Over 140,000 Employees Around the Globe
How Schneider Electric Connects Over 140,000 Employees Around the GlobeHow Schneider Electric Connects Over 140,000 Employees Around the Globe
How Schneider Electric Connects Over 140,000 Employees Around the Globe
 
How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
Top 10 Reasons to use Virtual Events
Top 10 Reasons to use Virtual EventsTop 10 Reasons to use Virtual Events
Top 10 Reasons to use Virtual Events
 
Regulations in IoT - Innovation Stifle or Urgent Need
Regulations in IoT - Innovation Stifle or Urgent NeedRegulations in IoT - Innovation Stifle or Urgent Need
Regulations in IoT - Innovation Stifle or Urgent Need
 
How to achieve big outcomes on a small IT budget
How to achieve big outcomes on a small IT budgetHow to achieve big outcomes on a small IT budget
How to achieve big outcomes on a small IT budget
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
Effective Management of Docker Containers
Effective Management of Docker ContainersEffective Management of Docker Containers
Effective Management of Docker Containers
 
New Security Challenges Juan Miguel Velasco
New	Security Challenges Juan Miguel VelascoNew	Security Challenges Juan Miguel Velasco
New Security Challenges Juan Miguel Velasco
 
Security research trends in 2020
Security research trends in 2020Security research trends in 2020
Security research trends in 2020
 
The ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social NetworkingThe ROI Global Forum on Enterprise Social Networking
The ROI Global Forum on Enterprise Social Networking
 
(SEC314) Customer Perspectives on Implementing Security Controls with AWS | A...
(SEC314) Customer Perspectives on Implementing Security Controls with AWS | A...(SEC314) Customer Perspectives on Implementing Security Controls with AWS | A...
(SEC314) Customer Perspectives on Implementing Security Controls with AWS | A...
 
Cloud Security For Dummies Netskope
Cloud Security For Dummies NetskopeCloud Security For Dummies Netskope
Cloud Security For Dummies Netskope
 
Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...Making best-in-class security ubiquitous - Why security is no longer just an ...
Making best-in-class security ubiquitous - Why security is no longer just an ...
 
Cloud content security vs innovation 2012_0821
Cloud content security vs innovation 2012_0821Cloud content security vs innovation 2012_0821
Cloud content security vs innovation 2012_0821
 
Disasters DO Happen... Protecting/Recovering Your Business with Cloud Technology
Disasters DO Happen... Protecting/Recovering Your Business with Cloud TechnologyDisasters DO Happen... Protecting/Recovering Your Business with Cloud Technology
Disasters DO Happen... Protecting/Recovering Your Business with Cloud Technology
 

Similaire à Secure, social, cloud - mutually exclusive or perfect partners?

Buzzword biopsy – Mobile, Social, Cloud – Janders Dean 2012
Buzzword biopsy – Mobile, Social, Cloud – Janders Dean 2012Buzzword biopsy – Mobile, Social, Cloud – Janders Dean 2012
Buzzword biopsy – Mobile, Social, Cloud – Janders Dean 2012Stuart Barr
 
Evolving role of knowledge managements impact on the bottom line - Lex Mundi ...
Evolving role of knowledge managements impact on the bottom line - Lex Mundi ...Evolving role of knowledge managements impact on the bottom line - Lex Mundi ...
Evolving role of knowledge managements impact on the bottom line - Lex Mundi ...Ben Wightwick
 
Gartner's 'Nexus of Forces' and the future of collaboration
Gartner's 'Nexus of Forces' and the future of collaborationGartner's 'Nexus of Forces' and the future of collaboration
Gartner's 'Nexus of Forces' and the future of collaborationHighQ
 
Collaboration - Making The World A Smaller Place
Collaboration - Making The World A Smaller PlaceCollaboration - Making The World A Smaller Place
Collaboration - Making The World A Smaller PlaceJacob Mathew
 
IBA Know-How Sub Committee
IBA Know-How Sub CommitteeIBA Know-How Sub Committee
IBA Know-How Sub CommitteeBen Wightwick
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Livingstone Advisory
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptxandrewbourget
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ramy Houssaini
 
Cloud Security: Trust and Transformation
Cloud Security: Trust and TransformationCloud Security: Trust and Transformation
Cloud Security: Trust and TransformationPeter Coffee
 
False Cloud Debate Panel Interop 2011
False Cloud Debate Panel Interop 2011False Cloud Debate Panel Interop 2011
False Cloud Debate Panel Interop 2011David Linthicum
 
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012 Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012 Livingstone Advisory
 
Appistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedExAppistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedExAppistry
 
Social, mobile, cloud and the consumerisation of user experience – LawTech Fu...
Social, mobile, cloud and the consumerisation of user experience – LawTech Fu...Social, mobile, cloud and the consumerisation of user experience – LawTech Fu...
Social, mobile, cloud and the consumerisation of user experience – LawTech Fu...Stuart Barr
 
Emerging collaboration technologies
Emerging collaboration technologiesEmerging collaboration technologies
Emerging collaboration technologiesStuart Barr
 
3 Things to Know When Securing Mixed, Multi-Cloud Environments
3 Things to Know When Securing Mixed, Multi-Cloud Environments3 Things to Know When Securing Mixed, Multi-Cloud Environments
3 Things to Know When Securing Mixed, Multi-Cloud EnvironmentsProtectWise
 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotTech Mahindra
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Livingstone Advisory
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Livingstone Advisory
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...Dana Gardner
 

Similaire à Secure, social, cloud - mutually exclusive or perfect partners? (20)

Buzzword biopsy – Mobile, Social, Cloud – Janders Dean 2012
Buzzword biopsy – Mobile, Social, Cloud – Janders Dean 2012Buzzword biopsy – Mobile, Social, Cloud – Janders Dean 2012
Buzzword biopsy – Mobile, Social, Cloud – Janders Dean 2012
 
Evolving role of knowledge managements impact on the bottom line - Lex Mundi ...
Evolving role of knowledge managements impact on the bottom line - Lex Mundi ...Evolving role of knowledge managements impact on the bottom line - Lex Mundi ...
Evolving role of knowledge managements impact on the bottom line - Lex Mundi ...
 
Gartner's 'Nexus of Forces' and the future of collaboration
Gartner's 'Nexus of Forces' and the future of collaborationGartner's 'Nexus of Forces' and the future of collaboration
Gartner's 'Nexus of Forces' and the future of collaboration
 
Collaboration - Making The World A Smaller Place
Collaboration - Making The World A Smaller PlaceCollaboration - Making The World A Smaller Place
Collaboration - Making The World A Smaller Place
 
IBA Know-How Sub Committee
IBA Know-How Sub CommitteeIBA Know-How Sub Committee
IBA Know-How Sub Committee
 
Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?Where worlds collide: Agile, Project Management, Risk and Cloud?
Where worlds collide: Agile, Project Management, Risk and Cloud?
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
 
Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011Ciphercloud Solutions Overview hsa oct2011
Ciphercloud Solutions Overview hsa oct2011
 
Cloud Security: Trust and Transformation
Cloud Security: Trust and TransformationCloud Security: Trust and Transformation
Cloud Security: Trust and Transformation
 
False Cloud Debate Panel Interop 2011
False Cloud Debate Panel Interop 2011False Cloud Debate Panel Interop 2011
False Cloud Debate Panel Interop 2011
 
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012 Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
Map of the Cloud minefield - Banktech Sydney Summit 17 july 2012
 
Appistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedExAppistry Cloud Computing for Government Featuring FedEx
Appistry Cloud Computing for Government Featuring FedEx
 
Social, mobile, cloud and the consumerisation of user experience – LawTech Fu...
Social, mobile, cloud and the consumerisation of user experience – LawTech Fu...Social, mobile, cloud and the consumerisation of user experience – LawTech Fu...
Social, mobile, cloud and the consumerisation of user experience – LawTech Fu...
 
Emerging collaboration technologies
Emerging collaboration technologiesEmerging collaboration technologies
Emerging collaboration technologies
 
3 Things to Know When Securing Mixed, Multi-Cloud Environments
3 Things to Know When Securing Mixed, Multi-Cloud Environments3 Things to Know When Securing Mixed, Multi-Cloud Environments
3 Things to Know When Securing Mixed, Multi-Cloud Environments
 
Cloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot SpotCloud Computing IT Lexicon's Latest Hot Spot
Cloud Computing IT Lexicon's Latest Hot Spot
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?Will the Cloud be your disaster, or will Cloud be your disaster recovery?
Will the Cloud be your disaster, or will Cloud be your disaster recovery?
 
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
How Deep Observability Powers Strong Cybersecurity and Network Insights Acros...
 

Dernier

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Dernier (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Secure, social, cloud - mutually exclusive or perfect partners?

  • 1. Secure, social, cloud Mutually exclusive or perfect partners? Stuart Barr www.highqsolutions.com
  • 2. Introduction Stuart Barr Director, HighQ ‣ Background in technology, social, legal ‣ HighQ is a leading provider of secure collaboration and publishing software to the legal, banking, life sciences and government sectors. Photo by Stuart Barr
  • 3. Can we have our cake and eat it? “ Is cloud-based social software inherently risky for enterprises looking to take advantage of the new wave of technology innovation or is it possible to have your cake and eat it? Photo by Mushroom and Rooster
  • 4. A new wave of technology adoption ‣ Cloud computing ‣ Social software ‣ Mobile access Photo by Stuart Barr
  • 5. Benefits of the cloud ‣ Reduce costs ‣ Rapid deployment ‣ Flexibility and scalability ‣ Access from anywhere Photo by The Planet
  • 6. Accelerating adoption of social tools ‣ Workforce productivity ‣ Communication & collaboration ‣ Knowledge sharing ‣ Internal and external Image by Gregory Williams
  • 7. Established cloud players lead the way ‣ Google ‣ Salesforce ‣ Zoho ‣ Amazon ‣ Microsoft ‣ Apple Photo by Fiona Romeo
  • 8. In theory, social + cloud = good ‣ Cheap, scalable computing ‣ Software on demand ‣ Cost and resource savings ‣ Access to latest innovations ‣ Timely deployments Photo by Lyza
  • 9. Not so fast Picture by Natalia & Gabriel Sánchez-Suárez Photo by Fiona Romeo
  • 10. Is the cloud secure? Photo by M I S C H E L L E
  • 11. Popular misconception no.1 “ The cloud is less secure than an in-house solution hosted in my own data centre. Photo by Martin Sharman ”
  • 12. Consumer-grade services Fantastic – but probably not the best place in the cloud to store your sensitive corporate data… we need something else Photo by Fiona Romeo
  • 13. Enterprise-grade services ‣ Specialist providers ‣ Focused on the enterprise ‣ High-grade security & control ‣ Independently audited ‣ Smaller, private clouds Photo by Steven Shorrock
  • 14. Specialist cloud providers ‣ Depend on trust of their clients ‣ Must be as secure as on-premise ‣ Robust, reliable, secure services ‣ State-of-the-art technology firms Photo by Lars Plougmann
  • 15. Popular misconception no.2 “ Social is a waste of time, it’s about sharing and being open, it’s risky and insecure. Photo by David Sim ”
  • 16. Take the best from the consumer web ‣ Best ideas from consumer tools ‣ Take them into the enterprise ‣ Add new security and controls
  • 17. Enterprise-grade social tools ‣ Robust and advanced controls ‣ Choose who to share with ‣ Be as open or closed as you need ‣ Various levels of privilege & access ‣ Internal and external users
  • 18. “Facebook for the enterprise” ‣ File sharing ‣ Wikis & blogs ‣ Microblogs ‣ Tasks & calendars ‣ People profiles ‣ Activity streams ‣ Feeds and filters
  • 19. What “social” really means ‣ Emphasising people and connections ‣ Enterprise-grade collaboration tools ‣ Convert work product into knowledge ‣ Create and share in the same system ‣ Gain a corporate peripheral vision Photo by Hans Põldoja
  • 20. So, I can have my cake and eat it? ‣ Secure, social, cloud is possible ‣ Do your due diligence ‣ Choose your providers carefully ‣ Ask the difficult questions ‣ Demand evidence they are secure Photo by Frank Gruber
  • 21. These firms are already doing it www.highqsolutions.com