The Threat
From Within!
Frank P. Rocha, CDIA+
Director of Marketing – Financial Services
2
Level Setting Todays Discussion
• Today’s webinar is intended to foster thought, debate, and collaboration
within you organization along with Nuxeo in order to determine the best
course of action for protecting content within your organization.
• The discussion today will be conceptual in nature.
• It is NOT intended to lay out specific technical details for implementing
the concepts I will present to you today.
• The concepts discussed today have been proven and shown to be
effective
• For more information on how the Nuxeo platform can be leveraged to
manage and secure you digital content, contact us at www.nuxeo.com.
The Threat From Within!
 Organizations are focused on
preventing access from
“external” agents.
 Breeches and malicious
activity are often performed
by “employees” authorized to
access the very content they
intend to damage.
 What steps can be taken to
deter such activity?
2
How can organizations protect their
content from malicious activity
perpetrated by individuals with
complete authorization to perform the
activities they are engaged in?
33% of threats come from employees
25% come from the extended enterprise (ex-employees / trusted partners)
87% are the result of inadvertent human error
82% result from lack of awareness /understanding of security threat
- clearswift
As It Relates To Content …..
5
• Someone in HR deletes a negative recommendation for a friend applying at the
company.
• A person in the mailroom writes an offensive comment on a piece of customer
correspondence.
• Claim Handler deletes information from the claim file of a relative.
• Customer Service Representative examines file of celebrity for sale to media.
• Loan Officer changes metadata to misfile documents after dispute with customer.
• Customer Service Representative views company executive file without business
justification.
• Life Insurance employee views medical information of fellow employee.
Extremely Difficult to Prevent
6
• One of the most difficult security measures to enforce, is the protection of
information from individuals who already have access to that information
• Damage to the brand can be extensive (regulatory, punitive, trust)
• The vast majority of employees are honest hard working individuals
• At times the actions taken can be accidental
• Many individuals guilty of such activity are unaware that their actions can be
traced
Actions taken by authorized individuals are extremely difficult to prevent.
Today, we will discuss measures that can be taken during the
implementation of your Content Services Platform to introduce
Accountability, Visibility, and Traceability to dissuade malicious activity
AUDIT TRAILS
USER COMMENTS
SPECIAL CUSTOMERS
FLAG & REPORT
CONTENT IN CONTEXT
CONCEPTS
1
2
3
4
5
6
7
ACCESS MANAGEMENT
8
AUTOMATIC VERSIONING
LOGICAL DELETE
8
Audit Trails
• Audit trails should be displayed by default when content is
accessed
• Audit trails provide a visual confirmation that all access to digital
content is being monitored and logged.
• Should be displayed in reverse chronological order (newest first)
• Display DATE/TIME/EMPLID/ACTION TAKEN
• Can be maintained for the life of the contentAdditional Benefit
Provides the employee with an immediate history of all actions taken
on the content, when, and by who.
9
User Comments: Optional/Mandatory
• Augments Audit Trails
• Should be displayed with Audit Trails
• Audit Trails tell Who, What, and When; Comments tell “Why?”
• Standardize if reporting on comments is required
• Comments can be optional or mandatory
• Mandatory further enforces that access must be performed in the
normal course of business
Additional Benefit
Explains to supervisors why actions were taken.
10
Special Customers
• Manage access based on special customers list:
• High Profile Customers
• Company Officers, Executives, Employees
• Restrict access to particular roles or levels of security
Additional Benefit
Prevent “inquisitive” minds. (people just being nosy).
11
Flag & Report Unauthorized Access
• Provide a visual indicator that unauthorized or inappropriate
access has been attempted
• Provide immediate notification to IT Security
• Immediately suspend further access if necessary
Additional Benefit
• Visual warnings can serve as successful deterrents to future
activity.
• Allows IT Security/HR to take immediate and appropriate action.
• Can feed analytics and trend analysis.
12
Content in Context
• Only deliver the relevant content necessary to perform the task at
hand. (typically workflow driven)
• Only allow ad-hoc access to relevant content
Additional Benefit
• Reduced payload and complexity of workflow
13
Access Management
• Manage access in real-time
• Provide access only during a given task
• Access today, does not mean access tomorrow
Additional Benefit
• Provides granular control of content access
• Protection for highly sensitive data
• Enforces “Need-to-Know” access
14
Automatic Versioning
• Versioning should be automatic when content is
modified
• Important if “structural” modifications are allowed
(merge, split, add page, delete page, rearrange pages,
etc)
• Modified version becomes current version
• Visual indicator that “other” versions exist.
Additional Benefit
• Establishes content tracking
• Allows users to see what modifications have been made and by
who
15
Logical Delete
• An employee should never be able to “physically” delete content
• Content is simply “flagged” as deleted or moved to Recycle Bin
• Restricts content from default search results
• All deleted content can be display if explicitly requested
• Only persona of Records Manager can physically delete content
Additional Benefit
• Removes uncertainty – “Is the system losing content?”
CONCLUSION:
Accountability, Visibility, & Traceability
• Protecting content when access is authorized is extremely challenging
• Must ensure the integrity of your Content Services Platform
• Simple measures can introduce Accountability, Visibility, and
Traceability
• Provide for the protection of content and a tracking mechanism for
actions taken and by who
16
The Nuxeo Advantage
17
Function Delivered by the Nuxeo
Platform
Audit Trails
User Comments
Special Customers
Flag & Report
Content in Context
Access Management
Automatic Versioning
Logical Delete
Thank
you!
Visit: www.nuxeo.com
Thank you!
Contact information
Frank P. Rocha, CDIA+
frocha@nuxeo.com

More Related Content

PPTX
Securing your digital world cybersecurity for sb es
PDF
The Three Critical Steps for Effective BYOD Management
PDF
5 Essential Tips for Creating An Effective BYOD Policy
PPTX
Best practices for security and governance in share point 2013 published
PPTX
The Path to IAM Maturity
PDF
Leave the HIT Stoneage
PDF
How to Leverage SaaS Apps with Minimal Risk
PDF
Getting the most from Application Security in your SOC by Leigh Collett
Securing your digital world cybersecurity for sb es
The Three Critical Steps for Effective BYOD Management
5 Essential Tips for Creating An Effective BYOD Policy
Best practices for security and governance in share point 2013 published
The Path to IAM Maturity
Leave the HIT Stoneage
How to Leverage SaaS Apps with Minimal Risk
Getting the most from Application Security in your SOC by Leigh Collett

Similar to Threat from within (20)

PPTX
Just Trust Everyone and We Will Be Fine, Right?
PPTX
Securing your digital world - Cybersecurity for SBEs
PDF
How To Eliminate Security Exposures in Office 365 Webinar
PDF
Sensibilisation à la Sécurité Salesforce
PDF
I Series User Management
PPTX
Data Breaches and Security Rights in SharePoint Webinar
PDF
Intranet content management (webinar)
PPTX
CIS Critical Security Controls Foundations of Cybersecurity.pptx
PPTX
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
PDF
Intro To Secure Identity Management
PPTX
A breach demands immediate, calculated response
PPTX
DevOpsDays Chicago 2014 - Controlling Devops
PPTX
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
PPTX
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
PPTX
SmartERP PeopleSoft Security
PDF
Hitachi ID Access Certifier
PDF
Hitachi ID Access Certifier
PDF
BYOD: Device Control in the Wild, Wild, West
PPTX
Segregation of Duties and Sensitive Access as a Service
DOCX
main project doument
Just Trust Everyone and We Will Be Fine, Right?
Securing your digital world - Cybersecurity for SBEs
How To Eliminate Security Exposures in Office 365 Webinar
Sensibilisation à la Sécurité Salesforce
I Series User Management
Data Breaches and Security Rights in SharePoint Webinar
Intranet content management (webinar)
CIS Critical Security Controls Foundations of Cybersecurity.pptx
Security, Administration & Governance for SharePoint On-Prem, Online, & Every...
Intro To Secure Identity Management
A breach demands immediate, calculated response
DevOpsDays Chicago 2014 - Controlling Devops
Webinar - Compliance with the Microsoft Cloud- 2017-04-19
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
SmartERP PeopleSoft Security
Hitachi ID Access Certifier
Hitachi ID Access Certifier
BYOD: Device Control in the Wild, Wild, West
Segregation of Duties and Sensitive Access as a Service
main project doument
Ad

More from Nuxeo (20)

PDF
Own the Digital Shelf Strategies Food and Beverage Companies
PDF
How DAM Librarians Can Get Ready for the Uncertain Future
PDF
How Insurers Fueled Transformation During a Pandemic
PDF
Manage your Content at Scale with MongoDB and Nuxeo
PDF
Accelerate the Digital Supply Chain From Idea to Support
PDF
Where are you in the DAM Continuum
PDF
Customer Experience in 2021
PPTX
L’IA personnalisée, clé d’une gestion de l’information innovante
PDF
Gérer ses contenus avec MongoDB et Nuxeo
PPTX
Le DAM en 2021 : Tendances, points clés et critères d'évaluation
PPTX
Enabling Digital Transformation Amidst a Global Pandemic | Low-Code, Cloud, A...
PDF
Elevate your Customer's Experience and Stay Ahead of the Competition
PDF
Driving Brand Loyalty Through Superior Customer Experience
PDF
Drive Enterprise Speed and Scale with A Cloud-Native DAM
PPTX
The Big Picture: the Role of Video, Photography, and Content in Enhancing the...
PDF
How Creatives Are Getting Creative in 2020 and Beyond
PPTX
Digitalisation : Améliorez la collaboration et l’expérience client grâce au DAM
PDF
Reimagine Your Claims Process with Future-Proof Technologies
PPTX
Comment le Centre Hospitalier Laborit dématérialise ses processus administratifs
PDF
Accelerating the Packaging Design Process with Artificial Intelligence
Own the Digital Shelf Strategies Food and Beverage Companies
How DAM Librarians Can Get Ready for the Uncertain Future
How Insurers Fueled Transformation During a Pandemic
Manage your Content at Scale with MongoDB and Nuxeo
Accelerate the Digital Supply Chain From Idea to Support
Where are you in the DAM Continuum
Customer Experience in 2021
L’IA personnalisée, clé d’une gestion de l’information innovante
Gérer ses contenus avec MongoDB et Nuxeo
Le DAM en 2021 : Tendances, points clés et critères d'évaluation
Enabling Digital Transformation Amidst a Global Pandemic | Low-Code, Cloud, A...
Elevate your Customer's Experience and Stay Ahead of the Competition
Driving Brand Loyalty Through Superior Customer Experience
Drive Enterprise Speed and Scale with A Cloud-Native DAM
The Big Picture: the Role of Video, Photography, and Content in Enhancing the...
How Creatives Are Getting Creative in 2020 and Beyond
Digitalisation : Améliorez la collaboration et l’expérience client grâce au DAM
Reimagine Your Claims Process with Future-Proof Technologies
Comment le Centre Hospitalier Laborit dématérialise ses processus administratifs
Accelerating the Packaging Design Process with Artificial Intelligence
Ad

Recently uploaded (20)

PPTX
Phase1_final PPTuwhefoegfohwfoiehfoegg.pptx
PPT
Predictive modeling basics in data cleaning process
PDF
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
PPTX
STERILIZATION AND DISINFECTION-1.ppthhhbx
PDF
Data Engineering Interview Questions & Answers Data Modeling (3NF, Star, Vaul...
PPTX
FMIS 108 and AISlaudon_mis17_ppt_ch11.pptx
PDF
Microsoft 365 products and services descrption
PDF
Introduction to Data Science and Data Analysis
PDF
Jean-Georges Perrin - Spark in Action, Second Edition (2020, Manning Publicat...
PPT
DU, AIS, Big Data and Data Analytics.ppt
PPTX
Steganography Project Steganography Project .pptx
PPTX
DS-40-Pre-Engagement and Kickoff deck - v8.0.pptx
PDF
Transcultural that can help you someday.
PPTX
modul_python (1).pptx for professional and student
PPTX
IMPACT OF LANDSLIDE.....................
PPTX
Business_Capability_Map_Collection__pptx
PPT
Image processing and pattern recognition 2.ppt
PPT
lectureusjsjdhdsjjshdshshddhdhddhhd1.ppt
PDF
Navigating the Thai Supplements Landscape.pdf
PPT
statistic analysis for study - data collection
Phase1_final PPTuwhefoegfohwfoiehfoegg.pptx
Predictive modeling basics in data cleaning process
Data Engineering Interview Questions & Answers Cloud Data Stacks (AWS, Azure,...
STERILIZATION AND DISINFECTION-1.ppthhhbx
Data Engineering Interview Questions & Answers Data Modeling (3NF, Star, Vaul...
FMIS 108 and AISlaudon_mis17_ppt_ch11.pptx
Microsoft 365 products and services descrption
Introduction to Data Science and Data Analysis
Jean-Georges Perrin - Spark in Action, Second Edition (2020, Manning Publicat...
DU, AIS, Big Data and Data Analytics.ppt
Steganography Project Steganography Project .pptx
DS-40-Pre-Engagement and Kickoff deck - v8.0.pptx
Transcultural that can help you someday.
modul_python (1).pptx for professional and student
IMPACT OF LANDSLIDE.....................
Business_Capability_Map_Collection__pptx
Image processing and pattern recognition 2.ppt
lectureusjsjdhdsjjshdshshddhdhddhhd1.ppt
Navigating the Thai Supplements Landscape.pdf
statistic analysis for study - data collection

Threat from within

  • 1. The Threat From Within! Frank P. Rocha, CDIA+ Director of Marketing – Financial Services
  • 2. 2 Level Setting Todays Discussion • Today’s webinar is intended to foster thought, debate, and collaboration within you organization along with Nuxeo in order to determine the best course of action for protecting content within your organization. • The discussion today will be conceptual in nature. • It is NOT intended to lay out specific technical details for implementing the concepts I will present to you today. • The concepts discussed today have been proven and shown to be effective • For more information on how the Nuxeo platform can be leveraged to manage and secure you digital content, contact us at www.nuxeo.com.
  • 3. The Threat From Within!  Organizations are focused on preventing access from “external” agents.  Breeches and malicious activity are often performed by “employees” authorized to access the very content they intend to damage.  What steps can be taken to deter such activity? 2 How can organizations protect their content from malicious activity perpetrated by individuals with complete authorization to perform the activities they are engaged in?
  • 4. 33% of threats come from employees 25% come from the extended enterprise (ex-employees / trusted partners) 87% are the result of inadvertent human error 82% result from lack of awareness /understanding of security threat - clearswift
  • 5. As It Relates To Content ….. 5 • Someone in HR deletes a negative recommendation for a friend applying at the company. • A person in the mailroom writes an offensive comment on a piece of customer correspondence. • Claim Handler deletes information from the claim file of a relative. • Customer Service Representative examines file of celebrity for sale to media. • Loan Officer changes metadata to misfile documents after dispute with customer. • Customer Service Representative views company executive file without business justification. • Life Insurance employee views medical information of fellow employee.
  • 6. Extremely Difficult to Prevent 6 • One of the most difficult security measures to enforce, is the protection of information from individuals who already have access to that information • Damage to the brand can be extensive (regulatory, punitive, trust) • The vast majority of employees are honest hard working individuals • At times the actions taken can be accidental • Many individuals guilty of such activity are unaware that their actions can be traced Actions taken by authorized individuals are extremely difficult to prevent. Today, we will discuss measures that can be taken during the implementation of your Content Services Platform to introduce Accountability, Visibility, and Traceability to dissuade malicious activity
  • 7. AUDIT TRAILS USER COMMENTS SPECIAL CUSTOMERS FLAG & REPORT CONTENT IN CONTEXT CONCEPTS 1 2 3 4 5 6 7 ACCESS MANAGEMENT 8 AUTOMATIC VERSIONING LOGICAL DELETE
  • 8. 8 Audit Trails • Audit trails should be displayed by default when content is accessed • Audit trails provide a visual confirmation that all access to digital content is being monitored and logged. • Should be displayed in reverse chronological order (newest first) • Display DATE/TIME/EMPLID/ACTION TAKEN • Can be maintained for the life of the contentAdditional Benefit Provides the employee with an immediate history of all actions taken on the content, when, and by who.
  • 9. 9 User Comments: Optional/Mandatory • Augments Audit Trails • Should be displayed with Audit Trails • Audit Trails tell Who, What, and When; Comments tell “Why?” • Standardize if reporting on comments is required • Comments can be optional or mandatory • Mandatory further enforces that access must be performed in the normal course of business Additional Benefit Explains to supervisors why actions were taken.
  • 10. 10 Special Customers • Manage access based on special customers list: • High Profile Customers • Company Officers, Executives, Employees • Restrict access to particular roles or levels of security Additional Benefit Prevent “inquisitive” minds. (people just being nosy).
  • 11. 11 Flag & Report Unauthorized Access • Provide a visual indicator that unauthorized or inappropriate access has been attempted • Provide immediate notification to IT Security • Immediately suspend further access if necessary Additional Benefit • Visual warnings can serve as successful deterrents to future activity. • Allows IT Security/HR to take immediate and appropriate action. • Can feed analytics and trend analysis.
  • 12. 12 Content in Context • Only deliver the relevant content necessary to perform the task at hand. (typically workflow driven) • Only allow ad-hoc access to relevant content Additional Benefit • Reduced payload and complexity of workflow
  • 13. 13 Access Management • Manage access in real-time • Provide access only during a given task • Access today, does not mean access tomorrow Additional Benefit • Provides granular control of content access • Protection for highly sensitive data • Enforces “Need-to-Know” access
  • 14. 14 Automatic Versioning • Versioning should be automatic when content is modified • Important if “structural” modifications are allowed (merge, split, add page, delete page, rearrange pages, etc) • Modified version becomes current version • Visual indicator that “other” versions exist. Additional Benefit • Establishes content tracking • Allows users to see what modifications have been made and by who
  • 15. 15 Logical Delete • An employee should never be able to “physically” delete content • Content is simply “flagged” as deleted or moved to Recycle Bin • Restricts content from default search results • All deleted content can be display if explicitly requested • Only persona of Records Manager can physically delete content Additional Benefit • Removes uncertainty – “Is the system losing content?”
  • 16. CONCLUSION: Accountability, Visibility, & Traceability • Protecting content when access is authorized is extremely challenging • Must ensure the integrity of your Content Services Platform • Simple measures can introduce Accountability, Visibility, and Traceability • Provide for the protection of content and a tracking mechanism for actions taken and by who 16
  • 17. The Nuxeo Advantage 17 Function Delivered by the Nuxeo Platform Audit Trails User Comments Special Customers Flag & Report Content in Context Access Management Automatic Versioning Logical Delete
  • 19. Thank you! Contact information Frank P. Rocha, CDIA+ frocha@nuxeo.com