[webinar slides] 4 ways to protect your captured data from theft and compliance violations

33
Underwri(en by: Presented by: Brousseau & Assoc. The Global Community of Informa4on Professionals Webinar Title Presented DATE 4 Ways to Protect Your Captured Data from The@ and Compliance Viola4ons An AIIM Webinar delivered on January 20, 2016

Upload: aiim

Post on 16-Apr-2017

8.327 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

#AIIMTheGlobalCommunityofInforma4onProfessionals

WebinarTitle

PresentedDATE

4WaystoProtectYourCapturedDatafromThe@andComplianceViola4ons

AnAIIMWebinardeliveredonJanuary20,2016

Page 2: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Today’sSpeakers

MarkBrousseauPresidentBrousseau&Associates

Host:TheresaResekDirectorAIIM

Page 3: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

WhyWeAreHere

The2015securityandcompliancewake-upcall:§  Massivedataleaks§  LostpaJentrecords§  Espionage

Page 4: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

TheImpactofDataLeaks

§  60%oforganizaJonssaythepotenJalimpactofadataleakwouldbehigh

§  13%oforganizaJonssaythepotenJalimpactofadataleakwouldbedisastrous

Source:AIIM

Page 5: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

AverageCostofaDataLeak

$7.2MILLIONSource:PonemonInsJtute

Increasingregula-onsandstandardsareraisingthestakes.

Page 6: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

What’sAtRisk

§  CustomerinformaJon§  Intellectualproperty§  Financialrecords§  Projectdocuments

Page 7: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Organiza4onsUnderstandtheStakes

§  67%oforganizaJonsseeensuringtheprivacyofcustomerdataasessenJal.

§  65%oforganizaJonsseecompliancewithindustryandgov’tregsasessenJal.

Source:AIIM

Page 8: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

IncreasingRegulatoryPressure

14,000

Federal,stateandindustrylaws,standards

andregulaJonsgoverningthemanagementofinformaJon.

Source:CadenceGroup

Page 9: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

ExamplesofKeyDataGovernanceRegula4ons

§  HealthInsurancePortabilityandAccountabilityAct(HIPAA)§  PaymentCardIndustryDataSecurityStandard(PCI-DSS)§  FederalInformaJonSecurityandManagementAct(FISMA)§  BankSecrecyAct(BSA)§  Gramm-Leach-BlileyAct(GLBA)§  Sarbanes-Oxley(SOX)§  DefenseInformaJonSystemsAgency(DISA)

Page 10: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

HowOrganiza4onsareProtec4ngThemselves

49%oforganizaJonsbelieveunauthorizedaccessbyinternalstaffposesthebiggestthreattotheirdata.§  Permissionsandaccesscontrols§  AnJ-virus/malwaretools§  Strongpasswords§  Perimetersecurity

Page 11: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

TheAchillesHeel:DocumentImagingSystems

AtypicaldocumentimagingsystemcancreateFOUR

vulnerabiliJesthatincreasethepotenJalfordatathe@andviola4onsofinformaJonmanagementregulaJons.

Page 12: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Risk#1:PryingEyes

NoencrypJonwhiledataisinmoJonandnoprotecJonforimagesordataastheytravelthroughthecaptureworkflow.

Page 13: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Risk#1:PryingEyes

MostdocumentimagingsystemshavenotmadetheleaptofulldiskencrypJon.

Page 14: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Risk#1:PryingEyes

OperatorshavenetworkorfilesystemrightstothelocaJonwhereimagesarewri(en.

Page 15: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Risk#1:PryingEyes

Imagesarewri(entothescanner’slocalharddriveprior

towriJngthedatatoanetworkfilerepository.

Page 16: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Risk#2:LogFilesLe@Unsecured

Mostdocumentimaging

systemswritebatchlogfilestothelocalharddriveofthe

scanner’shostPC.

Page 17: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Risk#2:LogFilesLe@Unsecured

LogfilesmaycontainPersonalInformaJon(PI)orPersonalHealthInformaJon(PHI)suchascheck

MICRinformaJonorOCR/ICRresultsfrommedicalforms.

Page 18: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Risk#3:PoorVisibilityintoOperatorAc4vi4es

DifficultytrackingandaudiJngtheacJviJesofoperaJonal

staff.

Page 19: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Risk#4:PoorSecurityManagement

Mostdocumentimagingsystemsrequiremanualprocessesfornetworkadministratorstoreview

securityseings.

Page 20: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

ELIMINATETHESERISKSHOWADVANCEDDOCUMENTIMAGINGSYSTEMS

Page 21: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Safeguard#1:“Impersona4on”

Dataiswri(entoadifferentuseraccountthantheone

usedbythescanneroperator.

Page 22: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Safeguard#2:ProtectedImagesandData

StrongencrypJonalgorithmsthatdonotimpactsystem

performance.

Page 23: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Safeguard#2:ProtectedImagesandData

UseofInternetProtocolSecurity(IPSec)tunnelsto

encryptdatathatisinmoJon.

Page 24: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Safeguard#2:ProtectedImagesandData

Temporaryimagesarestoredonlyinmemorypriortobeingwri(entothenetworkstore.

Page 25: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Safeguard#3:SecureAuditLogging

Detailedauditloggingtoacustomer’ssyslogserver.

Page 26: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Safeguard#3:SecureAuditLogging

Batchlogfilesarewri(endirectlytoauser’snetwork,insteadoftoalocaldrive.

Page 27: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Safeguard#3:SecureAuditLogging

NosensiJveinformaJonisincludedinlogfiles.

Page 28: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Safeguard#4:StrongSecurityManagement

AsecuritycontrolpanelthatprovidesinsightsandeasycontrolofconfiguraJons.

Page 29: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

Summary

§  Securityandcomplianceisonthecorporateagenda§  OrganizaJonsknowtheymustworkhardertoprotectcontent§  MostscanningsystemscreateFOURvulnerabiliJes§  Advancedcapturesystemseliminatetheseissueswhile

aligningdocumentprocessingwithcorporatesecuritygoals

Page 30: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

ibml

ibmlprovidesintelligentinformaJoncapturesoluJonsthatdrivebusinessprocessimprovements.Combiningintelligentscanners,somwareandservices,ibml’scomprehensivesoluJonsautomatethemostdemandingdocumentapplicaJonsinbanking,financialservices,healthcare,governmentservices,outsourcingandmore.Everyday,ibmlcustomersin48countriesrelyonourtechnologytoaccurately,efficientlyandsecurelycaptureandprocessmillionsofdocuments.Learnmoreatwww.ibml.com

Page 31: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

SecureDocumentCaptureSolu4ons

FormoreinformaJon,emailDanLucariniat

[email protected]

Page 32: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

#AIIMTheGlobalCommunityofInforma4onProfessionals

TakeyourskillstothenextlevelbylearningbestpracJcesandtechnologiesfordigitalimagingwithAIIM’sCapture&Imagingtrainingcourse.

Visit:AIIM.org/CaptureTraining

Page 33: [Webinar Slides] 4 Ways to Protect Your Captured Data from Theft and Compliance Violations

Underwri(enby: Presentedby: Brousseau&Assoc.

AIIMistheCommunityforInforma4onProfessionals

AIIMbelievesthatinforma4onisyourmostimportantasset–learntheskillstomanageit.

Ourmissionistoimprove

organizaJonalperformancebyempoweringacommunityofleaderscommi(edtoinformaJon-driven

innovaJon.

Learnmoreatwww.aiim.org