Page 419 - Using MIS
P. 419

Information                                     Chapter



                             Systems Security                                                10






            James and Michele are videoconferencing with Sam Ide, the
            manager of security for San Diego Sports, a large sports equipment vendor that
            Michele wants to involve in race events. Mr. Ide’s job is to determine if PRIDE
            Systems provides an acceptable level of security. Michele has gone over this
            several times with San Diego Sports personnel, and they asked to speak with
            someone outside of sales who has direct knowledge of PRIDE Systems’ security.
            Michele asked James to participate in the videoconference with Mr. Ide.
               “Sam, I have James Wu, our IS manager here, on our videoconference line.
            Why don’t I let you explain your concerns and I’ll ask James to respond?”
               “Sure. James, thanks for taking the time to speak with me.”
               “Happy to do it, Mr. Ide.”
               “Please, call me Sam. OK, we at SDS . . . that’s how we refer to ourselves . . .
            we at SDS have always been concerned with security. But, given the recent
            troubles at Target and Adobe, our senior management team has asked us to
            be even more careful. It appears that criminals have begun to focus attacks on
            interorganizational systems, and so we address security with all of our partners.”
               “I understand, Sam. Although in this case, we’re not talking about any
            connection between your systems and ours. As I understand it, we just want
            to feature San Diego Sports in a major way in our advertising and promotion of
            events.” James is careful as he gains a sense of his interests.
               “Thanks, James, that’s my understanding as well. All the same, we don’t
            want to become affiliated in the mind of our market with any company that does
            have a major security problem, and that’s the reason for this call.”
               “Got it. Do you have specific matters you’d like me to address?”
   414   415   416   417   418   419   420   421   422   423   424