Page 419 - Using MIS
P. 419
Information Chapter
Systems Security 10
James and Michele are videoconferencing with Sam Ide, the
manager of security for San Diego Sports, a large sports equipment vendor that
Michele wants to involve in race events. Mr. Ide’s job is to determine if PRIDE
Systems provides an acceptable level of security. Michele has gone over this
several times with San Diego Sports personnel, and they asked to speak with
someone outside of sales who has direct knowledge of PRIDE Systems’ security.
Michele asked James to participate in the videoconference with Mr. Ide.
“Sam, I have James Wu, our IS manager here, on our videoconference line.
Why don’t I let you explain your concerns and I’ll ask James to respond?”
“Sure. James, thanks for taking the time to speak with me.”
“Happy to do it, Mr. Ide.”
“Please, call me Sam. OK, we at SDS . . . that’s how we refer to ourselves . . .
we at SDS have always been concerned with security. But, given the recent
troubles at Target and Adobe, our senior management team has asked us to
be even more careful. It appears that criminals have begun to focus attacks on
interorganizational systems, and so we address security with all of our partners.”
“I understand, Sam. Although in this case, we’re not talking about any
connection between your systems and ours. As I understand it, we just want
to feature San Diego Sports in a major way in our advertising and promotion of
events.” James is careful as he gains a sense of his interests.
“Thanks, James, that’s my understanding as well. All the same, we don’t
want to become affiliated in the mind of our market with any company that does
have a major security problem, and that’s the reason for this call.”
“Got it. Do you have specific matters you’d like me to address?”