In part four of the Glisser Power User series, we'll be discussing SECURITY. Protecting the information of yourself and your team, your event, and/or your stakeholders should always be at the top of your planning checklist.
Mark Simeon, October 22, 2020
What is Security?
When we say 'Security,' we are referring to one of three things:
✅ Security of access
✅ Security of content
✅ Security of delegate data
1. Security of Access
In a physical event you can have registration, security guards, badges, scanners, door staff, etc. to decide who comes in.
In a virtual or hybrid environment you have to deliver that technically. For example, you can use whitelisting to approve or reject users, or pin codes to further restrict access. The use of API keys and authentication tokens gives you pretty solid control over who sees what, but, as ever, the biggest security risk is usually people (sharing passwords for example, much like sharing badges at your physical event).
Example uses of securing access:
Ultimately it's always a balance between creating friction 'onboarding' and the security you need. From the Glisser perspective, our goal is to offer a broad range of options that can be switched on or off to meet those different event needs.
2. Security of Content
In addition to the security controls determining who gets into an event or session, you should also look to add a layer of security to your content and intellectual property.
In a physical event we've mostly accepted that people have cameras in their phones and have the ability to capture presentation content. With virtual, we have to go the extra step and discourage screen-grabbing. Our watermark feature delivers this, overlaying delegate details on the on screen and downloaded slide images, allowing better tracing of any leaked content.
Toggle on 'Watermark Slides' to better secure your presentation content.
3. Security of Delegate Data
Critical across the event tech stack, in physical, virtual and hybrid events is the security of personal data. ISO27001 is the certification to check for here. As of last week, Glisser has passed this certification for a third straight year.
ISO27001 means that the data is not justtechnicallysecure, but the whole culture and work processes of a technology provider align with this approach. Some of the requirements include that no unprotected files containing data are flying around, no USB sticks with presentations left on desks, and a relatively simple compliance approval process for your use of the technology.
The image below courtesy of BSI, part of the UK National Standards body.
In the back end of Glisser, an event's "Topics" function very similarly to Rooms. When you add a topic, it creates a new tab to add slots into, just like a room would. When editing a Topic's slot, you would add functions that are very similar to how a normal room's sessions would work. So what are the differences?
Your event is over... now what? Your Zoom Meetings are closed. Your event sessions have been ended. People have already turned off their computers. But no matter what, your attendees will always want to refer back to your content days, sometimes weeks after your event ends.