The Cybersecurity Tech Accord delineated its powerful case for women and their diverse perspectives holding cybersecurity positions and the critical necessity for women to join the field in the MyCybHerStory campaign. Queue Associates Worldwide UK, Ltd. is a signatory of the accord.
A new blog post from Brad Smith, Microsoft President & Vice Chair, makes everyone aware of Microsoft’s leadership “role in coordinating with the Ukrainian government, as well as with the European Union, European nations, the U.S. government, NATO and the United Nations, in supporting cybersecurity and fighting misinformation related to the war in Ukraine.”
OneTrust and The Data Privacy Group Deliver Returns on Queue Associates’ Privacy Investment – OneTrust Case Study
An important data privacy initiative for Queue Associates Worldwide UK, Ltd., implemented by The Data Privacy Group (DPG), was documented by OneTrust, the “#1 Most Widely Used Platform to Operationalise Privacy, Security & Data Governance,” in a new case study just published on their website. DPG is Queue’s authorised GDPR Data Privacy Officer.
Microsoft is helping the many UK and European organisations, in the financial services and in other industry spaces, to create better efforts to realise sustainability strategies and milestones and achieve Net-Zero.
From Cybertechaccord.com: “Twenty years ago today, the Council of Europe Convention on Cybercrime, commonly known as the ‘Budapest Convention,’ became the first-ever international treaty on cybercrime. In the years since, it has been the leading international instrument supporting cooperation between nations working to combat cybercrime.
The Cybersecurity Tech Accord and its signatories want to express our support and appreciation for the Convention and its objectives and join governments, industry, and civil society organisations worldwide in celebrating the Convention’s anniversary by reflecting on the key role it plays in helping protect our society against cybercrime.”
Queue Associates Worldwide UK, Ltd. has been closely following and implementing solutions surrounding cybersecurity, in partnership, globally, with Microsoft. Queue is a Microsoft Gold Certified Partner, in numerous competencies including security — and a Microsoft Dynamics 365 Gold Partner — and ISO Certified for the execution and management of security policy. Queue is also a member of and signatory for the Tech Accord–please click on the link below:
This critical information about the Convention — “a truly global instrument over the past 20 years, ratified by 66 governments from across different regions and used by many more as a guideline for domestic cybercrime legislation” — and the Tech Accord and their efforts is highly valuable to Queue’s team for our client and partner initiatives.
Contact Queue Associates UK, Ltd.
Please contact Queue Associates, UK, Ltd. (a Microsoft Dynamics Gold Partner) to learn more about our services and research related to data and cyber security, as well as other solutions. You can reach us by completing the FORM ON OUR CONTACT PAGE (please include “Cybersecurity Tech Accord” in the comments), or by calling us at +44 020 7549 1606.
The Value of Investing in Privacy Compliance – Jeffrey Goldstein, Queue Associates: Voices for Innovation
Jeffrey Goldstein, Managing Director of Queue Associates UK, Ltd., contributed a blog post to the US organization, Voices for Innovation (VFI) about initiatives that he has undertaken regarding data privacy for the all of the websites for his companies in different geographies.
In the post, Mr. Goldstein stated that “Microsoft partners — and every tech business — should provide strong privacy protections for their customers.” He continued, indicating that, “companies and customers alike would benefit from a single, unified federal data privacy law. But in the absence of that law [in the United States], we’ll benefit if state laws are closely compatible with each other and with the European Union’s General Data Protection Regulation (GDPR).”
Revelations from Audits of Queue’s Websites
Mr. Goldstein described the project in which Queue Associates invested to ensure data privacy on the three websites for his different international companies. The companies are based in the United Kingdom — the website for which was to be made to adhere strictly to GDPR — in the United States, and Greater China. In this effort, for all of the sites for his different companies, he explained that it “made sense for us to seek outside help, so we contracted with a company called, The Data Privacy Group, Ltd. (DPG). When we first hired DPG, they conducted an audit of our websites and other technology. We were shocked to learn the extent to which we were out of compliance—even though we had not neglected privacy or security.”
Next Steps Towards Compliance
In the complete VFI post, Mr. Goldstein elaborated on the findings of the Data Privacy Group, and the extensive work undertaken by DPG and Queue Associates to follow laws and guidelines for web and data privacy in multiple countries. This effort is also bolstered by Queue’s recent achievement of ISO 27001 certifications. The companies, in each continent, sought to meet international standards on information security through these ISO certifications for their Microsoft Dynamics and other Microsoft-related initiatives for clients in these three geographies.
Read the Complete Post on the Voices for Innovation (VFI) Website
Contact Queue Associates UK, Ltd.
Please contact Queue Associates, UK, Ltd. (a Microsoft Dynamics Gold Partner) to learn more about our privacy initiatives for our clients and our company, and how we can serve your needs. You can reach us by completing the FORM ON OUR CONTACT PAGE (please include “Data Privacy” in the comments), or by calling us at +44 020 7549 1606.
Microsoft President Brad Smith: “A moment of reckoning: the need for a strong and global cybersecurity response”
Douglas Levin, Ph.D., APR, of the United States’ Voices for Innovation (VFI) Task Force — Jeff Goldstein, Managing Director of Queue Associates, Inc., is longtime member of the VFI Task Force — circulated an email today with the complete text of a very important, time sensitive, 17 December, blog post from Brad Smith, Microsoft President and Chief Legal Officer. In the post, Smith advocated for a strong and global cybersecurity response to, “the recent exposure of the world’s latest serious nation-state cyberattack”. He outlined Microsoft’s observations on the attacks and called for a more effective strategy and strong global response.
An Editor’s note was published (below the post) that outlined the impact on Microsoft of the issue surrounding SolarWinds.
The complete text of the post is reprinted below. (It is also available on Microsoft’s website.)
A moment of reckoning: the need for a strong and global cybersecurity response
Dec 17, 2020 | Brad Smith – President, Microsoft
The final weeks of a challenging year have proven even more difficult with the recent exposure of the world’s latest serious nation-state cyberattack. This latest cyber-assault is effectively an attack on the United States and its government and other critical institutions, including security firms. It illuminates the ways the cybersecurity landscape continues to evolve and become even more dangerous. As much as anything, this attack provides a moment of reckoning. It requires that we look with clear eyes at the growing threats we face and commit to more effective and collaborative leadership by the government and the tech sector in the United States to spearhead a strong and coordinated global cybersecurity response.
The evolving threats
The past 12 months have produced a watershed year with evolving cybersecurity threats on three eye-opening fronts.
The first is the continuing rise in the determination and sophistication of nation-state attacks. In the past week this has again burst into the headlines with the story of an attack on the firm FireEye using malware inserted into network management software provided to customers by the tech company SolarWinds. This has already led to subsequent news reports of penetration into multiple parts of the U.S. Government. We should all be prepared for stories about additional victims in the public sector and other enterprises and organizations. As FireEye CEO Kevin Mandia stated after disclosing the recent attack, “We are witnessing an attack by a nation with top-tier offensive capabilities.”
As Microsoft cybersecurity experts assist in the response, we have reached the same conclusion. The attack unfortunately represents a broad and successful espionage-based assault on both the confidential information of the U.S. Government and the tech tools used by firms to protect them. The attack is ongoing and is being actively investigated and addressed by cybersecurity teams in the public and private sectors, including Microsoft. As our teams act as first responders to these attacks, these ongoing investigations reveal an attack that is remarkable for its scope, sophistication and impact.
There are broader ramifications as well, which are even more disconcerting. First, while governments have spied on each other for centuries, the recent attackers used a technique that has put at risk the technology supply chain for the broader economy. As SolarWinds has reported, the attackers installed their malware into an upgrade of the company’s Orion product that may have been installed by more than 17,000 customers.
The nature of the initial phase of the attack and the breadth of supply chain vulnerability is illustrated clearly in the map below, which is based on telemetry from Microsoft’s Defender Anti-Virus software. This identifies customers who use Defender and who installed versions of SolarWinds’ Orion software containing the attackers’ malware. As this makes clear, this aspect of the attack created a supply chain vulnerability of nearly global importance, reaching many major national capitals outside Russia. This also illustrates the heightened level of vulnerability in the United States.
The installation of this malware created an opportunity for the attackers to follow up and pick and choose from among these customers the organizations they wanted to further attack, which it appears they did in a narrower and more focused fashion. While investigations (and the attacks themselves) continue, Microsoft has identified and has been working this week to notify more than 40 customers that the attackers targeted more precisely and compromised through additional and sophisticated measures.
While roughly 80% of these customers are located in the United States, this work so far has also identified victims in seven additional countries. This includes Canada and Mexico in North America; Belgium, Spain and the United Kingdom in Europe; and Israel and the UAE in the Middle East. It’s certain that the number and location of victims will keep growing.
Additional analysis sheds added light on the breadth of these attacks. The initial list of victims includes not only government agencies, but security and other technology firms as well as non-governmental organizations, as shown in the chart below.
It’s critical that we step back and assess the significance of these attacks in their full context. This is not “espionage as usual,” even in the digital age. Instead, it represents an act of recklessness that created a serious technological vulnerability for the United States and the world. In effect, this is not just an attack on specific targets, but on the trust and reliability of the world’s critical infrastructure in order to advance one nation’s intelligence agency. While the most recent attack appears to reflect a particular focus on the United States and many other democracies, it also provides a powerful reminder that people in virtually every country are at risk and need protection irrespective of the governments they live under.
As we have now seen repeatedly, Silicon Valley is not the only home of ingenious software developers. Russian engineers in 2016 identified weaknesses in password protection and social media platforms, hacked their way into American political campaigns, and used disinformation to sow divisions among the electorate. They repeated the exercise in the 2017 French presidential campaign. As tracked by Microsoft’s Threat Intelligence Center and Digital Crimes Unit, these techniques have impacted victims in more than 70 countries, including most of the world’s democracies. The most recent attack reflects an unfortunate but similarly ingenious capability to identify weaknesses in cybersecurity protection and exploit them.
These types of sophisticated nation-state attacks are increasingly being compounded by another technology trend, which is the opportunity to augment human capabilities with artificial intelligence (AI). One of the more chilling developments this year has been what appears to be new steps to use AI to weaponize large stolen datasets about individuals and spread targeted disinformation using text messages and encrypted messaging apps. We should all assume that, like the sophisticated attacks from Russia, this too will become a permanent part of the threat landscape.
Thankfully, there is a limited number of governments that can invest in the talent needed to attack with this level of sophistication. In our first Microsoft Digital Defense Report, released in September, we reviewed our assessment of 14 nation-state groups involved in cybersecurity attacks. Eleven of the 14 are in only three countries.
All this is changing because of a second evolving threat, namely the growing privatization of cybersecurity attacks through a new generation of private companies, akin to 21st-century mercenaries. This phenomenon has reached the point where it has acquired its own acronym – PSOAs, for private sector offensive actors. Unfortunately, this is not an acronym that will make the world a better place.
One illustrative company in this new sector is the NSO Group, based in Israel and now involved in U.S. litigation. NSO created and sold to governments an app called Pegasus, which could be installed on a device simply by calling the device via WhatsApp; the device’s owner did not even have to answer. According to WhatsApp, NSO used Pegasus to access more than 1,400 mobile devices, including those belonging to journalists and human rights activists.
NSO represents the increasing confluence between sophisticated private-sector technology and nation-state attackers. Citizen Lab, a research laboratory at the University of Toronto, has identified more than 100 abuse cases regarding NSO alone. But it is hardly alone. Other companies are increasingly rumored to be joining in what has become a new $12 billion global technology market.
This represents a growing option for nation-states to either build or buy the tools needed for sophisticated cyberattacks. And if there has been one constant in the world of software over the past five decades, it is that money is always more plentiful than talent. An industry segment that aids offensive cyberattacks spells bad news on two fronts. First, it adds even more capability to the leading nation-state attackers, and second, it generates cyberattack proliferation to other governments that have the money but not the people to create their own weapons. In short, it adds another significant element to the cybersecurity threat landscape.
There is a third and final sobering development worth noting from what has obviously been a challenging year. This comes from the intersection between cyberattacks and COVID-19 itself.
One might have hoped that a pandemic that cut short millions of lives might at least have received a pass from the world’s cyberattacks. But that was not the case. After a brief lull in March, cyberattackers took aim at hospitals and public health authorities, from local governments to the World Health Organization (WHO). As humanity raced to develop vaccines, Microsoft security teams detected three nation-state actors targeting seven prominent companies directly involved in researching vaccines and treatments for Covid-19. A crisis always seems to bring out the best and worst in people, so perhaps we should not be surprised that this global crisis was no exception.
Put together, however, these three trends point to a cybersecurity landscape that is even more daunting than when the year began. The most determined nation-state attackers are becoming more sophisticated. Risks are both growing and spreading to other governments through new private sector companies that aid and abet nation state attackers. And nothing, not even a pandemic, is off limits to these attackers.
We live in a more dangerous world, and it requires a stronger and more coordinated response.
A more effective strategy as we enter a new year
Put simply, we need a more effective national and global strategy to protect against cyberattacks. It will need multiple parts, but perhaps most important, it must start with the recognition that governments and the tech sector will need to act together.
The new year creates an opportunity to turn a page on recent American unilateralism and focus on the collective action that is indispensable to cybersecurity protection. The United States did not win World War II, the Cold War or even its own independence by fighting alone. In a world where authoritarian countries are launching cyberattacks against the world’s democracies, it is more important than ever for democratic governments to work together – sharing information and best practices, and coordinating not just on cybersecurity protection but on defensive measures and responses.
Unlike attacks from the past, cybersecurity threats also require a unique level of collaboration between the public and private sectors. Today’s technology infrastructure, from data centers to fiberoptic cables, is most often owned and operated by private companies. These represent not only much of the infrastructure that needs to be secured but the surface area where new cyberattacks typically are first spotted. For this reason, effective cyber-defense requires not just a coalition of the world’s democracies, but a coalition with leading tech companies.
To be successful, this coalition will need to do three things more effectively in the future:
First, we need to take a major step forward in the sharing and analysis of threat intelligence. In a new year that will mark the 20th anniversary of 9/11, we should remember one of the lessons from the tragic day that the 9/11 Commission called “a shock but not a surprise.” A recurring theme of the commission’s findings was the inability across government agencies to build collective knowledge by connecting data points together. The commission therefore focused its first recommendation on “unifying strategic intelligence” and moving from the “need to know” to the “need to share.”
If there is an initial question for the incoming Biden-Harris Administration and America’s allies, it is this: Is the sharing of cybersecurity threat intelligence today better or worse than it was for terrorist threats before 9/11?
In the wake of this most recent attack, perhaps no company has done more work than Microsoft to support agencies across the federal government. As much as we appreciate the commitment and professionalism of so many dedicated public servants, it is apparent to us that the current state of information-sharing across the government is far from where it needs to be. It too often seems that federal agencies currently fail to act in a coordinated way or in accordance with a clearly defined national cybersecurity strategy. While parts of the federal government have been quick to seek input, information sharing with first responders in a position to act has been limited. During a cyber incident of national significance, we need to do more to prioritize the information-sharing and collaboration needed for swift and effective action. In many respects, we risk as a nation losing sight of some of the most important lessons identified by the 9/11 Commission.
One indicator of the current situation is reflected in the federal government’s insistence on restricting through its contracts our ability to let even one part of the federal government know what other part has been attacked. Instead of encouraging a “need to share,” this turns information sharing into a breach of contract. It literally has turned the 9/11 Commission’s recommendations upside down.
It will be critical for the incoming Biden-Harris Administration to move quickly and decisively to address this situation. One ready-made opportunity is to establish a national cybersecurity director as recommended by the Solarium Commission and provided for in the National Defense Authorization Act.
Effective progress will also require a second realization that goes beyond anything the 9/11 Commission needed to confront. Cybersecurity threat intelligence exists in even more disconnected silos than more traditional information about national security threats. This is because it is spread not only among different agencies and governments but across multiple private sector companies as well. Even within a large company like Microsoft, we have learned that it is critical for our Threat Intelligence Center to aggregate and analyze data from across our data centers and services. And when there is a major threat, we need to share information and collective assessments with other tech companies.
Recent years have brought several important steps to better share cybersecurity information, and we greatly appreciate the dedication and support of many key people across the U.S. government. But we still lack a formal and cohesive national strategy for the sharing of cybersecurity threat intelligence between the public and private sectors. While there need to be important safeguards to protect government secrets and private citizens’ privacy, the time has come for a more systemic and innovative approach to the sharing and analysis of threat intelligence with those best positioned to act.
Second, we need to strengthen international rules to put reckless nation-state behavior out of bounds and ensure that domestic laws thwart the rise of the cyberattack ecosystem. While the world has important international norms and laws to address nation-state attacks, we continue to believe it is important to fill in gaps and continue to develop clear and binding legal obligations for cyberspace.
This should build on the lessons of 2020 and prioritize key and specific areas. For example, it should include the continued development of rules to expressly forbid the type of broad and reckless activity used against SolarWinds and its customers, which tampered with legitimate software and threatened the stability of a broader software supply chain. The international community has been moving in this direction, building on a 2015 report by a United Nations Group of Governmental Experts that received broad UN endorsement last year, as well as multi-stakeholder support by the Global Commission on the Stability of Cyberspace (GCSC). The U.S. government and its allies need to make crystal clear their views that this type of supply chain attack falls outside the bounds of international law.
We need similar strong and effective endorsements of rules that put attacks on health care institutions and vaccine providers off limits. (The recently convened Oxford Process has done important work to highlight the protections existing international law affords in this context.) And international rules should include stronger protections of democratic and electoral processes, as reflected in the principles of the Paris Call for Trust and Security in Cyberspace, which now has more than 1,000 signatories – the largest multi-stakeholder group ever assembled in support of an international cybersecurity-focused agreement.
In addition, governments should take new and concerted steps to thwart the rise of private sector offensive actors. As described above, these companies in effect have created a new ecosystem to support offensive nation-state attacks. The sooner governments take action to put this ecosystem out of business, the better.
An early opportunity for the Biden-Harris Administration will come in an appellate judicial case involving the NSO Group itself. NSO has appealed a lower court finding that it is not immune from claims that it violated the U.S. Computer Fraud and Abuse Act by accessing mobile devices without permission. Its argument is that it is immune from U.S. law because it is acting on behalf of a foreign government customer and hence shares that government’s legal immunity. NSO’s proposed recipe would make a bad problem even worse, which is why Microsoft is joining with other companies in opposing this interpretation. The Biden/Harris Administration should weigh in with a similar view.
NSO’s legal approach, while disconcerting, does the world a service by highlighting the path needed to thwart this new cyberattack ecosystem. It’s to ensure that domestic laws clearly and strongly prohibit companies from helping governments engage in unlawful and offensive cyberattacks and investors from knowingly financing them.
Consider the analogy to other forms of societally harmful activity, like human trafficking, narcotics or terrorism itself. Governments not only take strong steps to prohibit the illegal activity itself – such as engaging in drug trafficking – but also ensure that airlines don’t transport the drugs and investors don’t finance the activity.
A similar approach is needed to deter private sector offensive actors. We need steps to ensure, for example, that American and other investors don’t knowingly fuel the growth of this type of illegal activity. And the United States should proactively pursue discussions with other countries that are giving rise to these companies, including Israel, which has a strong cybersecurity ecosystem that can be drawn into dangerous support of authoritarian regimes.
Finally, we need stronger steps to hold nation-states accountable for cyberattacks. Governments and private companies have taken stronger steps in recent years to hold nation-states publicly accountable for cyberattacks. We need to build on this course and continue to press forward with it, with governments ensuring that there are greater real-world consequences for these attacks to promote stability and discourage conflict.
The world’s democracies took important steps in 2017 and 2018, led by the United States. With public statements about WannaCry and NotPetya, multiple governments attributed these attacks publicly to the North Korean and Russian governments, respectively. These types of coordinated public attributions have become an important tool to respond to nation-state attacks. The United States followed with stronger deterrent steps to protect the 2018 mid-term elections, and an even more concerted effort to successfully deter foreign tampering with voting in the 2020 Presidential elections.
In the private sector, circumstances have also changed dramatically since the early days in 2016 when we at Microsoft took legal action to thwart Russian cyberattacks on American political campaigns but were reluctant to speak publicly about it. In the years since, companies such as Microsoft, Google, Facebook and Twitter have all acted and spoken directly and publicly when responding to nation-state cyberattacks. Moreover, a coalition of more than 145 global technology companies have signed on to the Cybersecurity Tech Accord – committing themselves to upholding four principles of responsible behavior to promote peace and security online, including opposing cyberattacks against innocent civilians and enterprises.
The coming months will present a critical test, not only for the United States but for other leading democracies and technology companies. The weeks ahead will provide mounting and we believe indisputable evidence about the source of these recent attacks. It will become even clearer that they reflect not just the latest technology applied to traditional espionage, but a reckless and broad endangerment of the digital supply chain and our most important economic, civic and political institutions. It is the type of international assault that requires the type of collective response that shows that serious violations have consequences.
If there is a common lesson from the past few years, it’s the importance of combining ongoing learning with new innovations, greater collaboration, and constant courage. For four centuries, the people of the world have relied on governments to protect them from foreign threats. But digital technology has created a world where governments cannot take effective action alone. The defense of democracy requires that governments and technology companies work together in new and important ways – to share information, strengthen defenses and respond to attacks. As we put 2020 behind us, the new year provides a new opportunity to move forward on all these fronts.
Editor’s note: 12/17/2020, 7:50pm PT
Following news reports about the impact on Microsoft of the SolarWinds issue, the company issued the following statement:
“Like other SolarWinds customers, we have been actively looking for indicators of this actor and can confirm that we detected malicious SolarWinds binaries in our environment, which we isolated and removed. We have not found evidence of access to production services or customer data. Our investigations, which are ongoing, have found absolutely no indications that our systems were used to attack others.”
Tags: COVID-19, cyberattacks, cybersecurity, Defending Democracy Program, ElectionGuard
Contact Queue Associates UK, Ltd.
Please contact Queue Associates, UK, Ltd. (a Microsoft Dynamics Gold Partner). You can reach us by completing the FORM ON OUR CONTACT PAGE, or by calling us at +44 020 7549 1606.
Queue Associates (a Microsoft Dynamics Gold Partner) is re-publishing, in entirety, our Managing Director, Jeffrey Goldstein‘s, first letter from the International Association of Microsoft Channel Partners (IAMCP US), following his election last month to the role of U.S. Board President. The letter follows.
Hello IAMCP-US Community –
I am honored beyond words to have been elected to serve as your President of the International Association of Microsoft Channel Partners, United States (IAMCP US), and I’m filled with enthusiasm following our February Board of Directors meetings in Washington, DC.
Our code of ethics is a subject that is very important to me. It is as follows: “Members of the IAMCP Partner Community are dedicated to the highest standards of professionalism, integrity and competence. These principles apply to all activities wherever they occur. They address responsibilities to the public, which the professional serves, to the clients and users of the computer technology industry who help to shape and build the industry environment and to professional colleagues within the industry.”
In keeping with these standards of professionalism and the presence of such a strong community, I would like to let everyone know how supportive all of the leaders and members of the IAMCP have been during the Board of Directors transition. In particular, this includes the still-active President Emeritus, Randy Steinle, and Ro Kolakowski, Jon Sastre and Rudy Rodriguez. David Gersten, IAMCP US Vice President, and Debra Pfundstein, Secretary, have been awesome and endlessly helpful to our efforts! Tom Major will continue to lead the Finance Committee, and has done such a terrific job with our US operations that he has been asked to help the International Finance committee.
I am extremely excited about our senior level regional leaders:
- West: Ro Kolakowski, who will be heading up the Western Region
- Central: Ken Meyer, who will be managing the Central Region
- East: Keith Keeler, who will be taking over the Eastern Region
I’m also thrilled to announce the following leaders:
- US Vice President: David Gersten will manage the Regional Chairs. David’s focus will be on P3 which is Partnering, Process and Participation and establishing 51 Chapters in the US!
- US Secretary: Debra Pfundstein, who is the first-ever woman elected to the IAMCP US Executive Board, will serve as both the US Secretary and the International Inspire Chairperson. Debra did a fantastic job last year delivering the Inspire event for the IAMCP in 2017 and will continue in her role for 2018.
- Membership: Sharan Hildebrand will continue to lead the Membership committee and has a very aggressive calendar year-end goal of 1,000 paid members. Sharan will require everyone’s support to attain this attainable, but aggressive, objective.
- Sponsorship: Erik Frantzen, our very own Sponsorship Chair, has done a spectacular job with his professionalism and drive for sponsorship on behalf of IAMCP US. We will challenge him this year with a goal of delivering $200,000 in funding over the calendar year.
- Marketing & Communications: Jon Rivers, our Marketing and Communications guru, will continue to lead the Marcom committee. Jon has a very aggressive goal of 4,000 IAMCP US followers! Please follow us @iamcpus and share our story!
- Women in Technology: Beth Burrell is leading our Special Interest Group (SIG) Community, Women in Technology. Beth has a very aggressive goal of growing 38 active WIT chapters in the US and will work closely with Christine Bongard, the International WIT Chairperson. Supporting Beth in her efforts are:
- Advocacy: Our Advocacy Committee will continue to be led by Ryan Risley. Ryan has a goal of 38 active Advocacy ambassadors, one in each of our 38 US chapters. Ryan is truly a role model for Advocacy Ambassadors across the US.
- MIST (Microsoft IAMCP Strategy Team): Lastly, but perhaps the most important committee, is MIST, which is led by Randy Steinle. Randy will lead our Microsoft Liaison Team to foster the positive working relationship with the Microsoft Team.
Two other initiatives that we are researching include the IAMCP University and the development of a Project Management Organization (PMO). Stay tuned for additional details on these special projects and potential committees.
In conclusion, I am extremely excited to be working with Jon Sastre, our International IAMCP President and former US President. Jon is a great leader and I am confident he will make the International Worldwide IAMCP the best Microsoft Partner Organization on the planet!
On Friday, February 23, 2018, the IAMCP-US announced “a new slate of leaders for 2018.”According to a press release from the IAMCP Marketing Communications team, “The new IAMCP-US board of directors has a combined 90+ years of Microsoft experience spanning Dynamics, Office 365 and Azure.”
Among these newly-appointed leaders, is Queue Associates‘ Managing Director, Jeffrey Goldstein, who has been named IAMCP US President. Jeff stated, as indicated in a pull quote from the release, ” ‘…There is a significant opportunity for partners in the Microsoft partner ecosystem. I look forward to helping IAMCP members understand the opportunities and to working together in partner-to-partner efforts.’ – Jeffrey Goldstein, incoming president.”
CONTACT QUEUE ASSOCIATES
To learn more about Queue Associates, a Microsoft Gold Dynamics Partner, and the company’s offerings, or about Jeffrey Goldstein, Queue’s Managing Director and IAMCP US President, please complete the form on our CONTACT page, or call +44 020 7549 1606.
SEATTLE (PRWEB) February 23, 2018 — The International Association of Microsoft Channel Partners US Team, the IAMCP-US, is announcing an update to the board with the installation of a new slate of leaders for 2018 with a new president, vice president, and secretary. As the organization continues to transform to meet the needs of the members and to adapt to the Microsoft Partner community, several leaders are taking on new roles. We congratulate them and thank them for their service and commitment to the partner community.
The duties and responsibilities for these roles on the board will continue to serve IAMCP members and Microsoft partners in the United States.
Congratulations to Jeffrey Goldstein and David Gersten. They have been appointed to the roles of president and vice president, respectively. Additionally, congratulations to Tom Major and Debra Pfundstein. They have been appointed to the roles of treasurer and secretary, respectively. We also recognize and thank outgoing president Randy Steinle for his commitment to the partner community.
Mr. Goldstein is the managing director at Queue Associates, Inc., a privately held Microsoft Gold Certified Partner specializing in Microsoft Dynamics. Goldstein has been a longtime supporter of the IAMCP and has served in several roles on the US and International IAMCP board of directors.
As part of his role, Mr. Goldstein will be leading the 38 chapters across the United States to help ensure Microsoft partners get the information they need to connect, learn and grow their businesses.
“As the incoming president, I am looking forward to continuing the great momentum the board has begun. I look forward to taking on this responsibility and to meeting IAMCP members and growing the member base,” said Goldstein. “With the changes Microsoft has made in the One Commercial Partner (OCP) organization, there is a significant opportunity for partners in the Microsoft partner ecosystem. I look forward to helping IAMCP members understand the opportunities and to working together in partner-to-partner efforts. I encourage current and potential Microsoft partners to join us and become part of the global IAMCP community.”
“As the outgoing president, I want to congratulate the incoming president, Jeffrey Goldstein, and wish him well in carrying on this incredibly rewarding role,” said Randy Steinle. “I was honored and privileged to meet with and help numerous partners and Microsoft contacts in my tenure. The future is bright for Microsoft partners and the IAMCP.”
David Gersten will be taking on the role of vice president. In this role he will take on some of the duties and responsibilities of the president during absences. He will also take on the responsibility of ensuring the rest of the board and the 38 chapters have the support they need to operate efficiently while serving the IAMCP members.
Tom Major will be continuing in the role of treasurer, a role he has held for several years. The IAMCP thanks Mr. Major for his time and commitment to ensure continuity with the operational and financial elements of the organization.
Debra Pfundstein will be taking on the role of secretary. We look forward to her energy, commitment to partners, and ability to take charge and get things done.
Welcome to the new slate of leaders.
If you are a Microsoft partner, or thinking of becoming one, we want to talk with you. Our goal at the IAMCP is to help partners to maximize their engagement with Microsoft and with other partners. We encourage you to attend a local chapter meeting in your area. You can find more about chapter meetings on the IAMCP-US.org Calendar.
From experience we know that a strong local IAMCP chapter leads to a lot of partner and customer success. We look forward to helping a lot of new and existing Microsoft partners in 2018 and we encourage them to join the IAMCP so that we can Connect, Learn, and Grow their businesses.
About the IAMCP
The International Association of Microsoft Channel Partners (IAMCP) represents Microsoft’s best of breed partners from around the globe. Our organization was formed in 1994 and provides Microsoft Partners a voice into Microsoft programs, to the IT community at large, as well as a vehicle to facilitate mutual growth and business development among partners. The non-profit organization is operated by an annually elected board of directors and is funded through membership fees and sponsor grants. For more details.
The IAMCP – United States has over 38 chapters throughout the continental United States. Through membership meetings, social networking events and local websites, IAMCP – United States chapters link members with each other and with industry news from Microsoft. When you join an IAMCP – US chapter, you’re on your way to accessing networking capabilities and skill sets normally limited to only big-name consultancies. For information about joining the IAMCP, see the Join Us page – https://iamcp.site-ym.com/general/register_member_type.asp?
Follow the IAMCP on Facebook, LinkedIn and Twitter:
For questions, contact the IAMCP Marketing Communications Team – us.marcom(at)iamcp(dot)org
On May 21, Muhammad Alam, General Manager, Dynamics 365 for Finance & Operations at Microsoft, published an article entitled, “Happy 2nd Anniversary to Dynamics 365 for Finance and Operations.” In Alam’s post, he indicated that, on the same day, “James Philip, CVP of Business Applications, shared details of our Spring 2018 release, including version 8.0 of Microsoft Dynamics 365 for Finance and Operations.” He continued: “With the Spring release, we have reached the two-year mark of the Finance and Operations initial availability to the market. As I thought about the work that has gone into this release, I wanted to take a moment to thank our customers and highlight what we have accomplished in these first two years.”
According to Alam: “With the introduction of Finance and Operations, we delivered a new, modern service that shifts from being just a system of record to a system of intelligence. We help customers share information within their organization and across their supply chain by delivering real-time intelligence and actionable, predictive insights to keep business’ competitive using embedded Power BI analytics, Cortana intelligence, and advanced IoT and machine learning technologies.”
He then cited the following highlights of the solutions over the past two years:
- Over 50 role-based insightful, customizable workspaces.
- Built 1,200 pre-defined business process flows.
- Offer over 20 Power BI content packs.
- Created task-based guided experience.
- Flexible and agile financial reporting.
- Flexible deployment options–Cloud, on-premises, and cloud + edge.
- Delivered localizations and regulatory updates across 34 countries and 41 languages.
- Move from over-layering to extensions.
- Increased our financially-backed Service Level Agreement (SLA) to 99.9%.
- Commitment to achieving and maintaining the industry certifications that our customers need to support their business needs.
- Launched, then expanded our FastTrack service for Finance and Operations.
- Rapidly growing Finance and Operations partner solutions.
- Enabled seamless, connected and configurable business processes.
- We are committed to Finance and Operations being ready for the May 25, 2018 enactment of the General Data Protection Regulations (GDPR).
“And,” according to Alam, “the momentum continues… we believe we are just getting started.” He wrote, “Our North Star is to drive continuous innovation that helps our customers achieve true digital transformation.”
Contact Queue Associates for More Information
Please contact Queue Associates (a Microsoft Dynamics Gold Partner) to learn more about our services surrounding Microsoft Dynamics 365 For Finance and Operations, and other complimentary Microsoft solutions (including upgrades to new Microsoft Dynamics services). You can reach us by completing the form on our CONTACT page, or by calling +44 020 7549 1606.