CMR Dummy Event Agenda

Agenda

Today more than ever, security of information, employees and physical assets has become a major issue for enterprises to deal with. Threats have multiplied in recent years – threats from disgruntled employees, from employees exposing their companies via social media and even industrial espionage and terrorist attacks.The role of IT in security has moved beyond the “traditional” SW and HW security areas CMR has been covering in the past. Physical security has surfaced to secure and monitor facilities – and new methods of screening and profiling employees have also emerged. Solutions such as surveillance cameras, access technologies and inexpensive storage has allowed security administrators to leverage cameras and recording solutions to protect business assets and monitor remote locations.This event series will focus on the “4 Ps” of security: People, Process, Policy and Property – and on the role new IT systems and solutions play in addressing these security concerns.

Key topics and technologies covered in CMR’s SecurityVision 2012:

Network security

The perception of IT security has evolved significantly over the years, from single-product perimeter-based security to an integrated approach of security processes necessary to plan, assess, build, and manage secure network infrastructures. Security threats have evolved beyond the perimeter-based attacks, as the workforce has become increasingly mobile and the enterprise has been extended The concept of network security has therefore evolved beyond traditional measures and can no longer be seen as a stand-alone issue but should be seen as an integral part of broader security architecture.

Datacenter Security

Many companies in the region are currently transforming and consolidating their data centers. Data center consolidation can make great sense to a company as they stand to save both money and other resources from having everything in one place. But consolidation of data also means assimilation of risk. Having everything in one place makes it easier to secure – but it also provides an obvious target for outside attacks and once security has been compromised the potential damage could huge. But there are plenty of solutions available for securing the datacenter, which keep evolving as both systems and attacks become increasingly advanced.

Cloud Security

Cloud-based solutions are faced with exactly the same security issues as private datacenters. But the concept of shared services makes these issues even more worrying in the minds of most CIOs. Indeed, CMR surveys show that concerns about security are the biggest deterrent against adopting cloud services. The major cloud providers have the means to offer secure cloud services though, and this event will showcase how.

Employees’ use of Social Media

Web 2.0 and social media are revolutionizing the way employees can interact with each other as well as with customers. But they also provide employees with means to share and express their thoughts in real time with both pictures and words. But people’s urge to share their lives and thoughts sometimes makes them share more than they should. And disgruntled employees might to even further out of malice. Having a company policy on use of social media can take care of some of these concerns – but not altogether. Companies therefore need to continuously scan social media services for any sign of misconduct and the tools and services to do this exist today.

Biometrics

Just who is actually accessing your premises and your IT systems? Traditionally, companies have mostly had to rely on passwords for user authentication. But passwords can get cracked or stolen and employees can be deceived into revealing them. Biometric approaches are inherently much more secure than traditional means – but until recently biometrics have been out of reach for most companies. This has now changed. Affordable and efficient biometric security solutions are nowvavailable and they can help secure both devices and premises.

IP Surveillance

Enterprise IP surveillance is a video surveillance architecture that manages and records large quantities of IP-based surveillance cameras using Enterprise Software Architecture while based on commercial off-the-shelf cameras, software, servers, and switches. Enterprises/organizations are looking at IP Surveillance to replace their conventional analogue closed circuit television (CCTV) security camera due to performance and cost-benefit. These are cameras that are IP-based and tapped into the LAN, footage stored on stored onto servers and shared over an IP network.

Tying it all together

Addressing these multiple security issues is a daunting proposition at best to any CIO. A true security policy involves the adoption and use of multiple systems and solutions and this is really only feasible if the different systems are integrated and automated. This is not an easy task by any means, but the tools and the know-how are available so that companies adopt all the technology necessary to fully secure their business.

Key topics of discussion at the conference:

Secure your Datacenters

Having everything in one place makes it easier to secure – but it also provides an obvious target for outside attacks and once security has been compromised the potential damage could huge. But there are plenty of solutions available for securing the data center, which keep evolving as both systems and attacks become increasingly advanced.

Securing the Cloud

The concept of shared services is a red flag to many CIOs. Indeed, the surveys show that concerns about security is the biggest deterrent against adopting cloud services. The major cloud providers have the means to offer secure cloud services though, and this presentation will show how.

Beyond the Datacenter – Securing the Endpoints and the Network that Links them

In today’s networked world, it is necessary to have an integrated approach to the security processes necessary to plan, assess, build, and manage secure network infrastructures and comprehensive security programs. Security threats have evolved beyond the perimeter-based attacks, as the workforce has become increasingly mobile and the enterprise has been extended.

Your Employees Are Sharing – More Than They Should!

Just who is actually accessing your premises and your IT systems? Traditionally, companies have mostly had to rely on passwords for user authentication. But passwords can get cracked or stolen and employees can be deceived into revealing them. Biometric approaches are inherently much more secure than traditional means – but until recently biometrics have been out of reach for most companies. This has now changed. Affordable and efficient biometric security solutions are now available and they can help secure both devices and premises.

Who should attend?

A must attend for a Large Enterprise CIOs, CISO, VP/GM, AVP/AGM and Director and Head of IT and other technology decision makers and influencers such as CEOs, CFOs etc. across all industry verticals who strive for securing their business.

Leave a Reply

Your email address will not be published. Required fields are marked *