Most executives today understand just how damaging IT security breaches can be: data and money can be stolen, trust and brand reputation trashed, key services disrupted. And they know that, in this hostile world, the threats are increasing. To deal with this, most organisations now invest heavily in security tools and processes.
But is it enough? Many businesses worry that, even if they win almost all the battles, they might lose the war. The number and range of threats is now so great, and the implications of even small breaches can be so serious, that maintaining vigilance is costing too much money and impairing business agility.
Enterprise Security 08, the fifth annual Information Age security conference, will focus on the key area of strategy – how organisations can best organise their defences in such a way that spending is kept to a minimum, and business agility is not severely restricted.
The conference will discuss some of the emerging security challenges that businesses face, but will also focus on the rewards that result from effective security strategies.
Under discussion at Enterprise Security 08, in the form of presentations, on stage interviews and discussions will be:
• The opportunity: Does good security give competitive advantage?
Many businesses believe that excellent security can give them a competitive advantage over their nearest rivals – and extend their reach over the Internet.
• Security culture –latest thinking and best practice
The problem of maintaining discipline and vigilance is a perennial problem in most organisations.
• Agility versus security
Does good security impair business agility? How can the two be reconciled?
• The importance of policy
How can organisations perform effective risk assessments and build a business case for their security investments?
• Collaboration & Web 2.0: Security beyond the firewall
The opportunities of collaboration, and of allowing customers to contribute to your web sites, are great. But does the open collaborative culture carry security risks.
• Voice and video. New technologies, new risks
Voice-over-IP continues to raise security risks, as a carrier for viruses, as a vehicle for spam and because of the risks of data interception. How can these be dealt with?
• Tying it all together
Many security investments involve a series of ‘point’ products that secure different aspects of an organisations technology infrastructure. But most analysts agree that a unified, integrated defence strategy will ultimately work best.
• Identification, authentication and access
Identifying who individuals are, and what rights they have, remains a difficult problem when multiple systems are involved. This article looks at the tricky issues in ID management and authentication.
This is an exclusive event for up to 125 delegates at a 5-Star London venue. The event is free of charge to attend and includes the full day conference and a 3 course lunch.