Cost: Free for end-users and qualified partners. Registration is subject to terms & conditions.
Most executives today understand just how damaging IT security breaches can be: data and money can be stolen, trust and brand reputation trashed, key services disrupted. And they know that, in this hostile world, the threats are increasing. To deal with this, most organisations now invest heavily in security tools and processes. But is it enough? Many businesses worry that, even if they win almost all the battles, they might lose the war. The number and range of threats is now so great, and the implications of even small breaches can be so serious, that maintaining vigilance is costing too much money and impairing business agility.
Enterprise Security 2010, the seventh annual Information Age security event, will focus on the key area of strategy – how organisations can best organise their defences in such a way that spending is kept to a minimum, and business agility is not severely restricted. The seminar will discuss some of the emerging security challenges that businesses face, but will also focus on the rewards that result from effective security strategies. Under discussion at Enterprise Security 2010 will be:
• The opportunity: Does good security give competitive advantage?
Many businesses believe that excellent security can give them a competitive advantage over their nearest rivals – and extend their reach over the Internet.
• Security culture –latest thinking and best practice
The problem of maintaining discipline and vigilance is a perennial problem in most organisations.
• Agility versus security
Does good security impair business agility? How can the two be reconciled?
• The importance of policy
How can organisations perform effective risk assessments and build a business case for their security investments?
• Cloud Security
50% of respondents to a recent Information Age cited poll cited that Information Security concerns were preventing their organisations wider adoption of cloud services. So what are the threats and where should the solutions be deployed.
• Social Media friend or foe
The continued widespread adoption of social media is forecasted for the enterprise sector. But what is the real cost and how exposed are business users.
• Mobile threats
The 2010 Effective IT Survey demonstrated that 77.9% of organisations had adopted a mobile strategy. However as the smart phone replaces the laptop, what are the security threats and how can technology assist.