CyberMedia Research | CMR

Information

This article was written on 14 Jul 2012, and is filled under events.

Changing the way we LOCK IT: Combating NextGen Threats

 

Sponsors Date & Tim

Golden Partner

Wipro Limited is a $ 7 billion conglomerate (NYSE: WIT) providing
Information Technology, Consulting and Outsourcing services to
enterprises across India, US, UK, Japan, Europe, APAC and Middle East,
enabling them to do business better. Wipro delivers winning business
outcomes through its deep industry experience and a 360 degree view of
“Business through Technology” – helping clients create successful and
adaptive businesses. The company is recognised globally for its
comprehensive portfolio of services, a practitioner’s approach to
delivering innovation and an organization-wide commitment to
sustainability. 

For more visit http://wipro.com

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


Securing Your Business in a World of Risk with The “4 Ps” Of Security

Today more than ever, security of information, employees and physical
assets has become a major issue for enterprises to deal with. Threats
have multiplied in recent years – threats from disgruntled employees,
from employees exposing their companies via social media and even
industrial espionage and terrorist attacks. 

The role of IT in security has moved beyond the “traditional” SW and HW
security areas CMR has been covering in the past. Physical security has
surfaced to secure and monitor facilities – and new methods of screening
and profiling employees have also emerged. Solutions such as
surveillance cameras, access technologies and inexpensive storage has
allowed security administrators to leverage cameras and recording
solutions to protect business assets and monitor remote locations.

This event series will focus on the “4
Ps” of security: People, Process, Policy and Property 

and on the role new IT systems and solutions play in addressing these
security concerns.


Key Objectives

To highlight the business dynamics of the Indian BFSI sector focusing
upon the trends, challenges & its growth path in sync to the global
standards & showcase the IT adoption in the sector focusing upon the
current level of applications deployment in the industry & the future
roadmap therein.


Key topics and technologies covered in CMR’s SecurityVision:

Network security; 

The perception of IT security has evolved significantly over the years,
from single-product perimeter-based security to an integrated approach
of security processes necessary to plan, assess, build, and manage
secure network infrastructures. Security threats have evolved beyond the
perimeter-based attacks, as the workforce has become increasingly mobile
and the enterprise has been extended The concept of network security has
therefore evolved beyond traditional measures and can no longer be seen
as a stand-alone issue but should be seen as an integral part of broader
security architecture.

Datacenter Security 

Many companies in the region are currently transforming and
consolidating their data centers. Data center consolidation can make
great sense to a company as they stand to save both money and other
resources from having everything in one place. But consolidation of data
also means assimilation of risk. Having everything in one place makes it
easier to secure – but it also provides an obvious target for outside
attacks and once security has been compromised the potential damage
could huge. But there are plenty of solutions available for securing the
datacenter, which keep evolving as both systems and attacks become
increasingly advanced.

Cloud Security 

Cloud-based solutions are faced with exactly the same security issues as
private datacenters. But the concept of shared services makes these
issues even more worrying in the minds of most CIOs. Indeed, CMR surveys
show that concerns about security are the biggest deterrent against
adopting cloud services. The major cloud providers have the means to
offer secure cloud services though, and this event will showcase how.

Employees’ use of Social Media 

Web 2.0 and social media are revolutionizing the way employees can
interact with each other as well as with customers. But they also
provide employees with means to share and express their thoughts in real
time with both pictures and words. But people’s urge to share their
lives and thoughts sometimes makes them share more than they should. And
disgruntled employees might to even further out of malice. Having a
company policy on use of social media can take care of some of these
concerns – but not altogether. Companies therefore need to continuously
scan social media services for any sign of misconduct and the tools and
services to do this exist today.

Biometrics

Just who is actually accessing your premises and your IT systems?
Traditionally, companies have mostly had to rely on passwords for user
authentication. But passwords can get cracked or stolen and employees
can be deceived into revealing them. Biometric approaches are inherently
much more secure than traditional means – but until recently biometrics
have been out of reach for most companies. This has now changed.
Affordable and efficient biometric security solutions are nowvavailable
and they can help secure both devices and premises.

IP Surveillance

Enterprise IP surveillance is a video surveillance architecture that
manages and records large quantities of IP-based surveillance cameras
using Enterprise Software Architecture while based on commercial
off-the-shelf cameras, software, servers, and switches.
Enterprises/organizations are looking at IP Surveillance to replace
their conventional analogue closed circuit television (CCTV) security
camera due to performance and cost-benefit. These are cameras that are
IP-based and tapped into the LAN, footage stored on stored onto servers
and shared over an IP network.

Tying it all together

Addressing these multiple security issues is a daunting proposition at
best to any CIO. A true security policy involves the adoption and use of
multiple systems and solutions and this is really only feasible if the
different systems are integrated and automated. This is not an easy task
by any means, but the tools and the know-how are available so that
companies adopt all the technology necessary to fully secure their
business.


Key topics of discussion at the conference

Secure your Datacenters

Having everything in one place makes it easier to secure – but it also
provides an obvious target for outside attacks and once security has
been compromised the potential damage could huge. But there are plenty
of solutions available for securing the data center, which keep evolving
as both systems and attacks become increasingly advanced.

Securing the Cloud

The concept of shared services is a red flag to many CIOs. Indeed, the
surveys show that concerns about security is the biggest deterrent
against adopting cloud services. The major cloud providers have the
means to offer secure cloud services though, and this presentation will
show how.

Beyond the Datacenter – Securing the Endpoints and the Network
that Links them

In today’s networked world, it is necessary to have an
integrated approach to the security processes necessary to plan, assess,
build, and manage secure network infrastructures and comprehensive
security programs. Security threats have evolved beyond the
perimeter-based attacks, as the workforce has become increasingly mobile
and the enterprise has been extended. 

Your Employees Are Sharing – More Than They Should!

Just who is actually accessing your premises and your IT
systems? Traditionally, companies have mostly had to rely on passwords
for user authentication. But passwords can get cracked or stolen and
employees can be deceived into revealing them. Biometric approaches are
inherently much more secure than traditional means – but until recently
biometrics have been out of reach for most companies. This has now
changed. Affordable and efficient biometric security solutions are now
available and they can help secure both devices and premises.


Who should attend?

A must attend for a Large Enterprise CIOs, CISO, VP/GM, AVP/AGM and
Director and Head of IT and other technology decision makers and
influencers such as CEOs, CFOs etc. across all industry verticals who
strive for securing their business. 


Mumbai


Date – Wednesday,
25th July, 2012

Bangalore
Date – Thursday,
26th July, 2012
Delhi


Date – Friday,
27th July, 2012
 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Comments are closed.

Recent articles

Recent comments