Mobile working â€“ the very real challenges of security
What challenges does the cloud provide for information security, particularly the challenges for in-house and the problems with overseas data centres? What about the increase in workforce mobility and greater decentralisation of IT processes and the growing use of social media? Is there a very real threat that there could be a loss in direct control over data and applications?
Ensuring security in remote locations
â€“ Becoming aware of modern-day hackers
Remote working is the way forward but how is this possible in areas of the world where there is little or no infrastructure?
â€¢ Coping with the lack of operational solutions and trying to make suitable adaptions
â€¢ Supporting networks to evaluate, adapt and implement strategies to ensure that security procedures across the organisation and across the world are watertight.
Business continuity â€“ risks, threats and actions â€“ management and technical challenges
â€¢ So you think it is never going to happen to your organisation!
â€¢ Finding out what major threats are likely to emerge â€“ is information security that important to your business for it to continue to function?
â€¢ Ensuring that there is a policy and programme management plan in place
â€¢ Developing and implementing a business continuity
â€¢ Exercising, maintaining and reviewing â€“ a continuous process
The benefits and risks of consumerisation
Tackling new technology and also new user generation
â€¢ The rise of the internet generation, including Facebook and Twitter: how security issues are being tackled in this challenging area
â€¢ Mobile devices including iPads and smartphones: security being one of the major challenges of the new mobile world and ways around IT department controls
â€¢ Highlighting the risks which are sometimes not that obvious: what are others in the industry doing to mitigate very real threats?
The risks and benefits of mobile devices and the cloud
Mobile devices and the cloud allow for greater flexibility in the workforce but present different challenges in ensuring compliance. The Data Protection Act requires data controllers to take appropriate measures to protect personal data but how can they achieve this whilst still maintaining a mobile and flexible workforce? Can the controls applied within the corporate network be extended across the internet to mobile devices and cloud services?
Developing a secure relationship between your supplier, internal teams and customers to reduce data loss and human negligence
Knowing the questions you need to ask to minimize your risk
â€¢ Understanding the current solutions that can be delivered
â€¢ Who needs to be involved internally to ensure you make the most of your chosen solution
â€¢ Training your users to make them aware of the unique risks
Developing a holistic and business aligned approach to information security
Ensuring security procedures across the whole of your organisation are watertight
â€¢ Being aware of commercial espionage
Advanced Information Risk & Control Management
- Strategic Alignment - linking delivery to strategic intent
- Integrating security& resilience
- Control Performance Management - KRI's, KPI's
- Quantitative Risk Analysis using Monte Carlo simulations
- Use of Aggregated Dashboards to communicate to senior stakeholders
Think Tank - Data Loss Prevention
By 2015 there will be more tablets in use than there are smartphones now.
How do you ensure the management of corporate data stored on tablets and personal devices without compromising the security of your network?
Think Tank - Building a Business Continuity Framework
This think tank will allow delegates to share best practice on building a business continuity framework ensuring governance processes are met and risk evaluation is adhered to.
Think Tank - Is Ignorance Bliss?
In a recent survey, more than half of employees interviewed said they do not always follow their companyâ€™s IT security policies or are not even aware of those policies. How does the CISO ensure policies are adhered to?