With your customer footprint changing via consumerisation, generation Y and other trends, how will IT shops need to adapt and change? Intel IT is actively planning and adopting capabilities in the desktop virtualisation, consumerisation & security space that can fundamentally change the way that IT organisations do business in the future. Hear the latest information and plans on technologies that will help your organisation plan for its future.Read more >
Cool technologies show up for the consumer market before they're available to the business market. Employees are either going to figure out ways around the corporate security rules, or they're going to take another job with a more trendy company. Either way, senior management is going to tell security to get out of the way. It might even be the CEO, who wants to get to the company's databases from his brand new iPad, driving the change. It's going to be harder and harder to say no. Peter Wood looks at what firms are doing to answer this challenge and offers some pragmatic advice
About the speaker:
Peter is a world-renowned security evangelist, speaking at conferences and seminars on ethical hacking and social engineering. He has appeared in documentaries for BBC television, provided commentary on security issues for TV and radio and written many articles on a variety of security topics.
Peter has worked in the electronics and computer industries since 1969. He has extensive experience of communications and networking, with hands-on knowledge of many large-scale systems. He founded First Base Technologies in 1989, providing information security consultancy and security testing to commercial and government clients. Peter has hands-on technical involvement in the firm on a daily basis, working in penetration testing, social engineering and awareness.
Businesses around the world are observing a constant increase in the amount of employees bringing their own devices to work. The trend has become so significant that the term "BYOD" can no longer be ignored by corporations.
Up until now, businesses debating their BYOD policy have focused on three key aspects: flexibility, convenience and productivity. However, new research goes much further than these simple needs. As we live in a constantly connected world, scientists are discovering distinctive addiction patterns in the brains of device users. There is now evidence that preventing someone from using their device can increase levels of stress and nervousness.
With such strong connections between people and devices, it is impossible to try and resist the BYOD trend. If you can't fight it, how will you secure it?
Recently highlighted as being one of the top 5 threats for 2013 by the ISF, this webinar maps out how you can respond to the ‘consumerisation’ challenge today – whatever stage you are at – based on current efforts to formulate good practice at leading ISF Member organisations around the world. It offers independent guidance on how to plan your security response not only in terms of how your people use mobile devices, but also in terms of protection solutions, provisioning and support, and meeting statutory requirements.
About the speaker:
Steve Durbin is Global Vice President of the Information Security Forum (ISF). He is a regular speaker and chair at global events and is quoted in the Financial Times, Wall Street Journal, Forbes, Deutsche Presse, Süddeutsche Zeitlung, CIO Forum, ZD Net, and Information Week.
Steve has considerable experience working in the technology and telecoms markets and was previously senior vice president at Gartner. He is also currently chairman of the Digiworld Institute senior executive forum in the UK, a think tank comprised of Telecoms, Media and IT leaders and regulators.
The first of its kind and recently published UK Higher Education Service Desk Benchmarking Report captures the challenges and accomplishments of service desks within the UK higher education sector. With increased tuition fees, funding cutbacks, a student population born at the start of the Internet era and the consumerisation of IT, this sector faces a number of tough challenges, including high customer expectations.
Join Sally Bogg, Service Desk Manager at the University of Leeds, for an informative overview of the report results. Learn in which areas IT helpdesk at UK universities are leading their wider industry peers and where they are playing catch up.
Senior executives are now demanding access to corporate e-mail and other business applications from iPads, iPhones and Android phones.
This can cause a significant risk to the business through loss of corporate data, malicious applications and viruses – earlier this year Google identified 58 malicious applications on Android Market.
This webinar on Enterprise Mobile Security will include:
•overview of risks arising from the use of mobile devices
•methods of mitigating mobile device risks and ensuring regulatory compliance
•case study of mobile security implementation, and lessons learnt
•demonstration of technical approaches to securing mobile devices and corporate data
After graduation from Oxford University, Paul developed laser technology for NASA satellites, before moving into IT Security at Cable & Wireless in 2000, where he led the development of Internet Security Services. In 2005, Paul joined Vistorm, now HP Enterprise Security Services, as a Security Architect, where he is technical lead for mobile device and endpoint security solutions.
Paul is CISSP and ITPC certified, is a CLAS consultant and M.Inst.ISP. He has recently completed the MSc Information Security at Royal Holloway, University of London.
With the emergence of new technologies and the consumerisation of IT, businesses have become more productive and more efficient than ever. However, these benefits come at a price, as the list of threats and vulnerabilities to an organisation's network are soaring to an unprecedented level. From financially motivated hackers, hacktivists and state-sponsored espionage to disgruntled employees, the list of threats is extensive. Join this panel to learn from some of the world's leading industry experts on how to keep your network secure.Read more >
In a recent SC survey, when asked ‘Do you think your current network is secure?’ 43% of IS professionals said Not Sure.
At first glance, this appears a surprisingly high figure – but a closer look at today’s threat matrix soon tells us why. Technology developments such as multi-point cloud solutions, consumerisation, BYOD uptake and even Windows 8 are a major headache in network security for IT leaders. Plus organisations face a growing number of ‘invisible threats’ that they are often not aware of, and which present a very real risk to corporate security.
So what can be done to identify, monitor, respond and report these network security threats in real time?
SC’s latest webcast will share expert advice, practical testing regimes and examples of proven results in overcoming invisible threats. Insights include:
-Detailed analysis of the evolving threat landscape including the top 3 network security threats you don’t know about
-The knowledge you need to know when choosing a bespoke unified threat management solution for your business
-Real life examples showing why a rigorous, real-time testing environment is needed to make well-informed buying decisions
-Take-home advice on how to make sure the product you use protects against network security threats
Regulation, mobility, cloud, consumerisation and aggressive attacks have combined to elevate data security to a board-level concern. A breach carries significant implications to reputation, shareholder value, competitiveness and compliance. IT leaders are now responsible for maintaining data security, while embracing new technology, and meeting the growing demands for access to information.
In this session Dr. Jeremy Ward will evaluate the growing variety of sources that breaches are now coming from, the resultant impact this can have to the business and how HP can provide an integrated and flexible solution set to protect what matters.
In particular, Dr. Ward will discuss how you can prepare for a data breach with the HP Forensic Readiness Service. With a good understanding of your environment and creating and implementing policies to deal with a post-breach investigation, you can ensure your organization is doing everything it can to protect its reputation, employees, and customers.