When the world?s first Internet-worm, the so-called Morris worm, turns 25 in November 2013, we?ll have a lot to reflect on with regard to enterprise security and risk management. In particular, Doug Jacobson and Julie Rursch write in the October 2012 issue of Information Security magazine, despite all of the mishaps and mistakes, we still treat security as a ?bolt-on? and an afterthought. ?We don?t educate our computer engineers and computer scientists to take a holistic approach to security and when these individuals enter the workforce, security is treated with the same separatist approach,? write Jacobson and Rursch, who introduced a new column ?devoted to examining the difficulties in cybersecurity education at all levels, from formal university education and specialized training and certificates to security literacy for the masses.?
?
When HP Discover 2012 comes to Frankfurt 4-6 December, there will be a series of sessions devoted to enterprise security, including:
?
- Track keynote: Growth and innovation through intelligent security (TK3201). Art Gilliland, SVP of HP Software Enterprise Security Products, will share HP?s vision for the enterprise security market. In an era in which security threats are a professional ?market? characterised by highly specialised participants who steal, buy and sell sensitive information, how can enterprises protect themselves? Combating these new adversaries requires specialised controls at every step in the attack process as well as solutions for resolving the damage after a breach occurs. Mr. Gilliland will discuss the current security landscape and present HP?s product and services solutions designed to address today?s most advanced threats.
- Security 20/20: What does the future of information security hold for you? (BB1572). Senior IT executives have identified some concerning issues that will arise in 2020?issues that surround data privacy, information breaches and a lack of skilled resources to effectively manage security. Not to mention the risks associated with cloud computing and the intermingling of personal and business technologies. Join this session to hear developments on the security horizon and gain insights into the future of enterprise security.
- A glimpse into the future at HP Labs (DT1602). The new human information value chain spans from sensing?physical, personal, social?to storage to analysis and to visualisation of the data generated, and to the ability to securely access and share the information and insights you need anywhere, anytime, on any device or display surface. Join us in this session for a sneak peek at HP Labs? research from around the world. From the intelligent infrastructure that powers the converged cloud, to novel social and analytics tools, to solutions that deliver new end-to-end capabilities.
- We can protect what matters together (BB3074). HP Enterprise Security Services helps you see more, act quicker when it comes to security. In this session, we will discuss how to reduce your business risk by protecting critical data and infrastructure, maximise your investments by implementing the right security programs and enable your organisation to use information securely.
- Panel Discussion: the intersection of cloud and security (BB2473). With the rise of cloud computing, security for cloud services is a broad and complex topic. In this session, we?ll examine use cases that help illustrate the best practices to protect your data and applications in the cloud. We?ll explore how to build security into cloud applications, how to ensure that cloud services used by your enterprise are indeed secure and how to implement policy-based and real-time cloud services monitoring.
- Securing the modern enterprise in the age of big data, cloud and consumerization (BB1704). Computing trends such as big data, the consumerisation of IT, social media, cloud and mobility greatly increase productivity and business agility, but also introduce a host of new risks. How will you survive in this changing threat landscape? Learn how HP is protecting the whole enterprise with its integrated Security Intelligence and Risk Management platform and solutions.
- Social Engineering: The dark art (BB2055). The easiest way to gain unlawful access to your data is through your employees. This practice is called social engineering and it doesn't take a skilled coder to do it. In this session, you will hear about successful social engineering attacks on a variety of businesses and then learn how to avoid becoming a victim yourself. Attendees will learn about social engineering, the threat it poses to organisations and how to build a strong defence against it.
?
You can also hear how HP customer University of Nottingham put science into security management (BB1563).
?
Browse the HP Discover session catalogue to see what most interests you.
?
To keep up with updates and news about the event, we invite you to bookmark and regularly visit the HP Discover 2012 website to learn more about our keynote speakers and overall programme information and, of course, register to attend.
?
duggar family gilbert arenas facebook timeline kim jong il kim jong il vaclav havel vaclav havel
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.