Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Security conference directed at higher security awareness by CSOs

IDC : 04 October, 2007  (Technical Article)
The fifth annual IDC Conference on IT Security includes increased scope of the role of CSO within industry
People, processes, and technology are the hot topics on the CSO agenda for the next three years. This was the key message delivered by Eric Domage, manager of Western European Security Research and Consulting, IDC, at IDC's fifth annual IT Security Conference on September 25, 2007, in London.

Modern enterprises are increasingly elastic - people need to be able to access any device, anywhere at any time in order to create value. 'Laptops aren't given to employees because they're cheaper than desktops,' said Domage, 'It's because employees are expected to be more productive and can therefore work at home on a Sunday afternoon, in airports, and in hotels.'

The IT system is the business system and the data contained within it constitutes an organization's capital. An IT interruption means business interruption, and data leakage equals value leakage. IT security is a value-added process and CSOs must therefore now understand that they are business-oriented professionals, not just security engineers.

'Everything is a threat - your users are a threat, even you are a threat to yourself,' said Domage, before highlighting that failure to implement an effective security process can result in either fines or legal action.

Domage ended by outlining seven key issues that CSOs need to consider in the next year: pressuring antimalware vendors to deliver improved price and functionality, while trusting their technology; refreshing the malware/Web/regulation threat mix; fearing the user; thinking about data value and capital; thinking about what parts of a security strategy can be externalised; being prepared to spend more; and understanding that they are
now business-oriented professionals, not just engineers.

IDC's fifth annual IT Security Conference brought together over 140 senior IT decision makers in addition to high-profile vendor sponsors including Novell, Presence Networks, Secure Computing, Siemens, Sophos, Sun Microsystems, Clearswift, Kaspersky Lab, Nokia, Postini, Qualys, NetIQ, Vistorm, SkyRecon, and a case study sponsored by E-on. Media partners included the CMA, (ISC)2, SNS Europe and U.K., silicon.com, ZDNet, IT PRO, and the Journal of Business Continuity and Emergency Planning.

Issues discussed at the conference included:

- Identity management - the cornerstone of a total integrated security architecture
- Improving security through control at every level
- Tackling insider threat management to facilitate comprehensive endpoint security
- Building a leak-free enterprise
- Secure mobile connectivity
- Dealing with targeted malware attack across multiple protocols
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo