Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Security conference directed at higher security awareness by CSOs

IDC : 04 October, 2007  (Technical Article)
The fifth annual IDC Conference on IT Security includes increased scope of the role of CSO within industry
People, processes, and technology are the hot topics on the CSO agenda for the next three years. This was the key message delivered by Eric Domage, manager of Western European Security Research and Consulting, IDC, at IDC's fifth annual IT Security Conference on September 25, 2007, in London.

Modern enterprises are increasingly elastic - people need to be able to access any device, anywhere at any time in order to create value. 'Laptops aren't given to employees because they're cheaper than desktops,' said Domage, 'It's because employees are expected to be more productive and can therefore work at home on a Sunday afternoon, in airports, and in hotels.'

The IT system is the business system and the data contained within it constitutes an organization's capital. An IT interruption means business interruption, and data leakage equals value leakage. IT security is a value-added process and CSOs must therefore now understand that they are business-oriented professionals, not just security engineers.

'Everything is a threat - your users are a threat, even you are a threat to yourself,' said Domage, before highlighting that failure to implement an effective security process can result in either fines or legal action.

Domage ended by outlining seven key issues that CSOs need to consider in the next year: pressuring antimalware vendors to deliver improved price and functionality, while trusting their technology; refreshing the malware/Web/regulation threat mix; fearing the user; thinking about data value and capital; thinking about what parts of a security strategy can be externalised; being prepared to spend more; and understanding that they are
now business-oriented professionals, not just engineers.

IDC's fifth annual IT Security Conference brought together over 140 senior IT decision makers in addition to high-profile vendor sponsors including Novell, Presence Networks, Secure Computing, Siemens, Sophos, Sun Microsystems, Clearswift, Kaspersky Lab, Nokia, Postini, Qualys, NetIQ, Vistorm, SkyRecon, and a case study sponsored by E-on. Media partners included the CMA, (ISC)2, SNS Europe and U.K.,, ZDNet, IT PRO, and the Journal of Business Continuity and Emergency Planning.

Issues discussed at the conference included:

- Identity management - the cornerstone of a total integrated security architecture
- Improving security through control at every level
- Tackling insider threat management to facilitate comprehensive endpoint security
- Building a leak-free enterprise
- Secure mobile connectivity
- Dealing with targeted malware attack across multiple protocols
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo