Cornerstones of Trust 2013 Theme: Securing Ubiquity and Protecting the Enterprise of Things
With the press of consumerization and the Internet of Things, enterprises are struggling with protecting their business in new and unfamiliar areas. The traditional approach to Information Technology security needs to be reexamined in light of the transformations brought about by ubiquitous mobile access, social collaboration, information explosion, and distributed computing in the Cloud.
Users and customers are expecting choice and rapid change. There’s an increased drive to adopt new technologies, especially around devices and data. Enterprises need to protect this extended platform and the new type of devices interacting on the Internet.
These trends also mean that the traditional corporate perimeter, with clearly identifiable boundaries, has diminished – if not disappeared altogether. There continues to be pressures to leverage a high volume, velocity and variety of information to drive business outcomes. Lots of data - everywhere.
The continual rise of compliance requirements further compounds the situation and leads to added complexity in the business. Complexity that often results in significant blind spots within an organization and forces their security controls to be reactive to the latest threat or fire drill.
Security professionals need to look at the context of the business and the needed security controls in light of these trends. The various security controls are based on foundational security practices as well as new approaches. All of these decisions and strategies are paramount to securing devices and data anywhere while protecting the Enterprise of Things.
- Your Enterprise is Everywhere
- The Paradox of Connectivity
- Governance in the Age of Ubiquity
- Hands On; Cyber Security in the Connected World
See Full Track Details