Security intelligence & trends (IBM South Bank, London)
22 May 2012, Networking Seminar
A seminar exploring emerging security technology trends and how the UK is, or isn't, learning from security technology developments. 2011 was the 'year of the hacks', and with the exponential growth in cloud and mobile technology, it's critical that these environments benefit from cast-iron security technology.
Download the presentation slides
- Ian Jones, NCC
- John Smith, security product specialist, IBM
- Glenn Ambler, client technical architect, IBM Security Services
- Steve Durbin, global vice president, ISF Ltd
(The full version of this presentation can be bought from the Information Security Forum at www.securityforum.org)
- Rob Forde, IBM security services leader UKI
This seminar explores emerging security technology trends and how the UK is, or isn’t, learning from security technology developments. Over the next few years, emerging technological and social trends will continue to have far-reaching implications for enterprise security. 2011 was the ‘year of the hacks’, and with the exponential growth in cloud and mobile technology, it’s critical that these environments benefit from cast-iron security technology.
The seminar outline the trends organisations can expect to see in the next few years, the catalysts behind them and the ways in which technology can help organisations strategically balance risk with opportunity.
As the pace of globalisation picks up, traditional boundaries continue to disappear. In this new global reality, 'open for business' can mean pooling resources, and sharing sensitive information among organisations is the de facto cost of admission to the global economy. The line between participation and isolation can also mark the line of opportunity and risk. Now more than ever, we rely on our business systems and automated policies to guard that line – to root out the threats, safeguard our intellectual property, and protect our reputations and privacy.
In this context, the seminar will also illustrate how assessing and identifying security and compliance issues across the software lifecycle, in the cloud and on mobile devices, reduces risk and also potentially minimises cost – whether you operate an insourced or outsourced IT model.
To gain a perspective on the security challenges organisations will face, the following questions should be considered:
- What technology trends are expected to impact organisations in the next two to five years?
- What strategic drivers should serve as catalysts for change?
- How can organisations assess and identify security and compliance issues?
- How has the growth in cloud technology impacted the corporate security environment?
- How has the ubiquity of smart devices changed the mobile security landscape?
- How can organisations profit from the opportunities while managing risks?
Venue: IBM South Bank, London
76/78 Upper Ground, South Bank, London SE1 9PZ
|9.30||Registration – tea & coffee|
|Ian Jones, NCC|
|10.10||Security & risk trends 2012 – 2011 was the year of the security breach, what lies ahead in 2012?|
|John Smith, security product specialist, IBM
Various groups vie for control of our computer systems and networks, and these groups have different motivations as well as technical and operational capabilities. A clear, accurate understanding of the threat landscape can help guide appropriate responses. In this session, John will cover highlights from the recently published X-Force 2011 Year End Trend and Risk Report. The X-Force report paints a picture of this threat landscape by assessing quantitative data from IBM's database of over 50,000 computer security vulnerabilities, millions of intrusion events on tens of thousands of managed network sensors, web crawlers, spam collectors and numerous other intelligence sources. X-Force uses these data sources to paint a comprehensive picture of the attack activity that is going on in the internet and the progress being made in the effort to fight it.
|Glenn Ambler, client technical architect, IBM Security Services
Glenn shares the latest thinking in cloud and virtualisation security practices, addressing key questions such as: how can your organisation demonstrate its ability to remain compliant with strict infrastructure security mandates? How can you ensure you scan your entire IT infrastructure for vulnerabilities to multiple threats that crop up daily? Even for organisations that are able to collect a list of all areas that could expose their data, how can this be done in a time-efficient and cost-effective way to ensure that none of these vulnerabilities becomes a security violation?
|11.30||Threat Horizon 2014 – managing risks when threats collide|
|Steve Durbin, global vice president, ISF Ltd
To take advantage of technology and cyberspace, organisations must manage new risks beyond those traditionally covered by the information security function, including attacks on reputation and all manner of technology from telephones to industrial control systems. Traditional risk management is insufficiently agile to deal with the risks from activity in cyberspace. Enterprise risk management must be extended to create risk resilience, which must be built on a foundation of preparedness. The ISF Threat Horizon presentation provides a practical place to start by helping organisations take a forward-looking view of the increasing threats in today’s interconnected, always-on world. This in turn enables a better prepared, strategic approach to managing and mitigating risk.
|12.00||Mobile security in the enterprise|
|Rob Forde, IBM security services leader UKI
IBM embarked on a BYOD strategy over three years ago, starting with four questions. IBM now has over 100,000 employees securely enabled. In this talk you'll hear how IBM addressed four key challenges and enabled its global workforce. Given the innate dynamic nature of mobility, an intelligent, adaptable mobile security solution is required to provide an enterprise with the necessary visibility and control in managing threats and risks without degrading user experience:
|13.15||Lunch & networking|