|Home > > News > Securing your data: The role of security in a connected world||
DCS Europe Data storage and IT management:
Securing this data used to be purely an issue of its integrity and availability. Good backup and recovery, disaster recovery and business continuity plans were enough to satisfy the needs of the organisation. However in a world with mass connectivity, on-line transaction processing and social media information gathering, the security priorities and rules have changed. Now organisations cannot just set their own data security policies. The EU, national governments, industry regulators and individuals all have a say in what information can be held, where it can be located, how it must be secured, who has access and what can be done with the data.
At this year’s ‘Powering the Cloud’ event, encompassing SNW Europe, Datacenter Technologies and Virtualization World, taking place on
The first topic that will be addressed within the session will be the European Commission’s ‘proposal for a General Data Protection Regulation’ which represents almost certainly the most significant development since the EU Data Protection Directive.
Though many CIO’s might dispute this claim there is no doubt that they are using the cloud as part of their security strategy. That can be everything from data replication and disaster recovery to using the cloud as a DMZ for mobile users and customer interaction.
In this connected and mobile world CIOs are being particularly creative in building secure data environments, and during this session we will also have case studies of the challenges enterprises and government organisations have faced and how they have addressed them. We will also explore why many vendors and service are developing Unified Data Security solutions and whether there is a reality in this notion or whether it is still more appropriate to buy best of breed solutions.
The overall aim of this session is that delegates will have identified some answers to their own data security challenges and shared ideas through the panel sessions. If data security is high on your list of priorities then this Spotlight Session is one you must not miss.
For those of you who would like to participate in the 2013 conference programs the ‘Call for Papers’ is open until 26th April. The organisers are looking for high-quality submissions from IT end-users, consultants, industry analysts and system integrators/VARs, describing case studies or technology update sessions that focus on real-world deployments and/or methods and best practices to evaluate new, existing or future solutions. Fore more information, please visit
|White Paper Downloads|
Keep up to date with the latest industry products, services and technologies from the world's leading IT companies.