Search this website:


Conditions Change. Adapt Faster. Learn more > Conditions Change. Adapt Faster. Learn more >

Securing your data: The role of security in a connected world

Data that companies acquire, manage and secure today is much different to what it was even a couple of years ago. The variety, volume and complexity of customer and internal data held is placing new demands on CIOs both from a pure manageability front but also from external compliance and regulatory requirements.

 

Date: 20150728

Securing this data used to be purely an issue of its integrity and availability. Good backup and recovery, disaster recovery and business continuity plans were enough to satisfy the needs of the organisation. However in a world with mass connectivity, on-line transaction processing and social media information gathering, the security priorities and rules have changed. Now organisations cannot just set their own data security policies. The EU, national governments, industry regulators and individuals all have a say in what information can be held, where it can be located, how it must be secured, who has access and what can be done with the data.

At this year’s ‘Powering the Cloud’ event, encompassing SNW Europe, Datacenter Technologies and Virtualization World, taking place on
29th and 30th October in Frankfurt, the whole subject of data security will be addressed in one of our major Spotlight Sessions.

The first topic that will be addressed within the session will be the European Commission’s ‘proposal for a General Data Protection Regulation’ which represents almost certainly the most significant development since the EU Data Protection Directive.
Where the directive was interpreted and implemented at a national government level this proposal is an EU regulation and as such will be applicable in all member states, without the need for national implementing legislation.
This harmonisation of data protection law across the EU has been discussed now for over two years with the legislative process nearing the end. Though it will probably take some time to come into effect it is estimated that it will be in force fully by 2015. The proposed regulation is that companies should have only one regulatory authority that supervises its activities across all EU member states. At face value this sounds great but already there is dissention from consumer activists and global companies and it emerged recently that US regulations on data security mean that data held on US territories or by US companies globally can be accessed by the US government for national security reasons.
Not sure how Amazon Web Services and Microsoft Azure can sell this to European companies but that amongst many other issues of legislation, including PCI compliance, will be discussed and debated in this Spotlight Session. As just mentioned when data starts to exist in the Cloud its security becomes a major issue for everyone. Leaving aside the international regulations that are coming into effect, there are many other data security challenges that the Cloud brings to the fore such as data isolation, integrity, availability, compliance and privacy. During the session we will address all these issues and explore the contentious notion put forward by many Cloud providers that they have implemented better security than most Enterprise IT departments deploy in their own datacenters.

Though many CIO’s might dispute this claim there is no doubt that they are using the cloud as part of their security strategy. That can be everything from data replication and disaster recovery to using the cloud as a DMZ for mobile users and customer interaction.

In this connected and mobile world CIOs are being particularly creative in building secure data environments, and during this session we will also have case studies of the challenges enterprises and government organisations have faced and how they have addressed them. We will also explore why many vendors and service are developing Unified Data Security solutions and whether there is a reality in this notion or whether it is still more appropriate to buy best of breed solutions.

The overall aim of this session is that delegates will have identified some answers to their own data security challenges and shared ideas through the panel sessions. If data security is high on your list of priorities then this Spotlight Session is one you must not miss.
IT end user and channel partner can register for free with promo code: P3M13 at www.poweringthecloud.com

For those of you who would like to participate in the 2013 conference programs the ‘Call for Papers’ is open until 26th April. The organisers are looking for high-quality submissions from IT end-users, consultants, industry analysts and system integrators/VARs, describing case studies or technology update sessions that focus on real-world deployments and/or methods and best practices to evaluate new, existing or future solutions. Fore more information, please visit
www.poweringthecloud.com/speaker/information
 



ShareThis

« Previous article

Next article »

Tags:

More Exclusive News

Network access control - changed for the better

27 Jul 2015
Christian Buecker, CEO, macmon secure gmbh, says network access control (NAC) is needed now more than ever. And what’s more, it really has changed. From the cumbersome, expensive systems of o...

How the agile businesses will win

27 Jul 2015
By Daniel Naor, VP International Sales at Zadara Storage.

IoT helps financial services re-engage their customers

27 Jul 2015
By Matthew Larbey, Director of Product Strategy, VIRTUS Data Centres.

Meeting future standards

27 Jul 2015
Future-proofing investments with clever cabling. By Dr. Thomas Wellinger, Market Manager Data Centre R&M.

The counterintuitive CIO: The more advanced the business, the simpler the IT  

27 Jul 2015
By Nigel Moulton, CTO, EMEA – VCE.

Prevention: Survival of the fittest as data centre cyber threats evolve

27 Jul 2015
By Mike Langley, Regional Vice President, Western Europe and South Africa at Palo Alto Networks.

Six network security checks to mitigate the risk of data security breaches

20 Jul 2015
By Luke Potter, Operations Manager, SureCloud.

Control your HVAC motors anywhere!

20 Jul 2015
When Global Building Controls was asked to produce an effective VSD system that would help to keep energy costs under control for a data centre client, the company chose VACON 100X drives as the basis of its solution.

Are you energy efficient?

20 Jul 2015
By David Wilcox, Data Centre and ITaaS General Manager: Europe, Dimension Data.

A question of trust  

20 Jul 2015
By Jonathan Birch, Product Manager for Infrastructure and Data Services at Redcentric.

Improvements instead of incidents: optimize and align IT services

20 Jul 2015
By Per Bauer, Director of Global Services at TeamQuest, a global leader in IT Capacity Planning and Management solutions.

What does DR have in common with the Tour de France?

20 Jul 2015
By Marc Goroff, CTO at Quorum.

How to be a security policy management saint, not a sinner

13 Jul 2015
The path to policy righteousness demands the right processes, visibility and automation – but the rewards are improved security and better business agility. By Nimmy Reichenberg, VP marketing & strategy for AlgoSec.

Tallac Networks & Milton Keynes Council – a case study

13 Jul 2015
By Steve Broadhead, Broadband-Testing (www.broadband-testing.co.uk)

Computacenter enriches IT support experience and increases staff productivity with Next Generation Service Desk

13 Jul 2015
As part of its digitisation strategy, Computacenter needed to rethink its approach to delivering IT support services to both its employees and customers. The new approach would need to deliver an e...

Recruitment

Latest IT jobs from leading companies.

 

Click here for full listings»