Search this website:


Securing your data: The role of security in a connected world

Data that companies acquire, manage and secure today is much different to what it was even a couple of years ago. The variety, volume and complexity of customer and internal data held is placing new demands on CIOs both from a pure manageability front but also from external compliance and regulatory requirements.

 

Date: 6 Mar 2013

Securing this data used to be purely an issue of its integrity and availability. Good backup and recovery, disaster recovery and business continuity plans were enough to satisfy the needs of the organisation. However in a world with mass connectivity, on-line transaction processing and social media information gathering, the security priorities and rules have changed. Now organisations cannot just set their own data security policies. The EU, national governments, industry regulators and individuals all have a say in what information can be held, where it can be located, how it must be secured, who has access and what can be done with the data.

At this year’s ‘Powering the Cloud’ event, encompassing SNW Europe, Datacenter Technologies and Virtualization World, taking place on
29th and 30th October in Frankfurt, the whole subject of data security will be addressed in one of our major Spotlight Sessions.

The first topic that will be addressed within the session will be the European Commission’s ‘proposal for a General Data Protection Regulation’ which represents almost certainly the most significant development since the EU Data Protection Directive.
Where the directive was interpreted and implemented at a national government level this proposal is an EU regulation and as such will be applicable in all member states, without the need for national implementing legislation.
This harmonisation of data protection law across the EU has been discussed now for over two years with the legislative process nearing the end. Though it will probably take some time to come into effect it is estimated that it will be in force fully by 2015. The proposed regulation is that companies should have only one regulatory authority that supervises its activities across all EU member states. At face value this sounds great but already there is dissention from consumer activists and global companies and it emerged recently that US regulations on data security mean that data held on US territories or by US companies globally can be accessed by the US government for national security reasons.
Not sure how Amazon Web Services and Microsoft Azure can sell this to European companies but that amongst many other issues of legislation, including PCI compliance, will be discussed and debated in this Spotlight Session. As just mentioned when data starts to exist in the Cloud its security becomes a major issue for everyone. Leaving aside the international regulations that are coming into effect, there are many other data security challenges that the Cloud brings to the fore such as data isolation, integrity, availability, compliance and privacy. During the session we will address all these issues and explore the contentious notion put forward by many Cloud providers that they have implemented better security than most Enterprise IT departments deploy in their own datacenters.

Though many CIO’s might dispute this claim there is no doubt that they are using the cloud as part of their security strategy. That can be everything from data replication and disaster recovery to using the cloud as a DMZ for mobile users and customer interaction.

In this connected and mobile world CIOs are being particularly creative in building secure data environments, and during this session we will also have case studies of the challenges enterprises and government organisations have faced and how they have addressed them. We will also explore why many vendors and service are developing Unified Data Security solutions and whether there is a reality in this notion or whether it is still more appropriate to buy best of breed solutions.

The overall aim of this session is that delegates will have identified some answers to their own data security challenges and shared ideas through the panel sessions. If data security is high on your list of priorities then this Spotlight Session is one you must not miss.
IT end user and channel partner can register for free with promo code: P3M13 at www.poweringthecloud.com

For those of you who would like to participate in the 2013 conference programs the ‘Call for Papers’ is open until 26th April. The organisers are looking for high-quality submissions from IT end-users, consultants, industry analysts and system integrators/VARs, describing case studies or technology update sessions that focus on real-world deployments and/or methods and best practices to evaluate new, existing or future solutions. Fore more information, please visit
www.poweringthecloud.com/speaker/information
 



ShareThis

« Previous article

Next article »

Tags:

More Exclusive News

Reinforcing your data security model for an insecure cyber world

23 Mar 2015
By Mark Edge, Country Manager UK & VP Sales, Brainloop.

Banks turn to digital in the race to remain relevant

23 Mar 2015
By Len Padilla, NTT Communications in Europe.

Three key Unified Access milestones on the road to the Unified Network

23 Mar 2015
According to Forrester, the number of applications in the US Apple Store is expected to grow from 233,000 in 2010 to a huge 10 million in 2017. Enterprise networks have undoubtedly started to get read...

Managing assets with automated monitoring

23 Mar 2015
By Dr. Thomas Wellinger, Market Manager Data Centre R&M.

How can businesses reap the benefits of big data?

23 Mar 2015
ByMike Hoskins, CTO, Actian.

Software Defined Storage: Future Undefined

23 Mar 2015
By Alex McMullan, Field CTO, Pure Storage.

Fixing weak passwords

16 Mar 2015
By Chris Stoneff, director of professional services at Lieberman Software Corporation.

Ready to launch: Using the cloud to speed up time to market

16 Mar 2015
By Ian Tickle, ‎VP EMEA, SaaS Solutions at Oracle.

Data migration – reconciliation holds key to success

16 Mar 2015
By Jake Sweeney, Director, Asia Pacific, Gresham Computing.

Peugeot cruises to hosting durability with Claranet

16 Mar 2015
Established in France in 1810 as an engineering firm producing a host of mechanical objects, Peugeot is best known today as one of the leading car manufacturers in the world. The car company has a l...

Realty Check: 2015 Technology Drivers

16 Mar 2015
By Rob Bath, VP Engineering, EMEA, Digital Realty.

SMEs - which IT support service is right for you?

16 Mar 2015
By Matt Kingswood from ITS, a Managed IT Services provider.

You can’t always Stop the Breach - but you should always be able to Spot the Breach

9 Mar 2015
One year on from the debacle of Target’s security breach and has anything really changed? Despite the weeks of forensic analysis and the astronomical cost incurred by the company, retailer af...

Direct attach versus structured cabling in a data centre

9 Mar 2015
It’s an important decision to make when building a data centre. Our regular columnist, Willy Rietveld, TE Connectivity, writes.

Delivering business advantage with cloud application

9 Mar 2015
By Ian Tickle, ‎VP EMEA, SaaS Solutions at Oracle Corporation, looks at how the cloud debate is set to evolve with a focus on delivering business advantage.

Recruitment

Latest IT jobs from leading companies.

 

Click here for full listings»