Cyber Security in 2015-2016
- LANGUAGE: English DATE: Tuesday, October 13, 2015 TIME: 1:00pm - 5:00pm AEST
The afternoon seminar covers two subjects:
- Identity-based network security
- Managing "managed services" in the Cloud
Identity-based network security
No longer can we let Cloud services be engaged without providing an identity provider service for all SaaS application providers to use. Synchronising identities to Cloud Service Providers unacceptably raises our risk profile. Secondly, we must also manage mobile devices; it’s no longer possible to restrict system access to clients using our SOE. Thirdly we must face up to the need for device integration. It’s going to become more prevalent and we need to educate our staff in regard to managed API deployment to protect our corporate systems.
Managing "managed services" in the Cloud
Engaging Cloud services is fraught with difficulty. It’s important that you can outsource service provision but you can’t outsource responsibility. A risk management approach is recommended with an honest evaluation of the variables that impact the efficiency and effectiveness of a managed service. Controls are then applied to ensure the engagement of a managed service doesn’t end in tears. Deployment practices are also important; transitioning to a managed service is often the hardest part. Finally monitoring options will be explored to ensure Cloud governance matches our on-premise governance.
Location / Hotels
- Registration fee:
- Contact person:
Ms. Liankee Seah
- Oct 13, 2015 1:00pm - 5:00pm AEST Melbourne, Australia
Now is the time to implement the Zero Trust security model because the traditional model of enforcing security at the network perimeter is no longer effective with users, devices and workloads moving outside the corporate network, but success depends on understanding the essential components of a Zero Trust Architecture.