Cyber Security in 2015-2016
- LANGUAGE: English DATE: Tuesday, October 13, 2015 TIME: 1:00pm - 5:00pm AEST
Architecting the Global Digital Business
The afternoon seminar covers two subjects:
- Identity-based network security
- Managing "managed services" in the Cloud
Identity-based network security
No longer can we let Cloud services be engaged without providing an identity provider service for all SaaS application providers to use. Synchronising identities to Cloud Service Providers unacceptably raises our risk profile. Secondly, we must also manage mobile devices; it’s no longer possible to restrict system access to clients using our SOE. Thirdly we must face up to the need for device integration. It’s going to become more prevalent and we need to educate our staff in regard to managed API deployment to protect our corporate systems.
Managing "managed services" in the Cloud
Engaging Cloud services is fraught with difficulty. It’s important that you can outsource service provision but you can’t outsource responsibility. A risk management approach is recommended with an honest evaluation of the variables that impact the efficiency and effectiveness of a managed service. Controls are then applied to ensure the engagement of a managed service doesn’t end in tears. Deployment practices are also important; transitioning to a managed service is often the hardest part. Finally monitoring options will be explored to ensure Cloud governance matches our on-premise governance.
Location / Hotels
- Registration fee:
- Contact person:
Mr. Levent Kara
+49 211 23707710
- Oct 13, 2015 1:00pm - 5:00pm AEST Melbourne, Australia
As businesses are becoming increasingly digital, their IT infrastructures are continuously growing in scale and complexity, with vast numbers of previously disparate systems and platforms woven together by new communications channels. Many of these systems are no longer located within the corporate perimeter, having partially or completely migrated to the cloud. Even those which still remain on.premises, must be constantly accessible to mobile workers, external contractors or support engineers.
The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.