Cyber Security in 2015-2016
- LANGUAGE: English DATE: Tuesday, October 13, 2015 TIME: 1:00pm - 5:00pm AEST
The afternoon seminar covers two subjects:
- Identity-based network security
- Managing "managed services" in the Cloud
Identity-based network security
No longer can we let Cloud services be engaged without providing an identity provider service for all SaaS application providers to use. Synchronising identities to Cloud Service Providers unacceptably raises our risk profile. Secondly, we must also manage mobile devices; it’s no longer possible to restrict system access to clients using our SOE. Thirdly we must face up to the need for device integration. It’s going to become more prevalent and we need to educate our staff in regard to managed API deployment to protect our corporate systems.
Managing "managed services" in the Cloud
Engaging Cloud services is fraught with difficulty. It’s important that you can outsource service provision but you can’t outsource responsibility. A risk management approach is recommended with an honest evaluation of the variables that impact the efficiency and effectiveness of a managed service. Controls are then applied to ensure the engagement of a managed service doesn’t end in tears. Deployment practices are also important; transitioning to a managed service is often the hardest part. Finally monitoring options will be explored to ensure Cloud governance matches our on-premise governance.
Location / Hotels
- Registration fee:
- Contact person:
Ms. Liankee Seah
- Oct 13, 2015 1:00pm - 5:00pm AEST Melbourne, Australia
There is growing interest in deception as a methodology and as an integral part of cybersecurity architecture, as organizations seek more effective approaches for detecting and responding to threats in real time. Distributed Deception Platforms have made this approach practical and affordable for the first time, but choosing the right solution can be challenging.