Cyber Security in 2015-2016
- LANGUAGE: English DATE: Tuesday, October 13, 2015 TIME: 1:00pm - 5:00pm AEST
The afternoon seminar covers two subjects:
- Identity-based network security
- Managing "managed services" in the Cloud
Identity-based network security
No longer can we let Cloud services be engaged without providing an identity provider service for all SaaS application providers to use. Synchronising identities to Cloud Service Providers unacceptably raises our risk profile. Secondly, we must also manage mobile devices; it’s no longer possible to restrict system access to clients using our SOE. Thirdly we must face up to the need for device integration. It’s going to become more prevalent and we need to educate our staff in regard to managed API deployment to protect our corporate systems.
Managing "managed services" in the Cloud
Engaging Cloud services is fraught with difficulty. It’s important that you can outsource service provision but you can’t outsource responsibility. A risk management approach is recommended with an honest evaluation of the variables that impact the efficiency and effectiveness of a managed service. Controls are then applied to ensure the engagement of a managed service doesn’t end in tears. Deployment practices are also important; transitioning to a managed service is often the hardest part. Finally monitoring options will be explored to ensure Cloud governance matches our on-premise governance.
Location / Hotels
- Registration fee:
- Contact person:
Ms. Liankee Seah
- Oct 13, 2015 1:00pm - 5:00pm AEST Melbourne, Australia
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.