Digital Transformation: Why Security and Privacy Matter
- LANGUAGE: English DATE: Tuesday, May 03, 2016 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Amazon, Uber, Netflix, the Kindle etc.: Digital technology has changed our society in an appreciable way. Just as our personal lives are being transformed digitally, the same happens in corporations and with our traditional technology solutions. The digital transformation affects everything from customer experience andoperational processes to business models and IT focus. Even software development is being digitally transformed. This leads to new security and privacy challenges: In IoT and digital transformation, organizations have to deal with more identities and relations than ever before. The attack surface increases constantly every day.
More and more people, everyday “intelligent” things and devices are going to be connected – and hacked. Search engines like Shodan exacerbate this situation, making life easy for hackers and facilitating automated attacks. But can enterprises be at the same time secure and agile? There is often a misconception that security is expensive and hinders agility. In fact, the contrary is the case: By doing security and privacy right from the start, you will become far more flexible than by taking both as an afterthought. You will speed up innovation and create agility by design.
In this KuppingerCole webinar, you will hear about
- The Information Security Side of Digital Transformation;
- The Eight Fundamentals for Secure Digital Transformation;
- The new ABC: Agile Businesses – Connected to their customers, partners and associates;
- Why Safety and Security are no dichotomy and why SDOT (Software-defined OT) is a must;
- Identity & Access Control and Standards as key elements in modern security concepts;
- Moving from high risk and low agility to a state of low risk and high agility (Win-Win).
In the first part of the webinar Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, explains how security and privacy by design lead to high agility and enable enterprises to quickly respond to risk alterations, changes in legislation and regulation as well as new business requirements simply by quick configuration instead of costly and effortful code changes.
In the second part of the webinar Jackson Shaw, Senior Director Product Management at Dell Security, will describe how digital transformation is affecting consumers, corporations and their customers and the IT departments who support our companies. And what can be done to satisfy the demand of both security and agility. What do we each have to do to adapt to and fully realize the benefits of digital transformation?
Dell Security solutions help you create and maintain a strong security foundation with interconnected solutions that span the enterprise. From endpoints and users to networks, data and identity, Dell Security solutions mitigate risk and reduce complexity so you can drive your business forward. Dell.com/security
Privileged Access Management (PAM) solutions are critical cybersecurity controls that address the security risks associated with the use of privileged access in organizations and companies. To reduce the risk of privileged accounts being hijacked or used fraudulently, and to uphold regulatory compliance, a strong PAM solution is essential. But finding the right PAM solution can be challenging.