Have the barbarians captured the castle?
How Social, Mobile and the Cloud require changes to existing security paradigms
The medieval castle metaphor of a hard shell protecting assets has been the norm in describing information security, with the perimeter firewall serving as the moat.
However, changes to the IT landscape (i.e., social media, mobility and the Cloud) are putting the adequacy of this model in doubt. What began as less critical outsourced services has grown, with the Cloud, to encompass critical business systems and information. Changes in end-user expectations of technologies (smartphones, tablets) and cost concerns have added pressure on IT departments to provide mobile devices, and even implement Bring Your Own Device (‘BYOD’) policies. Also, as social networking has become pervasive not only for personal use, but also business use, it has created yet another opening to the ‘IT kingdom’, and underlying security foundations.
Insider threats have always been a big risk to organizations, while external attackers have generally been the focus. Targeted attacks from criminal organizations and foreign governments alike are on the rise, with news reports out almost every week on this topic. As a result, businesses, their IT/IS and Internal Audit departments must adapt to this new reality.
Presented by Yves Desharnais (CISSP) and Kumar Setty (CISA)
Location: Grant Thornton, Oakbrook Terrace 1901 South Meyers Road, Suite 455, Oakbrook Terrace IL 60181
Date: 2pm – 4pm May 7th, 2013
If you prefer to pay the day of the event, please register by emailing: Russ Hinnen at email@example.com.