↓ Agenda Key
Visionary speaker presents to entire audience on key issues, challenges and business opportunities
Panel moderated by Master of Ceremonies and headed by four executives discussing critical business topics
Solution provider-led session giving high-level overview of opportunities
End user-led session in boardroom style, focusing on best practices
Interactive session led by a moderator, focused on industry issue
Pre-determined, one-on-one interaction revolving around solutions of interest
Discussion of business drivers within a particular industry area
Analyst Q&A Session
Moderator-led coverage of the latest industry research
Several brief, pointed overviews of the newest solutions and services
Overview of recent project successes and failures
Open Forum Luncheon
Informal discussions on pre-determined topics
Unique activities at once relaxing, enjoyable and productive
Everyday individuals make technology decisions on behalf of their organization by implementing tools that solve their real business problems. Employees are easily adopting unsanctioned services from a number of sources, where they are storing, sharing and managing internal company data. This new paradigm poses a major security challenge for today's enterprises: how can we let technology run rampant through our organizations - technology that is fundamentally improving business outcomes - while still maintaining a coherent IT security strategy?
Enterprise data security has become a critical issue for business decision-makers when the control over the information is at stake. What can organizations do to secure enterprise data and applications? What strategies and methods can they use to maintain control over who has access to what?
Topics to be discussed:
As your organization shifts business processes, transactions and assets to the cloud, security and privacy concerns may surface. Knowledge is crucial to supporting your business and client-side demands. This session will provide insight into how to leverage existing practices, incorporating requirements to support the transition to the cloud. Organizations must understand potential risks, implementing continuous compliance to gain visibility and realize the benefits of 24/7 access, reporting, industry expertise and on-demand flexibility of cloud services.
As the U.S. energy infrastructure becomes more advanced it must meet and address cybersecurity challenges along the way. Enterprises will need to research, develop and commercialize a comprehensive range of cybersecurity solutions to strengthen the energy infrastructure against cyber intrusion and assist owners and operators in complying with cybersecurity regulations.
Topics to be discussed include:
A relational database management system (RDBMS) is a database management system based on the relational model. While relational database systems remain the dominant choice for both transactional and analytical applications, newer structures are competing with RDBMSs in data warehouse applications, including column-oriented and correlation database systems. Recently, many organizations have transitioned to web-based services due to increased internet reliability, data storage efficiency and the decreasing need for IT staff dedicated to managing hardware. This session will discuss best practices for CISOs when designing a database access strategy.
Smartphones, tablet computers and other personal devices are connecting to an increasing number of corporate networks, and the trend continues to gain momentum. With employers and employees expecting 24/7 access to company data, ease of access and convenience must be balanced with industry, security and compliance requirements.
The days of corporate IT departments distributing and mandating the technology that employees use are being challenged. A new generation of Bring Your Own Technology (BYOT) workers wants to choose the technology it utilizes. The lines between personal and business computing blur, as employees want a single mobile device to meet all of their needs. While most users focus on simplicity and ease of use, they rarely understand the associated complex regulatory and legal concerns. PCI, SOX, HIPAA and GLBA mean little to employees, but are a constant focus for IT executives charged with keeping their computing environments secure and compliant.
This interactive session will highlight industry trends, launching into a candid discussion of how peers are confronting challenges. The session will focus on how to utilize technology as a competitive advantage, while being mindful of the responsibility to control the flow of data.
Smart grid information security and power transmission protection has aspects of both Industrial Control Systems (ICS) as well as Information Technology (IT) Systems. The threat profiles precedes all other security services and differ significantly from threat profiles of other IT functions such as utility customer billing, where confidentiality is a greater concern.
This session will discuss the fact that although both ICS and IT systems require information security services, the specifics of how these services are used for the power grid depend upon appropriate risk assessment and risk control.
Too many organizations respond to persistent security threats and burdensome compliance requirements by investing in reactive perimeter controls, and implementing tactical application security testing programs that may satisfy regulators. However, these measures fall short of consistently protecting the assets and information that are the lifeblood of the business. As these assets are moved to the cloud, there is an even greater need for a more strategic approach to securing critical applications and data. All of cloud's benefits come with new challenges pertaining to relinquishing some of the infrastructure and security controls that might exist in your own data center.
Some progressive organizations have begun to adopt software security assurance as a more strategic approach to securing applications, wherever they may originate or reside. Software security assurance is a comprehensive discipline that provides a systematic way to secure applications, by delivering the application security intelligence necessary to manage risk in context with the business.
Beyond just reacting to the latest security threats, CISOs need to approach security from the standpoint of risk management. Growth remains a top priority for most enterprises, challenging IT executives to provide sustainable management support for increasingly complex business models. As overcoming these challenges has become a survival factor, it is crucial for IT leaders to be more effective. Developing an IT organization that successfully delivers innovative solutions, efficient risk management and pervasive cost optimization is a key success factor for any operator.
A view on architectural cloud strategies for improving IT efficiency and security. Where are the weak spots of the service and what can be done do to prevent illegal access? Are current security systems, integrated with enterprise single-sign-on and Identity Management, enough to secure the cloud?
American enterprises are facing a new and unprecedented range of risks. Beyond the challenges of the current economic climate, organizations are also under pressure to assure the control and protection of sensitive client and employee information. Increasingly sophisticated security threats, paired with the sheer pace of technology innovation have raised the bar substantially. Longstanding questions about trust and confidence must be addressed in a new light. As North American organizations are feeling economic constraints more than many others, how do we deal with these challenges and prepare for what is yet to come?
Discussion topics for this insightful Executive Panel session: