Changing the way we LOCK IT: Combating NextGen Threats

Posted on Posted in Archive Events, Physical

 

Securing Your Business in a World of Risk with The “4 Ps” Of Security
Today more than ever, security of information, employees and physical assets has become a major issue for enterprises to deal with. Threats have multiplied in recent years – threats from disgruntled employees, from employees exposing their companies via social media and even industrial espionage and terrorist attacks.The role of IT in security has moved beyond the “traditional” SW and HW security areas CMR has been covering in the past. Physical security has surfaced to secure and monitor facilities – and new methods of screening and profiling employees have also emerged. Solutions such as surveillance cameras, access technologies and inexpensive storage has allowed security administrators to leverage cameras and recording solutions to protect business assets and monitor remote locations.This event series will focus on the “4 Ps” of security: People, Process, Policy and Property – and on the role new IT systems and solutions play in addressing these security concerns.

Key topics and technologies covered in CMR’s SecurityVision 2012:

Network security
The perception of IT security has evolved significantly over the years, from single-product perimeter-based security to an integrated approach of security processes necessary to plan, assess, build, and manage secure network infrastructures. Security threats have evolved beyond the perimeter-based attacks, as the workforce has become increasingly mobile and the enterprise has been extended The concept of network security has therefore evolved beyond traditional measures and can no longer be seen as a stand-alone issue but should be seen as an integral part of broader security architecture.

Datacenter Security
Many companies in the region are currently transforming and consolidating their data centers. Data center consolidation can make great sense to a company as they stand to save both money and other resources from having everything in one place. But consolidation of data also means assimilation of risk. Having everything in one place makes it easier to secure – but it also provides an obvious target for outside attacks and once security has been compromised the potential damage could huge. But there are plenty of solutions available for securing the datacenter, which keep evolving as both systems and attacks become increasingly advanced.

Cloud Security
Cloud-based solutions are faced with exactly the same security issues as private datacenters. But the concept of shared services makes these issues even more worrying in the minds of most CIOs. Indeed, CMR surveys show that concerns about security are the biggest deterrent against adopting cloud services. The major cloud providers have the means to offer secure cloud services though, and this event will showcase how.

Employees’ use of Social Media
Web 2.0 and social media are revolutionizing the way employees can interact with each other as well as with customers. But they also provide employees with means to share and express their thoughts in real time with both pictures and words. But people’s urge to share their lives and thoughts sometimes makes them share more than they should. And disgruntled employees might to even further out of malice. Having a company policy on use of social media can take care of some of these concerns – but not altogether. Companies therefore need to continuously scan social media services for any sign of misconduct and the tools and services to do this exist today.

Biometrics
Just who is actually accessing your premises and your IT systems? Traditionally, companies have mostly had to rely on passwords for user authentication. But passwords can get cracked or stolen and employees can be deceived into revealing them. Biometric approaches are inherently much more secure than traditional means – but until recently biometrics have been out of reach for most companies. This has now changed. Affordable and efficient biometric security solutions are nowvavailable and they can help secure both devices and premises.

IP Surveillance
Enterprise IP surveillance is a video surveillance architecture that manages and records large quantities of IP-based surveillance cameras using Enterprise Software Architecture while based on commercial off-the-shelf cameras, software, servers, and switches. Enterprises/organizations are looking at IP Surveillance to replace their conventional analogue closed circuit television (CCTV) security camera due to performance and cost-benefit. These are cameras that are IP-based and tapped into the LAN, footage stored on stored onto servers and shared over an IP network.

Tying it all together
Addressing these multiple security issues is a daunting proposition at best to any CIO. A true security policy involves the adoption and use of multiple systems and solutions and this is really only feasible if the different systems are integrated and automated. This is not an easy task by any means, but the tools and the know-how are available so that companies adopt all the technology necessary to fully secure their business.

Key topics of discussion at the conference:

Secure your Datacenters
Having everything in one place makes it easier to secure – but it also provides an obvious target for outside attacks and once security has been compromised the potential damage could huge. But there are plenty of solutions available for securing the data center, which keep evolving as both systems and attacks become increasingly advanced.

Securing the Cloud
The concept of shared services is a red flag to many CIOs. Indeed, the surveys show that concerns about security is the biggest deterrent against adopting cloud services. The major cloud providers have the means to offer secure cloud services though, and this presentation will show how.

Beyond the Datacenter – Securing the Endpoints and the Network that Links them
In today’s networked world, it is necessary to have an integrated approach to the security processes necessary to plan, assess, build, and manage secure network infrastructures and comprehensive security programs. Security threats have evolved beyond the perimeter-based attacks, as the workforce has become increasingly mobile and the enterprise has been extended.

Your Employees Are Sharing – More Than They Should!
Just who is actually accessing your premises and your IT systems? Traditionally, companies have mostly had to rely on passwords for user authentication. But passwords can get cracked or stolen and employees can be deceived into revealing them. Biometric approaches are inherently much more secure than traditional means – but until recently biometrics have been out of reach for most companies. This has now changed. Affordable and efficient biometric security solutions are now available and they can help secure both devices and premises.

Who should attend?
A must attend for a Large Enterprise CIOs, CISO, VP/GM, AVP/AGM and Director and Head of IT and other technology decision makers and influencers such as CEOs, CFOs etc. across all industry verticals who strive for securing their business.
1850 Registration, Light Refreshments
1900

Welcome and speaker introduction

1915 The Emerging Paradigm for Indian Enterprises: Making them Secure
Apalak Ghosh, Lead Analyst, Software and Services Research, CyberMedia Research
1935 Emerging Trends and New Challenges for IT Security – “Computerization of IT” (BYOD)
Gopinathan K, Sr. Practice Manager, Managed Security, Network Services, Global Infrastructure Services, Wipro Infotech
2000 CheckPoint Security Tour
Sr. Executive, CheckPoint
2040 Interactive Roundtable Discussion-cum-Q&A – All speakers and invited audienceModerated by:  Apalak Ghosh, Lead Analyst, Research & Consulting, CyberMedia Research
2100 Vote of Thanks followed by  Networking Cocktails & Dinner

Note: CMR reserves the right to amend the agenda, as deemed necessary without prior notice.

Platinum Partner

Gold Partner

Silver Partner

Wipro Limited is a $ 7 billion conglomerate (NYSE: WIT) providing Information Technology, Consulting and Outsourcing services to enterprises across India, US, UK, Japan, Europe, APAC and Middle East, enabling them to do business better. Wipro delivers winning business outcomes through its deep industry experience and a 360 degree view of “Business through Technology” – helping clients create successful and adaptive businesses. The company is recognised globally for its comprehensive portfolio of services, a practitioner’s approach to delivering innovation and an organization-wide commitment to sustainability. With a presence in 54 countries, Wipro has 120,000 employees belonging to 67 nationalities serving 904 clients across the globe. In addition to its flagship IT Business, the group also has diversified business interests in Infrastructure engineering and Consumer Products and Lighting in India and abroad. Wipro Infotech, is the India, Middle East and Africa IT business division of Wipro Limited. With over two decades presence in the domestic market, it is also the fastest growing IT services market in the Middle East. The company offers services and solutions spanning the entire IT life cycle including Consulting, Business Solutions, System Integration, Infrastructure and Application Management, Data Center and Cloud and Total Outsourcing services where all IT needs of a customer are serviced, end-to-end. The company has strategic partnerships with over 50 technology leaders to ensure customers have only the best-of-breed technologies working for them. Headquartered in Bangalore, Wipro Infotech serves customers in India through a network of 22 offices and 170 service locations across the country. It also has regional offices across the Middle East serving the region. Wipro’s ADSs are listed on the New York Stock Exchange, and its equity shares are listed in India on the Stock Exchange – Mumbai, and the National Stock Exchange. To know more, log on to www.wipro.com Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft. For more information log-on-to www.checkpoint.com Happiest Minds was founded in April 2011 by Ashok Soota and a team of industry experts, with the mission to create Happiest People and Happiest Customers. Happiest Minds is a new gen IT services company, enabling companies to capture the business benefits of emerging technologies like cloud computing, social media, mobility solutions, business intelligence, analytics and unified communications. Happiest Minds offers high degree of skills, IPs and domain expertise across a set of focused areas that include IT Services, Software Product Engineering, Infrastructure Management, Security, Testing and Consulting. Happiest Minds will focus on industries such as Travel & Transportation, Manufacturing, CPG, BFSI, Retail and Media. Solution focus will be in the areas of Multi-Channel Commerce, Demand Driven Supply Chain and expertise around Human Capital Management. Headquartered in Bangalore, India, the company has operations in the US, UK with offices planned across Europe and Singapore.
Apalak Ghosh Manager, Research and Consulting, Emerging Technologies, Software & IT Services Research, CMR Infotech Practice
Apalak is a lead analyst with CMR’s software and IT services research practice, based out of Gurgaon (near New Delhi). In this role, Apalak is responsible for overseeing development of reports, carrying out in-depth market assessments and forecasts on new and emerging technologies like Cloud Computing, Virtualization, Green IT, Data Center adoption amongst others. Apalak has led new research initiatives to study adoption of Cloud Computing and Virtualization amongst Indian enterprises. He is frequently quoted in the media on the subject of Cloud Computing and Data Centers on popular TV channels such as NDTV and in leading business publications such as The Economic Times and The Hindu Businessline. He also writes a blog on the theme of Green IT/Virtualization/Cloud Computing. In this capacity he carries forward his rich experience as Manager, Software and Services Research and Consulting Practice, IDC India. Prior to his current role, Apalak has worked with TNS India as a research analyst for two years, before which he was with TransAsia Solution Seekers, Indonesia as a consultant for a year. His experience spans across key research areas such as brand tracking, product / concept testing, quantitative and qualitative research, and consulting. He has a rich exposure to research techniques such as face-to-face and telephonic interviews, profiling and discussions with stakeholders across diverse industry verticals such as IT and Telecom, Consumer Packaged Goods and Automotive. Apalak completed his Master’s program in Business Administration from the ICFAI Business School, Bangalore, specialising in Marketing. Apalak also holds a Bachelor’s degree in Computer Engineering from the Birla Institute of Technology (BIT), Ranchi capital of the eastern Indian state of Jharkhand.
Gopinathan K. Senior Practice Manager, Managed Security and Network Services Global Infrastructure Services (GIS), Wipro Infotech
Gopinathan K is the Senior Practice Manager for Managed Security and Network Services, Global Infrastructure Services (GIS), Wipro Infotech.   Managed Services Business is the services arm of Wipro Infotech, focusing on providing Infrastructure Management Services including End User Computing, Cloud and Data Center Services.  With 12000 plus employees, it is one of Wipro’s largest divisions and contributes strongly to Wipro’s leadership position in the region.Gopinathan’s practice responsibilities span across India and Middle East geographies. He has overall 17+ years of experience in Security, Network, OS and Telecom domains in the Industry and has been with Wipro for the last 12+ years.  He has performed several roles ranging from Technical Specialist, Service Delivery, Solution Architect & Heading Security and Network Practice roles. Prior to his tenure at Wipro Infotech, Gopinathan has worked with EdNet Software India Pvt. Ltd., Gopinathan holds a Master’s degree in Physics with specialization in Electronics from University of Madras.
Registration is Closed