Cyber-Security in 2014
Tuesday 23 September 2014
The
cost of cyber-crime to businesses could rise to €2200 billion by
2020.
The European regulatory framework is evolving, with aNetwork and information security directive adopted by the
European Parliament in March 2014 and data protection rules due to be agreed in 2015.
Phishing, data theft, hacktivism, espionage; cyber-risks affecting companies’ systems and networks are numerous
and constantly changing, calling for adapted legislative responses. After the Heartbleed bug detected in April 2014,
the question is where the next attack will strike.
Mobile devices, cloud computing and the much-discussed rise of Big Data have transformed corporate IT security
and call for innovative defence strategies. CIOs, heads of IT security, chief privacy officers… how can you keep up
with increasingly sophisticated threats? Which audit processes should you implement to anticipate and prevent
attacks? Which departments should be mobilised to contain crises and minimise the financial and reputational
consequences?
This one-day session will give you practical, hands-on case studies and keys to:
Securing mobile devices and networks
Identifying new threats in the Internet of Things
Embedding trust into your business
Dealing with the aftermath of an attack through sound business continuity plans.
The European regulatory framework is evolving, with aNetwork and information security directive adopted by the
European Parliament in March 2014 and data protection rules due to be agreed in 2015.
Phishing, data theft, hacktivism, espionage; cyber-risks affecting companies’ systems and networks are numerous
and constantly changing, calling for adapted legislative responses. After the Heartbleed bug detected in April 2014,
the question is where the next attack will strike.
Mobile devices, cloud computing and the much-discussed rise of Big Data have transformed corporate IT security
and call for innovative defence strategies. CIOs, heads of IT security, chief privacy officers… how can you keep up
with increasingly sophisticated threats? Which audit processes should you implement to anticipate and prevent
attacks? Which departments should be mobilised to contain crises and minimise the financial and reputational
consequences?
This one-day session will give you practical, hands-on case studies and keys to:
Securing mobile devices and networks
Identifying new threats in the Internet of Things
Embedding trust into your business
Dealing with the aftermath of an attack through sound business continuity plans.