Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 12 February 2011

ISACA’s EuroCACS Examines Data Protection, Cloud Computing and Social Networking

Posted on 05:18 by Unknown

ISACA’s EuroCACS Examines Data Protection, Cloud Computing and Social Networking

20-23 March 2011, Manchester, UK

Rolling Meadows, IL, USA (10th February 2011)—David Smith, the deputy commissioner and director of data protection for the United Kingdom Information Commissioner’s Office will discuss the challenges posted by personal privacy expectations from customers and regulators—and how IT professionals can strengthen public confidence in data protection—in his keynote presentation at ISACA’s European Computer Audit, Control and Security Conference (EuroCACS). This year, the event will be held 20-23 March in Manchester—one of the top 20 places to visit according to the New York Times’ “41 Places to Go in 2011.”

EuroCACS is an annual event drawing hundreds of global leaders in IT security, assurance and governance. Hosted by ISACA, a nonprofit association serving 95,000 IT professionals, the conference will feature 44 sessions divided into 12 streams:

· Client Computing

· Cloud Computing and Virtualization

· Computer Forensics

· Governance, Risk and Compliance

· Information Architecture

· Managing IT Investment

· Outsourcing

· Privacy, Information Protection and Loss Prevention

· Regulations and Compliance

· Risk Management

· Social Computing, Social Networks and Human Factors

· Sustainability

“EuroCACS is a great place for delegates to get the latest guidance on the issues that keep them awake at night.  Attendees will learn valuable tips and solutions to add value to their enterprises,” said Peter Thompson, President, ISACA Northern England Chapter.

Summary of Select Streams:

Cloud Computing and Virtualization

Cloud computing is something of a buzz term in the IT and business communities. Many maintain that it is the long-sought-after solution to cost and security concerns within an organization; others are resolutely unconvinced. Economic pressures have forced organizations to re-evaluate their IT solutions with specific regard to availability, scalability, efficiency and cost, so it is particularly important to assess the potential business benefits, risks and assurance considerations. Sessions in this stream will address the legal, security and governance issues surrounding the cloud.

Privacy, Information Protection and Loss Prevention

Contemporary data security is perhaps the most pressing of all challenges facing IT professionals today—a fact that has resulted in unanimous agreement that a new type of security culture must be created. But what alterations must be made to reflect the current information security zeitgeist? Examining the latest security trends is the logical starting point, paying close attention to, for example, hacker tools, exploits, legislation, cybercrime news, and what private data encompasses and where it resides, all of which are conducive to achieving the IT culture required for the 21st century. By adopting frameworks such as ISACA’s Business Model for Information Security (BMIS), organizations can implement a new level of security requirements; one such example is the UK Government, which adopted the concepts of BMIS and will be featured in a EuroCACS session. Sessions in this stream will feature security case studies, the latest threats and trends, guidance to prevent data leakage and more.

Regulations and Compliance

Evaluating compliance is a difficult job, and this stream reveals the most effective ways of completing it. Sessions include Emerging Standards in Software Security Assurance; Essentials of XBRL: The Emerging Financial Reporting Standard; PCI DSS 2.0: What the Standard Means for Companies; PCI DSS 2.0 Compliance: A Practical Approach; and Automating Security Configuration: Applying the US DoD Standard.

Social Computing, Social Networks and Human Factors

With the advent of social-networking and increased consumerisation, the workplace has now become an extension of an employee’s private life—albeit a slightly restrictive one. Social networking web sites have created many marketing and communication opportunities; however, there are also significant risks involved. This stream will delineate the pros and cons of social computing and social networks, and attempt to direct its attendees toward achieving an appropriate level of control within the business environment.  Sessions will discuss the risks and benefits of social media, how to create an effective policy, and how to control the uncontrollable.

Six optional pre- and post-conference workshops are also available. For additional information, visit www.isaca.org/eurocacs.

With 95,000 constituents in 160 countries, ISACA® (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. Founded in 1969, the nonprofit, independent ISACA hosts international conferences, publishes the ISACA® Journal, and develops international IS auditing and control standards, which help its constituents ensure trust in, and value from, information systems. It also advances and attests IT skills and knowledge through the globally respected Certified Information Systems Auditor® (CISA®), Certified Information Security Manager® (CISM®), Certified in the Governance of Enterprise IT® (CGEIT®) and Certified in Risk and Information Systems Control™ (CRISC™) designations. ISACA continually updates COBIT®, which helps IT professionals and enterprise leaders fulfill their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business.

Follow ISACA on Twitter at http://twitter.com/ISACANews.

Source: Eskenzi PR

This press release is presented without editing for your information only.

Full Disclosure Statement: The ICT REVIEW received no compensation for any component of this article.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ▼  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ▼  February (30)
      • Security Concerns over Cloud Storage
      • Lieberman Software warns on new hacking trend of m...
      • 95% of parents found children accessing internet p...
      • Parallels to leverage Scality RING technology in i...
      • Connectria selects Scality to launch a public clou...
      • Flash disk security is very different to magnetic ...
      • New Financial Trojan OddJob Keeps Online Banking S...
      • US worries over Internet `kill switch' highlights ...
      • CREDANT TECHNOLOGIES LAUNCHES BETA PROGRAM FOR CLO...
      • Beware the Enemy Within
      • Infosecurity Europe welcomes plans for rapid taked...
      • ISACA’s EuroCACS Examines Data Protection, Cloud C...
      • Imperva warns on the real insider security threat
      • Tufin unveils new functionality & updated PCI DSS ...
      • Trusteer Secure Web Access prevents attacks that e...
      • Venafi launches 1st universal automated management...
      • Safer Internet Day - The role of Security within S...
      • `What are the banks not telling us about card frau...
      • DES Offers Free Encryption
      • Tufin introduces next generation firewall manageme...
      • Infosecurity Europe 2011 Hall of Fame nominations ...
      • Huddersfield NHS laptop loss highlights need to pr...
      • Innovative software solutions to reduce business e...
      • Talk of Intel developing IT security game-changer ...
      • SOURCEFIRE’S IMMUNET ANTI-MALWARE SOLUTION DELIVERS
      • Lieberman Software and Q1 Labs Partner to stop ins...
      • Data governance and leaks drives Varonis growth
      • ISACA report emphasizes governance's central role ...
      • WikiLeaks DDoS arrests welcomed by Infosecurity Eu...
      • KOBIL mIDentity secures e-Banking of the BBVA (Sui...
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile