|
Available now to our members. Click the link above.
|
Keynote
Speaker
Andy
Purdy
Deputy to the Vice Chair, Senior
Advisor, IT Security and Privacy
The President's Critical Infrastructure Protection Board.
|
Venue: Hyatt
Regency, San Francisco Airport, California, USA
The evolution of Boundaryless Information Flow brings with it the requirement
to get the right information to the right person at the right time. Fundamental
to this is the need for the information to be secure at all stages of
transmission and to authenticate the sender and recipient.
This event focused upon the security aspects of boundaryless information,
comprising an agenda of high profile industry speakers and an interactive
intrusion attack scenario. The Open Group brought together IT customers,
security system suppliers and representatives from the leading consortia
working in this area, to address topics such as:
• Intrusion attack / deterrence /
response
• Trusted Information
• Message Authentication
• Operational Risk Management
• Identity Management
• Corporate Liability Saving
|
Saving Private Data:
An Act in Two Parts
At 09.35, StarCorp’s online order-processing application
went down. The initial word from IT operations was that it was a
hacker attack. Getting the system back on line was the company’s
highest priority. A SWAT team headed by IT Operations Manager Rocky
Wardrop tried to identify and fix the problem. StarCorp CEO Brenda
Star was determined that the offender would not go unpunished.
Two sessions dealt firstly with intrusion response procedures;
and then with legal liabilities and remedies, highlighting the conflicts
and benefits of IT and legal departments working in partnership,
and throwing up some unexpected results. Delegates were prepared
for some surprises!
|
|