This section will provide viewers with an overview of many of the security, risk and governance aspects of moving to the cloud. Our panel of cyber and security professionals discuss what organizations should consider before moving data, applications or business proceeded to the cloud, steps they may take to better secure their data and how to begin to be prepared for an incident.
Employee and consumer use of mobile devices has skyrocketed, creating novel threats to information security. Businesses that understand and are prepared for the risks and the opportunities can enhance productivity and gain competitive advantage. Our panel of cyber and security professionals discuss the risks and opportunities associated with accessing corporate data or enabling business processes from mobile devices. They also provide guidance regarding the need for education for end-users and how to effectively embrace the mobile change.
PCI is generally perceived as a complex security standard of extensive lists of security control requirements, various validation and reporting mechanisms, and merchant classification categories. Our panel of cyber and security professionals discuss the controls that should be in place around the data, key compliance considerations and aspects of responding to a breach.