Securing your data: The role of security in a connected world

Data that companies acquire, manage and secure today is much different to what it was even a couple of years ago. The variety, volume and complexity of customer and internal data held is placing new demands on CIOs both from a pure manageability front but also from external compliance and regulatory requirements.

  • 11 years ago Posted in

Securing this data used to be purely an issue of its integrity and availability. Good backup and recovery, disaster recovery and business continuity plans were enough to satisfy the needs of the organisation. However in a world with mass connectivity, on-line transaction processing and social media information gathering, the security priorities and rules have changed. Now organisations cannot just set their own data security policies. The EU, national governments, industry regulators and individuals all have a say in what information can be held, where it can be located, how it must be secured, who has access and what can be done with the data.

At this year’s ‘Powering the Cloud’ event, encompassing SNW Europe, Datacenter Technologies and Virtualization World, taking place on
29th and 30th October in Frankfurt, the whole subject of data security will be addressed in one of our major Spotlight Sessions.

The first topic that will be addressed within the session will be the European Commission’s ‘proposal for a General Data Protection Regulation’ which represents almost certainly the most significant development since the EU Data Protection Directive.
Where the directive was interpreted and implemented at a national government level this proposal is an EU regulation and as such will be applicable in all member states, without the need for national implementing legislation.
This harmonisation of data protection law across the EU has been discussed now for over two years with the legislative process nearing the end. Though it will probably take some time to come into effect it is estimated that it will be in force fully by 2015. The proposed regulation is that companies should have only one regulatory authority that supervises its activities across all EU member states. At face value this sounds great but already there is dissention from consumer activists and global companies and it emerged recently that US regulations on data security mean that data held on US territories or by US companies globally can be accessed by the US government for national security reasons.
Not sure how Amazon Web Services and Microsoft Azure can sell this to European companies but that amongst many other issues of legislation, including PCI compliance, will be discussed and debated in this Spotlight Session. As just mentioned when data starts to exist in the Cloud its security becomes a major issue for everyone. Leaving aside the international regulations that are coming into effect, there are many other data security challenges that the Cloud brings to the fore such as data isolation, integrity, availability, compliance and privacy. During the session we will address all these issues and explore the contentious notion put forward by many Cloud providers that they have implemented better security than most Enterprise IT departments deploy in their own datacenters.

Though many CIO’s might dispute this claim there is no doubt that they are using the cloud as part of their security strategy. That can be everything from data replication and disaster recovery to using the cloud as a DMZ for mobile users and customer interaction.

In this connected and mobile world CIOs are being particularly creative in building secure data environments, and during this session we will also have case studies of the challenges enterprises and government organisations have faced and how they have addressed them. We will also explore why many vendors and service are developing Unified Data Security solutions and whether there is a reality in this notion or whether it is still more appropriate to buy best of breed solutions.

The overall aim of this session is that delegates will have identified some answers to their own data security challenges and shared ideas through the panel sessions. If data security is high on your list of priorities then this Spotlight Session is one you must not miss.
IT end user and channel partner can register for free with promo code: P3M13 at www.poweringthecloud.com

For those of you who would like to participate in the 2013 conference programs the ‘Call for Papers’ is open until 26th April. The organisers are looking for high-quality submissions from IT end-users, consultants, industry analysts and system integrators/VARs, describing case studies or technology update sessions that focus on real-world deployments and/or methods and best practices to evaluate new, existing or future solutions. Fore more information, please visit
www.poweringthecloud.com/speaker/information
 

Exos X20 and IronWolf Pro 20TB CMR-based HDDs help organizations maximize the value of data.
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Infinidat has achieved significant milestones in an aggressive expansion of its channel...
Collaboration will safeguard HPC storage systems and customer data with Panasas hardware-based...
Peraton, a leading mission capability integrator and transformative enterprise IT provider, has...
Helping customers plan for software failure, data loss and downtime.
Cloud Computing and Disaster Recovery specialist, virtualDCS has been named as the first UK-based...
SharePlex 10.1.2 enables customers to move data in near real-time to MySQL and PostgreSQL.