We need to carry out a deep introspection about the current state of the IT and InfoSec rollout and the associated policies. The sequence of doing so is of the utmost importance. We may have to re-engineer the following. 1. Network Security 2. Application Security 3. Operational Security 4. Information Security 5. BCP & DR 6. End-User Education Computing has seen a significant transformation. The IT services are being utilized and consumed by the end-users in a much different way than before. The stress on the IT managers has increased as they are compelled to allow the much-debated issue of securing and rolling out the BYOD policies. The forced reduction of the headcount & reduced wages has had an adverse impact on the employee’s integrity. Remote users have many peeping toms at home looking at the computer screens. The Home Wi-Fi used by the employees is not secure. This leads us to analyze the top 10 areas of concern. Parallelly, the outbreak of an undeclared war between the “Cyber Bullies” and the “IT Security Soldiers” is hotter than ever before. We will discuss the strategies that IT Security Soldiers are adopting and the success thereof. The current perceived threats have created opportunities for the vendors providing the NAC, ZeroTrust, RPA’s, ATP’s, infusion of ML and AI into the Firewalls and perimeter security devices to a large extent. The OS and RDBMS patch updates have taken a front stage and are a priority task for the IT Managers. We need to draft out an SOP for keeping the IT Infrastructure secured. We need to create “8 Commandments” to have a well-secured IT Infrastructure There is a human angle to IT Security as well. Only having robust IT InfoSec Policies. The Human Resource department needs to play an important role. The goals that an IT InfoSec leadership needs to achieve has to be clear, well defined, and meticulously followed. This presentation will be a snapshot of an end to end journey.

Hora

08:00 - 09:00 hs GMT+1

Organizador

Information Security
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Mayo / 2025 314 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 28 de Mayo de 2025
Mar 29 de Mayo de 2025
Mié 30 de Mayo de 2025
Jue 01 de Mayo de 2025
Vie 02 de Mayo de 2025
Sáb 03 de Mayo de 2025
Dom 04 de Mayo de 2025
Lun 05 de Mayo de 2025
Mar 06 de Mayo de 2025
Mié 07 de Mayo de 2025
Jue 08 de Mayo de 2025
Vie 09 de Mayo de 2025
Sáb 10 de Mayo de 2025
Dom 11 de Mayo de 2025
Lun 12 de Mayo de 2025
Mar 13 de Mayo de 2025
Mié 14 de Mayo de 2025
Jue 15 de Mayo de 2025
Vie 16 de Mayo de 2025
Sáb 17 de Mayo de 2025
Dom 18 de Mayo de 2025
Lun 19 de Mayo de 2025
Mar 20 de Mayo de 2025
Mié 21 de Mayo de 2025
Jue 22 de Mayo de 2025
Vie 23 de Mayo de 2025
Sáb 24 de Mayo de 2025
Dom 25 de Mayo de 2025
Lun 26 de Mayo de 2025
Mar 27 de Mayo de 2025
Mié 28 de Mayo de 2025
Jue 29 de Mayo de 2025
Vie 30 de Mayo de 2025
Sáb 31 de Mayo de 2025
Dom 01 de Mayo de 2025

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado