, ,

Security Policy Changes for Today’s Threat Environment

In 2012, the number of smartphone users will reach 106.7 million with 94% of these users accessing the mobile internet. With employees accessing all kinds of information on multiple devices, agencies are presented with numerous challenges including, cyber attacks, which continue to be a challenge for IT departments on restricted budgets. In the BYOD era, how do you create an enforceable and realistic policy?

On October 23, Robert Carey, Principal Deputy Chief Information Officer, US Department of Defense and Debora Plunkett, Information Assurance Director, National Security Agency will discuss these concerns in the keynote address, “Security Policy Changes for Today’s Threat Environment” at the co-located Cloud & Virtualization, Cybersecurity and Mobile Government Conferences. Specifically, they will focus on current threats that affect cloud and mobile, and how you can articulate risks, solutions, and costs to your organization. In addition, they will share best practice policies from across the public sector.

This session is one of many at the co-located Cloud & Virtualization, Cybersecurity and Mobile Government Conferences on October 22-23. They are designed to provide government technology professionals with opportunities to learn and experience the latest cloud, cyber and mobile solutions. You can learn more about the individual conferences, various tracks, and see a list of speakers here. This is a great opportunity to learn about the latest technology, network with fellow peers, and learn best practices strategies for implementing mobile, cloud and BYOD policies.

Cloud and Virtualization: As CIOs strive to cut costs and improve performance, cloud technology is a compelling approach, but there are concerns about controls over data, security, and reliability. This conference offers technology insight and best practices for planning, implementing, and reaping the benefits of cloud computing.

Cybersecurity: The ongoing challenge of cybersecurity is often seen solely as a technology issue; however, for those in charge of securing data, the challenges extend far beyond hardware and software. From managers to mission owners, all layers of the organization must come together to ensure a secure network of systems. The Cybersecurity Conference will examine the technology, policy, and standards needed to manage risk yet optimize efficiency.

Mobile Government: The Mobile Government Conference will discuss how the public sector can take advantage of mobile technology to develop compelling solutions that improve both citizen and enterprise services. here you will obtain the latest information about how mobile programs are being implemented by agencies and valuable ideas for achieving the objectives laid out in the Digital Government Strategy.

Leave a Comment

Leave a comment

Leave a Reply