Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 164

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 167

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 170

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 173

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 176

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 178

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 180

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 202

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 206

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 224

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 225

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 227

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/admin/class.options.metapanel.php on line 56

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/admin/class.options.metapanel.php on line 49
21 | January | 2012 | Certified Ethical Hackers Security Analyst Malware Hacking Information
From the daily archives: Saturday, January 21, 2012

EC-Council’s Inaugural CISO Executive Summit Develops Guidelines to Address Challenges of 2012′s IT Mantra “Doing More with Less”

High unemployment and increased economic uncertainty has forced top-level Information Security executives to utilize alternative technology and invest in the existing workforce creating an onslaught of new security issues.

January 9, 2012 Albuquerque, NM- The New Year brings an unfamiliar set of challenges for executive-level Information Security (IS) professionals. The troubled economy and increased economic uncertainty has led many to seek alternatives to doing more with less. However, new initiatives such as implementing more cost efficient technology, with cloud computing being top-of-mind for many executives, and investing in existing resources, like the workforce, come with a set of security and training challenges.

These issues were addressed at EC-Council’s Inaugural CISO (Chief Information Security Officer) Executive Summit 2011 in Las Vegas, NV held from December 5-6th. Over 40 prominent top-level executives from the private, public, and government sectors gathered to collaborate on ways to overcome these obstacles. The corporations and agencies included: IBM, Motorola, TransUnion, Abu Dhabi Securities Exchange (ADX), Sallie Mae, Blue Cross Blue Shield, Deloitte Touche, U.S. Department of Treasury, U.S. Army Reserve and Department of Defense.

The need for increased Information Security arises as executives look for more cost-cutting technology and invest in existing assets to stay competitive in 2012. As Pearl Zhu, CEO, COO, Chairman, and President of Brobay stated in the article 2012 IT Tea Leaf Reading: The Year of Wisdom, “Businesses are facing unprecedented uncertainties, accelerated changes and hyper-competitive global competitions.” Many organizations in 2012 will focus on software automation and cloud solutions, which provide convenience and cost-efficiency.

The topic of responsible implementation of cloud computing in terms of information security was one of the focus areas of the CISO Executive Summit.

Ben Eu, Program CISO at IBM, and Raymond Soriano, Director of Security Privacy Services and Cyber Threat Vulnerability Management at Deloitte Touche, served as co-chairs on the “Embracing the Cloud and Mitigating Surrounding Threats” panel discussion. Summarizing the panel discussion, they stated that in order to mitigate threats posed by the cloud, top IS professionals must:

Perform due diligence and consider satisfactory levels of Right to Audit and other measures within contracts.

Consult with business to understand the requirements and risk tolerance for cloud solutions.

Engage with Internal Audit to help support and drive additional control with cloud solutions applied for the organization.

Another challenge that awaits CISOs in the New Year is ensuring the IS team they lead consists of highly skilled professionals who are ready to mitigate risks associated with cloud computing and other technologies.

According to “The IT Skills Gap”, an article written by Andrew Horne, Practice Director at Corporate Executive Board, another one of the CIO’s (Chief Information Security Officer) most serious challenges is the lack of adequate skills in prospective and current IS employees. It is projected that demand for certain roles in the IS field will increase by over 200% within the next 5 years. He goes on to say that, “As key IT skills are in short supply, and the few people with those skills are not going to be pried loose from their current employers, the only option for CIO’s is to develop existing employees.”

Co-chairs of “Structuring and Managing Your Infosec Workforce”, Jerry Chappee, Chief Information Assurance and Operations Officer for the U.S. Army Reserve, and Jeffrey Vinson, Director and CISO of SecureNet Payment Systems, stated that one of the best ways to improve the skills of the existing workforce is by investing in certifications, “Leaders of the organization need to support their people and show them the importance of certifications. More specifically, how the certification directly supports the business and keeps information more secure.”

The CISO Executive Summit created an environment where the most recent IS threats and landscape evolution was discussed and debated. Additional key issues addressed were implementing a high-performing IS program, managing insider threats, and factors with the greatest impact on the IS profession. For a full CISO Summit report including highlights and key takeaways, please visit: http://www.eccouncil.org/cisosummit

2012 will have its share of challenges and obstacles to overcome. The tough economic climate and mantra of “doing more with less” will prompt Information Security leaders to come together and share knowledge and ideas. It is the mission of the CISO Executive Summit Series to unite the top Information Security (IS) leaders across the world in the fight against cyber crime and IS threats, while providing a platform for continuous learning where the most recent IS threats and landscape evolution can be discussed and debated.

EC-Council will host a Global CISO Executive Summit on October 29, 2012 in Miami, FL. For more information, please visit: http://www.eccouncil.org/cisosummit.


Marissa Easter Marketing Communications Specialist (marissa.easter@eccouncil.org)

About EC-Council:

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and information security skills. It is the owner and creator of the world-famous Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), Certified Chief Information Security Officer (C|CISO) as well as many other programs that are offered in over 80 countries through a global training network of more than 450 training partners.

Article source: http://www.articlesnatch.com/Article/-Ec-council-s-Inaugural-Ciso-Executive-Summit-2012-s-It-Mantra--doing-More-With-Less-/3560061

Data and records whether personal, official or professional bears utter importance to the concerned individual or business. When lost, at times it is unrecoverable. So, it is evident that negligence in case of Data security is often penalizing. Data loss is a major concern for every computer user unless any effective data security measure is implemented. Hence, its advisable, to imply a Data security and PC protection program and not to keep waiting until a havoc data loss occurs leaving you bewildered.

Presently it is observed that highly confidential data, both personal and official are often stored digitally or in computer storage devices. Today one cannot afford to make mistakes with their private data. Hence, encryption and file protection is todays call. In spite of being aware of anti-virus protection and on-line security programs, protection for the confidential stored information is often taken for granted.

Personal computers are most widely used for generously storing data and information in the form of files, folders, photos, songs, films, or even eBooks. No sooner than a hard drive malfunctions, the complete data storage turns, blank, apart from getting your computer repair. Before you are at such a mess, get exposed to the best possible ways to keep your data secured and confidential as per your preference. For your help you can even get in touch with tech support providers and learn about the most appropriate ways to keep your data a hush-hush affair.

Lets look into the possible ways to safe and secure data and PC security protection systems.

Antivirus and PC protection Programs:

Such losses are often, also a result of virus and malicious attacks. It further leads to data hacking. To add on to the misery, computer repair gets added to the list. Hence, using an adept Antivirus program for a PC is a mandate for a secure digital storage. Use the best and compatible Antivirus available and you can safeguard your PC from the wicked intruders.

External Hard Drive:

You can consult an Tech Support provider in this aspect to implement the best available data storage facility. One of the most common and popular method is to simply use an external hard drive for your laptop or desktop computer. Just keep a copy of your important data in your external hard drive from your normal data drive. This would help you maintain a spare storage device for your facts and figures such that it remains untraceable by the folks hacking into it through the internet access. But in case there is a fire breakout or burglary occurs, your external hard drive may be at risk along with your computer.

Online Storage Company:

Online Storage Company is one of the most effective alternatives in case of data storage. To keep a regular track of the existence of your data you can access it from anywhere through internet and fire break out is not at all a point of concern. The only two points of concerns are the monthly cost and the risk of online data hacking mishaps. These problems also apply to people that get a VPS.

Virtual Private Server:

A VPS or a virtual private server operates as a remote computer. The best part of it being the data protection aspect as well as operate software programs from it. It provides every user with a unique IP address, which one can put it to use when instead of the personal IP address. Hence, the unique IP address helps you to access to sites which doesnt allow you to access using your personal IP.

Cloud Data Protection :

Yet another simple method to keep the valuable data of your enterprise protected under enterprise cloud storage solution. This helps you to access and recover your data and information through a simple and easy way. To add on to the advantage it is known that Offsite info security through enterprise online backup owes a simple and cheap set up process.
For more vivid and informative details on PC security and Data protection you can get your queries resolved by online tech experts or the technical support providers.

Article source: http://www.articlesnatch.com/Article/Don-t-Wait-Until-It-s-Too-Late--Keep-Your-Data-Protected/3564706

Set your Twitter account name in your settings to use the TwitterBar Section.