Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 164

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 167

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 170

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 173

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 176

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 178

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 180

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 202

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 206

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 224

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 225

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 227

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/includes/class.layout.php on line 321

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/admin/class.options.metapanel.php on line 56

Warning: Creating default object from empty value in /home/ethical/public_html/wp-content/themes/platform/admin/class.options.metapanel.php on line 49
cloud security | Certified Ethical Hackers Security Analyst Malware Hacking Information
Currently viewing the tag: "cloud security"

Widespread economic uncertainty and decreased budgets have forced top-level Information Security executives to utilize alternative technology and invest in the existing workforce creating an onslaught of new information security issues.

February 6, 2012, Albuquerque, NM- 2012 brings an unfamiliar set of challenges for Chief Information Security Officers (CISO). The troubled economy and increased economic uncertainty has led many to seek alternatives to doing more with less. However, new initiatives such as implementing more cost efficient technology, with cloud computing being top-of-mind for many executives, and investing in existing resources, like the workforce, come with a set of security and training challenges.

Guidelines to address these challenges were developed at EC-Council’s Inaugural CISO Executive Summit in December 2011. Over 40 prominent top-level executives from the private, public, and government sectors gathered to collaborate on information security (IS) best practices. The corporations and agencies included: IBM, Motorola, TransUnion, Abu Dhabi Securities Exchange (ADX), Sallie Mae, Blue Cross Blue Shield, Deloitte Touche, U.S. Department of Treasury, U.S. Army Reserve and Department of Defense. To view the full report complete with key takeaways or to attend or speak at upcoming CISO Executive Summits, please click here.

The information security topic of responsible implementation of cloud computing was one of the focus areas of the CISO Executive Summit.

Ben Eu, Program CISO at IBM, and Raymond Soriano, Director of Security Privacy Services and Cyber Threat Vulnerability Management at Deloitte Touche, served as co-chairs on the “Embracing the Cloud and Mitigating Surrounding Threats” panel discussion. Summarizing the panel discussion, they stated that in order to mitigate threats posed by the cloud, top IS professionals must:

Perform due diligence and consider satisfactory levels of Right to Audit and other measures within contracts.

Consult with business to understand the requirements and risk tolerance for cloud solutions.

Engage with Internal Audit to help support and drive additional control with cloud solutions applied for the organization.

Another challenge that awaits CISOs in the New Year is ensuring the IS team they lead consists of highly skilled professionals who are ready to mitigate risks associated with cloud computing and other technologies.

According to “The IT Skills Gap”, an article written by Andrew Horne, practice director at Corporate Executive Board, another one of the CISO’s most serious challenges is the lack of adequate skills in prospective and current IS employees. It is projected that demand for certain roles in the IS field will increase by over 200% within the next 5 years. Horne goes on to say that, “As key IT skills are in short supply, and the few people with those skills are not going to be pried loose from their current employers, the only option for CISO’s is to develop existing employees.”

Co-chairs of “Structuring and Managing Your Infosec Workforce”, Jerry Chappee, Chief Information Assurance and Operations Officer for the U.S. Army Reserve, and Jeffrey Vinson, Director and CISO of SecureNet Payment Systems, stated that one of the best ways to improve the skills of the existing workforce is by investing in certifications, “Leaders of the organization need to support their people and show them the importance of certifications. More specifically, how the certification directly supports the business and keeps information more secure.”

2012 will have its share of challenges and obstacles to overcome. The tough economic climate and mantra of “doing more with less” will prompt Information Security leaders to come together and share knowledge and ideas. It is the mission of the CISO Executive Summit Series to unite the top Information Security (IS) leaders across the world in the fight against cyber crime and IS threats, while providing a platform for continuous learning where the most recent IS threats and landscape evolution can be discussed and debated.

EC-Council is committed to providing Information Assurance Executive Professionals with the latest Information Security news and trends from the industry’s leading experts. Readers are also encouraged to look into EC-Council’s Certified Chief Information Security Officer (C|CISO) Certification and EC-Council’s CISO Executive Summit Series.

Contact:

Marissa Easter Marketing Communications Specialist (marissa.easter@eccouncil.org)

About EC-Council CISO Executive Summit Series:

EC-Council CISO Executive Summit Series strives to unite the top Information Security (IS) leaders across the world in the fight against cyber crime and IS threats, while providing a platform for continuous learning where the most recent Information Security threats and landscape evolution can be discussed and debated. Designed by EC-Council, the 1st in the CISO Executive Summit Series made its debut in Las Vegas, NV in December 2011. Due to the nature of the discussions, all CISO Summits are closed-door events open only to senior information security executives (C-levels, VPs, Senior Directors, etc.). http://www.eccouncil.org/cisosummit

About EC-Council:

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in cyber security and e-commerce. It is the owner and developer of 20 security certifications, including Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), Certified Security Analyst/Licensed Penetration Tester (ECSA/LPT) and Certified Chief Information Security Officer (C|CISO). EC-Council has trained over 90,000 security professionals and certified more than 40,000 members. EC-Council’s certification programs are offered by over 450 training centers across 87 countries. These certifications are recognized worldwide and have received endorsements from various government agencies including the U.S. Department of Defense via DoD 8570.01-M, the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). EC-Council also operates EC-Council University and the global series of Hacker Halted information security conferences.

Article source: http://www.articlesnatch.com/Article/Ec-council-s-Ciso-Executive-Summit-Develops-Solutions-To-Challenges-Of--doing-More-With-Less-/3629636

With more usage of computers for communication than pen and paper, following computer ethics have become a must for each and everyone! This article highlights the points that throw some light on the importance of computer ethics and how they contribute into a better and safe usage of computers in our daily life. With the introduction of computers globally in the 1990s, the entire approach of working, communicating and storing important information has been changed. I mean who would have thought that a machine can make one convey a message at any corner of the world with just a click of a button, when it took days for them to receive letters and telegrams! Who would have thought that computers will give us the access to all the information across the globe through the use of internet. I mean, who goes to libraries these days to read books on history and ancient cultures when you can sit at home and surf each and every information. With computers giving us so much of ease and freedom, there are high chances that this freedom may be used in an ‘unethical way’. This is where the role of computer ethics come into picture. What is the importance of computer ethics in today’s world? The following section discusses the same.

Why is it Important to Follow Computer Ethics?

What are ethics? Well, ethics are the moral values that stop you from doing anything that is not legal and that does not harm or damage anyone else’s work, or interests. Ethics are something that are embittered in us from childhood. Remember when the teacher said, “Do not copy others homework”? Or when the monitor asked to stand in the line. These simple etiquette and ethics help the environment to be more safe, friendly and co-operative for others around. Computer ethics are nothing but how we use our personal morals and ethics while using the computer for various purposes. Computer ethics consists of all the rules that you would apply to not misuse any information that is not yours to use, or to access any data that is not owned by you. With issues like cyber crimes, plagiarism, hacking and password thefts, it has become important to know the importance of computer ethics to be able to create a safe computer based environment.
Prevents Misuse of Personal Information
Computers have made the world come closer, be it personally or professionally! Most of us find it more convenient to shop online rather than going out. For this we are asked to give out our personal information like name, date of birth and most importantly, our ‘credit card information’! Ask yourself, if you know that people don’t follow computer ethics everywhere, would you feel safe to give out all this information? On the contrary, if you have read their privacy policies and know that they abide by the cyber laws and computer ethics, you know for a fact that your personal information will not be misused.

Prevents Theft of Intellectual Property
What is intellectual property? Well, unlike physical forms of properties like car or house, intellectual property refers to the property created by the mind! The internet consists of various intellectual properties which includes works of various researchers, writers, song artists and so on. Without the presence of computer ethics, the work created by the intellect of one person can be easily copied and plagiarized by someone else. Imagine how you would feel if your poetry has been copied and publicized under someone else’s name? Now do you know what following computer ethics and privacy policies is important?

Prevents Loss of Various Jobs in the field of Software Development
There are thousands of people globally that are working in companies that develop computer programs and software. However, if we find out a way to get these software without having to pay the price, most of us would prefer piracy over paying, right? Have you ever wondered, how this can cost the employees working in these companies their job. The general mentality of most of the people downloading software illegally is that these companies are very rich and it really wouldn’t affect them…, even if it does, who cares? However, the point to be kept in mind is, what if the one who had to pay the price is someone close to you. Imagine, there are thousands of people getting involved in unethical downloads and distribution. In fact, a report reveals that a significant number of the people prefer never to pay for a software and get involved in piracy!

Keeps you from being Unethical!
It’s not that you need to follow computer ethics to show others. However, by following the commandments of computer ethics, you would know what you need to do to be a responsible user and keep yourself from getting into trouble by being unethical. Trouble? Well, yes, there are various laws that can put you behind bars if you are caught violating the privacy policies and norms of individual websites. I remember reading that a school had to pay almost $5 million as fine for using pirated software, it was later that they realized that getting a license would have been much more economical.

Makes Your Computer a Better and Safe place to be At
Your computer is not just an electronic device for communication, it is your data store, your photo album, your work recorder, your social network, your calculator and what not…it is what you are! If you get involved in downloading information or accessing portals that you are not allowed to, you are opening the doors of various issues and threats like viruses and Trojans that can illegally enter your system and crash it completely! On the other hand, if your system is used in the way it is supposed to, you are creating a safer and a better atmosphere wherein you can rest assured that your work and your personal information is absolutely safe and secure.

Computer ethics are something that cannot be imposed on you, it is rather something that should be followed out of your own will and desire. The way you use the computer to access information speaks a lot about you and your ethical values. What would you do if you get your colleague’s password? Would you ask him or her to change it since you accidentally found out, or would you try to get some information that you are not supposed to? There are two kinds of people in this world, one who follow the rules and respect them at the same time, and the others who don’t really care. Should you care about the importance of computer ethics? You decide! Nevertheless, if you are caught, rest assured the authorities won’t care about you as well!

For more information: http://www.electrocomputerwarehouse.com

Article source: http://www.articlesnatch.com/Article/Importance-Of-Computer-Ethics--/3630164

Set your Twitter account name in your settings to use the TwitterBar Section.