A ȘASEA CONFERINȚĂ NAȚIONALĂ CIO COUNCIL ROMANIA

Cea de-a VI-a ediție a Conferinței Naționale a Managerilor de IT din România, organizată de către CIO Council și Revista CARIERE, va avea loc pe 16 mai 2018 la Hotel Radisson Blu din București.

Conferința CIO Council este concepută ca un forum care oferă o platformă de rețea pentru CIO-uri și CxO din cadrul organizațiilor de vârf. Participanții vor fi angajați în dezbateri provocatoare și schimburi inovatoare de cunoștințe cu membrii CIO Council și lideri din industrie cu privire la oportunitățile oferite de transformarea digitală și noile trenduri în industria IT.

Evenimentul va reuni peste 250 de profesioniști și manageri din domeniul tehnologiei (CIOs și COOs), oferindu-le acestora o excelentă ocazie de a discuta despre noile tendințe IT: inteligența artificială, automatizare, robotizare, machine learning. Pe măsură ce tehnologia digitală își continuă avansul, noile reglementări GDPR și amenințările de securitate informatică pun o presiune extraordinară pe umerii CIOs și a decidenților din industria IT.

CIO Council este Asociația Directorilor de Tehnologia Informațiilor și Comunicații din România și reunește peste 80 de membrii ce dețin sau au deținut funcția de Chief Information Officer/Director IT în mari corporații românești sau multinaționale din domenii diverse de activitate.

Principalele teme de discuție ale ediției din acest an:

  • Top 10 tendințe digitale pentru anul 2019
  • Creșterea afacerilor prin IoT, AI, machine learning, robotizare și imprimare 3D
  • Viitorul aplicațiilor de business intelligence se bazează pe AI și machine learning
  • Secretul tehnologiei blockchain
  • Data privacy și GDPR – o schimbare culturală majoră în societate.
  • Construirea unei culturi de cybersecurity
  • Cybersecurity pentru automatizarea industrială și sistemele de control
  • Viitorul orașelor inteligente
  • Forța de muncă digitală / Locul de muncă al viitorului. Inteligența artificială poate fi înlocuirea potrivită pentru oameni?
  • Atragerea și menținerea talentului într-un ecosistem digital
  • Sistemul educațional este pregătit să susțină tehnologia inovativă?
  • Agenda digitală europeană

Conferința este sprijinită de către asociația paneuropeană EuroCIO prin prezența dlui Emmanuel Gaudin, Chairman al asociației și CIO Lagardere; CIO Council România reprezintă România în cadrul asociației EuroCIO începând din 2018. Conferința va fi moderată de către Yugo Neumorni, Președinte CIO Council România și Director IT&C, Hidroelectrica.

Ca principali speakeri în siunile dedicate vor fi: Cătălina Dodu, Managing Atos Cybersecurity Business in CEE, Atos; Carmen Adamescu, Partner, Head of IT Advisory Services, EY Romania; Marius Iordache, IP Network Architect, Orange România; Roxana Ionescu, Partner, Head of Data Protection practice, NNDKP; Vlad Tănase, Partner, NNDKP; Vladan Pekovic, Chief Technology and Information Officer, Telekom Romania; Cătălin Popescu, CIO Council Member; Radu Brașoveanu, CIO Council Member; Liviu Buligan, Executive Director SoftOne România și alții.

  • Supporting Partners: DELLEMC, Atos, Orange România;
  • Parteneri: NNDKP, SoftOne, EY România, Softline, Bitdefender, Telekom România, Relational și Informatica;
  • Networking Partners: SoftwareONE; Koding, Crescendo, ASBIS România;
  • Parteneri media: Revista HR Manager, HR Club, Biz, Wall-Street, Portal HR, Jurnalul de Afaceri, Repatriot, Elite Business Women, Business Review, ISACA, Agora, Market Watch, ANIS, ARASEC, CloudMania, RisCo.

Mai multe informații despre speakeri, agenda și înregistrare puteți găsi pe site-ul evenimentului:  www.cioconference.roPentru înregistrarea la eveniment accesați http://www.cioconference.ro/register

Advertisements

CYBERSECURITY TOP EVENT OF THE YEAR IN ROMANIA, SIBIU, 13-16 SEPTEMBER 2016

cybersecurity-cover

Former European Capital of Culture in 2007, Sibiu is transforming few days per year in a Cybersecurity European Capital. It is one of the happy collaboration situations in which a private initiative of some enthusiastic organizers enjoy a total support from international institutions, from government organizations and from technology community.

The 4th Edition of the “Cybersecurity in RomaniaCongress is organised by the Swiss WebAcademy, in collaboration with Security Brokers International, New Strategy Center, Agora Media Group, and iBusiness.

The Cybersecurity Congress will be held in Sibiu (Hotel Ramada and Hotel Golden Tulip) on September 13th-16th 2016, under the high patronage and in the presence of the Swiss Ambassador in Romania, H.E. Urs Herren.

Like in the precedent editions, the ITU (International Telecommunication Union, UNO-Geneva), is offering the main support in Cybersecurity Congress 2016 by the presence of its cyber-security division and sustaining the presence of many internationally renowned specialists.

The value of the event is demonstrated by the interest of major government organization like the Romanian Intelligence Service (SRI) – represented by the CYBERINT Center, as well as the General Inspectorate of the Romanian Police (IGPR), the ANCOM (Romanian National Authority for Management and Regulation in Communications) and the CERT-RO (Romanian National Computer Security Incident Response Team) which decided to become partners too.

header-cyber-2016-2More important European actors accepted to become partners: The Ministry of Security and Economy of the Swiss Canton of Geneva – represented by the Geneva State Police, the center of the Special Telecommunications of the Republic of Moldova – represented by the Cyber Security Center CERT-GOV-MD, the Global Cyber Security Center (GCSEC) of the Italian Posts and the Listeners Institute of Higher Studies for National Defense in Franche-Comté (AR10 of the IHEDN).

Among professional partners, the congress is backed by two powerful associations, the CLUSIS (Swiss Association of Information Security) and its Romanian counterpart, the ANSSI (Romanian National Association for Information Systems Security).

cybersecurity-awareness-day-2015

Cynersecurity 2015 – Awareness day Success

According to the organiser’s concept the Cybersecurity Congress is the only non-technical and non-marketing orientated event in Romania – and one of the few in Central and South-Eastern Europe – in the IT&C security field. The event is addressing to both national and international experts, oriented towards international cooperation and real public-private partnership models of success identified at the global level.  Moreover, this co-participation formula is rising the international trends awareness, providing all the necessary information on security threats and data protection measures to be taken by the CEOs and decision-makers.

This formula helped the Congress to grow in quality and internationality, reaching new horizons and being since 2015 promoted as “best practice example” by the International Telecommunications Union (ITU). The first day of the Congress is dedicated special awareness training offered by specialists in two sessions:

  • One awareness training for children and teenagers
  • A non-technical security training for CEOs and executive levels.

For more details about Location, Program, Participants, Speakers and Partners list, please visit Cybersecurity Romania official Web page

 

 For Last Minute Registration just access the dedicated Web page

 

IDC IT Security Roadshow: Reaching The New Frontiers in Data Protection

 IDC2 Cover

2nd article: Facing to invasion of more and more sophisticated data security threats business leaders push IT to deploy new technologies and services.

Continuing presentation of the IDC IT Security Roadshow organised in April 14th in Bucharest, will try to review the most important security issues discussed during keynote presentations and panel sessions.

Expose the Unknown – most important driver of data prevention for Check Point

One of the hottest subjects in the industry now is zero-day attacks prevention. According to Check Point a “zero-day” exploit is any vulnerability that’s exploited immediately after its discovery. We speak here about rapid attacks that take place before the security community or the vendor knows about the vulnerability, or has been able to repair it. Such kind of exploits are a Holy Grail for hackers because they take advantage of the vendor’s lack of awareness and the lack of a patch, enabling the hacker to wreak maximum havoc. Zero-day exploits are often discovered by hackers who find a vulnerability in a specific product or protocol. Once discovered, zero-day exploits are disseminated rapidly, typically via Internet Relay Chat channels or underground Web sites. From practice, detailed information about zero-day exploits are available only after the exploit is identified.

IDC2 Check Point

Source: IDC

“Increasing your enterprise security often means increasing your complexity and management challenges in kind. Check Point delivers a multi-layered line of defence to help you maximize your security while minimizing challenges and closing gaps”, said Cezar Varlan – Security Engineer, Check Point Software Technologies

Trying to cover multiple-layers potential vulnerabilities, many organizations are investing in a disparate mix of new security technologies from a variety of vendors. All these tools provide punctual advantage but each must be managed individually, including reporting, provisioning, configuration and testing tasks.

Check Point offers a comprehensive solution, with a full range of interoperable threat prevention blades, common policy management and monitoring, and maximum protection from emerging threats. Attackers have become more creative, reaching corporate resources with modern and complex malware attacks. Check Point SandBlast Zero-Day Protection combines innovative technologies to proactively protect against even the most dangerous targeted attacks and unknown malware, while ensuring quick delivery of safe content.

Staying ahead of the threat with Fortinet

IDC2 Fortinet

Source: IDC

Today’s threats are increasingly sophisticated and often bypass traditional malware security by masking their maliciousness. As these attacks become more advanced, organizations must similarly improve their security posture. Why do these breaches continue? “Extreme focus on compliance, reacting only to known threats, and existing of to many point solution are between main reasons”, said Adrian Danciu – Regional Director, South Eastern Europe, Fortinet. “More that, the lack of a defined perimeter offers a borderless attack surface.”

Fortinet solutions are based on a deep segmentation for protection against outside and inside threats, proactive Mitigation, Advanced Threat Visibility, and Flexible Deployment Fortinet Advanced Threat Protection relies on multiple types of security technologies, products, and research applied from the network edge through to endpoint devices. To deliver the most effective protection, they are integrated to work together automatically, continuously handing off data from one to the next to identify, evaluate and respond to attacks.

Fortinet Advanced Threat Protection Framework delivers end-to end protection across the attack chain, based on three elements which work hand-in-hand:

  • Prevent – Act on known threats and information
  • Detect – Identify previously unknown threats
  • Mitigate – Respond to potential incidents

Fortinet was recognised as major player in fastest growing market segment – network security and WLAN market (IDC, 2015), largest network security appliance vendor (units) and quickly growing (IDC – Worldwide Security Products), and second largest provider for Data Center Firewall (Infonetics research).

Applying probabilistic mathematics and machine learning to cyber threat discovery

Very interesting point of view opened by Darktrace and Safetech, based on major role machine learning could have in probabilistic identification of cyber threats.

Image result for machine learning darktrace

Source: Darktrace

Machine learning can be thought of as the third and most recent machine revolution. The first was the replacement of muscle by machine in the industrial revolution. The second involved computers taking over repetitive tasks that had originally been done by people. Machine learning represents computers being able to undertake complex thoughtful tasks.

Darktrace’s technology is powered by advanced machine learning, allowing it to learn what is normal for a company’s network environment, so that it can then determine if any behaviour is abnormal. This allows it to detect cyber-attacks of a nature that may not have been observed before, the unknown unknowns. The ability to self-learn and adapt to a changing environment in real-time allows organizations to reconcile the need for an interconnected workforce, customer base and supply chain, whilst ensuring that they protect against serious, existential threats to their businesses in the most effective and pragmatic way possible.

Legacy approaches to cyber security embody the second revolution: people describe what an attack looks for, and then ask the computer to look for a match to that description. Darktrace turns this paradigm on its head, embodying the third machine revolution: the computer analyses the data and finds areas that merit human interrogation. It is this capability that allows Darktrace to abandon the legacy approach of rules and signatures, and analyse even fast-moving, sophisticated and unknown threats in real time.

“Our vision is to apply human intelligence to cyber defence through revolutionary technology. Deep expertise in cyber defence operations and ground-breaking, self-learning technology allows organizations to keep up with the speed and sophistication of today’s attackers, “said Mateusz Flak – Cyber Security Regional Manager, Darktrace. “The age of surrounding your information with higher and higher walls is over. Legacy approaches permanently leave you a step behind. Darktrace moves at the same speed as the threat, automatically learning from an organization’s ongoing activity in real time to detect threat behaviours as they emerge.”

New approach for modern threat prevention coming from Palo Alto Networks

IDC2 Palo Alto 2

Source: IDC

Most important is everybody should understand the prevention is no negotiable. The Palo Alto Networks’ strategy for modern threat prevention is based on five simple processes every organization should implement, each of them having a well-established actions:

  • Everything must go in the funnel
  • Reduce the attack surface
  • Block known threats
  • Test and adapt to unknowns
  • Investigate and respond
  • Investigate indicators

One of most frequent cyberattacks are ransomware messages. Attackers have traditionally profited by stealing identities or credit card numbers, and then selling them on underground markets. According to the Verizon Data Breach Investigations Report, the

price for stolen records has fallen, so cyber attackers are on the hunt for new ways to make a profit. Due to technology advances in attack distribution, anonymous payments, and the ability to reliably encrypt and decrypt data, ransomware effect is decreasing.

According Palo Alto Networks, the three key steps to protect against ransomware are based on:

  • Preparation – Having a solid backup and recovery strategy in place is the key to recovery if the worst were to happen.
  • Prevention – Segment your network, control access, stop known malware, and quickly detect and prevent unknown malware as it arises.
  • Response – Understand the latest ransomware families and campaigns. Have a plan in place for engaging law enforcement agencies.

To better deserve the threat and attacks research Palo Alto Networks opened Unit42, with clear mission to analyse the data available to Palo Alto Networks to identify adversaries, their motivations and resources to better understand the threats our customers face.

Other valuable principle developed by Palo Alto is based on comprehensive concept of Threat Intelligence. What is Threat Intelligence? “Evidence-based knowledge, including context, mechanisms, indicators, implications and actionable advice, about an existing or emerging menace or hazard to assets that can be used to inform decisions regarding the subject’s response to that menace or hazard, “ explained Peter Lechman – Regional Sales Manager – Eastern Europe, Palo Alto Networks, during his keynote in IDC Roadshow from Bucharest.

A new approach to security from Symantec

Knowing how cyber-criminals are threatening security is the first step to securing information—and any company’s goals. From data breaches to digital extortion, the 2016 Symantec Internet Security Threat Report leverages an unparalleled amount of data and is the resource you need to quickly uncover digital threats.

Here are the main key finding pf the last edition of ISTR, presented by Christos Trizoglou – Regional Manager of MiTech Systems, Symantec in his keynote from Bucharest:

  • A large business attacked once in 2015 was likely to be attacked 3 more times

    IDC Sala 3

    Source: IDC

  • 50% of all targeted attacks were against small businesses
  • 55% increase in the number of spear-phishing campaigns attacks in 2015
  • 3out of 4legitimate websites found to have unpatched vulnerabilities
  • 125% increase in the number of zero-day vulnerabilities discovered
  • 100 Million Technical Support scams blocked
  • 35% increase in crypto-ransomware as it spread beyond end-users to holding businesses hostage
  • A record 9 mega breaches occurred in 2015
  • 430 Million new pieces of unique malware discovered

Symantec is ready to deliver a unified security intelligence platform that leverages the combined visibility and intelligence of all of his offerings (augmented by 3rd-party data) to block, detect, and remediate attacks, protect information, and reduce risk. Best Practices provided by Symantec are based on following advices:

  • Don’t get caught unprepared – Use advanced threat intelligence solutions to find indicators of compromise and respond faster to incidents;
  • Employ a strong security posture – Implement multi-layered endpoint security, network security, encryption, strong authentication &reputation-based technologies. Partner with a managed security service provider to extend your IT team;
  • Prepare for the worst – Incident management ensures your security framework is optimized, measureable and repeatable, and that lessons learned improve your security posture. Consider adding a retainer with a third-party expert to help manage crises;
  • Provide ongoing education and training – Establish guidelines & company policies and procedures for protecting sensitive data on personal and corporate devices. Regularly assess internal investigation teams—and run practice drills—to ensure you have the skills necessary to effectively combat cyber threats.

 Internet Identifiers – Your Most Undervalued and Under Risk Assets?

IDC2 Internet Security ICANN

Source: ICANN

Very interesting subject proposed by ICANN which considers Internet Identifiers for both vulnerability place and security asset. ICANN (Internet Corporation for Assigned Names and Numbers) is a not-for-profit public-benefit corporation with participants from all over the world dedicated to keeping the Internet secure, stable and interoperable. ICANN mission is to preserve the security, stability and resiliency of the Domain Name System and domain name registration services, to promote user confidence and trust in these systems.

Obviously identifiers are common targets for loss, misuse or abuse. Domain Name are subject of various attacks, having as consequence loss of Web services, public defacement, eMail or eCommerce functions disruptions. IP addresses damages conduct to network disruption and data exfiltration. Autonomous System Numbers breaks can generate disruption of global communications systems and largescale loss of commercial hosting.

IDC ICANN

Source: IDC

From Risk Mitigation perspective Internet Identifiers could be considered as assets. The best practice is based on quick adoption of standard risk management practices: regular evaluation of organization’s identifier assets, correct appreciation of the threat landscape and the vulnerabilities status, managing risks by priorities, and correctly positioning of mitigation techniques against protection costs. Periodic analysis is a strong defense.

Resource and relationship management could play critical roles in Risk Mitigation. “Organizations should know their allies, keeping points of contact for mitigation providers, upstream ISPs, hosting providers, registries, registrars, vendors and security service technical support,” said Andrea Beccalli – Stakeholder Engagement Manager – Europe, at ICANN

A new data protection regulation is born… during IDC conference in Bucharest

A happy coincidence was the final approval of the new EU General Data Protection Regulation has successfully passed through the European Parliament in the same day with IDC conference from Bucharest. Essential regulation and the critical importance for European Commission efforts toward a future Digital Single Market were presented by Bogdan Manolea – Legal Advisor, Legi-internet.ro

European Union (EU) member states will now had two years to pass the new regulations – which were proposed by former EU justice commissioner Viviane Reding four years ago – into law. The data protection reform package includes both the GDPR and the Data Protection Directive for Police and Criminal Justice Authorities. It replaces current rules based on directives laid down in 1995 and 2008.

IDC Security 1

Source: cloud☁mania

Concluding, IDC IT Security Roadshow is a professional marathon inviting industry specialists and business managers to think, to learn and to act against digital security threats. This year IT security conference series investigates the threats to key systems, data, and networks, and the main actions that organizations need to take to secure them. IDC is advising security professionals not only to look at investing in security solutions, but also at people and processes, employees and business partners, helping individuals and organizations to develop a strategic thinking.

 

 

IDC IT Security Roadshow: Cybersecurity as Key Business Effectiveness

IDC Sala

1st article*: A professional marathon inviting industry specialists and business managers to think, to learn and to act against digital security threats.

Data security has always been one of the critical points in the IT industry, which has developed a real phobia for understanding, prevention and threat intelligence that addresses the inherent vulnerabilities of a system. The digital revolution generated by large technologies adoption in business processes has led on the one hand to mitigate risks but also generated new threats associated with key unexplored.

In his permanent engagements in innovative technology research and new trends adoption, IDC is developing a large frame of activities dedicated to data security and data privacy issues. Part of this engagement, IDC IT Security Roadshow examines global and regional trends related to security and provides actionable advice and best practices for organizations in an era of digital transformation.

IDC 3rd PLatformOrganizations increasingly invest in 3rd-Platform technologies primarily to spur business efficiency and improve business agility, and transform themselves into digital enterprises. These digital enterprises have dedicated fewer resources to securing their 3rd Platform-enabled technology infrastructure in recent years. They are now giving a higher priority to deploying advanced security solutions, as next generation technology investments pose higher security risks. IDC predicts that by 2017, over 10% of security investment will be spent in connection with personal data protection and regulatory compliance.

This year IT security conference series investigates the threats to key systems, data, and networks, and the main actions that organizations need to take to secure them. IDC is inviting security professionals not only to look at investing in security solutions, but also at people and processes, employees and business partners, helping individuals and organizations to develop a strategic thinking.

IDC IT Security Roadshow 2016 is first of all a powerful concentration of forces to communicate, to invite, support and disseminate information of the highest value to a heterogeneous community of specialists. It’s hard to organize and to hold an event. IDC Security Roadshow includes 20 events, in 20 locations in 18 countries from CEMA region, addressing over 3000 experts.

Bucharest was the 10th Roadshow location, after  the conferences that have already taken place starting February in Kiev (Ukraine), Prague (Czech Republic), Moscow (Russia), Belgrade (Serbia), Zagreb (Croatia),  Nicosia (Cyprus), Budapest (Hungary), Bratislava (Slovakia), and  St. Julians (Malta).

Until September 2016, other ten conferences will be held in: Warsaw (Poland), Almaty (Kazakhstan), Athens (Greece), Tbilisi (Georgia), Baku (Azerbaijan), Minsk (Belarus), St. Petersburg (Russia), Cluj (Romania), Vienna (Austria), and Tashkent (Uzbekistan).

Tomas Vavra

Thomas Vavra – Associate Vice President Software, IDC CEMA

Bucharest conference gathered together leading specialists in IT and cyber security independent experts, recognized analytics and key market players to discuss about:  threats and vulnerability management, identity & access management, Web security & mobile security, network security, endpoint protection and threat intelligence security services.

Within last three years, many Romanian companies were exposed to an increasing number of cyber-attacks and were forced to take emergency measures to prevent the threat and overcome the consequences. Unfortunately, the number of cyber-attacks will continue to increase exponentially in the coming years. During his introductory keynote, Thomas Vavra – Associate Vice President Software IDC CEMA, presented a series of facts shaping Romanian IT security landscape related to cybersecurity law adoption and the critical importance of European efforts toward a harmonized regulation frame for all the countries. European Data Protection and EU-US Safe-Harbor Privacy Shield are key part of European Commission strategy to create the Digital Single Market.

EU Originl Data Protection Keyboard

Source: EU Commission

A happy coincidence made that just during the conference in Bucharest in April 14th, the European Parliament announced final vote for the long-awaited General Data Protection Regulation (GDPR). EU members will now had two years to implement the new regulations, proposed by former EU justice commissioner Viviane Reding four years ago. The data protection reform package includes both the GDPR and the Data Protection Directive for Police and Criminal Justice Authorities. It replaces current rules based on directives laid down in 1995 and 2008.

Made in practice, GDPR will give citizens of all 28 member states more information on how their personal data is processed, presented clearly and understandably. They have now the right to know as soon as possible if their personal data is ever compromised, while the “right to be forgotten” has been clarified and strengthened. It will also become easier for people to transfer data between service providers, with the introduction of a right to data portability. The EU also said it saw benefits for businesses, with companies having only to deal with one supervisory authority across the EU, as opposed to one in each member state in which they operate.

IDC’s critical considerations exposed by Tomas Vavra in Bucharest refers to the necessity for a correct evaluation of the impact of proposed data protection rules by a continuous monitoring of data processing procedures. Extending existing solutions to meet specific requirements of national and regional data protection regulations is also a must. Any company and any organization had to plan ahead to have data protection solutions in place prior to their impact in business and operations.

IDC Top 3 Cybersecurity Predictions

#1: Data Protection Regulations – By 2019, 25% of security spend will be driven by the EU and other jurisdictional data regulations, leading to a patchwork of compliance regimes;

#2 Data Breach Impact – By 2020, more than 1.5 Billion People will be affected by data breaches, increasing calls for regulation and alternative authentication measures;

#3: Biometric Authenticated Transactions – By 2020, one-fourth of all worldwide electronic transactions will be authenticated biometrically, driven by the use of biometric-enabled devices.

What is clear in this moment is organizations should rethink their security strategies and to adapt their prevention and protection platforms to the new paradigm. In the actual context of digital transformation, data protection and data privacy are between most disrupted factors. Cloud intensive adoption, Internet of Think platform impact in all industries and mobile apps explosion opened new fronts for new vulnerabilities and more dramatic threats.

IDC Sala 3Adoption of 3rd platform and innovation driven business demands security evolution. Next-generation security solutions should be designed for distributed architecture, incorporating intelligent threat tools offered by Big data and Analytics technologies and data security anomaly detection based on contextual awareness and machine learning advanced mathematical models.

One of the newest and most emerging trend in data security is integration of biometric identification technologies. IT providers have quickly adopted alternative identification technics launching new smartphone models with fingerprint sensors, electronic payment with fingerprint reader as secondary validation system, voice recognition sensors in call centers, facial recognition scanners at events, or iris scan authentication at ATMs.

Unfortunately, a long series of incidents caused by hackers who broke biometric safety barriers and stole entire fingerprint data bases dismounted limits of new technologies credibility. A very active opposition is generated also by a large diversity of lobby groups demonstrating against privacy issues generated by large biometrics adoption.

In his critical considerations and advises for the industries, IDC specialists recommend a carefully adoption of biometric technologies and only as supplementary identification. Passwords are not death.  Any biometric system should be designed on deeply analysis of customer behaviour, consolidating the traditional methods of biometric data protection.

Ending opening keynote Thomas Vavra outlined the IDC’s key takeaways relating to security protection and data privacy:

  • Organizations should achieve full compliancy to rapid development of national and regional regulations;
  • Legacy security solutions are insufficient against modern and advanced threats opened by digital transformation;
  • New strategies should be based on intelligent solutions and services, engaging expert partners able to deliver proactive prevention;
  • 3rd Platform development requires optimum solution for improving identity and authentication;
  • Security specialists are key assets in any organization which should consolidate more efficient recruitment and retention program, providing also properly security training for all employees.

Concluding, we have to be optimistic. Keep strong passwords and your data will be safe. Even for security industry the best is yet to come. The staffing impact of the GDPR will be huge. More than 28,000 data protection officers (DPOs) will be required in whole Europe alone according GDPR regulations, says the International Association of Privacy Professionals (IAPP).

*Note: This is the first episode in a mini-series of articles dedicated to Bucharest conference included in the IDC IT Security Roadshow.  

Photo Sources: IDC

IDC IT Security Roadshow 2016 – Bucharest 14 April

http://idcitsecurity.com/bucharest/register

By 2020, more than 1.5 billion people worldwide will be affected by the breach of their personal data. This situation creates a strong need for regulation and the need for alternative authentication data access.

 

IDC IT SECURITY ROADSHOW examines global and regional trends related to security and provides actionable advice and best practices for organizations in an era of digital transformation. This year’s series investigates the threats to our key systems, data, and networks, and the steps that organizations need to take to secure them.
We will not only look at investing in security solutions, but also at people and processes, employees and business partners, and strategic thinking.

KEY THEMES OF IDC IT SECURITY ROADSHOW 2016

  • EU Data Protection Regulations
  • Data Breach Impact
  • Biometric Authenticated Transactions

 

„IDC predicts that by 2017, over 10% of security investment will be spent in connection with personal data protection and regulatory compliance.”

Mark Child, IDC Research Manager, Software & Enterprise Applications

 

WHO YOU ARE GOING TO SEE AND HEAR
Virgilius Stanciulescu Virgilius Stanciulescu, Head of IT Network Administration Office, ANCOM
Bogdan Manolea Bogdan Manolea, Consultant, Legi-internet.ro
Andrea Becalli Andrea Becalli, Stakeholder Engagement Manager Europe, ICANN
Peter Lechman Peter Lechman, Regional Sales Manager, Eastern Europe, Palo Alto
Dana Samson Dana Samson, Senior Research Analyst, IDC Romania
Cezar Varlan Cezar Varlan, Security Engineer, Check Point Software Technologies

You may check the latest information on the agenda, here: 

idcitsecurity.com/bucharest/agenda

ATTENDEES

  • Chief Security Officers
  • Directors of Enterprise Security
  • CIOs
  • CTOs
  • CISOs
  • IT Strategists/Specialists
  • Privacy Officers
  • IT Managers
  • Heads of Departments
  • Heads of Digital Strategy
  • Network Security Managers
  • VPN and 3A Managers

 

REGISTER NOW

 

DESPRE ROCS DIN FATA, DAR MAI ALES DIN SPATELE CORTINEI…

ROCS logoA trecut si ROCS 2015! Cum se mai duce timpul… Cea de-a 21-a editie s-a desfasurat in perioada 25-26 Noiembrie si a avut ca motto: „21 products and technologies who made IT”, adica: Internet – Microprocessor– PC – Client/Server architecture –VOIP – Mobile Telephony – Broadband Communications – Wireless – AI – BPM – BI – CA- Virtualization – Cloud Computing – Data Center – Big Data – Laptop – iPhone – IoT – Smart everything – Tablets”.

ROCS-ul are pentru mine o semnificatie speciala, pentru ca practic am „jucat aici in toate posturile”: membru al echipei care a gandit conceptul si a organizat primele 6 editii, partener de business din partea unui renumit producator de software pentru alte 4 editii, partener si speaker pentru solutii de avangarda la alte 7-8 editii, si in fine, moderator pentru cel putin 2 editii, printre care si cea din anul acesta, cand…

A fost asadar a 21-a editie a celei mai longevive manifestari de business din industria autohtona de IT. Si asta spune multe. In 1994, cand tanara si entuziasta echipa de la IDG Romania punea bazele Romanian Computer Show nimeni nu isi putea inchipui cum o sa evolueze lucrurile… In acei ani traiam un moment de reala emulatie generat de cresterea de popularitate a PC-urilor in randul utilizatorilor casnici, dar si de elanul tineresc al industriei autohtone bazate pe vremea aceea pe cativa piloni: nucleele de programatori din casele locale de software si mica industrie a asamblorilor locali, care erau in acelasi timp si dealeri pentru diferitele componente. Era o vreme in care computerele de la Compaq sau HP nu aparusera inca oficial in Romania si brandurile locale incercau sa se afirme prin certificari si standarde internationale. Cu cateva mici exceptii, marii vendori mondiali inca nu isi deschisesera subsidiarele din Romania…

turnirIn acea perioada presa de IT incepuse sa se consolideze, dar si sa se diversifice. Exista deja o competitie, ceea ce era bine, pentru ca asta genera calitate. Pe vremea aceea nu existau rubrici de IT in presa cotidiana sau in revistele de business. Dar exista deja un continut editorial de mare valoare in presa de specialitate, care renuntase la simpla traducere de comunicate sau de analize de produse realizate in laboratoare din SUA, Franta sau Germania… Cresterea experientei in analize si evaluari editoriale a condus la realizarea unor proiecte, cu certa contributie in sustinerea si dezvoltarea industriei locale. Era momentul primelor ghiduri despre piata din Romania, precum cel al producatorilor romani de software (ROSI), al asamblorilor locali sau al primelor cafenele Internet… Era momentul primelor actiuni 100% originale dedicate unei piete in plina ascensiune. Era momentul primului Turnir Antivirus din Romania, despre care am amintit si la sesiunea de Cybersecurity de la recenta editie ROCS, o abordare originala si deosebit de temerara a uneia dintre cele mai serioase probleme de la emanciparea sistemelor individuale de calcul: securitatea si confidentialitatea datelor.

ROCS 2008Si de atunci, chiar daca in mod firesc, de-a lungul timpului au intervenit o serie de transformari de organizare, precum concentrarea pe un program mai dens de conferinte sau parteneriatul cu echipa de evenimente de la Agora Grup, ROCS-ul a reprezentat un fanion al industriei locale de IT, un motor pentru prezentarea si discutarea noilor tendinte, dar si forum de dezbateri legate de impactul pentru business al inovatiei tehnologice. Cu alte cuvinte, ROCS-ul a reflectat an de an evolutia si impactul tranformarilor digitale…  Printre cele mai importante exemple de premiere care au avut loc la ROCS imi amintesc de: prima conferinta nationala de ERP, primul workshop dedicat analizei financiare ROI si TCO, primul colocviu al producatorilor locali de PC-uri, prima prezentare de Cloud si de solutii eHealthcare, precum si o serie intreaga de lansari de noi solutii si alte premiere pentru piata de IT din Romania. Cine isi mai aduce aminte, este rugat sa ma completeze.

ROCS 2003Important este ca, indiferent de ce s-a intamplat in timp, si s-au intamplat multe, ROCS-ul a ramas un pol al conferintelor de business si al discutiilor despre impactul tehnologiei, dovedind ca in ciuda varstei, ramane acelasi spirit tanar si oferind auditoriului abordari originale si de valoare asupra realitatilor momentului. Pe linia acestei abordari, actuala editie a avut o structura bipolara, focalizata pe doua mari tematici care sunt de continua actualitate: evolutia pietei de solutii si servicii si securitatea informatica.

Astfel, prima zi de ROCS 2015 s-a axat in jurul dezbaterii legata de cele mai imperative provocari ale momentului, la care au participat reprezentanti ai asociatiilor profesionale ARIES, ANIS si CIO Council si managerii unor companii care au fost prezente si pe agenda de prezentari precum: Dynatrace – la prima prezenta publica in Romania, InfoWorld, ESRI, Ymens sau Totalsoft. De un interes deosebit s-a bucurat expunerea lui Eugen Schwab-Chesaru, Group Vice President – Research, Vice President – CEE la PAC, care a analizat piața de software și servicii informatice ce parcurge o perioadă de re-orientare.

Avand in vedere importanța domeniului securitatii datelor in cyberspace precum si impactul “razboiului nevazut”, panelul dedicat din ce-a de-a doua zi de RoCS a reunit o serie personalitati si de organizatii  reprezentative precum Florin Cosmoiu – director al National Cyberint Center SRI, Toma Campeanu – director executiv ANSSI (Asociatia Nationala pentru Securitatea Sistemelor Informatice), dr. ing. Alexandru Groseanu – presedeinte Research Center for Security, Crisis Managemet and Conflicts Preventions, Ionut Stoica – inspector principal de politie in cadrul IGPR, Marius Amza – IT manager la Swiss WebAcademy si Dan Modoran – director Tryamm. Am avut onoarea ca alaturi de Mihaela Gorodcov sa moderez acest panel de discutii, care in ciuda tematicii senzitive in perspectiva contextului regional si international, a fost dominat de un dialog extrem de deschis si bine argumentat cu privire la factorii majori care modifica si dinamizeaza politicile de cybersecurity, educatie si protectie a datelor. S-a discutat pe larg despre situatia existenta in administratia publica locala, in educatia cibernetica, despre proiectele de colaborare internationala si mai ales despre necesitatea adoptarii cat mai rapide a unor norme coerente.

Ca si in cazul altor probleme majore unde educatia si programele de constientizare au o mare importanta, s-a discutat despre viitorul generatiei digitale si pericolele care ii pandesc pe copii si pe adolescenti odata cu consumerizarea tehnologiilor mobile si a retelelor sociale. A fost o placuta surpriza pentru audienta sa aflam ca exista deja o cooperare internationala intre Swiss WebAcademy si autoritatile competente din Romania, care pe langa organizarea unor congrese de cybersecurity a lansat un program de educare a elevilor si tinerilor, cu un proiect pilot bazat pe multiple activitati, derulat deocamdata doar la Sibiu. Voi reveni cu informatii mai detaliate despre acest program.

A trecut si ROCS 2015! Cum se mai duce timpul…

INSTITUTUL BANCAR ROMAN SI CIO COUNCIL VA INVITA LA CYBERTHREATS 2013

bannaer cyberthreatsInstitutul Bancar Roman si CIO Council Romania organizeaza pe 16 Octombrie, incepand de la ora 9.00, la sediul IBR din Bucuresti, cea de-a VI-a editie a conferintei CYBERTHREATS.

Securitatea informatică a intrat intr-o noua era. Institutiile financiar-bancare tind sa atinga acel nivel de maturitate care le determina sa constientizeze beneficiile securitaţii informtiilor, dincolo de obligaţiile impuse prin reglementări. Criza globală şi naţională a generat pierderi la nivelul sistemului financiar-bancar, ca urmare a lipsei unei viziuni, unui sistem global de securitate informatică şi unor competenţe relevante şi certificate. Abordarea sistemică determină trecerea la o fază superioară de prevenţie, macro-prundentiala.

IBRIn acest context, principala tematica dezbatuta in cadrul acestei conferinte vizeaza « SECURITATEA INFORMATICA – INTRE MANAGEMENTUL RISCURILOR OPERATIONALE SI NEVOILE DE BUSINESS »

Conferinţele CYBERTHREATS organizate de IBR au ajuns la editia a-VI-a. Alaturi de parteneriatul devenit traditional cu CIO Council Romania, evenimentul se bucura de sustinerea specialiştilor in probleme de securitate a datelor de la Serviciul Roman de Informaţii si, Centrul National De Raspuns la Incidente De Securitate Cibernetica (CERT-RO), precum si de participarea Bancii Naţionale a Romaniei, a Autoritatii de Supraveghere Financiara, a unor firme de consultanţă şi audit, precum si de suportul unor companii private cu mare experienta in domeniul securitătii IT.

De asemenea, conferinta va aborda necesitatea unor reglementări eficiente din perspectiva riscurilor operaţionale si a administrării acestor riscuri  operaţionale specifice activitatilor IT&C, intr-o lume din ce in ce mai interconectata, apeland la servicii externalizate, in care evoluţiile tehnologice pot eluda metodele clasice de prevenire si supraveghere.

Prin pareneriatul cu CERT-RO, Conferinta Cyberthreats 2013 a fost inclusa in programul European Cyber Security Month (ECSM) al ENISA (European Network and Information Security Agency).

Informatii complete despre Conferinta Cyberthreats

Inregistrarea la Conferinta

 

MAJOR CYBERSECURITY EVENT IN ROMANIA, SIBIU, 25-26 September

Swiss Webacademy from Sibiu in collaboration with P Finder Consult (Bucharest) and the Association of Specialists in Business Intelligence (Bucharest) will organize « Cybersecurity, Challenges and solutions for IT security“, one of the most important event of the year dedicated to IT security issues.

SibiuThe Cybersecurity conference  will be held in Sibiu (Hotel Ramada) on September 25th-26th, 2013 under the patronage and in the presence of the Ambassador of Switzerland in Romania, H.E. Jean-Hubert Lebet.

The main purpose of the Conference is to establish a dialogue platform, bringing together most representative specialists of national and international IT players, public Institutions, relevant NGOs and the corporate environment.

The event is built upon the following simple assumptions regarding Romanian positioning on international cybersecurity landscape, where Romania is ranked:

  • 6thby number of IT specialists per capita,
  •  2ndby the number of strategic cyber-attacks
  • 7thby the number of hackers.

Between the most representative participants:

  • H.E. Jean-Hubert Lebet, Ambassador of Switzerland in Romania
  • Dr. Marco Obiso, World Coordinator, Cybersecurity Dpt., International Telecommunications Union
  • MELANI (Swiss Government Reporting and Analysis Centre for Information Assurance)
  • Institute for Fight against Economic Crimes, Neuchâtel, Switzerland
  • University of Fribourg, Switzerland
  • Southeast European Law Enforcement Center, Bucharest
  • Federal Bureau of Investigations, Romanian Task Force

The conference is designed to cover the most important subjects as well as the hottest themes in the data security area. As Romania is facing an increasing dynamic and complexity of cyber-attacks at national and international level, the keynotes experts will be glad to share useful information with Romanian specialists, speaking about most similar incidents happened elsewhere. On the other hand, the impressive experience of Romanian institutions to fight successfully against a skilled cyber criminality will be of great importance for foreign experts and for IT users..

Thematic sessions:

  1. Actual situation, comprehensive and legal approaches
  2. Specific hot trends, risks and solutions
  3. Solutions for IT users

For more details, Program, Participants, Speakers and Partners list, please visit Cybersecurity Romania official Web page

For Registration just access the dedicated Web page

Sibiu City Photo: AIESEC Sibiu

%d bloggers like this: