Why IT security holes can destroy your business

Traditionally, IT security was the concern of the IT department. No longer. Now, criminals are capable of infiltrating enterprise through its IT systems to defraud, compromise enterprise and customer data, and potentially bring the business to its knees.

Because of the very real possibility of your business being targeted by cyber criminals, you need to understand what international cyber crime networks want, how they access business data, and what you can do to prevent it. This is in line with new legislation, which places the responsibility on business management to secure the data they have access to.

But IT security is a complex and ever-changing field. Staying abreast of the risks and changing modus operandi of criminals is an ongoing task. To give business and financial executives an overview of new IT security risks and the strategies they must adopt, the Security Summit 2014 will include tracks designed for business management. The summit is the premier IT security event for southern Africa, presented annually by ITWeb. This year, dedicated high-level tracks designed for business executives will address issues such as security governance, the value of information security, cyber insurance, privacy and data protection, and the relationship between corruption and cyber crime, among others.

This three-day event will include an expo area, where business and IT professionals can discuss their security challenges and find solutions designed to address them.

The Security Summit 2014 is endorsed by ISACA and (ISC)² Gauteng Chapter and will be staged at the Sandton Convention Centre from 27-29 May. For more information, go to www.securitysummit.co.za Join the conversation on Twitter at #itwebsec


Source: www.securitysummit.co.za

This entry was posted in ICT, South Africa News. Bookmark the permalink.

Leave a Reply