Security Briefing: Taking Back Control Of Data Beyond The Perimeter
For decades, an effective IT Security strategy has been built upon on the foundation of a secure network perimeter and deploying infrastructure within the DMZ to allow secure access both in and out of an organisation’s network.
However, with the arrival of mobile & cloud, this model is increasingly ineffective where data and endpoints have moved outside the traditional perimeter. Whether sanctioned or not, many organisations now increasingly live in a Hybrid state where their data still lives in their data centres and now also on Cloud Services and Endpoints beyond that secure perimeter.
While it is important to continue to protect the perimeter, it is now necessary to adapt security to cover data wherever it may reside. Failure to do this risks Mobile Endpoints and Cloud Services being the soft target for attackers.
So, what steps can be taken to keep your mobile devices & cloud services safe and secure?
Join us on from 17:30-20:30 on the 11th September 2019, at Tattu, Manchester, for an evening of drinks and discussions surrounding mobile & cloud strategy, and how to protect your resources beyond your perimeter.
Topics discussed will include:
- Why identity is now vital to Cloud Security
- How the new perimeter needs to be on the data wherever it resides
- How to balance security and user experience
- Measures that can be taken to prevent Shadow IT
- Why it is time to go passwordless
Arrival is from 17:30 with the beginning at 18:00.
*This event is open to end-users of Enterprise organisations only