Abstract:
Mobile and Cloud have changed the landscape of enterprise security; business drivers are overriding security requirements left right and centre, creating complex solutions (and complexity is the enemy of security). Systems are integrating with internet based services to provide functionality and meet business requirements, but more and more security architects are finding their enterprise corporate data suddenly protected by security systems that are not entirely under their control. This talk is a frank discussion on strategies and mechanisms to start to deal with this evolution, focussing on the art of the possible. This is intended to be a two-way discussion; the speaker is also here to listen to your needs and requirements, this is your chance to influence direction by raising what is important to your business.