A few months ago, I was fortunate enough to attend RSA, one of the biggest and best security conferences here in the States. Today, I’m overseas attending Europe’s leading security conference. It’s a tough job, but hey, someone’s gotta do it.
I’m talking of course about Infosecurity 2014, which features over 300 exhibitors, 13k attendees and hundreds of the brightest minds from the global security community. As you might imagine, the agenda covers nearly all of the hot industry topics, including cloud technology, compliance, cybercrime and much more. That said, there are four things in particular that I’m looking forward to:
#1. MFT and the Continental Divide
Here in North America, the primary drivers for adopting Managed File Transfer (MFT) are almost always some combination of automation, consolidation, integration, visibility and control. But can the same be said for organizations across the pond? I hope to find out. While Europe’s compliance laws, for instance, are certainly different from the ones we have here in the US, they are no less stringent. Thus, I’m interested to learn what unique factors are driving MFT adoption outside of the US.
#2. Sessions, Sessions, Sessions
If I could clone myself and attend every session, I would. While I’ll be attending as many as I can, I’m especially interested in these four:
- Understanding and Addressing Data Governance in Large Scale Enterprises: Barclays recently took a series of measures designed to strengthen its data governance capabilities with respect to “unstructured, human-generated data.” I was aware of the initiative, but only on a very general level, so I’m interested in getting an insider’s look during this presentation.
- PCI DSS 3.0, Application Security and Penetration Testing: PCI is a topic near and dear to me (and the rest of us here at Ipswitch), so I’m excited to learn about new techniques that help PCI-compliant organizations ensure a greater level of safety for their applications. This session covers some of the latest changes in 3.0 and “how it relates to application security and see how new technology can be applied to development processes to create continuous security assurance for applications early in the development life cycle.”
- Social Engineering, a View From the Dark Side: Organizations have gone to great lengths to secure their systems from a data breach, but they still have a long way to go towards securing their employees in a similar fashion In this session, we’ll be given a closer look into social engineering – how hackers are “coercing unwitting employees to provide them with the tools they need to unlock even the most secure systems.”
- How to Avoid the Tangled, Digital “Do-It-Yourself” Approach to File Transfer: In the absence of well-defined policies, awareness and education, and enterprise-supported alternatives — enterprises over time have come to rely on a mix of “digital do-it-yourself” approaches for synching, sharing and transferring files. In this presentation, Ipswitch’s very own Steve Hess will untangle the web of file transfer applications within the enterprise and talk about best practices to ensure visibility and control in an increasingly regulated market.
#3. Innovations and Insights
Of course, not all of the learnings and key takeaways will come from panelists and presenters; much of it will come from the conference’s 325+ exhibitors. I’m therefore extremely eager to chat with my colleagues and contemporaries to gain a better understanding of the global security market. I’m always interested to see what other upcoming tools and technologies are being developed to help make businesses (and their data) more secure – and there’s no better place to do just that than Infosecurity.
On a personal note, I’m really looking forward to walking around Soho (my favorite part of London), having pints of lager with bangers and mash in some of the more prominent pubs, and shopping at Lillywhites on Piccadilly Circus for football jerseys and rugby shirts.