Security

Top trends in IT security

Not even a third of companies have data leakage prevention or intrusion detection systems in place. Good thing it’s nearly time for CeBIT! Held in Hannover, Germany, the world’s leading digital technology trade show will provide information, advice, support and the right IT solutions to make business secure.

26 Jan. 2016
Business Security_2

New: European Cyber Security Conference in the Nord/LB Forum complex

IT security will be writ large at the new “European Cyber Security Conference.” Held on the Monday of CeBIT (14 March), the conference will explore IT security mainly from a business standpoint, although it will also provide an individual-user perspective. The conference motto is, “End of Naivety | End-to-end-Security is Executives’ Top Priority.” In the morning plenary session, several international keynote speakers will outline the current European and national-level rules and regulations on cyber security and discuss future trends and opportunities for new approaches and new forms of collaboration. The afternoon session comprises several parallel workshops on such topics as transparency and the private sphere, the secure management of increasingly large volumes of data, and emergency measures and procedures. The conference will be held in the Nord/LB Forum complex adjoining Hall 17.

Heightened IT security and compliance standards

Today’s world of digitally interconnected machines and products and data-driven services calls for very high levels of security. In Germany, the National Reference Project for IT Security in Industry 4.0 (IUNO) has set itself the goal of developing the IT security and compliance standards necessary to achieve this. The project, sponsored by the German Federal Ministry of Education and Research (BMBF), is a partnership between 14 industrial companies and seven university research institutes. The envisaged standards aim to minimize the security exploits available to hackers. They will also be cost-effective to implement, meaning they will be attractive to SMEs as well as big corporates.

Controls on the use of smartphones and tablets

Mobile working is an extremely attractive option because it enables employees to access work resources whether they’re working from home, on the road, or on-site with a customer. However, it’s critical for companies to have clearly defined rules for the use of mobile devices, apps and data – particularly in today’s BYOD era, where access to company networks is increasingly via personal devices. A recent IDC survey of corporate IT managers in Germany identified improved mobile security as a top priority. And that means tighter controls on employee use of mobile technology, given that the participating IT managers attributed almost half of all security incidents to employees. Indeed, 30 percent of the non-IT managers surveyed confessed to losing a smartphone containing company data sometime in the last two years. 10 percent even said this had happened more than once.

CeBIT 2016: Best-of-breed security solutions for all industries

Today’s business world involves a constant flow of data between people, machines and mobile devices. At the “Business Security” showcase in Hall 6 at CeBIT 2016, the world’s leading security specialists will showcase the best solutions for safeguarding this data against cyberattacks. Hall 6 is also home to the “Research & Innovation” showcase, where the world’s biggest names in IT security research will map out the road ahead for biometric security technologies such as facial recognition and iris scanning.

IT security will also be very high on the agenda at the CeBIT Global Conferences .

More

Security CEBIT RSS Feed