Tuesday, June 21, 2011

24 June: Security of information within Organizations in an era of Thinning Perimeter

Pleas join us to hear Vishal Gupta, Chief Executive Officer, Seclore Technology on "Security of Information within Organizations in an era of Thinning Perimeter".

The World economy is going through a sea-change. With increased pressure to streamline processes and reduce costs comes an increased regulatory compliance and security threat. Organizations are collaborating confidential information increasingly between their employees and with business partners. In this environment of change, ensuring the security and privacy of confidential data is an increasing complex challenge. Earlier tenets of security based on physical or logical boundaries are giving way to information leakage. Technologies which provide security by controlling the flow of information within a specific computer / network / location (e.g. firewalls, vpn, virtual data rooms, port blocking technologies, etc) are rendered useless in the context of outsourced processes and a mobile workforce.

The presentation will focus on a new approach to information security and privacy namely, Information Rights Management (IRM) which changes the fundamental tenets of information security. The presentation will also cover actual scenarios of the usage of the IRM technology by organizations like HDFC, Kotak and SBI who are all facing the challenge of an increasingly "Thinning Perimeter".

IRM allows for owners of documents to control usage of documents before and after the documents have been circulated. This means that documents shared with internal and external parties can be "remote controlled". It is also possible to, at the end of the process, revoke the usage rights to the document so that the document can thereafter no longer be opened by the receiving party. Documents can also be programmed for self destruction based on time!

Documents so shared can be controlled for:
- WHO has access to the documents
- WHAT he/she can do with the documents (view, edit, print, forward, … )
- WHEN he can use them and
- WHERE ( in the office, at home, … ) can they use them.

A complete audit trail of the document flow and its usage is maintained centrally in line with the recommendations of ISO 27001 or SOX 404.

Date: Friday, 24 June 2011
Time: 6:00pm - 9:00pm (Registration: 6:00pm; Dinner 6:30pm - 7:00pm; Presentation 7:00pm – 9:00pm)
Venue: National Library Board Building, Level 5 Imagination Room, 100 Victoria Street, Singapore 188064
Non-Members: S$ 45
Full time Students: S$15
CPE: 2 hours
Dinner: Buffet Dinner Included (halal/no pork no lard)

Interested members, please visit http://www.cvent.com/d/0dqhrf/4W