contents | business | |||||||
| Comsec Consulting Outlines the Challenge for Businesses to Stay ‘In Control’ of Security at This Year’s Forrester’s Security Forum EMEA Comsec Consulting will be outlining the challenges faced by businesses to remain 'in control' of security as it presents at Forrester's Security Forum EMEA on Transformation and Excellence in Security & Risk Management on 2nd and 3rd April 2008 in Amsterdam, The Netherlands. Henk Van der Heijden, the company's Managing Director in The Netherlands, will be outlining the challenges faced by enterprises and SMEs to remain transparent in their control of security within an internal or outsourced environment. Mr Van der Heijden will highlight the importance of the management cycle and its place within corporate policy, which has an impact on the business, its customers, its employees and the law. Comsec' presentation will take place at 3.15pm on Wednesday 2nd April 2008. Forrester's Security Forum EMEA 2008 offers security and risk practitioners the opportunity to share innovative best practices and experiences in preparing for tomorrow's security challenges. Other confirmed speakers include Andrew Strong, Global Security Officer, Unilever; Nick Bleech, IT Security Director, Rolls Royce UK and Pascal Lointier, IS Risks Advisor, AIG. Henk Van der Heijden explains Comsec's views on the current challenges, "To maintain compliance with new laws and regulations, those responsible for IT have been forced to rethink the way that they control their data security measures. The assurance of integrity and confidentiality of data is imperative as internal and external threats adapt in their sophistication and prove to be a tremendous threat. Every business should be underlying its corporate policy with organisation, management and technical controls." In addition, Mr Van der Heijden will address the future role of technology in combating security and provide delegates with important information to design a framework which will enable a measurable, secure response to their internal and external requirements. write your comments about the article :: © 2008 Computing News :: home page |