Automation has moved its paradigm from manufacturing floor to a new vertical. Internet of things (IOT) has made a massive leap over past 5 years as never before. All the tech giants are making proprietary eco systems that can cater the customer to make a "SMART" home. By converting all the things into IOT or cloud based, then the word "Big data Analytics" came to the arena. Lets see the cross sections on these paths to see, Whats latest? Are we in a potential data Risk? and Whats next?Read more>>
With just over five months to go until the General Data Protection Regulation (GDPR) comes into effect, organisations globally need to start thinking about their compliance to the GDPR if they are handling personal data of EU citizens. This session will be an overview of GDPR and how to create/improve your GDPR policies and processes to demonstrate ongoing compliance.Read more>>
"Cloud Computing" has become the most popular buzz word on today's IT world, which is allowing Enterprises to minimize time to go-live on their products and services to their customers with seamless possibilities. But are we security aware on what we do on cloud ? are we using the tools and features efficiently to make our data on cloud secure?Read more>>
Are you worried how your customers will react if your application is down for 5 minutes? 1 hour? 24 hours? Multiple days? In a digital world, where the web up-time is more critical than ever, the only way to guarantee that your application has the anticipated level of operational continuity is by designing it with High Availability (HA). The appearance attempts to guide the audience to curb system failures by implementing a HA architecture while supporting the desired level of security, scalability & performance.Read more>>
The evolving field of cyber forensics requires professionals who understand far more than just hard drive or intrusion analysis.The CCFP(Certified Cyber Forensics Professional) from ISC2 credential indicates expertise in forensics techniques and procedures, standards of practice, and legal and ethical principles to assure accurate, complete, and reliable digital evidence admissible in a court of law. It also indicates the ability to apply forensics to other information security disciplines, such as e-discovery, malware analysis, or incident response. In other words, the CCFP is an objective measure of excellence valued by courts and employers alike.Read more>>
Building secure software is the responsibility of all the stakeholders involved with the software development lifecycle (SDLC). Many times, the processes that are in place to aid in the security of software end up being circumvented, victims of the iron triangle of project scope, schedule and budget. This session is fully focused on addressing key security issues in software development.Read more>>
In the last years security breaches has significantly impacted financial institution. The Association of Certified Fraud Examiners, estimated as $67 billion the losses incurred by FI. About 70% of this was internal and most remain undetected. How Financial Institution can leverage on their existing information to reduce security breaches. Risk and controls framework coupled with an holistic view of IT and business to identify risk patterns and behaviors.Read more>>
As a future information security professional, you must understand the scope of an organization's legal and ethical responsibilities. The infromation security professional plays an important role in organization's approach to managing liability for privacy and security risks.Read more>>
An Overview of the current Cyber Security Threat Landscape and how evolutions in Cyber Threats have impacted response strategies for Enterprises Globally.Read more>>
The forum brought together a strong gathering of Sri Lankan CIOs from diverse industry verticals, such as government, defense, telecommunications, and banking, for an evening of insightful discussions, along with (ISC)2 Executive Director Hord Tipton.
Presentation "Telecommunication Industry of Sri Lanka: Security Perspective" By: Rajitha Udayanga: Head of Network & Data Security, Bharathi Airtel
The (ISC)2 Colombo Chapter inauguration event was very successfully held on 21st September 2012.