Business continuity planning

Business continuity planning

Computers & Security, Vol. 14, No. 5 multimedia industries. This presentation will focus upon the problems and the emerging solutions that are being ...

103KB Sizes 3 Downloads 170 Views

Computers & Security, Vol. 14, No. 5

multimedia industries. This presentation will focus upon the problems and the emerging solutions that are being proposed within Europe.

risks associated with hardware, system software and data losses are reducing rapidly, whilst losses associated with human behaviour, viruses and other forms ofmisuse arc’ coming into increasing focus.

STREAM 3 (p.m.): Directors’ Briefing Title: Author:

Facing the Challenge of IT Security Martin Smith, Kroll Associates

Information is a vital business resource. Protection of that information, most apparent in the need for IT security, is a business issue, not a technical one. The solutions are, in the main, business solutions, not technical ones. Responsibility for IT security rests with senior management. It must not be ignored, nor must it 1~ left in the hands of those who may not have the knowledge, authority, resource or motivation to address it satisfxtorily.

Author:

IT Security - An Implementation Strategy Rod Parkin, Midland Bank

Title: Author:

Business Continuity Planning John Sherwood, Sherwood Associates

Title:

An International Perspective on IT Security Judith Vince,Thc Rothschild Group

Title:

Author:

The paper examines the legal aspects of information security and copyright laws, as well as security infrastructure, IT security policies, security catalysts, new challenges, trends in security threats and responses to today’s requirements and tomorrow’s world.

STREAM 4 (a.m.): Disaster Recovery Title:

Author:

The Changing Rises Associated with Computer Systems as Reflected by Disaster Recovery Experience Frank Taylor, Systems Technology Consultants

Distributed computing in association with International/European and de facto standardization has r.ldicall?, changed the risks associated with computing svstems. Based on more than eighty case histories investjgatcd over 1J ye.u-s this presentation will show that

Title: Author:

Why Waste Money on Disaster Recovery Andrew Hiles, Kingswell Partnership

“A disaster will never happen to me - so why spend money on pre\renting it? In any cast‘, 1 have insurYes, it is easy to waste money on disaster ance......” recovery. This session will demonstrate how to avoid throwing money at a problem that may never happen; how to justify spend in terms of day-to-day business benefit; how to get the best possible leverage from your investment in disaster recovery; how to turn disaster recovery into a corporate asset that can glvc real conpetitive edge.

STREAM 4 (p.m.): IT Audit Title: Author:

Marketing Information Systems Audit Alan Krull, Business and Professional Education

Marketing starts with discovering what customers want. It is not huckstering; it is not ‘selling’ what you have. Marketing allo\xps clients to ‘buy into’ audit, so that prudent business practices and positive control become part of the job and an aid to the client. Threats and the use of power get compliance, but they don’t get understanding of and commitment to good practice. You don’t need cajoling, surveillance or threats to get you to lock your house or car. Can this kind of commitment be transferred to the business environment! Topics and sub-topics: How to get the educated opinion and judgement of senior management, when they are &gnorant (not stupid) on the subject. Customer scrvicc: how people (and audit departments) arc incented to give bad service; whey you cannot measure aspects of good service; why the measuring procc>ss itself m,ly negatively impact the prrccption of service; telephone calls ti-om hell. User-friendly audits (not an oxymoron) and dumb rules. Pseudo-requirements - whatever happened to the Dutch East India Company? Automated Audit - Tools & Techniques Title:

423