Article

Gartner conference: Securing business assets a central theme

Edward Hurley, Assistant News Editor

Various topics, like PKI, securing e-mail and security policies, are often covered at security conferences. However, especially topical areas are scheduled for Gartner's Information Security Conference 2002 this week in Chicago.

FOR MORE INFORMATION:

    Requires Free Membership to View

Best Web Links on incident response

SearchSecurity security policy expert


Feedback on this story? Send your comments to Assistant News Editor Edward Hurley

The shadow of September 11 will fall wide on the conference's proceedings. Disaster recovery, homeland security and anti-terrorism tactics will be discussed.

Victor S. Wheatman, vice president and research area director at Gartner, will address in his keynote protecting "Enterprise Assets in the New World." Companies have faced a host of challenges since September 11. How will changes affecting existing security systems? Will new vulnerabilities be introduced?

There are no easy or simple answers, but Wheatman will address the ways businesses need to precede.

In one of the more provocative sessions, Microsoft's former Chief Security Officer will explain why he left the software juggernaut to join the government.

Howard A. Schmidt, vice chairman of the United States Critical Infrastructure Protection Board, is building a board of both government and private experts to focus on cybersecurity in the United States. He reports to National Security Advisor Condoleezza Rice and Tom Ridge, director of Homeland Security.

Other government officials will be on hand to share their insights into computer security. Robert Weaver, Assistant Special Agent in Charge for the New York Electronic Crimes Task, will discuss what his unit does and how businesses need to work with authorities in order to prevent and detect electronic crime.

In a more speculative vein, Wheatman will also examine some of the security issues that businesses will face in the next century.

Other areas to be covered include the human aspects of security, the total cost associated with security and the security aspects of wireless and mobile computing.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: