OASIS Announces Keynote Speaker for Borderless Cyber Europe

Borderless Cyber banner

Today’s digital threats are more numerous and sophisticated than ever. As a result, many in the security industry feel organizations can no longer adequately defend their networks by themselves. Those analysts feel the threat environment is evolving too quickly. Modern threats know no boundaries, they argue, which is why companies and governments alike need to work together to improve their state of preparedness.

Recognizing that need for collaboration, OASIS (who has partnered with CDM Media on our CISO global event portfolio) will be hosting Borderless Cyber Europe on 8-9 September, 2016 in Brussels.

In collaboration with its partners, OASIS has designed the conference to provide expert insight on the international advances in threat sharing intelligence. More specifically, attendees will learn how to take advantage of existing or build their own threat intelligence sharing communities as well as access digital threat information. Industry experts will infuse those lessons with their own real-world use cases involving threat information sharing, which will empower security practitioners to enact change at their respective organizations after the conference.

Delegates will hear from keynote speaker, Andrus Ansip, vice Andrus_Ansip Portraitpresident for the European Commission’s Digital Single Market initiative, who has been instrumental in negotiating the EU-US Privacy Shield designed to protect user privacy while allowing for trans-Atlantic trade.

“Data flows between our two continents are essential to our society and economy – we now have a robust framework ensuring these transfers take place in the best and safest conditions.” Ansip said.

The nature of today’s threats is such that information security professionals aren’t the only ones who should be learning about digital threats.

For an organization to improve its state of preparedness, the chief information security officer (CISO) and other IT security managers also need to keep their thumb on the pulse of the latest threat information. That effort should involve the following:

• Understanding how the EU-United States Privacy Shield is designed to protect users’ privacy and what implications it will have for their organization.
• Leveraging the European Union General Data Protection Regulation (GDPR) to understand their data protection risks as they oversee the development and operation of cybersecurity programs.
• Learning how to automate threat intelligence sharing and how to respond to threats more quickly by making use of new simplified versions of STIX, TAXII and CybOX.

Borderless Cyber Europe will explore all of these topics and more.

To help executives capitalize on the latest threat intelligence, OASIS would like to extend a special VIP CISO conference pass to executives responsible for developing, influencing and managing cyber threat information, risk management and corporate governance in the public and private sectors.

CISOs in the CDM community who are interested in receiving a VIP pass are asked to contact jane.harnad@oasis-open.org by the closing date midnight (PST) 31 July 2016.

Those who are selected will be notified by 5 August. (Please note that travel, subsistence, and other expenses will not be covered by the pass.)

By design, Borderless Cyber Europe will provide a collaborative, peer-to-peer exchange of information through interactive sessions that encourage attendees to share best practices, successful case studies, and insight into how threats can be managed and resolved. Security practitioners and managers alike can then take those insights and use them to build relationships and make the most out of threat information sharing tools/open source standards at the organizational level.

Please join OASIS in September by registering for Borderless Cyber Europe today!

This post comes courtesy from one of CDM Media’s trusted partners. Whether it be an industry association or a news outlet, our partners provide a fresh perspective on trending topics in innovation. The Organization for the Advancement of Structured Information Standards (OASIS) is a nonprofit consortium that drives the development, convergence and adoption of open standards for the global information society. OASIS promotes industry consensus and produces worldwide standards for security, Internet of Things, cloud computing, energy, content technologies, emergency management, and other areas. For more information, visit https://www.oasis-open.org/.

What Should CIOs Expect From Telecom in 2016

The following guest post comes courtesy from one of CDM Media’s trusted partners. Whether it be an industry association or a news outlet, our partners provide a fresh perspective on trending topics in innovation. The Telecom Council of Silicon Valley is Where Telecom Meets Innovation. The Council connects the companies who are building communication networks, with the people and ideas that are creating it – by putting those companies, research, ideas, capital, and human expertise from across the globe together in the same room. For more information visit www.telecomcouncil.com.

image001

What Should CIOs Expect From Telecom in 2016

by Derek Kerton, Managing Partner, Kerton Group
@derekkerton

It used to be that changes in the services of telecom carriers needed to be followed closely by CIOs…with a check in about once-a-decade! Telecoms earned a reputation as the classic dinosaurs – slow to change, and resistant to innovation not invented in their own labs. But things are quite different in the new century. Fiber, wireless, IP packetization, and virtualization have radically changed the structure of telco networks, and pressure from Over-The-Top (OTT) competitors has lit a fire under the telecom industry, and standing still is no longer an option.

That’s good news for enterprise IT departments and their leaders. The range of options and services is blossoming, and the ability to get competitive bids means that prices are always dropping. More for less? Sounds good, right? Until, of course, one considers the complexity and risk involved in changing telecom providers and adopting new services. So, what’s on tap over the next year from the telecom industry, and what should IT departments be looking for?

For the answers, we at the Telecom Council of Silicon Valley turn to our carrier members, global telecom operators who represent 2.5 Billion end subscriber accounts. Each year, we poll the carriers at the Silicon Valley-based TC3 Summit (Telecom Council Carrier Connections) meeting, and we ask what the top innovation priorities are for them for the next calendar year. This year’s meeting is coming up September 30 – October 1, and we’re already hearing from the operators what they will be sharing.

The hot topics for the next year look to include:

  • More cloudification, with hybrid to retain key data, and cloudify for peak loads and collaboration
  • XaaS – the third stage evolution of datacenters is anything As A Service
  • Virtualization – borrowing from enterprise IT, telco is virtualizing the network
  • 5G – opportunities for redundancy, mobile workforce, and high speed wireless networks
  • IoT – Connecting equipment, sensors, relays, people, trucks, and equipment to the network

With those changes, carriers are enhancing the services they can offer enterprise, and blurring the lines between the carrier network and that of enterprise customers. If you are interested in hearing more about what the carriers will be discussing at TC3, there is an easy way. Just tune into the free TC3 preview webinar with China Mobile, BT, and Rogers on Thurs. Sept 3 at 2pm ET / 11am PT.

TC3logo

Yelpification: Reviews in the Technology Buying Process

The following guest post comes courtesy from one of CDM Media’s trusted partners. Whether it be an industry association or a news outlet, our partners provide a fresh perspective on trending topics in innovation. IT Central Station is primarily a crowdsourced review site that provides user generated reviews of products for the enterprise tech community. It has been referred to as the “Yelp for enterprise technology” by the Wall Street Journal.

 

Crowdsourcing

Finding the optimal technology solution for your company can be an unnecessarily difficult process. With vendors running biased marketing campaigns and potentially affecting analyst reviews, it is hard to determine which product best fits your needs. In the past, business-to-business technology buyers have relied heavily on market research companies like Forrester, Gartner and IDC; however, according to data from LinkedIn, product reviews and social media allow for roughly two-thirds of the buying process to be finished before even meeting with a sales representative. As social buying takes on a greater importance, crowd-sourced review sites have worked to create an easier way to get trustworthy research.

The model for providing this research is similar to Yelp: companies collect reviews of B2B technology products to present to IT buyers in order to allow them a more informed decision based on real reviews from their peers, instead of whitepapers with vendor bias. This trend of offering reviews alongside research has been generally referred to as the “yelpification” of enterprise technology.  Sites such as IT Central Station put a heavy emphasis on promoting trust, a key issue with Yelp, by verifying reviewers through methods including interviews and connecting with LinkedIn.

While buying was previously done by individuals such as the head of IT, today, technology is widespread and can be bought both for big operations and at an individual scale. For inexpensive technologies, some companies will allow departments to skip the protocol, meaning less experienced buyers who might not have a connection to a vendor will be looking for information. The technology itself has also changed from bulky applications whose implementation could be costly in time and money, to smaller solutions often in SaaS models or with easy setups that can be done in a day. These radical changes in both user and product mean consumers have new expectations for research companies that call for a remodel of the existing analyst-based system.

Crowd-sourced reviews have a variety of benefits that typical research companies like Forrester, Gartner and IDC can’t offer. Primarily, reviews allow consumers to look to their peers for reliable, objective analyses. In addition, these sites can focus on a greater number of vendors including small companies and startups, as the review process is less expensive and strenuous to the site providers. The number of reviewers themselves is much larger as well, which eliminates personal biases that may affect an analyst’s report. This allows potential buyers to deeply analyze all available options to truly find the one that best fits with their company. Additionally, the personal recommendations of peers can provide a deeper understanding of the technology solution and its applications in specific settings. For example, while most people tout the depth of customization available in SolarWinds Network Performance Monitor, one IT Central Station user, a senior network administrator, notes that some knowledge of SQL query is needed to take full command of the customization options. While an analyst’s opinion is still a powerful tool, “yelpified” organizations often include these reports and whitepapers alongside consumer reviews in order to provide the maximum amount of information to the buyer. Ultimately, individuals such as Dan Lyons, author and previous senior editor at Forbes magazine covering enterprise computing and consumer electronics, find that the “opinions of actual customers might be more meaningful and more valuable than the opinion of a credentialed expert.” Lyons goes on to compare looking at Yelp instead of a New York Times food critic’s article to reading peer reviews instead of using an analyst report.

When seven-two percent of surveyed B2B buyers already seek out information from their peers in making B2B purchasing decisions according to the 2014 B2B Buyer Behavior Survey, it only makes sense that the buying process is undergoing a “yelpification.” By providing access to the peer opinions that professionals want to see, crowd-sourced review sites go beyond analyst reports to facilitate a more complete picture of enterprise technology solutions. In the end, this process allows users to make better and more informed buying decisions than previously possible.