Latvijas Pašvaldību Savienībai - Inovācijas Datu Drošībā @headtechnology 2009Andris Soroka
Ikviens valsts sektora uzņēmums ir atbildīgs par tam uzticētajiem datiem - gan par pašu darbinieku datu privātuma nodrošināšanu, gan par drošu tā sadarbības partneru vai klientu (valsts iedzīvotāji, uzņēmēji, NVO u.c.) datu drošu iegūšanu un apkopošanu, apstrādi, uzglabāšanu un darbu ar tiem. Mūsdienās, kad tehnoloģijas attīstās arvien straujāk, arvien būtiskāk ir pievērst uzmanību tieši datu drošības risinājumiem. Un nevis tikai tiem, standarta un gadiem ilgiem pazīstamajiem risinājumiem, kā ugunsmūri, antivīrusi, IDS/IPS utt.), bet gan jaunākajiem, industrijā atzītākajiem risinājumiem. Jo tikai ar tiem mēs spēsim nodrošināt optimālu labāko aizsardzību datiem - 21.gadsimta pamatvalūtai.
Latvijas Pašvaldību Savienībai - Inovācijas Datu Drošībā @headtechnology 2009Andris Soroka
Ikviens valsts sektora uzņēmums ir atbildīgs par tam uzticētajiem datiem - gan par pašu darbinieku datu privātuma nodrošināšanu, gan par drošu tā sadarbības partneru vai klientu (valsts iedzīvotāji, uzņēmēji, NVO u.c.) datu drošu iegūšanu un apkopošanu, apstrādi, uzglabāšanu un darbu ar tiem. Mūsdienās, kad tehnoloģijas attīstās arvien straujāk, arvien būtiskāk ir pievērst uzmanību tieši datu drošības risinājumiem. Un nevis tikai tiem, standarta un gadiem ilgiem pazīstamajiem risinājumiem, kā ugunsmūri, antivīrusi, IDS/IPS utt.), bet gan jaunākajiem, industrijā atzītākajiem risinājumiem. Jo tikai ar tiem mēs spēsim nodrošināt optimālu labāko aizsardzību datiem - 21.gadsimta pamatvalūtai.
Imran Razzaq is the Director of Cloud Services at Microsoft CEE in Riga, Latvia. He discusses both external challenges facing nations like environmental issues, security threats, and economic competition as well as internal constraints facing nations from factors like election cycles, data privacy laws, and skills shortages. He argues that citizens and businesses now expect improved services and engagement from their leaders anytime, anywhere. Leaders expect tools that provide greater insight, accountability, privacy, and compliance. Data visualization technologies can help provide insights to shape policies and budget decisions and help decision making with easy to use analytic tools.
Mega trends will have far-reaching impacts on business, societies, economies and cultures through 2025. The document discusses 11 key mega trends: urbanization and the rise of cities as economic centers; connectivity and convergence of technologies; social trends like an aging population; economic power shifting to emerging markets; new business models focused on customer value; health, wellness and quality of life; innovating products and services towards zero waste and emissions; the future of energy focusing on renewables; growing infrastructure needs; advances in mobility including autonomous vehicles and ride-sharing; and smart, sustainable cities.
This document discusses trends in mobile biometric devices, including:
- The increasing demand for mobile identification and the need for smaller fingerprint sensors.
- A comparison of fingerprint sensor sizes for smartphones and larger fingerprint capture devices (FAPs).
- How fingerprint sensor size affects the ability to perform 1:1 verification and 1:N identification/enrollments.
- The potential for using thinner, lighter, and more efficient light-emitting semiconductor (LES) film technology to reduce the size of fingerprint sensors while maintaining image quality and capabilities.
- Predictions that future fingerprint collection will incorporate larger capture areas in smaller sizes using thinner-film touch sensors, lower power consumption, and multi-modal biometrics as a standard
Launching great enterprise mobile apps that beat the competitionebuc
The document discusses the importance of testing mobile apps in real-world conditions with real users. It notes that modern apps need testing where users live, work and play rather than just in testing labs. The document promotes the services of Applause, which provides in-the-wild testing of apps across devices, operating systems and carriers with real testers using real devices under real-world conditions throughout the software development lifecycle. It describes tools from Applause like its SDK, analytics and 360-degree quality dashboard to help developers improve app quality and user experience.
The document discusses the security of cloud computing. It notes that insufficient knowledge and risk of security breaches are the main factors deterring adoption of cloud services. However, the statistics show that the vast majority of security breaches involve on-premises data centers, not public clouds. The document outlines how cloud providers and customers share responsibility for security, with providers handling physical and network security and customers responsible for data and applications. It addresses common concerns about cloud security like data access and location and notes the various security certifications and standards that cloud providers adhere to. The conclusion is that cloud security is at least equivalent to on-premises security when responsibilities are properly allocated.
This document discusses cloud security and authentication methods. It notes that security has limitations and existing solutions are not fully effective against cyberattacks. It then introduces an alternative no-password, single-factor authentication method called CaptureIn that uses a smartphone camera to log in without entering passwords or using multifactor authentication. CaptureIn aims to provide stronger authentication that is passwordless and does not rely on central databases of user credentials.
This document discusses enterprise asset management for aviation. It provides an overview of IBM's vision, which includes leveraging condition monitoring, visualization, mobility, analytics and intelligence to optimize asset management. Some key goals are improving reliability, reducing costs, recovering lost revenue, and assuring safety. The aviation industry faces challenges from factors like economic growth, passenger growth and globalization, which are driving new technology solutions to better predict demand, improve operations and customer experience, and increase efficiency and security.
All real time speed control cameras fix vehicles exceeding the speed limit and transmit data to a central data system for collection and processing, issuing penalties and identifying vehicle owners. Statistics show that the use of speed cameras reduced over-speeding by 50% and led to fewer administrative infringements over a given time period. Future intelligent transport systems would allow for centralized monitoring and data collection from devices like speed cameras, weather stations, and traffic surveillance to automatically identify vehicles, process data, store information and remotely control cameras.
This document discusses moving business applications and infrastructure to the cloud. It begins with an overview of trends driving cloud adoption like mobility, social media, analytics and cloud computing. Examples of cloud adoption from various companies are provided. The key pillars of developing a cloud strategy are then outlined, including addressing compliance, business cases, IT infrastructure, people readiness and change management. The benefits of the cloud for flexibility, disaster recovery, automatic updates and cost savings are highlighted. The presentation concludes with examples of good practices for hybrid cloud implementations from the Ministry of Education in Romania, Škoda Auto and EasyJet.
This document discusses big data and analytics. It predicts that by 2019, computers costing $4,000 will have processing power exceeding the human brain. Within the next 3-5 years, analytics will drive new business models and increase productivity by a factor of 100. Expert systems using knowledge bases, fact bases, and algorithms can replace "knowledge workers", making over 5,000 decisions per week in under 15 milliseconds.
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
Biznesa infrastruktūras un datu drošības juridiskie aspekti. Carlos Trigoso, EY Eiropas, Vidējo Austrumu, Indijas un Āfrikas reģiona vadības konsultāciju centra Informācijas drošības virziena vecākais projektu vadītājs.
Smart business - is cloud part of the problem or part of the solutionebuc
David Balazic gave a presentation on cloud computing. He discussed the challenges of today's IT environment, including rigid application architectures, long procurement cycles, and inability to scale with unpredictable demand. He outlined trends driving cloud adoption like mobility, social, analytics and cloud technologies. Balazic suggested finding the right balance between cloud and on-premise solutions. He provided examples of companies successfully using cloud computing and concluded by offering Consalta's expertise in developing cloud strategies.
Iniciatīvas mērķis ir aicināt Latvijas reģionu 9.-12. klašu skolēnus un uzņēmējus kopīgi radīt jaunus risinājumus un inovācijas uzņēmuma ikdienas procesos, izstrādāt jaunus produktus un veicināt savstarpējo sadarbību. Jaunu ideju radīšana ir īpaši nozīmīga tieši reģionu attīstībai, lai veicinātu to izaugsmi un radītu aizvien jaunus veiksmes stāstus.
Imran Razzaq is the Director of Cloud Services at Microsoft CEE in Riga, Latvia. He discusses both external challenges facing nations like environmental issues, security threats, and economic competition as well as internal constraints facing nations from factors like election cycles, data privacy laws, and skills shortages. He argues that citizens and businesses now expect improved services and engagement from their leaders anytime, anywhere. Leaders expect tools that provide greater insight, accountability, privacy, and compliance. Data visualization technologies can help provide insights to shape policies and budget decisions and help decision making with easy to use analytic tools.
Mega trends will have far-reaching impacts on business, societies, economies and cultures through 2025. The document discusses 11 key mega trends: urbanization and the rise of cities as economic centers; connectivity and convergence of technologies; social trends like an aging population; economic power shifting to emerging markets; new business models focused on customer value; health, wellness and quality of life; innovating products and services towards zero waste and emissions; the future of energy focusing on renewables; growing infrastructure needs; advances in mobility including autonomous vehicles and ride-sharing; and smart, sustainable cities.
This document discusses trends in mobile biometric devices, including:
- The increasing demand for mobile identification and the need for smaller fingerprint sensors.
- A comparison of fingerprint sensor sizes for smartphones and larger fingerprint capture devices (FAPs).
- How fingerprint sensor size affects the ability to perform 1:1 verification and 1:N identification/enrollments.
- The potential for using thinner, lighter, and more efficient light-emitting semiconductor (LES) film technology to reduce the size of fingerprint sensors while maintaining image quality and capabilities.
- Predictions that future fingerprint collection will incorporate larger capture areas in smaller sizes using thinner-film touch sensors, lower power consumption, and multi-modal biometrics as a standard
Launching great enterprise mobile apps that beat the competitionebuc
The document discusses the importance of testing mobile apps in real-world conditions with real users. It notes that modern apps need testing where users live, work and play rather than just in testing labs. The document promotes the services of Applause, which provides in-the-wild testing of apps across devices, operating systems and carriers with real testers using real devices under real-world conditions throughout the software development lifecycle. It describes tools from Applause like its SDK, analytics and 360-degree quality dashboard to help developers improve app quality and user experience.
The document discusses the security of cloud computing. It notes that insufficient knowledge and risk of security breaches are the main factors deterring adoption of cloud services. However, the statistics show that the vast majority of security breaches involve on-premises data centers, not public clouds. The document outlines how cloud providers and customers share responsibility for security, with providers handling physical and network security and customers responsible for data and applications. It addresses common concerns about cloud security like data access and location and notes the various security certifications and standards that cloud providers adhere to. The conclusion is that cloud security is at least equivalent to on-premises security when responsibilities are properly allocated.
This document discusses cloud security and authentication methods. It notes that security has limitations and existing solutions are not fully effective against cyberattacks. It then introduces an alternative no-password, single-factor authentication method called CaptureIn that uses a smartphone camera to log in without entering passwords or using multifactor authentication. CaptureIn aims to provide stronger authentication that is passwordless and does not rely on central databases of user credentials.
This document discusses enterprise asset management for aviation. It provides an overview of IBM's vision, which includes leveraging condition monitoring, visualization, mobility, analytics and intelligence to optimize asset management. Some key goals are improving reliability, reducing costs, recovering lost revenue, and assuring safety. The aviation industry faces challenges from factors like economic growth, passenger growth and globalization, which are driving new technology solutions to better predict demand, improve operations and customer experience, and increase efficiency and security.
All real time speed control cameras fix vehicles exceeding the speed limit and transmit data to a central data system for collection and processing, issuing penalties and identifying vehicle owners. Statistics show that the use of speed cameras reduced over-speeding by 50% and led to fewer administrative infringements over a given time period. Future intelligent transport systems would allow for centralized monitoring and data collection from devices like speed cameras, weather stations, and traffic surveillance to automatically identify vehicles, process data, store information and remotely control cameras.
This document discusses moving business applications and infrastructure to the cloud. It begins with an overview of trends driving cloud adoption like mobility, social media, analytics and cloud computing. Examples of cloud adoption from various companies are provided. The key pillars of developing a cloud strategy are then outlined, including addressing compliance, business cases, IT infrastructure, people readiness and change management. The benefits of the cloud for flexibility, disaster recovery, automatic updates and cost savings are highlighted. The presentation concludes with examples of good practices for hybrid cloud implementations from the Ministry of Education in Romania, Škoda Auto and EasyJet.
This document discusses big data and analytics. It predicts that by 2019, computers costing $4,000 will have processing power exceeding the human brain. Within the next 3-5 years, analytics will drive new business models and increase productivity by a factor of 100. Expert systems using knowledge bases, fact bases, and algorithms can replace "knowledge workers", making over 5,000 decisions per week in under 15 milliseconds.
Biznesa infrastruktūras un datu drošības juridiskie aspektiebuc
Biznesa infrastruktūras un datu drošības juridiskie aspekti. Carlos Trigoso, EY Eiropas, Vidējo Austrumu, Indijas un Āfrikas reģiona vadības konsultāciju centra Informācijas drošības virziena vecākais projektu vadītājs.
Smart business - is cloud part of the problem or part of the solutionebuc
David Balazic gave a presentation on cloud computing. He discussed the challenges of today's IT environment, including rigid application architectures, long procurement cycles, and inability to scale with unpredictable demand. He outlined trends driving cloud adoption like mobility, social, analytics and cloud technologies. Balazic suggested finding the right balance between cloud and on-premise solutions. He provided examples of companies successfully using cloud computing and concluded by offering Consalta's expertise in developing cloud strategies.
Iniciatīvas mērķis ir aicināt Latvijas reģionu 9.-12. klašu skolēnus un uzņēmējus kopīgi radīt jaunus risinājumus un inovācijas uzņēmuma ikdienas procesos, izstrādāt jaunus produktus un veicināt savstarpējo sadarbību. Jaunu ideju radīšana ir īpaši nozīmīga tieši reģionu attīstībai, lai veicinātu to izaugsmi un radītu aizvien jaunus veiksmes stāstus.
Programmatūras licencēšana. Iespējas un izaicinājumi. SIA DPA
Datu drošība
1. Datu drošības caurumi Pēteris Ervalds, Infrastruktūras risinājumu vadošais eksperts Mārtiņš Magone, Infrastruktūras risinājumu konsultants 16.04.2011
2. Saturs Kāpēc drošība ir tik aktuāla? Pašreizējā situācija Jaunākās tendences Ierobežotas pieejamības tīkls IT drošības auditi Demonstrācija - (ne)drošībatelefonā
3. Kāpēc drošība ir tik aktuāla? 2011. gada 1. februārī stājās spēkā Informācijas tehnoloģiju drošības likums Drošības pārbaudes jāveic ne retāk kā reizi gadā
4. Pašreizējā situācija Fiziskā piekļuve Perimetra aizsardzība Antivīrusu sistēmas Drošības jauninājumi Pretspama risinājumi Tiesību ierobežošana un piekļuves kontrole
5. Jaunākās tendences Trešo pušu produktu aizsardzība Mobilās iekārtas Datu aizsardzība Sociālie tīkli Drošība mākonī Uzbrukumi no tīkla iekšpuses
7. IT drošības auditi Auditējam Novēršam konstatētos trūkumus Auditējam Novēršam konstatētos trūkumus ... Izmaiņu vadība
8. Bezvadu AP IP: 10.0.0.1 MAC: BB:BB:BB:BB:BB:BB Lietotāja iekārta IP: 10.0.0.2 MAC: AA:AA:AA:AA:AA:AA Lietotāja iekārtas ARP kešatmiņa norāda ka IP:10.0.0.1 atrodas MAC:CC:CC:CC:CC:CC:CC Bezvadu AP ARP kešatmiņa norāda ka IP:10.0.0.2 atrodas MAC:CC:CC:CC:CC:CC:CC Hakera dators IP: 10.0.0.3 MAC: CC:CC:CC:CC:CC:CC