Cybersecurity: Gaining Control of Data
Carol Stream, Ill. (PRWEB) January 19, 2015 -- If a burglar was trying to enter your home, would you make every effort to stop him? Now imagine that burglar would also gain access to all of your personal data, and the intrusion becomes even more sinister. In today’s digital economy, citizens are faced with this type of threat day in and day out, whether they are aware of it or not.
During remarks at the FTC (Federal Trade Commission) on January 12, President Obama began to detail the government’s plans to help protect against cyber breaches, including new legislation to create standards for notification in the event data is compromised as well as providing baseline protective measures for consumers and businesses and their sensitive data.
What else can be done? What steps can individuals and businesses take to protect themselves?
“In our connected society, data is an inestimable commodity, growing in value both to our economy and those looking to sabotage it,” says Peggy Smedley, editorial director, Connected World magazine. “As Americans, many of us believe we have lost control of this data. Well, it’s time to take control away from the bad guys.”
To gain control, the first step is to gather thought leaders and professionals from the most innovative and influential organizations in the world to unravel the relationship between connected society and cybersecurity. This step will be taken at the 2015 Connected World Conference.
“As more and more industries are connecting assets and objects to the Internet, it’s never been more important to evaluate and mitigate security risks through secure product design and end-to-end security architecture specific to each business case,” says Laetitia Jay, vice president of M2M solutions and services, Gemalto. “As the global leader in digital security, Gemalto is honored to sponsor the 2015 Connected World Conference, which is bringing together key stakeholders in the industry to address challenges and solutions for securing our increasingly connected world.”
The Connected World Conference, held in partnership with University of Alabama at Birmingham’s Center for Information Assurance and Joint Forensics Research (The Center), will bring professionals together to create a call-to-action and develop a take-away security strategy to protect our connections to the nation’s most critical infrastructures. The event will be held February 23-24 in Birmingham, Ala.
The 2015 event is sponsored by Altair Semiconductor, Berkeley Varitronics Systems, Gemalto, and Synapse Wireless. To learn more about the 2015 Connected World Conference, please visit the event Website.
About Connected World Magazine
Connected World is the business and technology publication that provides the intelligence industry titans need and the guidance consumers crave. It’s all about M2M. connectedworld.com
Michelle Mayer, Connected World magazine, http://connectedworld.com/, +1 630-933-0844 Ext: 246, [email protected]
Share this article