Telecoms, Media & Technology is part of the Knowledge and Networking Division of Informa PLC
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.
Threats are proliferating, attacks are coming faster and getting more dangerous and attack surfaces are broadening. Enterprises and service providers need new skills, technologies and staffing strategies to keep up and deliver end-to-end seamless security.
Enterprises and service providers face the challenge of securing infrastructure across multiple public clouds as well as their own private cloud and legacy infrastructure. This panel will address in detail the common design principles that should be adopted to secure a multicloud architecture and home in on how automation can contribute to this goal. The session will also include a frank discussion of what level of progress has been achieved in the implementation of these principles, how automation has played a part to date and what security hurdles remain.
Automation tools can help service providers and enterprises speed operations and reduce costs. However, automation is broadly defined and subject to interpretation, which makes the development and implementation of a holistic, automation-based security strategy difficult. This panel will commence by breaking down automation into the relevant capabilities (e.g. dehumanizing processes, machine learning and AI) and then address the value proposition, benefits, challenges and concerns associated with applying automation to enterprises' and service providers' approach to security.
The world is quickly converging to a single service domain in which enterprise, carrier and third-party segment services such as connected car must be seamlessly and holistically delivered. This shift to a “universal service” use case will drive a fundamental redefining of security services in a perimeter-less world. This redefinition process will on some level necessitate the adoption of advanced orchestration, API management, monitoring and machine learning enriched policy enforcement. This session will consider how these advanced techniques can be applied to meet the complex security requirements associated with universal service use cases driven by IoT and 5G.
Security doesn’t have to be a barrier to productivity. By combining security and operations, and embracing the principles and process methodology of DevSecOps, enterprises and service providers can achieve both security and agility. This session will examine the benefits of adopting a DevSecOps model as a coherent and effective approach to software delivery, as well as the implementation challenges that are likely to be encountered.
What are the practical takeaways that enterprise security leader attendees should leave with? What should service providers consider incorporating into their offering? Join our analyst hosts in distilling the day’s content into some key thoughts for consideration.