AccessData, the leader in incident resolution solutions, announced that Mr. Keith Miller, the company’s director, International Professional Services will be one of the key speakers at Virtuport’s 4th annual Middle East & North Africa Information Security Conference (MENA ISC) will be held in Riyadh, Saudi Arabia at the Four Seasons Hotel on March 25th and 26th, 2014.
Mr. Miller, a veteran in cybercrime and intelligence, will educate attendees about how the British Army’s Royal Military Police Cyber Crime Centre evaluated its requirement against robust ‘Business Needs Analysis’ before considering the technology solutions with the end result being a fully integrated forensic lab capability, process and resource led, matched to business requirements. His presentation is entitled ‘Integrating Technology and Business Requirements – are you matching capability appropriately within your business space?’
“Procurement of technological solutions is often the result of an immediate requirement or perceived risk. Whilst this method meets the short term need, the question to be asked is whether you have contributed to the long-term vision or just created another ‘silo’ of capability,” says Mr. Miller.
This month AccessData sponsored a ‘Threat Intelligence & Incident Response: A Study of EMEA Organizations’ conducted by Ponemon Institute which surveyed 521 IT and IT security practitioners in EMEA who are involved in handling security and incident response for their company. Below are some of the interesting findings:
- An average of 29% of all cyber attacks are undetected.
- 79% of respondents say detection of a cyber attack takes too long and 80% say there is little or no prioritisation of incidents.
- 45% of respondents say their security products do not support the import of threat intelligence from other sources.
- 51% of respondents do not believe their security team has sufficient skills to investigate and remediate a security incident.
- 36% of respondents say it could take a year to know the root cause of a cyber attack and 43% of respondents say their organisations will never know with certainty.
- 86% of respondents rate the investigation of mobile devices as difficult.
- 61% percent of respondents say they are not able to conduct investigation on mobile devices in response to e-discovery requests or they are unsure. In the case of being able to locate sensitive data on mobile devices, 56% say they are not able to or are unsure.
MENA ISC brings together the best and brightest in the information security field, creating opportunities for conference attendees to learn about IT security’s most important issues through first-hand interactions with peers, luminaries and emerging as well as established companies. As the IT security landscape continues to grow in complexity and sophistication, MENA ISC will play an integral role in keeping security professionals across MENA connected and educated. The last event in Riyadh in 2013 saw more than 400 delegates, sponsors and media attend.
More information about the event can be found at http://www.menaisc.com/
Meetings and interviews with Keith Miller are available at the AccessData booth at MENA ISC.
Follow us on Twitter at @AccessDataGroup.