Data Security Council of India announced the 7th edition of Best Practices Meet 2015, scheduled to be held in Bengaluru, from July 9-10.
With the unleashing of the Digital Technologies Globally and in India BPM 2015, has “Architecting Security for Digital Transformation” as the theme. The two-day deliberations, will reflect on policy, endeavors at national and industry levels, proposed industry steps, market response, best practices, industry standards and technology designs and see how they play their roles in architecting of information systems and enterprise security within organizations.
As country is witnessing a great push for transforming the economy to a digital economy, significant steps have been taken by the government and public sector, which promise to alter the nature and fabric of services delivered to the citizens by them. Furthermore, the Digital India initiative not only tends to re-structure the entire delivery of these services, but also unleash the potential of private sector leading to a technology makeover. This transformation is led by digitization of data, experimentations with technology enabled channels, adoption of mobile technologies, choice of using diverse devices and technology enabled transaction processing. Digital technologies create immense possibilities and unveil many ways to solve a specific business or governance problem. However, in the process they may expand the threat landscape, introduce vulnerabilities, weaken the security composition and give rise to many new possibilities of security vulnerabilities. Security hence becomes integral component of Digital transformation.
On the day of announcement Rama Vedashree, VP NASSCOM and Interim CEO, DSCI said “Digital transformation calls for in-depth, 3600 analysis of security. Architecting a security solution should factor the complex threat landscape. This year’s DSCI Best Practices Meet promises to take a deep dive into the policy, technology and the practices that would help design and organize the security structure and make processes more resilient”
Highlights of the agenda include workshops on ‘Cyber Insurance’ and ‘Management of Legal Risks in IT-enabled businesses’, breakfast session on day two, discussing ‘The Wearables: Relevance to Enterprise’, track sessions and policy updates, besides plenary sessions. Focused on ‘Architecting Security’, BPM 2015 would deliberate on how architectural views, approaches, frameworks, processes and practices work for security and what benefits they yield to the enterprise and the consumer.