{"id":362,"date":"2006-11-03T00:00:00","date_gmt":"2006-11-03T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/03\/review-of-the-6th-annual-infosecurity-new-york-conference-and-exhibition\/"},"modified":"2021-12-30T11:37:06","modified_gmt":"2021-12-30T11:37:06","slug":"review-of-the-6th-annual-infosecurity-new-york-conference-and-exhibition","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/11\/03\/review-of-the-6th-annual-infosecurity-new-york-conference-and-exhibition\/","title":{"rendered":"Review of The 6th Annual InfoSecurity New York Conference and Exhibition"},"content":{"rendered":"<p>The 6th Annual InfoSecurity New York Conference and Exhibition was a major draw for financial institutions seeking the best and the latest products and services available in the information security industry.  This conference offered cutting-edge solutions for financial institutions looking to secure their IT infrastructure and maintain the overall integrity of their information security programs.  Due to the evolving nature of cyber threats, effective security measures are not resolved with a single quick-fix; rather, it is an ongoing process that requires continual awareness of the newest threats and their countermeasures.  For the average bank employee, such issues are easily written off as the responsibility of more technical personnel &#8212; perhaps, the sole problem of the head of the IT department &#8212; often acting as the CISO and\/or other roles.  However, as one comes to realize from attending this conference, there are a plethora of vendors and solutions which can have an impact on numerous people within an organization, and therefore, the security solutions by which a company may ascribe to.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Among the solutions provided, there exist data encryption, IT auditing services, application security solutions, biometrics, end-to-end infrastructure management&#8230;  Whether your institution requires simple IT risk assessment or a full-enterprise database infrastructure centralization and standardization, InfoSec NY provided a complete spectrum of provider solutions.<\/p>\n<p>In a world where both threats and solutions are constantly evolving, educating yourself about the various security providers available is no longer an issue of compliance and best-practices.  InfoSec NY provided both elements by offering informative sessions hosted by field experts and other authorities in addition to vendor resources.  <\/p>\n<p>Out of the companies surveyed, the study found 72 percent of breaches occurred because of a lack of protection. Yet regardless of this fact, the costs caused by breaches are primarily reactive, with costs increasing with relation to collateral mitigation, such as: <\/p>\n<p>&#8211; a 55 percent focus in marketing costs<br \/>\n&#8211; a 34 percent focus in customer support costs<br \/>\n&#8211; an 11 percent focus in legal, audit, and risk management cost<br \/>\n&#8211; a 0 percent focus in IT security costs <\/p>\n<p>With the IT department bearing none of the costs related to addressing data breaches, such a trend will continue for those who do not maintain a best-practices information security posture.<\/p>\n<p>From attending InfoSec NY, the tracks available satisfied every information security need for all financial institutions, whether they attended to simply touch base with the industry trends, or to gain insightful methods into improving their business posture.  As for the general atmosphere of the discussion panels, the warm reception and the number of pleased nods the sessions provoked was a good indicator of the audience&#8217;s approval.<\/p>\n<p>http:\/\/www.bankinfosecurity.com\/articles.php?art_id=167&#038;PHPSESSID=5d300b3be8332b81086b766592012ed5<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-362","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=362"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/362\/revisions"}],"predecessor-version":[{"id":2849,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/362\/revisions\/2849"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}