SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News
http://www.enterpriseitnews.com.my/smartly­secure­securely­smart/ 1/6
CAT YONG on Thursday, September 1, 2016 at 12:51:50 am
Home
About
Contact
Advertise
Search... 
NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV
PEOPLE IT BYTES BACK!
HOME ABOUT CONTACT ADVERTISE SEARCH. . . 
Smartly Secure, Securely
Smart
11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News
http://www.enterpriseitnews.com.my/smartly­secure­securely­smart/ 2/6
Speaking at the sidelines of Netapp’s Secure Cities Dialogue event in Singapore, Netapp’s East Asia Managing Director
and VP, Krishna Arani said, “(Storage) always has to think of data even when not being used ….ensure that data is
controlled and moved to where it needs to be.”
Data Fabric is one technology that addresses key issues in newer data protection issues, like vendor lock-in. Then there
is also Netapp Private Storage for cloud (NPS) that enables companies to take advantage of data that is not in the cloud.
Service providers like Korea Telekom can host an Amazon data centre alongside the NPS cloud for example, with the
NPS having all the bene ts of private, dedicated storage.
But, building a smart city requires more than just technology to maintain data integrity and privacy.
More than tech
Netapp’s APAC President Rick Scur eld said, “Smart cities is about partnerships and policies, it’s not just a tech question
or tech solution.”
Case in point is the hundreds of millions of dollars the Canadian government wasted when they built a big data centre
for their federal IT organisation. It violated sovereignty compliance because Canadian citizens’ data were being routed
through data centres outside of the country.
Netapp’s Chief Privacy Of cer, Sheila FitzPatrick pointed out that Netapp is a tech company that also complies with
privacy law. “We don’t think of privacy as an afterthought. Data can be your greatest asset and detriment. If you only
think of a tech solution (to data privacy), it doesn’t do you good to encrypt data you shouldn’t be collecting in the rst
place.”
Smart city conundrum
Smart cities come with a unique set of problems. For it to work, it needs data and lots of it.
Basically, it could lead to collection of personal data at greater rate, unknown usage of personal data by unknown
parties, cybersecurity attacks, increasing data privacy laws and risk of non-compliance, new technology driving need for
greater attention to potential risks and lack of transparency.
If there was a cyberattack, to what extent is a company allowed to report it, if at all? What is the data that can or can’t
be collected, and many more concerns.
Due diligence          
FitzPatrick shares best practices that can help mitigate the risks in a smart city environment. For example:
1. Governance, risk and compliance
2. Practicing proactive data privacy
3. Doing an impact assessment
4. Classifying data and managing access to data
5. De ning the data ownership controller-processor roles and ensuring there is shared joint liability.
6. Transparency
7. Vet partner providers
8. Doing a security assessment
11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News
http://www.enterpriseitnews.com.my/smartly­secure­securely­smart/ 3/6
CATEGORIES BIZ PERFORMANCE
TAGGED CLOUD DATA PROTECTION KRISHNA ARANI PRIVACY PRIVATE CLOUD PUBLIC CLOUD
RICK SCURFIELD SHEILA FITZPATRICK
Notify of new follow-up comments ›
CAT YONG
Cat Yong is Editor-in-Chief of Enterprise IT News.
WEBSITE
LEAVE A REPLY
Be the First to Comment!
You must be logged in to post a comment.

0
PREVIOUS ARTICLE
SAP MALAYSIA TO INTRODUCE DIGITAL BOARDROOM SOLUTION
NEXT ARTICLE
VIRTUAL NETWORKING AND (FINALLY?) TRUE WORKLOAD
MOBILITY ACROSS CLOUDS
Email
NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV
PEOPLE
IT BYTES BACK!
QUOTE: ASHTON KUTCHER TALKS
ABOUT HEART IN SECURITY
QUOTE:
AIMS’
CHIEW ON
CONNECTIVI
TY AND
CLOUD
SERVICES
OFF THE
CUFF: IBM’S
STEVE MILLS
ON THE
COMPETITIO
N
QUOTE:
INTEL’S
PRAKASH
MALLYA ON
PRACTICING
BYOD
Get the week’s best articles right in your inbox
Your Name Your Email
Subscribe
Join 15K subscribers
11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News
http://www.enterpriseitnews.com.my/smartly­secure­securely­smart/ 4/6
LATEST
COMMENTS
HAPPY on 29 Oct
Happy [...]Here are some of
Search... 
LATEST POSTS
SYSTEM & APPS 18 NOV
COMPUTE AT THE EDGE: SCHNEIDER
WILL SEE YOU THERE
PIKOM LAUNCHES PC ...
NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV
PEOPLE
IT BYTES BACK!
QUOTE: ASHTON KUTCHER TALKS
ABOUT HEART IN SECURITY
QUOTE:
AIMS’
CHIEW ON
CONNECTIVI
TY AND
CLOUD
SERVICES
OFF THE
CUFF: IBM’S
STEVE MILLS
ON THE
COMPETITIO
N
QUOTE:
INTEL’S
PRAKASH
MALLYA ON
PRACTICING
BYOD
Get the week’s best articles right in your inbox
Your Name Your Email
Subscribe
Join 15K subscribers
11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News
http://www.enterpriseitnews.com.my/smartly­secure­securely­smart/ 5/6
Happy [...]Here are some of
the web-sites we advise for
our visitors[...]
HAPPY on 29 Oct
Happy [...]Here are a
number of the internet sites
we suggest for our
visitors[...]
THE WAY TO
HAPPINESS on 29 Oct
The Way To Happiness
[...]we like to honor a lot of
other world-wide-web web
pages on the net, even if
they arent linked to us, by
GOOGLE on 27 Oct
Google Sites of interest we
have a link to.
THE PROMISE OF
CLOUD: ASEAN IT
SCEPTICS GET A
TASTE WITH
RAVELLO |
ENTERPRISE IT NEWS
HTTP://WWW.ENTE
RPRISEITNEWS.COM.
MY/THE­PROMISE­
OF­CLOUD­ASEAN­IT­
SCEPTICS­GET­A­
TASTE­WITH­
RAVELLO/ … ­ NEWS
on 27 Oct
[…] The promise of cloud:
ASEAN IT sceptics get a
ABOUT
SAP GAINS TOP GART...
SAP GAINS TOP GART...
THE PROMISE OF CLO...
NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV
PEOPLE
IT BYTES BACK!
QUOTE: ASHTON KUTCHER TALKS
ABOUT HEART IN SECURITY
QUOTE:
AIMS’
CHIEW ON
CONNECTIVI
TY AND
CLOUD
SERVICES
OFF THE
CUFF: IBM’S
STEVE MILLS
ON THE
COMPETITIO
N
QUOTE:
INTEL’S
PRAKASH
MALLYA ON
PRACTICING
BYOD
Get the week’s best articles right in your inbox
Your Name Your Email
Subscribe
Join 15K subscribers
11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News
http://www.enterpriseitnews.com.my/smartly­secure­securely­smart/ 6/6
ASEAN IT sceptics get a
taste with Ravello |
Enterprise IT News
http://www.enterpriseitnew
s.com.my/the-promise-of-
cloud-asean-it-sceptics-get-
a-taste-with-ravello/&…
[…]
Copyright © 2016 Enterprise IT News | All Rights Reserved.
Home About Contact Advertise
BACK TO TOP
WE ARE SOCIAL
LATEST POSTS
SYSTEM & APPS 18 NOV
COMPUTE AT THE EDGE: SCHNEIDER WILL
SEE YOU THERE
NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV
PEOPLE
IT BYTES BACK!
QUOTE: ASHTON KUTCHER TALKS
ABOUT HEART IN SECURITY
QUOTE:
AIMS’
CHIEW ON
CONNECTIVI
TY AND
CLOUD
SERVICES
OFF THE
CUFF: IBM’S
STEVE MILLS
ON THE
COMPETITIO
N
QUOTE:
INTEL’S
PRAKASH
MALLYA ON
PRACTICING
BYOD
Get the week’s best articles right in your inbox
Your Name Your Email
Subscribe
Join 15K subscribers

Contenu connexe

Tendances

7. Big data proposal to go lean in public
7. Big data proposal to go lean in public7. Big data proposal to go lean in public
7. Big data proposal to go lean in publicMrsAlways RigHt
 
SILICON VALLEY: RECENT TECHNOLOGIES, CHALLENGES, TRENDS
SILICON VALLEY: RECENT TECHNOLOGIES, CHALLENGES, TRENDSSILICON VALLEY: RECENT TECHNOLOGIES, CHALLENGES, TRENDS
SILICON VALLEY: RECENT TECHNOLOGIES, CHALLENGES, TRENDSGlobalLogic Ukraine
 
7 Important Cybersecurity Trends
7 Important Cybersecurity Trends7 Important Cybersecurity Trends
7 Important Cybersecurity TrendsMarco
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
Blockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
Blockchain + AI + Big Data Technology Integration for 4th Industrial RevolutionBlockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
Blockchain + AI + Big Data Technology Integration for 4th Industrial RevolutionAlex G. Lee, Ph.D. Esq. CLP
 
A Sneak Peek into Internet of Things!
A Sneak Peek into Internet of Things!A Sneak Peek into Internet of Things!
A Sneak Peek into Internet of Things!Romit Bose
 
Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)Mike Wons
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Ray Bugg
 
The Privacy Advantage 2016 - Geoff Revill
The Privacy Advantage 2016 - Geoff RevillThe Privacy Advantage 2016 - Geoff Revill
The Privacy Advantage 2016 - Geoff RevillKrowdthink
 
Intel and the Internet of Things
Intel and the Internet of ThingsIntel and the Internet of Things
Intel and the Internet of ThingsDaren Dunkel
 
15 Big Data Companies in California
15 Big Data Companies in California15 Big Data Companies in California
15 Big Data Companies in CaliforniaIntellectyx Inc
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)U.S. Chamber of Commerce
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNorth Texas Chapter of the ISSA
 

Tendances (18)

7. Big data proposal to go lean in public
7. Big data proposal to go lean in public7. Big data proposal to go lean in public
7. Big data proposal to go lean in public
 
SILICON VALLEY: RECENT TECHNOLOGIES, CHALLENGES, TRENDS
SILICON VALLEY: RECENT TECHNOLOGIES, CHALLENGES, TRENDSSILICON VALLEY: RECENT TECHNOLOGIES, CHALLENGES, TRENDS
SILICON VALLEY: RECENT TECHNOLOGIES, CHALLENGES, TRENDS
 
7 Important Cybersecurity Trends
7 Important Cybersecurity Trends7 Important Cybersecurity Trends
7 Important Cybersecurity Trends
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Blockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
Blockchain + AI + Big Data Technology Integration for 4th Industrial RevolutionBlockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
Blockchain + AI + Big Data Technology Integration for 4th Industrial Revolution
 
A Sneak Peek into Internet of Things!
A Sneak Peek into Internet of Things!A Sneak Peek into Internet of Things!
A Sneak Peek into Internet of Things!
 
IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem
 
Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)Five Big Bets in a Blockchain World (June 2018)
Five Big Bets in a Blockchain World (June 2018)
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019
 
Blockchain+AI+Big Data Technology Integration
Blockchain+AI+Big Data Technology IntegrationBlockchain+AI+Big Data Technology Integration
Blockchain+AI+Big Data Technology Integration
 
The Privacy Advantage 2016 - Geoff Revill
The Privacy Advantage 2016 - Geoff RevillThe Privacy Advantage 2016 - Geoff Revill
The Privacy Advantage 2016 - Geoff Revill
 
Intel and the Internet of Things
Intel and the Internet of ThingsIntel and the Internet of Things
Intel and the Internet of Things
 
15 Big Data Companies in California
15 Big Data Companies in California15 Big Data Companies in California
15 Big Data Companies in California
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
Laporan IGF 2017 oleh Shita Laksmi
Laporan IGF 2017 oleh Shita LaksmiLaporan IGF 2017 oleh Shita Laksmi
Laporan IGF 2017 oleh Shita Laksmi
 
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
 
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor AgreementsNTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
NTXISSACSC4 - Mitigating Security Risks in Vendor Agreements
 

En vedette

Seguridad informática
Seguridad informáticaSeguridad informática
Seguridad informáticaAmbar Lopez
 
Alcances jurídicos del plan nacional para el buen vivir
Alcances jurídicos del plan nacional para el buen vivirAlcances jurídicos del plan nacional para el buen vivir
Alcances jurídicos del plan nacional para el buen vivirJessica_Viviana_Carrasco
 
Clinical Programs in the Department of Supportive Care - Psychosocial Oncology
Clinical Programs in the Department of Supportive Care - Psychosocial OncologyClinical Programs in the Department of Supportive Care - Psychosocial Oncology
Clinical Programs in the Department of Supportive Care - Psychosocial OncologyGlobal Institute GIPPEC
 
Investing In Brazil (1)
Investing In Brazil (1)Investing In Brazil (1)
Investing In Brazil (1)Naeem Iqbal
 
DHW Planning for Growth copy
DHW Planning for Growth copyDHW Planning for Growth copy
DHW Planning for Growth copyBrett Lear
 
Présentation IceFire pour Aos Canada français
Présentation IceFire pour Aos Canada françaisPrésentation IceFire pour Aos Canada français
Présentation IceFire pour Aos Canada françaisMartin Laplante
 
Wizard Food: sweets, butterbeer, and childhood tastes
Wizard Food: sweets, butterbeer, and childhood tastesWizard Food: sweets, butterbeer, and childhood tastes
Wizard Food: sweets, butterbeer, and childhood tastesEmily Truman
 
Olympics amazing presentaton
Olympics amazing presentatonOlympics amazing presentaton
Olympics amazing presentatonvibhu mehta
 
Om0011 enterprises resource planning
Om0011 enterprises resource planningOm0011 enterprises resource planning
Om0011 enterprises resource planningconsult4solutions
 

En vedette (16)

Seguridad informática
Seguridad informáticaSeguridad informática
Seguridad informática
 
Alcances jurídicos del plan nacional para el buen vivir
Alcances jurídicos del plan nacional para el buen vivirAlcances jurídicos del plan nacional para el buen vivir
Alcances jurídicos del plan nacional para el buen vivir
 
Enfoque por competencias
Enfoque por competenciasEnfoque por competencias
Enfoque por competencias
 
Clinical Programs in the Department of Supportive Care - Psychosocial Oncology
Clinical Programs in the Department of Supportive Care - Psychosocial OncologyClinical Programs in the Department of Supportive Care - Psychosocial Oncology
Clinical Programs in the Department of Supportive Care - Psychosocial Oncology
 
Investing In Brazil (1)
Investing In Brazil (1)Investing In Brazil (1)
Investing In Brazil (1)
 
mycollegecreditcourses
mycollegecreditcoursesmycollegecreditcourses
mycollegecreditcourses
 
DHW Planning for Growth copy
DHW Planning for Growth copyDHW Planning for Growth copy
DHW Planning for Growth copy
 
Présentation IceFire pour Aos Canada français
Présentation IceFire pour Aos Canada françaisPrésentation IceFire pour Aos Canada français
Présentation IceFire pour Aos Canada français
 
my m health: Wessex PPA slides
my m health: Wessex PPA slidesmy m health: Wessex PPA slides
my m health: Wessex PPA slides
 
Wizard Food: sweets, butterbeer, and childhood tastes
Wizard Food: sweets, butterbeer, and childhood tastesWizard Food: sweets, butterbeer, and childhood tastes
Wizard Food: sweets, butterbeer, and childhood tastes
 
English cv 3
English cv 3English cv 3
English cv 3
 
projekt_praktikum
projekt_praktikumprojekt_praktikum
projekt_praktikum
 
Asignación n°4
Asignación n°4Asignación n°4
Asignación n°4
 
Olympics amazing presentaton
Olympics amazing presentatonOlympics amazing presentaton
Olympics amazing presentaton
 
Manejo Florestal
Manejo FlorestalManejo Florestal
Manejo Florestal
 
Om0011 enterprises resource planning
Om0011 enterprises resource planningOm0011 enterprises resource planning
Om0011 enterprises resource planning
 

Similaire à Smartly Secure, Securely Smart _ Enterprise IT News

World’s 10 Best Data Integration Solution Providers 2022.pdf
World’s 10 Best Data Integration Solution Providers 2022.pdfWorld’s 10 Best Data Integration Solution Providers 2022.pdf
World’s 10 Best Data Integration Solution Providers 2022.pdfInsightsSuccess4
 
Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsZeshan Sattar
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in MindGosia Fraser
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
 
Big Data Scotland 2017
Big Data Scotland 2017Big Data Scotland 2017
Big Data Scotland 2017Ray Bugg
 
How Big Data Will Change Businesses In 2018
How Big Data Will Change Businesses In 2018How Big Data Will Change Businesses In 2018
How Big Data Will Change Businesses In 2018Tyrone Systems
 
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...Sonia Usih, PMP, MCPM, BSc.
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Scot Cloud 2016
Scot Cloud 2016Scot Cloud 2016
Scot Cloud 2016Ray Bugg
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...lithanhall
 
AI Presentation - Danial Shaikh
AI Presentation - Danial ShaikhAI Presentation - Danial Shaikh
AI Presentation - Danial ShaikhFraugster
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of ThingsW. David Stephenson
 
Cloud Computing and CDO (April 29).pdf
 Cloud Computing and CDO (April 29).pdf Cloud Computing and CDO (April 29).pdf
Cloud Computing and CDO (April 29).pdfPablo Junco
 
Mobile of People and Internet of Things: State of the Union
Mobile of People and Internet of Things: State of the UnionMobile of People and Internet of Things: State of the Union
Mobile of People and Internet of Things: State of the UnionVitaliy Rudnytskiy
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteSandraPaiva
 

Similaire à Smartly Secure, Securely Smart _ Enterprise IT News (20)

World’s 10 Best Data Integration Solution Providers 2022.pdf
World’s 10 Best Data Integration Solution Providers 2022.pdfWorld’s 10 Best Data Integration Solution Providers 2022.pdf
World’s 10 Best Data Integration Solution Providers 2022.pdf
 
Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013Appinions Information Technology Influence Study_August 2013
Appinions Information Technology Influence Study_August 2013
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?
 
Big Data Scotland 2017
Big Data Scotland 2017Big Data Scotland 2017
Big Data Scotland 2017
 
How Big Data Will Change Businesses In 2018
How Big Data Will Change Businesses In 2018How Big Data Will Change Businesses In 2018
How Big Data Will Change Businesses In 2018
 
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
The National Security Agency (NSA) -- PRISM Surveillance System _Not a Surpri...
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019The 10 most trusted companies in enterprise security 2019
The 10 most trusted companies in enterprise security 2019
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
Scot Cloud 2016
Scot Cloud 2016Scot Cloud 2016
Scot Cloud 2016
 
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
Exciting it trends in 2015  why you should consider shifting and upgrading yo...Exciting it trends in 2015  why you should consider shifting and upgrading yo...
Exciting it trends in 2015 why you should consider shifting and upgrading yo...
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
AI Presentation - Danial Shaikh
AI Presentation - Danial ShaikhAI Presentation - Danial Shaikh
AI Presentation - Danial Shaikh
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
 
Cloud Computing and CDO (April 29).pdf
 Cloud Computing and CDO (April 29).pdf Cloud Computing and CDO (April 29).pdf
Cloud Computing and CDO (April 29).pdf
 
Mobile of People and Internet of Things: State of the Union
Mobile of People and Internet of Things: State of the UnionMobile of People and Internet of Things: State of the Union
Mobile of People and Internet of Things: State of the Union
 
Dinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference KeynoteDinis Cruz IBWAS'10 Conference Keynote
Dinis Cruz IBWAS'10 Conference Keynote
 
OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 

Smartly Secure, Securely Smart _ Enterprise IT News

  • 1. 11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News http://www.enterpriseitnews.com.my/smartly­secure­securely­smart/ 1/6 CAT YONG on Thursday, September 1, 2016 at 12:51:50 am Home About Contact Advertise Search...  NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV PEOPLE IT BYTES BACK! HOME ABOUT CONTACT ADVERTISE SEARCH. . .  Smartly Secure, Securely Smart
  • 2. 11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News http://www.enterpriseitnews.com.my/smartly­secure­securely­smart/ 2/6 Speaking at the sidelines of Netapp’s Secure Cities Dialogue event in Singapore, Netapp’s East Asia Managing Director and VP, Krishna Arani said, “(Storage) always has to think of data even when not being used ….ensure that data is controlled and moved to where it needs to be.” Data Fabric is one technology that addresses key issues in newer data protection issues, like vendor lock-in. Then there is also Netapp Private Storage for cloud (NPS) that enables companies to take advantage of data that is not in the cloud. Service providers like Korea Telekom can host an Amazon data centre alongside the NPS cloud for example, with the NPS having all the bene ts of private, dedicated storage. But, building a smart city requires more than just technology to maintain data integrity and privacy. More than tech Netapp’s APAC President Rick Scur eld said, “Smart cities is about partnerships and policies, it’s not just a tech question or tech solution.” Case in point is the hundreds of millions of dollars the Canadian government wasted when they built a big data centre for their federal IT organisation. It violated sovereignty compliance because Canadian citizens’ data were being routed through data centres outside of the country. Netapp’s Chief Privacy Of cer, Sheila FitzPatrick pointed out that Netapp is a tech company that also complies with privacy law. “We don’t think of privacy as an afterthought. Data can be your greatest asset and detriment. If you only think of a tech solution (to data privacy), it doesn’t do you good to encrypt data you shouldn’t be collecting in the rst place.” Smart city conundrum Smart cities come with a unique set of problems. For it to work, it needs data and lots of it. Basically, it could lead to collection of personal data at greater rate, unknown usage of personal data by unknown parties, cybersecurity attacks, increasing data privacy laws and risk of non-compliance, new technology driving need for greater attention to potential risks and lack of transparency. If there was a cyberattack, to what extent is a company allowed to report it, if at all? What is the data that can or can’t be collected, and many more concerns. Due diligence           FitzPatrick shares best practices that can help mitigate the risks in a smart city environment. For example: 1. Governance, risk and compliance 2. Practicing proactive data privacy 3. Doing an impact assessment 4. Classifying data and managing access to data 5. De ning the data ownership controller-processor roles and ensuring there is shared joint liability. 6. Transparency 7. Vet partner providers 8. Doing a security assessment
  • 3. 11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News http://www.enterpriseitnews.com.my/smartly­secure­securely­smart/ 3/6 CATEGORIES BIZ PERFORMANCE TAGGED CLOUD DATA PROTECTION KRISHNA ARANI PRIVACY PRIVATE CLOUD PUBLIC CLOUD RICK SCURFIELD SHEILA FITZPATRICK Notify of new follow-up comments › CAT YONG Cat Yong is Editor-in-Chief of Enterprise IT News. WEBSITE LEAVE A REPLY Be the First to Comment! You must be logged in to post a comment.  0 PREVIOUS ARTICLE SAP MALAYSIA TO INTRODUCE DIGITAL BOARDROOM SOLUTION NEXT ARTICLE VIRTUAL NETWORKING AND (FINALLY?) TRUE WORKLOAD MOBILITY ACROSS CLOUDS Email NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV PEOPLE IT BYTES BACK! QUOTE: ASHTON KUTCHER TALKS ABOUT HEART IN SECURITY QUOTE: AIMS’ CHIEW ON CONNECTIVI TY AND CLOUD SERVICES OFF THE CUFF: IBM’S STEVE MILLS ON THE COMPETITIO N QUOTE: INTEL’S PRAKASH MALLYA ON PRACTICING BYOD Get the week’s best articles right in your inbox Your Name Your Email Subscribe Join 15K subscribers
  • 4. 11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News http://www.enterpriseitnews.com.my/smartly­secure­securely­smart/ 4/6 LATEST COMMENTS HAPPY on 29 Oct Happy [...]Here are some of Search...  LATEST POSTS SYSTEM & APPS 18 NOV COMPUTE AT THE EDGE: SCHNEIDER WILL SEE YOU THERE PIKOM LAUNCHES PC ... NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV PEOPLE IT BYTES BACK! QUOTE: ASHTON KUTCHER TALKS ABOUT HEART IN SECURITY QUOTE: AIMS’ CHIEW ON CONNECTIVI TY AND CLOUD SERVICES OFF THE CUFF: IBM’S STEVE MILLS ON THE COMPETITIO N QUOTE: INTEL’S PRAKASH MALLYA ON PRACTICING BYOD Get the week’s best articles right in your inbox Your Name Your Email Subscribe Join 15K subscribers
  • 5. 11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News http://www.enterpriseitnews.com.my/smartly­secure­securely­smart/ 5/6 Happy [...]Here are some of the web-sites we advise for our visitors[...] HAPPY on 29 Oct Happy [...]Here are a number of the internet sites we suggest for our visitors[...] THE WAY TO HAPPINESS on 29 Oct The Way To Happiness [...]we like to honor a lot of other world-wide-web web pages on the net, even if they arent linked to us, by GOOGLE on 27 Oct Google Sites of interest we have a link to. THE PROMISE OF CLOUD: ASEAN IT SCEPTICS GET A TASTE WITH RAVELLO | ENTERPRISE IT NEWS HTTP://WWW.ENTE RPRISEITNEWS.COM. MY/THE­PROMISE­ OF­CLOUD­ASEAN­IT­ SCEPTICS­GET­A­ TASTE­WITH­ RAVELLO/ … ­ NEWS on 27 Oct […] The promise of cloud: ASEAN IT sceptics get a ABOUT SAP GAINS TOP GART... SAP GAINS TOP GART... THE PROMISE OF CLO... NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV PEOPLE IT BYTES BACK! QUOTE: ASHTON KUTCHER TALKS ABOUT HEART IN SECURITY QUOTE: AIMS’ CHIEW ON CONNECTIVI TY AND CLOUD SERVICES OFF THE CUFF: IBM’S STEVE MILLS ON THE COMPETITIO N QUOTE: INTEL’S PRAKASH MALLYA ON PRACTICING BYOD Get the week’s best articles right in your inbox Your Name Your Email Subscribe Join 15K subscribers
  • 6. 11/19/2016 Smartly Secure, Securely Smart | Enterprise IT News http://www.enterpriseitnews.com.my/smartly­secure­securely­smart/ 6/6 ASEAN IT sceptics get a taste with Ravello | Enterprise IT News http://www.enterpriseitnew s.com.my/the-promise-of- cloud-asean-it-sceptics-get- a-taste-with-ravello/&… […] Copyright © 2016 Enterprise IT News | All Rights Reserved. Home About Contact Advertise BACK TO TOP WE ARE SOCIAL LATEST POSTS SYSTEM & APPS 18 NOV COMPUTE AT THE EDGE: SCHNEIDER WILL SEE YOU THERE NEWS BIZ PERFORMANCE DISRUPTIVE SOCIAL IT SECURITY EITN TV PEOPLE IT BYTES BACK! QUOTE: ASHTON KUTCHER TALKS ABOUT HEART IN SECURITY QUOTE: AIMS’ CHIEW ON CONNECTIVI TY AND CLOUD SERVICES OFF THE CUFF: IBM’S STEVE MILLS ON THE COMPETITIO N QUOTE: INTEL’S PRAKASH MALLYA ON PRACTICING BYOD Get the week’s best articles right in your inbox Your Name Your Email Subscribe Join 15K subscribers