ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

SARG 2015 - Security audit, risk and governance workshop (SARG 2015)

Date2015-09-15 - 2015-09-17

Deadline2015-04-15

VenueLondon, England, UK - United Kingdom UK - United Kingdom

Keywords

Websitehttps://conferences.gsm.org.uk/icgs3

Topics/Call fo Papers

Security audit, risk and governance workshop (SARG 2015)
Part of 10th International Conference on Global Security, Safety & Sustainability
Hosted by: GSM London
Date: 15th - 17th September 2015
Venue: London, England
Website: http://conferences.gsm.org.uk/icgs3/
CFP Deadline: 5-MAY-2015
Accepted paper will be published as a Springer CCIS volume
Information Technologies (IT) have become a strategic key success factor and essential for business development. To be more effective, organizations must manage their business, made by other than IT resources, with IT infrastructures. They need also, to be more competitive, to involve all the new emerging IT paradigms like Cloud (SaaS, PaaS and IaaS), Social Networks and Mobile (BYOD included).
In this context IT Management take the form of IT Governance, in which all the stakeholders should be able to make their own decisions thus preventing a single stakeholder, typically IT, from being blamed for poor decisions.
Thus, the sole introduction of IT in business processes poses many new challenges in terms of risk evaluation, risk management, compliance verification processes (in order to prevent data leaks or exposures), business continuity and cyber resilience in presence of security attacks and/or cybercrime, reinforced by the higher attractivity of cybercrime with respect to common crime.
Topics of interest include, but are not limited to:
- Cyber resilience models
- Cybercrime mitigation models
- Security risk-management strategies and models
- Risk Analysis architectures and models
- Risk and Reputation Management
- Social Media, social networks and mobile. Security, Trust and Privacy Management in enterprise environments
- Trust and policy management in the Cloud
- Security Governance, Risk and Compliance
- New standards, guidelines, best practices for security and privacy in the Cloud
- Bring Your Own Device, Mobile Device Management
- Business-driven governance vs IT-Security driven governance
- Security Management Development Lifecycle
- Data security and data privacy management
- Cost and economic models for security in the Cloud
- Risk, audit and governance related to Cyber Economy
- Cybercrime economics

Last modified: 2015-04-12 14:47:33