Security user group gears up for growth

A year after IT directors at some of Britain's largest organisations began to form a high-powered security user group, the...

A year after IT directors at some of Britain's largest organisations began to form a high-powered security user group, the Jericho Forum has opened up to new members.

It has also announced plans to operate under the auspices of the Open Group, a standards group representing users and suppliers of open technology.

While relinquishing its status as an independent body, the Jericho Forum is expected to maintain its own identity, founder members told Computer Weekly.

There are now 40 companies, including many multinationals in the Jericho Forum, along with government representatives. The group aims to expand its membership to several hundred by the end of next year.

Paul Dorey chief information security officer at BP, said, "User companies may join at £4,000-£6,500 a year based on size with large suppliers paying up to £11,000. Academics and government departments pay lower fees."

David Lacey, director of information security at Royal Mail Group and founding member of the Jericho Forum, said, "We have decided to include suppliers but they will not have the same voting rights as users. We cannot afford to leave decisions to suppliers, because they are naturally competitive."

Lacey was also keen to get academics involved even though this will mean having to assess the merits of blue-sky technology. "We need more [blue-sky technology] and we are aiming to engage the academic community by setting them specific problems to solve," he said.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close