Mobile Device Security Summit 2013
Date of Event
The evolution of mobile devices shows no signs of slowing, and with each new generation, the devices become more efficient tools that employees increasingly rely on to conduct both their corporate and personal business. Apps that allow the user to access sensitive corporate data are prime targets for hackers and provide a wide range of access ports to data. Controlling security breaches of mobile devices is complex due to the varying software and device types. Additionally, many organizations have no restrictions on use of personal devices.
Mobile device security experts and practitioners will discuss the best approaches to this new and evolving challenge. Organizations who have developed successful mobile device security programs will share how they developed and gained management support for their plans.
Topics will include:
understanding and controlling risks in an increasingly mobile world
managing the human factor and increasing security awareness across the enterprise
user case studies
benchmarking and metrics for a mobile security program
current threat landscape, and what"s on the horizon
Who should attend?
Chief technology officers (CTO)
Chief security officers (CSO)
Cyber risk managers
John Britton, Good Technology
Vijay Dheap, IBM Mobile Security Solutions
Scott Gordon, ForeScout Technologies
Todd Nakano, InfoExpress
Upesh Patel, Trusteer
Ojas Rege, MobileIron
If you are interested in speaking at the 2013 Mobile Device Security Summit, please contact Jennifer Santiago, Summit Content Manager.
- Receive a discount of up to $500 for any full course paid for by Wednesday, April 17, 2013.
- Receive a discount of up to $250 for any full course paid for by Wednesday, May 1, 2013.
- No refunds available after Wednesday, May 8, 2013.