WEBINAR 2014 - Threats and Solutions for Mobile Security - Webinar By EITAGlobal
View: 109
Website http://bit.ly/1esy4ut |
Edit Freely
Category Information Technology(IT); Compliance training; IT training, Regulatory compliance; Threats and Solutions; Mobile Security; Compliance Management.
Deadline: January 13, 2014 | Date: January 14, 2014
Venue/Country: Online, U.S.A
Updated: 2013-12-02 18:10:36 (GMT+9)
Call For Papers - CFP
Overview: With the expanding range of mobile devices both company-provided and employee owned accessing corporate email and other systems, organizations are seeing an enormous security exposure created. Security capabilities vary widely among the various mobile operating systems and releases, and incidents of mobile malware are growing by leaps and bounds. This session will provide an organized presentation of the recognized mobile vulnerabilities, the difference in severity among the various mobile operating systems, and describes the protections that are available and assesses their efficacy.Why should you attend: IT organizations are being called upon to support a wider range of mobile devices, many of which lack the basic mechanisms required to adequately secure corporate information stored on them. Further, many organizations have not invested in mobile device management (MDM) systems that would allow the company to ensure basic security practices are being used on those devices or provide the ability to wipe the corporate information if the device is lost or stolen. If your organizations has moved beyond BlackBerry and is currently supporting iOS, Android, or other smartphone platforms, either company-provided or personally-owned, you need to understand what is at stake and how to best protect your organization.Areas Covered in the Session:Importance of a sound mobility policy, and how to go about creating oneWhat are the major threat vectors for corporate data residing on mobile devices?What is a mobile device management (MDM) system and do I need one?Are there threats that MDM systems do not address?What kind of push-back can I expect from my users?Do all mobile platforms provide equivalent security protections?What are the major elements in a successful enterprise mobility management plan?Who Will Benefit:CSO, Security and Compliance ManagersIT/Telecommunications DirectorMobility Services Manager/Party responsible for mobile service purchasesSpeaker Profile:Michael F. Finneran is principal at dBrn Associates, a full service advisory firm specializing in wireless and mobile security, and he has assisted a number of organizations in developing their mobility plans. Along with providing consulting assistance to carriers, equipment manufacturers and end-user organizations, Michael is a frequent speaker at industry conferences including InterOp, Enterprise Connect, and the Information Week 500. He has published over 300 articles as well as numerous white papers and market reports. His blogs appear regularly in Information Week, NoJitter.com, and UCStrategies.com, and the Voice Report. Michael is a member of the Society of Telecommunications Consultants and he has a Masters Degree from the J. L. Kellogg Graduate School of Management at Northwestern University.
Keywords: Accepted papers list. Acceptance Rate. EI Compendex. Engineering Index. ISTP index. ISI index. Impact Factor.
Disclaimer: ourGlocal is an open academical resource system, which anyone can edit or update. Usually, journal information updated by us, journal managers or others. So the information is old or wrong now. Specially, impact factor is changing every year. Even it was correct when updated, it may have been changed now. So please go to Thomson Reuters to confirm latest value about Journal impact factor.