This resource is no longer available
Managing the Mobile Onslaught: Securing Endpoints to Apps
Mobile devices have become a ubiquitous resource in today’s workplace. More than ever before employees are using their mobile devices for both business and personal use, making mobile security that much more essential – and complicated.
How can you achieve malleable security and improved compliance efforts as new devices, platforms and online threats proliferate?
Join ISACA, SearchSecurity, SearchCompliance, and thousands of your peers online for this look at the state of mobile security and compliance today. Hear expert opinions on the current landscape and receive best practices for developing and maintaining a BYOD policy that protects your company's data -- while also catering to evolving regulatory compliance and privacy rules.
Enter the convenient, online environment of this virtual event on September 18th for expert answers to questions like:
- What are the risks and rewards associated to mobility and BYOD?
- How does Mobile Device Management (MDM) really work, and which MDM product is the right fit for my environment?
- How do Mobile Application Management (MAM) and MDM differ?
- How can I reach a broader range of MAM benefits?
- What are the built-in security features, weaknesses, and vulnerabilities of each of the 4 major device platforms – Adroid, iOS, BlackBerry, and Windows Mobile – and how do I secure each
SpeakersJohn P. Pironti CGEIT, CISA, CISM, CISSP, CRISC, ISSAP, ISSMP, President, IP Architects, LLC
John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 20 years. Mr. Pironti has a number of industry certifications including Certified in the Governance of Enterprise IT (CGEIT), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information System Control (CRISC), Information Systems Security Architecture Professional and (ISSAP) and Information Systems Security Management Professional (ISSMP). Mr. Pironti frequently provides briefings and acts as a trusted advisor to senior leaders of numerous organizations on information security and risk management and compliance topics and is also a member of a number of technical advisory boards for technology and services firms. He is also a published author and writer, highly quoted and often interviewed by global media, and an award winning frequent speaker on electronic business and information security and risk management topics at domestic and international industry conferences.Jack Madden Blogger
Jack Madden writes about everything related to enterprise mobility management at BrianMadden.com. He was the editor of ConsumerizeIT.com (now a part of BrianMadden.com) and has also contributed to SearchVirtualDesktop.com. Jack is the co-creator of the Consumerization Nation podcast, and has spoken at BriForum, Citrix Synergy, and other events throughout the US. Jack was a co-author of "The VDI Delusion," and his book "Enterprise Mobility Management: Everything you need to know about MDM, MAM, and BYOD" will be published this April. Follow Jack on Twitter @JackMaddenJack Gold president and principal analyst, J. Gold Associates LLC
Jack Gold is Founder and Principal Analyst at J. Gold Associates. Gold has more than 35 years in the computer and electronics industries, including work in imaging, multimedia, technical computing, consumer electronics, software development and manufacturing systems. He is a leading authority on mobile, wireless and pervasive computing, advising clients on business analysis, strategic planning, architecture, product.Lisa Phifer President, Core Competence Inc.
Lisa Phifer owns Core Competence Inc., a consulting firm specializing in business use of emerging Internet technologies. Lisa has been involved in the design, implementation and evaluation of internetworking, security and management products for 30 years. At Core Competence, she has advised large and small companies regarding security needs, product assessment and the use of emerging technologies and best practices. She teaches about wireless LAN and mobile device administration and security, and has written extensively for numerous publications, including Information Security, SearchSecurity, SearchMobileComputing, TomsITPro, and Wi-Fi Planet. Phifer's insight columns and technical tips are published monthly by SearchNetworking and the AirWISE Community Security Center. She holds an MS, Computer Science from Villanova University, and a BS in Computer Science from West Chester University.Arun Bhattacharya Product Marketing, Mobility Solutions, CA Technologies
Arun leads product marketing for Enterprise Mobility solutions at CA Technologies. Prior to CA, Arun was most recently at Good Technology and Citrix Systems where he held leadership positions, also in the Mobility space. He brings with him nearly 20 years of product marketing leadership experience across Citrix, Intel, HP, Good, Cadence and a few technology start-ups. He has an undergraduate degree in Engineering from India and an MBA from Rice University.
- SearchCompliance and SearchSecurity.com
- 07 Aug 2013
- 07 Aug 2013
- Virtual Seminar