Building and Managing an Effective Mobile Security Strategy

Most organizations today allow employees and other users to bring their own mobile devices onto the enterprise network to access corporate data. But in many cases, security teams still do not have comprehensive, enforceable security policies that take into account the many technologies and networks that users may employ to connect their mobile devices.

Available:
On Demand
Duration:
1h 00min

In this webinar, attendees will get advice on how to build a sound, effective mobile security strategy that works across locations and devices --and that can be enforced across the enterprise.

Attend this webinar and you'll:

  • Receive a roadmap for updating your remote work security strategy and BYOD policy
  • Learn about the variety of tools available for securing smartphones, and those tools' limitations
  • Get tips for what to tell home workers about securing any mobile or remote devices that may connect to the corporate network

Featured Speakers

  • John Burke
    John Burke
    Senior IT Security Engineer
    Iberia Bank

    John Burke is a Senior IT Security Engineer for Iberia Bank. A graduate of Auburn University, John has more than 20 years in IT experience. John has worked in banking and healthcare technology risk systems, as well as broad experience managing security for other disciplines.He is a Certified Computer Forensics Examiner, Certified Web Application Penetration Tester, and a Certified Ethical Hacker.

  • Shimon  Oren
    Shimon Oren
    VP of Research & Deep-Learning
    Deep Instinct

    Shimon N. Oren is VP of Research & Deep-Learning at Deep Instinct. Prior to joining Deep Instinct in 2016, Shimon served for 14 years as an officer in the Israel Defense Force's elite cyber unit. Shimon’s background includes a wide range of cyber security and research positions, where he managed multifunctional teams of hackers, researchers and engineers. Over the years Shimon has worked extensively with a variety of industry, defense and intelligence partners and agencies in North America and Europe. He is a recipient of the President of Israel Award for Outstanding Military Service, holds a B.Sc in Electrical Engineering and a graduate degree in Finance and Tech Management.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By