In today’s mobile world, companies need a strong combination of policies, training, device management, controls and application security. To help IT and security professionals implement a successful mobile strategy for both company-owned and BYOD devices, global IT association ISACA is presenting a free virtual conference, titled “Mobile Security Matures: Managing the New Mobile Enterprise 2.0,” April 15, 2015, from 5:45pm – 02:30 am IST.
“Mobile devices have transformed organizations through increased productivity, convenience and accessibility. But many of these devices are not owned by the company and pose additional risk,” said Robert E Stroud, CGEIT, CRISC, international president of ISACA and vice president of strategy and innovation at CA Technologies. “ISACA’s virtual conference will help attendees ensure their mobile security is solid and able to adapt, as mobile risks and opportunities continue to evolve.”
During the virtual conference, thousands of attendees will participate in educational sessions, network with peers from around the world, and interact with exhibitors and sponsors in a virtual exhibit hall. Sessions include:
- “Will Your Mobile Policies Survive a Road Trip?” presented by Bryan Barringer, enterprise mobility consultant with SearchCIO. Barringer will provide guidance and tools to review mobile policies in light of the current BYOD climate.
- “Options for File Sync and Storage,” presented by Lisa Phifer, partner of CoreComm. Phifer will discuss how file sync and storage solutions have changed, and new options that are available.
- “State of Mobile Malware,” presented by Bill Dean, director of Computer Forensics and Security Assessment for Sword & Shield Enterprise Security. Dean will discuss malware threats that exist in the mobile environment and what enterprises should most be concerned about regarding the current threat landscape.
- “Mobile Application Security Assessments,” presented by Georgia Wideman, CEO of Bulb Security. Wideman will provide guidance on performing security assessments for custom applications and how they differ from traditional application assessments.