Roundtable: Mobile Privacy and Security

  •  TYPE: Track    START DATE:  Thursday, April 19, 2012     START TIME: 14:00    LOCATION:  Ammersee 2
Parent Track

Even though mobile devices bring along many advantages, privacy and security are not among their strengths. In this round table, we will look into the  main issues of mobile privacy and security breaches  – and explore what can be done against it. 


Even though mobile devices bring along many advantages, privacy and security are not among their strengths. In this round table, we will look into the  main issues of mobile privacy and security breaches  – and explore what can be done against it. 

After attending this you will be able to:

  • Explain the main risks associated with mobile devices based on real life examples.
  • Explain the risks associated with allowing employees to use their own mobile devices for their work in the organization.
  • Describe best practices for securing mobile devices with the organization.
  • Describe best practices for securing data accessed by employees using their own mobile devices.

This Roundtable qualifies for 3 Group Learning based CPEs.

Continuing Professional Education Credits:

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org


You can get 1 CPE for this track.

Sessions:

Privacy in the age of BYOD and Enterprise Mobility

Date: Thursday, April 19, 2012 Time: 14:00-16:00

Privacy in the age of BYOD and Enterprise Mobility
Alexei Balaganski, KuppingerCole

BYOD, or Bring Your Own Device, is a trend which means that corporate IT may no longer control what devices employees use to connect to corporate applications. In this new environment, employees use iPads and smartphones for work, expecting to use enterprise applications anytime and anywhere. This presents significant challenges, including the fact that devices may not interface directly with corporate identity management systems. In this track, we examine the implications of BYOD on the...

Mobile data Security and Privacy
Eric Fulton, Lake Missoula Group

Physical security of mobile devices is poor. It is good practice to enforce stronger data security and privacy policies for data bound to mobile clients, and have mandatory remote wipe functionalities. How can you implement tiered data security / privacy policies that are mobile aware? For example, when a REST API is being called by a web app from an internal IP, enforce minimum restrictions, where as if the caller is an iPhone application, enforce maximum restrictions.

Securing the Mobile API Ecosystem
Axel Grosse, Vordel

Many organizations are deploying APIs, using REST and JSON, to enable mobile application developers to create apps using their APIs. In this way, an organisation can quickly create an ecosystem of developers creating apps for their services. However, how can these APIs be secured? How is usage controlled? This session focuses on API Management in the age of mobile.

Bridging from Mobile to on-Premise

Date: Thursday, April 19, 2012 Time: 16:30-17:30

Bridging from Mobile to on-Premise
Axel Grosse, Vordel

Organisations are under pressure to deliver applications to mobile devices. However, many of the applications to be deployed to mobile clients currently reside behind the firewall. How can this gap be bridged? In this track, the question of mobile-enablement of on-premises applications is addressed.


Congress

European Identity & Cloud Conference 2012

Language:
English
Registration fee:
€1980.00 $2475.00 S$3168.00 21780.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Apr 17 - 20, 2012 Munich, Germany