Mobile Security, BYOD & How to do it Right
- TYPE: Track START DATE: Friday, April 20, 2012 START TIME: 13:30 LOCATION: Alpsee
BYOD stands for “Bring Your Own Device”. On the train or at the airport you will observe an impressive number of different devices being used by business travellers - notebooks, netbooks, iPads, iBooks, tablets and smartphones. For a long time organizational IT departments have tried to limit the number of these devices to a small list to make the problem manageable. However, the reality is that most IT departments have failed.
It increasingly looks like the solution is to accept that users want to use these devices, and to accept that innovation especially around smartphones and tablet PCs is far faster than organizational IT departments can adapt to manage. The key success is to focus on managing and securing information i.e. “information security”, rather than on the devices themselves i.e. “technology security”.
BYOD stands for “Bring Your Own Device”. On the train or at the airport you will observe an impressive number of different devices being used by business travellers - notebooks, netbooks, iPads, iBooks, tablets and smartphones. For a long time organizational IT departments have tried to limit the number of these devices to a small list to make the problem manageable. However, the reality is that most IT departments have failed.
It increasingly looks like the solution is to accept that users want to use these devices, and to accept that innovation especially around smartphones and tablet PCs is far faster than organizational IT departments can adapt to manage. The key success is to focus on managing and securing information i.e. “information security”, rather than on the devices themselves i.e. “technology security”.
After attending this workshop you will be able to:
- Explain the main risks associated with mobile and employee owned devices based on real life examples.
- Explain the risks associated with allowing employees to use their own mobile devices for their work in the organization.
- Describe best practices for controlling and securing access to information using mobile devices.
- Describe best practices for securing data accessed by employees using their own mobile devices.
This Workshop qualifies for 2.5 Group Learning based CPEs
Learning level: Overview
Continuing Professional Education Credits:

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org
You can get 1 CPE for this track.
Sessions:
Securing the communication of Mobile Devices
Process Maturity Needs
European Identity & Cloud Conference 2012
- Language:
- English
- Registration fee:
-
€1980.00
$2475.00
S$3168.00
21780.00 kr
INVOICE
- Contact person:
-
Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
- Apr 17 - 20, 2012 Munich, Germany