Mobile Security, BYOD & How to do it Right

  •  TYPE: Track    START DATE: Friday, April 20, 2012     START TIME: 13:30    LOCATION:  Alpsee
Conference Agenda

BYOD stands for “Bring Your Own Device”.   On the train or at the airport you will observe an impressive number of different devices being used by business travellers - notebooks, netbooks, iPads, iBooks, tablets and smartphones.   For a long time organizational IT departments have tried to limit the number of these devices to a small list to make the problem manageable.  However, the reality is that most IT departments have failed.

It increasingly looks like the solution is to accept that users want to use these devices, and to accept that innovation especially around smartphones and tablet PCs is far faster than organizational IT departments can adapt to manage.  The key success is to focus on managing and securing information i.e. “information security”, rather than on the devices themselves i.e. “technology security”. 


BYOD stands for “Bring Your Own Device”.   On the train or at the airport you will observe an impressive number of different devices being used by business travellers - notebooks, netbooks, iPads, iBooks, tablets and smartphones.   For a long time organizational IT departments have tried to limit the number of these devices to a small list to make the problem manageable.  However, the reality is that most IT departments have failed.

It increasingly looks like the solution is to accept that users want to use these devices, and to accept that innovation especially around smartphones and tablet PCs is far faster than organizational IT departments can adapt to manage.  The key success is to focus on managing and securing information i.e. “information security”, rather than on the devices themselves i.e. “technology security”.  

After attending this workshop you will be able to:

  • Explain the main risks associated with mobile and employee owned devices based on real life examples.
  • Explain the risks associated with allowing employees to use their own mobile devices for their work in the organization.
  • Describe best practices for controlling and securing access to information using mobile devices.
  • Describe best practices for securing data accessed by employees using their own mobile devices.

This Workshop qualifies for 2.5 Group Learning based CPEs

Learning level:  Overview

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org

For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: lk@kuppingercole.com

Session(s):

Securing the communication of Mobile Devices

Date: Friday, April 20, 2012 Time: 13:30-15:00

Securing the communication of Mobile Devices
Alexei Balaganski, KuppingerCole • Eric Fulton, Lake Missoula Group • Axel Grosse, Vordel

With the rising amount of Mobile Devices and Apps, a new challenge drives the integration and security teams in companies. Harmless and business critical applications run on the same device of managers and workers. The well established software deployment policies do not work well in this dynamic environment. Clearly identifying the privileged user and securing the content of his communication is a real challenge. The second part of the talk will highlight the recommended principles and...

Process Maturity Needs

Date: Friday, April 20, 2012 Time: 15:00-16:00

Process Maturity Needs
Alexei Balaganski, KuppingerCole • Eric Fulton, Lake Missoula Group • Axel Grosse, Vordel

Recent and not so recent developments like SOA, BYOD, or Cloud Services as a common denominator require reliable, fine grained, actively managed and monitored authentication and authorization. This simple truth has been frequently spread since quite a while and should be widely known meanwhile. Less understood are the necessary preconditions for the organization regarding a minimum process maturity and minimum level of having things organized. This closing part of the workshop will provide...

Quick Links

Stay Connected

Information

Congress

European Identity & Cloud Conference 2012

Language:
English
Registration fee:
€1980.00 $2376.00
Contact person:

Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
  • Apr 17 - 20, 2012 Munich, Germany

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00