Panel discussion: Securing the mobile, social enterprise: Tackling and embracing BYOD and consumerisation

  • Date 24 Apr 2013

Panel discussion: Securing the mobile, social enterprise: Tackling and embracing BYOD and consumerisation

24 Apr 2013, 16:00 - 17:00

Keynote Theatre

English (United Kingdom)

Mobility has changed business. The consumerisation of IT and BYOD have been driven by cultural change in the way people work. Businesses are demanding flexibility and a mobile workforce - always connected, always on - expects to have access to the latest technologies and devices to enable them to do their work. The debate is no longer around whether consumerisation and BYOD are a good idea – they’re here to stay whether you like it or not and you need to deal with the resulting host of information security challenges around policy, data and usage. How do you manage mobile devices securely? How can information security policies be applied consistently across all devices including BYOD? What access rights should you have in place? What are the new risks that consumerisation poses to an organisation? Who owns the data when you have a BYOD strategy and who is liable when there is a breach? How do you deal with social networking on personal devices? And what implications does the arrival of 4G have for securing the mobile enterprise?

This session will share case studies and best practice that will enable you to protect your mobile enterprise.

  • Hear best practice regarding mobile and BYOD usage policies
  • Discover how to manage data in a mobile and social business
  • Evaluate the mobile cyber threat landscape and identify strategies to tackle the risks
  • Learn lessons and hear war stories from organisations that are currently grappling with the challenges of implementing a security strategy and architecture for mobile devices and BYOD




Business Issues Covered

• Deliver security to drive and enable clear business growth • Demonstrate clear thought leadership to ensure security is high on the corporate agenda and capex justified • Ensure information security projects demonstrate return on investment • Identify internal and external threats and keep a business secure • Benchmark your security posture and strategy against your peers

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.