Mobile Security: Managing Identity and Access
Mobile Security: Managing Identity and Access

- Premium Members Only Content - Exclusive Video -

See Also: 2016 Annual Worldwide Infrastructure Security Update

Security leaders agree: You can't realistically say "no" to the bring-your-own-device movement. But you also cannot say "yes" without taking on significant mobile security challenges. None any bigger than identity and access management.

Elayne Starkey of the State of Delaware and Malcolm Harkins of Intel are two CSOs who stepped into the BYOD movement early, and they are open about the lessons their organizations have learned.

In this video interview, Starkey and Harkins discuss:

  • New approaches to IAM;
  • Privacy challenges to be tackled;
  • How to use mobility to enhance security.

Background

It's no longer a question of if organizations will support the bring-your-own-device phenomenon. It's a question of "how?"

And in terms of mobile security, it's no longer a matter of simply ensuring device safety. Organizations now must focus on protecting data and networks, as well as ensuring a whole new level of identity and access management.

In this exclusive video interview, we hear from two BYOD pioneers:

  • Elayne Starkey of the State of Delaware tells why her agency was a leader, not a laggard, in mobile security and what her team is doing today to improve IAM across the state.
  • Malcolm Harkins of Intel talks not only about his approach to IAM, but also how the company responds to global privacy regulations, as well as uses mobile devices to create new forms of security.

For organizations that have just entered or are considering the BYOD revolution, these mobile security tips are valuable. And they come from the first-hand experience of two mobile pioneers.



Around the Network