Mobile Security Q&A with Intel's Malcolm Harkins
Spend an hour with mobile security pioneer Malcolm Harkins, chief security and privacy officer at Intel, as he answers direct questions from attendees about how to get the most from your mobile security efforts.
See Also: Unite & Disrupt: Mitigate Attacks by Uniting Security Operations
Attendees had the opportunity to submit questions directly to Harkins. Among the topics he discussed:
- Identity and access management in the mobile era;
- How to secure data - not just devices;
- New business benefits your organization can gain from BYOD.
In an exclusive session brought to you by Information Security Media Group, Harkins expands upon topics discussed in his two webinars, Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices and Mobile Security: Intel's CISO on Identity & Access Management (IAM) and Data Security.
In previous insight focused on mobile security and employee-owned devices, Harkins says organizations must tackle these risks head-on. "Doing nothing is not an option" when it comes to BYOD. "Employees will work around and unknowingly expose the enterprise," he says. Organizations now must focus on protecting data and networks, as well as ensuring a whole new level of identity and access management.
"The thing [organizations] have to do is ... establish a cross-functional mobile governance view of this, so you can understand the dynamics of what the business is trying to achieve," Harkins says. With a more global view of goals and challenges, security leaders can hone in on the true inhibitors to mobile security. "That way, you can focus on: Is it an application issue you need to work on in a particular category? Is it the encryption? The identity and access management? You can get into the uses and where the company is trying to achieve value with the mobile device proliferation."
You might also be interested in …