Smart phones, laptops, tablet PCs, optical discs and USB devices. There are many new mobile devices and emerging technologies to help today's professionals do their jobs in any location - and increasingly private business is being conducted on personal digital and storage devices. Yet, these technologies create new risks to the security of information systems and privacy of protected data.
How do you ensure that critical information remains secure on personal mobile devices - even when the devices are lost or stolen?
Join this expert panel for insights on:
Proper inventory management of mobile devices - and remember, mobile means more than just smart phones;
Creating and enforcing mobile security policies;
Strategies for encryption, data loss prevention and other elements of layered security to protect devices and systems;
Unique mobile challenges for regulated industries such as financial services, government and healthcare.
In the fall of 2011, the U.S. Department of Veterans Affairs launched a "go-slow" approach to enabling physicians and others to use Apple iPhones and iPads for limited purposes. In this pilot program, a limited number of VA staff members will use the smart phones and tablets primarily for encrypted e-mail and as viewers to access a VA clinical information system, but not to store patient information.
"We're being careful to not increase our breach exposure as we roll these devices out," said Roger Baker, the VA's CIO.
The VA's experience mirrors what is happening to public and private sector organizations in every global marketplace. They are all trying to get a secure handle on the mobile revolution, which is driven by consumer-friendly technologies and threatened by a range of security risks.
Employees and customers alike want to conduct business via mobile technologies, including optical discs and USB devices, so information security leaders are forced to grapple with questions such as:
Who Owns the Devices? Do organizations issue their own devices in the workplace, or do they allow their employees to bring their own devices to work - if they follow prescribed policies?
What Are the Elements of a Sound Mobile Policy? Organizations need minimum security standards, and they need to articulate clear uses, data management principles and the fundamentals of mobile security awareness.
What are the Risks? Each organization must assess the relative risks of mobile against other electronic channels - for employees and customers alike. But there are unique mobile security risks, including controls in mobile applications, the growing threat of mobile malware, and the ever-present prospect of device loss or theft.
In this session, mobile security experts will discuss these topics and more, sharing insights on how today's leading-edge organizations are enabling safe, secure mobile computing inside and outside the workplace.
Webinar Registration
Premium Members Only
OnDemand access to this webinar is restricted to Premium Members.
Scott Ashdown has over 15 years of experience in product development and product management in the data security, authentication, and VoIP industries. He held increasingly senior positions at MPR Teltech, Bioscrypt, ActivIdentity, CounterPath, and Wesley Clover prior to joining Imation. Focused on translating market needs into well-resolved products, Scott holds a Bachelor of Engineering in Computer Systems from Carleton University.
Robert Hamilton
Senior Product Marketing Manager - Data Loss Prevention, Symantec
As Senior Manager, Product Marketing, Data Loss Prevention at Symantec, Robert Hamilton works with security and privacy executives at leading Fortune 500 companies across all industries to help them protect their confidential data. Symantec is the acknowledged market leader in Data Loss Prevention with the only unified solution to discover, monitor, and protect confidential data wherever it is stored or used.
Terrell Herzig
Former CISO, UAB Medicine
Herzig was a national expert on healthcare privacy and information security, mobile device security, and disaster recovery. At UAB he headed a team of security specialists at the delivery system, which includes a 1,000-bed hospital and numerous outpatient facilities throughout the state. During his tenure at UAB, he has served as director of Information Technology for the Civitan International Research Center and director of Informatics for the Pittman General Clinical Research Center. Mr. Herzig has also consulted on numerous informatics projects with external groups, including Southern Nuclear and the US Army Medical Command. He is editor the book, "Information Security in Healthcare: Managing Risk," published by the Healthcare Information and Management Systems Society.
Paula Skokowski
VP - Products & Marketing, Accellion
Ms. Skokowski joined Accellion in February 2007 and oversees the company's product development and marketing initiatives. Accellion provides secure, mobile file sharing solutions that offer ease-of-use internal and external enterprise users need, while giving IT organizations the security protection they require. Ms. Skokowski has more than 20 years experience in new product introduction for pre and post-IPO companies in Silicon Valley.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.