Next-Generation Technologies & Secure Development

Mobile Technology: How to Mitigate the Risks

Mobile Technology: How to Mitigate the Risks
Smart phones, laptops, tablet PCs, optical discs and USB devices. There are many new mobile devices and emerging technologies to help today's professionals do their jobs in any location - and increasingly private business is being conducted on personal digital and storage devices. Yet, these technologies create new risks to the security of information systems and privacy of protected data.

How do you ensure that critical information remains secure on personal mobile devices - even when the devices are lost or stolen?

Join this expert panel for insights on:

  • Proper inventory management of mobile devices - and remember, mobile means more than just smart phones;
  • Creating and enforcing mobile security policies;
  • Strategies for encryption, data loss prevention and other elements of layered security to protect devices and systems;
  • Unique mobile challenges for regulated industries such as financial services, government and healthcare.

See Also: Cyber Insurance Assessment Readiness Checklist

To view the webinar Q&A transcript, click here.


In the fall of 2011, the U.S. Department of Veterans Affairs launched a "go-slow" approach to enabling physicians and others to use Apple iPhones and iPads for limited purposes. In this pilot program, a limited number of VA staff members will use the smart phones and tablets primarily for encrypted e-mail and as viewers to access a VA clinical information system, but not to store patient information.

"We're being careful to not increase our breach exposure as we roll these devices out," said Roger Baker, the VA's CIO. The VA's experience mirrors what is happening to public and private sector organizations in every global marketplace. They are all trying to get a secure handle on the mobile revolution, which is driven by consumer-friendly technologies and threatened by a range of security risks. Employees and customers alike want to conduct business via mobile technologies, including optical discs and USB devices, so information security leaders are forced to grapple with questions such as:

Who Owns the Devices? Do organizations issue their own devices in the workplace, or do they allow their employees to bring their own devices to work - if they follow prescribed policies?

What Are the Elements of a Sound Mobile Policy? Organizations need minimum security standards, and they need to articulate clear uses, data management principles and the fundamentals of mobile security awareness.

What are the Risks? Each organization must assess the relative risks of mobile against other electronic channels - for employees and customers alike. But there are unique mobile security risks, including controls in mobile applications, the growing threat of mobile malware, and the ever-present prospect of device loss or theft.

In this session, mobile security experts will discuss these topics and more, sharing insights on how today's leading-edge organizations are enabling safe, secure mobile computing inside and outside the workplace.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.