1 SECURING YOUR ENTERPRISE MOBILITY STRATEGY, OPERATION & TECHNOLOGY INTERACTIVE TRAINING WORKSHOP Burj Al Arab, Dubai th th th 16, 17 & 18 March 2015
2 ABOUT LUCIDEUS Lucideus is a cyber space security leader and a trusted standard for companies that need to protect their brands, businesses and dignity from debilitating cyber attacks. Our services include technology & strategy consultancy, training & capacity Building and vulnerability management THE TRAINING WORKSHOP ENTERPRISE MOBILITY THEORY & PRACTICAL RATIO STRATEGY (DAY 1) Management layer trainings with focus on policy formulation, strategy and implementation roadmap construction. OPERATIONS (DAY 2) Implementation of BYOD roadmap and overcoming challenges across the organization. Case study of successful BYOD & MDM deployment. TECHNOLOGY (DAY 3) Deep Dive hands on workshop on Mobile Technologies and their Vulnerability Management. 9:1 7:3 2:8 PAGE 1 OF 7
3 TH DAY 1-16 MARCH Secured Enterprise Mobility - Strategy & Management Enterprise Mobility Strategy and Mobile Center of Excellence Mobile enterprise and mobile security Mobility Strategy - Governance, Policy, Environment, and Security Mobile Security Canvas - Apps, Content, Users, Devices, Transactions, Network, Integration, Backend Infra App Strategy - Enterprise and B2C Device strategy and enterprise BYOD, COBO, COPE, CYOD Mobility management - MDM, MAM, MCM, MADP, EMM Mobile Center of Excellence and Governance Enterprise Mobility Maturity Mode TRAINER PROFILE 25 Year Experience in information security space with his last assignment as Senior VP and Global CISO of Bharti Airtel. He is a recipient of the Vishist Seva Medal by the President of India for innovative work in information security. Prior to Bharti, he was an advisor to a Big 4 Consultancy and Director and Head of the Indian Navy s Information Technology. FELIX MOHAN CEO, CISO ACADEMY He has been Member of the IBM Security Board of Advisors & RSA Security for Business Innovation Council. He has won the CSO Forum Security Visionary Award, and the RSA Security Strategist Award. PAGE 2 OF 7
4 TH DAY 2-17 MARCH Secured Enterprise Mobility - Operations Enterprise BYOD Roadmap & Implementation Challenges Enterprise BYOD Policy Formulation BYOD Implementation and Enablement across verticals and geographies Policy Considerations while implementing BYOD Mobile Device Management - Over the air - Device Independence and Multi Platform Support BYOD and HR Policy interlinking Vulnerability Management post BYOD Implementation Case Studies of Successful Implementation of BYOD TRAINER PROFILE 12 Year Experience in managing Information Technology and Security Strategy with his last assignment as Senior VP and CIO of BPTP Limited (one of india s largest real estate company). Prior to BPTP, Vilakshan was a senior consultant to MetLife Bank in New Jersey and GM Insurance as an application consultant in the USA. VILAKSHAN JAKHU CEO, WILL INFOTECH Co-Authored Whitepaper on SAP Performance Enhancement using Private Cloud, in conjunction with IBM He is a recipient of SAP Ace Award and CIO 100 Award in 2012 PAGE 3 OF 7
5 TH DAY 3-18 MARCH Unhack your Enterprise Mobility - Technology Vulnerability Management & Security testing for Enterprise Mobility Ecosystem Understanding Android and ios ecosystem (history, user base and application policies) OWASP Top 10 Mobile Threats, Malware in Mobile Applications Rooting and Jailbreaking Application Permission Model and Built-in Security API Decompile, Analyse and Patch, Local Datastore Inspection Runtime Inspection and Manipulation SSL Pinning and Tra c Interception Security best practices for Mobile Applications TRAINER PROFILE SAKET MODI CEO, LUCIDEUS Saket is the CEO of Lucideus Tech, a company involved in securing Enterprise Cyber Architecture from Cyber Attacks. He has been awarded the title of Indian Ambassador of Cyber Security in Education at National Education Awards He was a Part of Government of India s committee constituted for creation vocational course on cyber security under MHRD. As a Computer Science Engineer, Saket is an advisor to large nancial institutions mostly across South Asia and Europe. ADITYA MODHA VP, TECHNOLOGY, LUCIDEUS Aditya Modha, VP, Technology at Lucideus oversees critical technology projects and implementations at the company. He comes with over 7 years of on ground experience & knowledge acquired by over 200 projects he has worked on for web & mobile application security assessment. A computer science graduate, he has been a trainer in various international security conferences such as Hack In The Box, HackCon, OWASP AppSec among others. PAGE 4 OF 7
6 Training Specs Who Should Atend Innovation O ce and Strategy Team, IT Governance Professionals CIO & CISO Project and Corporate Governance, IT Audit Professionals Information Technology & Security Operations Team IT Risk management professionals & Mobile Application Developers Bene ts & Take Away Understand and Design enterprise mobility strategy with BYOD, COBO, COPE & CYOD Roadmap for your Organization. Mitigate against common vulnerabilities and security threats against mobile applications & their platforms. Crash Course into mobile device architecture, operating systems, mobile network connectivity and security features Live demonstrations and practical sessions of methods used to attack mobile devices, including jailbreaking, rooting, sidejacking, and web app attacks. Each Individual to be provided with Certi cate of Completion, Practical Toolkit (DVD) with tools used during the workshop, white papers, video tutorial etc. To top it all, experience the best of Middle Eastern hospitality at the only 7 star hotel in the world - The Burj Al Arab and network with top industry leaders. Bring Along Each Participant is required to carry a laptop, an Android & an ios Device for Live Practical Demonstrations. PAGE 5 OF 7
7 Schedule & Commercials th th th Schedule for 16, 17 & 18 March 2015 Delegate Registration 8:30am - 9:00am st 1 Session 9:00am - 1:00pm Networking & Lunch - 1:00pm -2:00pm nd 2 Session - 2:00pm - 5:00pm Investment for Participation USD 599 Per Head per Day USD 1499 Per Head for all Three Days Early Bird Discount - For Registrations before 3rd March 2015 USD 499 Per Head per Day USD 1199 Per Head for all Three Days PAGE 6 OF 7
8 Yearly Training Calendar March April May Enterprise Mobility Management 16TH 17TH 18TH Enterprise Web Application & E Commerce 12TH 13TH 14TH Digital Forensics & Incident Response 10TH 11TH 12TH 2015 June Network, Infrastructure & SOC 07TH 08TH 09TH July Cloud Computing & Big Data Analytics 19TH 20TH 21ST August Enterprise Mobility Management 16TH 17TH 18TH September Enterprise Web Application & E Commerce 13TH 14TH 15TH October Digital Forensics & Incident Response 11TH 12TH 13TH November Network, Infrastructure & SOC 15TH 16TH 17TH December Cloud Computing & Big Data Analytics 13TH 14TH 15TH PAGE 7 OF 7
9 FOR REGISTRATIONS & FURTHER INFORMATION Ms. Harneet Download the registration form : Visit Us https://www.youtube.com/user/lucideust3ch https://www.facebook.com/lucideustech https://twitter.com/lucideustech All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is strictly prohibited without the prior written consent of Lucideus. No part of this document may be reproduced in any form or by any means without the prior written authorization of Lucideus. While every precaution has been taken in the preparation of this document, Lucideus assumes no responsibility for errors or omissions. Copyright of Lucideus 2015
1 MOBILITY IN FINANCIAL SERVICES A Checklist Towards Regulatory Compliance Whitepaper Whitepaper Brochure 2 A Checklist Towards Regulatory Compliance Like business leaders in every industry, decision makers
CENTER FOR ADVANCED SECURITY TRAINING 618 Designing and Implementing Cloud Security About EC-Council Center of Advanced Security Training () The rapidly evolving information security landscape now requires
Qatar National Cyber Security Strategy MAY 2014 i ii TABLE OF CONTENTS FOREWORD... v EXECUTIVE SUMMARY... vi 1. INTRODUCTION...1 2. THE IMPORTANCE OF CYBER SECURITY TO QATAR...3 2.1 Threats... 3 2.2 Challenges...
and Mission Information technology is a dynamic discipline that addresses the use of computing and I n t r o d u c t i o n information technology in business, education, government, and other organizations.
A Forrester Consulting Thought Leadership Paper Commissioned By Trend Micro Key Strategies To Capture And Measure The Value Of Consumerization Of IT Enterprises Achieve A Wide Range Of Benefits By Deploying
Information Security & Protection Seminar June 15, 2011 8:00 a.m. to 3:30 p.m. Presented by: ARMA Greater Indianapolis Chapter Session 1: Physical Security, & Handling Classified Information Overview Rolls-Royce
For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest
A SANS Analyst Survey Written by Joshua Wright Advisor: Chris Crowley December 2013 Sponsored by Trusted Computing Group 2013 SANS Institute Introduction It s not shocking to see media reports depicting
Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,
Joint national Part Curriculum, August 2015 Multimedia Design and Communication Multimediedesigneruddannelsen Joint National Part revised August 2014 Institutional Part revised August 2015 0 Joint national
ICC CYBER SECURITY GUIDE FOR BUSINESS ICC CYBER SECURITY GUIDE FOR BUSINESS Acknowledgements The ICC Cyber security guide for business was inspired by the Belgian Cyber security guide, an initiative of
Bill Aerts, CISSP, CISM Director, Information Risk Management Medtronic Bill Aerts is the Director of Information Risk Management at Medtronic. In this role, he oversees information security and is developing
Thriving In The As-a-Service Economy Enterprise Mobility Services Blueprint Excerpt for NTT Data A Maturing Buyer s Market As Distinctions Across Service Providers Abate April 2015 Ned May SVP Research,
Federal Communications Commission Information Technology Strategic Plan Implementing technology today to meet FCC business needs tomorrow Office of the Managing Director Information Technology Center July
MICHIGAN CYBER INITIATIVE 2015 Leading the Nation: An interagency, public-private collaboration www.michigan.gov/cybersecurity FROM THE GOVERNOR Michigan has become the leader among states in cybersecurity.
MASTER YOUR CAREER GROWTH COURSE PROSPECTUS 2015 CONTENTS 02 03 04 06 08 09 10 12 13 26 27 33 36 37 MESSAGE FROM THE DEAN SYDNEY BUSINESS SCHOOL OUR CAMPUSES WHY STUDY WITH SYDNEY BUSINESS SCHOOL? RANKINGS
EXECUTIVE MBA PROGRAM INTERNATIONAL EXECUTIVE MASTER OF BUSINESS ADMINISTRATION #1 EMBA GLOBALLY FOR CAREER PROGRESS 2012, 2013, 2014 THE FINANCIAL TIMES EMBA RANKING BENEFITS FOR YOUR CAREER EMBA 2014
Windows Phone 8 Security Overview This white paper is part of a series of technical papers designed to help IT professionals evaluate Windows Phone 8 and understand how it can play a role in their organizations.
EARLY-BIRD Discount Save $400 by 20 March Celebrating 10 Years Gartner IT Infrastructure, Operations & Data Center Summit 2015 18 19 May Hilton Sydney gartner.com/ap/datacenter Transform Service Delivery
IT@Intel Achieving Intel Transformation through IT Innovation 2014 2015 Intel IT Business Review Annual Edition The Transformative Power of Innovation Kim Stevenson Intel Chief Information Officer Contents
Convergence of Social, Mobile and Cloud: 7 Steps to Ensure Success June, 2013 Contents Executive Overview...4 Business Innovation & Transformation...5 Roadmap for Social, Mobile and Cloud Solutions...7
Consumerization of IT: Risk Mitigation Strategies [Deliverable 2012-12-19] Consumerization of IT: Risk Mitigation Strategies I Acknowledgements This report has been produced by ENISA using input and comments
BYOD: (Bring Your Own Device) Is Your Organization Ready? December 2013 Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada BYOD: (Bring Your Own Device) Is Your Organization Ready?
EMC ACADEMIC ALLIANCE Preparing the next generation of IT professionals for careers in virtualized and cloud environments. EMC ACADEMIC ALLIANCE EMC collaborates with colleges and universities worldwide