SECURING YOUR ENTERPRISE MOBILITY
|
|
- Elinor Marshall
- 8 years ago
- Views:
Transcription
1 SECURING YOUR ENTERPRISE MOBILITY STRATEGY, OPERATION & TECHNOLOGY INTERACTIVE TRAINING WORKSHOP Burj Al Arab, Dubai th th th 16, 17 & 18 March 2015
2 ABOUT LUCIDEUS Lucideus is a cyber space security leader and a trusted standard for companies that need to protect their brands, businesses and dignity from debilitating cyber attacks. Our services include technology & strategy consultancy, training & capacity Building and vulnerability management THE TRAINING WORKSHOP ENTERPRISE MOBILITY THEORY & PRACTICAL RATIO STRATEGY (DAY 1) Management layer trainings with focus on policy formulation, strategy and implementation roadmap construction. OPERATIONS (DAY 2) Implementation of BYOD roadmap and overcoming challenges across the organization. Case study of successful BYOD & MDM deployment. TECHNOLOGY (DAY 3) Deep Dive hands on workshop on Mobile Technologies and their Vulnerability Management. 9:1 7:3 2:8 PAGE 1 OF 7
3 TH DAY 1-16 MARCH Secured Enterprise Mobility - Strategy & Management Enterprise Mobility Strategy and Mobile Center of Excellence Mobile enterprise and mobile security Mobility Strategy - Governance, Policy, Environment, and Security Mobile Security Canvas - Apps, Content, Users, Devices, Transactions, Network, Integration, Backend Infra App Strategy - Enterprise and B2C Device strategy and enterprise BYOD, COBO, COPE, CYOD Mobility management - MDM, MAM, MCM, MADP, EMM Mobile Center of Excellence and Governance Enterprise Mobility Maturity Mode TRAINER PROFILE 25 Year Experience in information security space with his last assignment as Senior VP and Global CISO of Bharti Airtel. He is a recipient of the Vishist Seva Medal by the President of India for innovative work in information security. Prior to Bharti, he was an advisor to a Big 4 Consultancy and Director and Head of the Indian Navy s Information Technology. FELIX MOHAN CEO, CISO ACADEMY He has been Member of the IBM Security Board of Advisors & RSA Security for Business Innovation Council. He has won the CSO Forum Security Visionary Award, and the RSA Security Strategist Award. PAGE 2 OF 7
4 TH DAY 2-17 MARCH Secured Enterprise Mobility - Operations Enterprise BYOD Roadmap & Implementation Challenges Enterprise BYOD Policy Formulation BYOD Implementation and Enablement across verticals and geographies Policy Considerations while implementing BYOD Mobile Device Management - Over the air - Device Independence and Multi Platform Support BYOD and HR Policy interlinking Vulnerability Management post BYOD Implementation Case Studies of Successful Implementation of BYOD TRAINER PROFILE 12 Year Experience in managing Information Technology and Security Strategy with his last assignment as Senior VP and CIO of BPTP Limited (one of india s largest real estate company). Prior to BPTP, Vilakshan was a senior consultant to MetLife Bank in New Jersey and GM Insurance as an application consultant in the USA. VILAKSHAN JAKHU CEO, WILL INFOTECH Co-Authored Whitepaper on SAP Performance Enhancement using Private Cloud, in conjunction with IBM He is a recipient of SAP Ace Award and CIO 100 Award in 2012 PAGE 3 OF 7
5 TH DAY 3-18 MARCH Unhack your Enterprise Mobility - Technology Vulnerability Management & Security testing for Enterprise Mobility Ecosystem Understanding Android and ios ecosystem (history, user base and application policies) OWASP Top 10 Mobile Threats, Malware in Mobile Applications Rooting and Jailbreaking Application Permission Model and Built-in Security API Decompile, Analyse and Patch, Local Datastore Inspection Runtime Inspection and Manipulation SSL Pinning and Tra c Interception Security best practices for Mobile Applications TRAINER PROFILE SAKET MODI CEO, LUCIDEUS Saket is the CEO of Lucideus Tech, a company involved in securing Enterprise Cyber Architecture from Cyber Attacks. He has been awarded the title of Indian Ambassador of Cyber Security in Education at National Education Awards He was a Part of Government of India s committee constituted for creation vocational course on cyber security under MHRD. As a Computer Science Engineer, Saket is an advisor to large nancial institutions mostly across South Asia and Europe. ADITYA MODHA VP, TECHNOLOGY, LUCIDEUS Aditya Modha, VP, Technology at Lucideus oversees critical technology projects and implementations at the company. He comes with over 7 years of on ground experience & knowledge acquired by over 200 projects he has worked on for web & mobile application security assessment. A computer science graduate, he has been a trainer in various international security conferences such as Hack In The Box, HackCon, OWASP AppSec among others. PAGE 4 OF 7
6 Training Specs Who Should Atend Innovation O ce and Strategy Team, IT Governance Professionals CIO & CISO Project and Corporate Governance, IT Audit Professionals Information Technology & Security Operations Team IT Risk management professionals & Mobile Application Developers Bene ts & Take Away Understand and Design enterprise mobility strategy with BYOD, COBO, COPE & CYOD Roadmap for your Organization. Mitigate against common vulnerabilities and security threats against mobile applications & their platforms. Crash Course into mobile device architecture, operating systems, mobile network connectivity and security features Live demonstrations and practical sessions of methods used to attack mobile devices, including jailbreaking, rooting, sidejacking, and web app attacks. Each Individual to be provided with Certi cate of Completion, Practical Toolkit (DVD) with tools used during the workshop, white papers, video tutorial etc. To top it all, experience the best of Middle Eastern hospitality at the only 7 star hotel in the world - The Burj Al Arab and network with top industry leaders. Bring Along Each Participant is required to carry a laptop, an Android & an ios Device for Live Practical Demonstrations. PAGE 5 OF 7
7 Schedule & Commercials th th th Schedule for 16, 17 & 18 March 2015 Delegate Registration 8:30am - 9:00am st 1 Session 9:00am - 1:00pm Networking & Lunch - 1:00pm -2:00pm nd 2 Session - 2:00pm - 5:00pm Investment for Participation USD 599 Per Head per Day USD 1499 Per Head for all Three Days Early Bird Discount - For Registrations before 3rd March 2015 USD 499 Per Head per Day USD 1199 Per Head for all Three Days PAGE 6 OF 7
8 Yearly Training Calendar March April May Enterprise Mobility Management 16TH 17TH 18TH Enterprise Web Application & E Commerce 12TH 13TH 14TH Digital Forensics & Incident Response 10TH 11TH 12TH 2015 June Network, Infrastructure & SOC 07TH 08TH 09TH July Cloud Computing & Big Data Analytics 19TH 20TH 21ST August Enterprise Mobility Management 16TH 17TH 18TH September Enterprise Web Application & E Commerce 13TH 14TH 15TH October Digital Forensics & Incident Response 11TH 12TH 13TH November Network, Infrastructure & SOC 15TH 16TH 17TH December Cloud Computing & Big Data Analytics 13TH 14TH 15TH PAGE 7 OF 7
9 FOR REGISTRATIONS & FURTHER INFORMATION Ms. Harneet Download the registration form : Visit Us info@lucideustech.com All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is strictly prohibited without the prior written consent of Lucideus. No part of this document may be reproduced in any form or by any means without the prior written authorization of Lucideus. While every precaution has been taken in the preparation of this document, Lucideus assumes no responsibility for errors or omissions. Copyright of Lucideus 2015
Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications
Android & ios Application Vulnerability Assessment & Penetration Testing Training 2-Day hands on workshop on VAPT of Android & ios Applications Course Title Workshop on VAPT of Android & ios Applications
More informationSamsung Solutions for Enterprise Mobility. MichailasTraubas Samsung Electronics Baltics
Samsung Solutions for Enterprise Mobility MichailasTraubas Samsung Electronics Baltics Samsung Today Samsung Electronics Baltics Established in 2008 [1999] Employees: 144 people Revenue: 357 mio. USD in
More informationThe Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
More informationMobile Device Management
1. Introduction Mobile Device Management This document introduces security risks with mobile devices, guidelines for managing the security of mobile devices in the Enterprise, strategies for mitigating
More informationOn the Radar: Apperian MAM
Mobile application management and enterprise app store Publication Date: 12 May 2015 Product code: IT0021-000082 Richard Absalom Summary Catalyst There is a massive opportunity for enterprises to develop,
More informationFundamentals of Secure Collaboration in the Mobile Workforce. Sinisha Patkovic
Fundamentals of Secure Collaboration in the Mobile Workforce Sinisha Patkovic 1 DISCUSSION Hyper connected X-Times future and blurring of lines between personal, social cloud, & enterprise. CIO Challenge:
More informationServices. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
More informationWeak Spots in Enterprise Mobility Management Dennis Schröder
Weak Spots in Enterprise Mobility Management Dennis Schröder Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dennis Schröder, M. Sc. IT Security Business Security & Privacy Product Manager
More informationTCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions
TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy Mobility Solutions The growth of in-house and third-party enterprise mobile applications; device diversity across ios, Android,
More informationMobile Medical Devices and BYOD: Latest Legal Threat for Providers
Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and
More informationMobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
More informationGuideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
More informationSPAN. White Paper. Key Elements of Enterprise Mobility Strategy. Elements of Enterprise Mobility Strategy
SPAN White Paper Key Introduction The rapid adoption of mobile devices coupled with the undeniable benefits of Enterprise Mobility - the use of mobile devices for business, is creating complexity for many
More informationi Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.
Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop
More informationUnified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
More informationThe Hunt for Fraud. September 25, 2014. Seminar / Training. September 26, 2014
BYOD and Securing Mobile Devices September 25, 2014 The Hunt for Fraud September 26, 2014 Seminar / Training Central Arkansas Chapter Information Systems Audit and Control Association, Arkansas Division
More informationConsumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM
Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization
More informationMobile Device and Application Strategy. Right Technology, Right Design, Right Price
Mobile Device and Application Strategy Right Technology, Right Design, Right Price Agenda 1 Mobility Strategy Methodology 2 3 Mobile Device Strategy Mobile Application Development 4 Q &A Mobility Strategy
More informationHow To Protect Your Mobile Device From Attack
Manage and Secure the Mobile Data, Not Just the Device Stijn Paumen VP Business Development, Wandera The Great Platform Shift 60,000,000 iphone BlackBerry 50,000,000 40,000,000 30,000,000 20,000,000 10,000,000
More informationAdvanced ANDROID & ios Hands-on Exploitation
Advanced ANDROID & ios Hands-on Exploitation By Attify Trainers Aditya Gupta Prerequisite The participants are expected to have a basic knowledge of Mobile Operating Systems. Knowledge of programming languages
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationSecurity and Compliance challenges in Mobile environment
Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com
More informationSecurity Testing Guidelines for mobile Apps
The OWASP Foundation http://www.owasp.org Security Testing Guidelines for mobile Apps Florian Stahl Johannes Ströher AppSec Research EU 2013 Who we are Florian Stahl Johannes Ströher Lead Consultant for
More informationwelcome to the mobile connected economy
welcome to the mobile connected economy Intelligent Mobile Applications Welcome to the Mobile Connected Economy It s forecast that mobile subscriptions will grow from 3.6 to 4.6 billion by 2015. * This
More informationProtecting Corporate Data from Mobile Threats. And the emerging role for microsd-based security Art Swift CEO, CUPP Computing
Protecting Corporate Data from Mobile Threats And the emerging role for microsd-based security Art Swift CEO, CUPP Computing 1 Information security is broken $77B WORLDWIDE SPENDING ON INFORMATION SECURITY
More information6 Things To Think About Before Implementing BYOD
6 Things To Think About Before Implementing BYOD Kimber Spradlin, CISA, CISSP 2012 IBM Corporation Mobile Devices: Unique Management & Security Challenges Mobile devices are shared more often Mobile devices
More informationGartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management 2015 2 3 November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot
More informationDRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions
DRIVING ENTERPRISE MOBILITY Enterprise Mobility Solutions from Computacenter CONTENTS 03 04 05 06 09 10 The Growth of Mobility Seizing Opportunities Overcoming Adversity Computacenter Mobility Solutions
More informationSecurely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com
Securely Yours LLC IT Hot Topics Sajay Rai, CPA, CISSP, CISM sajayrai@securelyyoursllc.com Contents Background Top Security Topics What auditors must know? What auditors must do? Next Steps [Image Info]
More informationIf you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationHands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl
More informationTHEODORA TITONIS VERACODE Vice President Mobile
THEODORA TITONIS VERACODE Vice President Mobile MOBILE SECURITY Increasing Threat MOBILE RISK 64% 34% 47% Companies with no BYOD policy. 3 Companies with no app security program. 4 614% Nearly half of
More informationWelcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc
Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software
More informationMobile Threat Intelligence Report
Mobile Threat Intelligence Report Q1 2016 Overview Mobile malware has been around almost as long as mobile apps, but the worst malware of today is no longer just an annoying inconvenience to the user.
More informationSoftware AG TechEd 2015 User Conference Mobile Enabler for Natural
Software AG TechEd 2015 User Conference Mobile Enabler for Natural April 21-22, 2015 Eric Wood Principal Systems Engineer, Adabas-Natural Software AG 1 Mobile use Continues to Grow Of US adult population
More informationWhite Paper. Data Security. The Top Threat Facing Enterprises Today
White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is
More informationMobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus
Mobile Application Hacking for ios 3-Day Hands-On Course Syllabus Course description ios Mobile Application Hacking 3-Day Hands-On Course This course will focus on the techniques and tools for testing
More informationThe Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
More informationWhite Paper: Leveraging Web Intelligence to Enhance Cyber Security
White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence
More informationThis session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
More informationOn the Radar: Pulse Secure
Secure access management for corporate and personal endpoints on company networks Publication Date: 17 Jul 2015 Product code: IT0022-000431 Rik Turner Summary Catalyst Pulse Secure is a developer of secure
More informationSpikes Mobile Security Research Report. Deployed to Spiceworks Voice of IT panel April, 2015
Spikes Mobile Security Research Report Deployed to Spiceworks Voice of IT panel April, 2015 Table of Contents IN THIS REPORT Background & Methodology 3 Executive Summary 4 Detailed Findings 5-17 Mobile
More informationMobile Application Security
Building security into the development process Rajneesh Mishra Senior Consultant - Secure Mobile Mobile devices have outnumbered PCs and laptops to become the primary medium for accessing content & services.
More informationEnterprise Solution & Business Revolution Enterprise Mobility Management Strategy
Enterprise Solution & Business Revolution Enterprise Mobility Management Strategy PRESENTED BY: Giannis Loussidis EMM Landscape 2 Enterprise Mobility Management Landscape 77% of US and European businesses
More informationBYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
More informationManaging Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management
Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management Managing Remote and Mobile Workers 1 Today s Workforce 79% employees favor
More informationThe Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
More informationMobile Application Security
Mobile Application Security Jack Mannino Anand Vemuri June 25, 2015 About Us Jack Mannino CEO at nvisium UI and UX development impaired Enjoys: Scala, Elixir Tolerates: Java Allergic To: Cats, Pollen,.NET
More informationRESEARCH NOTE. Workplace Service. Predictions for Mobile, 2015: Mobile-First Apps and the Imperative to Protect the Enterprise
Authors: Jim Lundy, David Mario Smith Predictions for Mobile, 2015: Mobile-First Apps and the Imperative to Protect the Enterprise Summary: Mobile is poised to continue disrupting the workplace, as mobile-first
More informationEnterprise Apps: Bypassing the Gatekeeper
Enterprise Apps: Bypassing the Gatekeeper By Avi Bashan and Ohad Bobrov Executive Summary The Apple App Store is a major part of the ios security paradigm, offering a central distribution process that
More informationwww.pwchk.com Bring Your Own Device (BYOD) & Customer Data Protection Are You Ready?
www.pwchk.com Bring Your Own Device (BYOD) & Customer Data Protection Are You Ready? Why is this important to you? Background Enterprise mobility through Bring-Your-Own-Device (BYOD) has been around for
More informationMike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
More informationMobile Security. Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.
Mobile Security Luther Knight - @lutherldn Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015 12015 IBM Corporation Where I Started: Blackberry Migration BYOD Bring Your Own
More informationPractical Attacks against MDM Solutions (and What Can You Do About It)
Practical Attacks against MDM Solutions (and What Can You Do About It) SESSION ID: MBS-R02 Michael Shaulov CEO and Co-Founder Lacoon Mobile Security @LacoonSecurity Agenda Your Data Exploits to target
More informationIBM MobileFirst Launch David Lee Heyman
IBM MobileFirst Launch David Lee Heyman WW Mobile Business Agility Tiger Team IBM's Mobile Enterprise - A personal journey Watch now: http://youtu.be/0sealyljfag Announcing: IBM MobileFirst 5 2013 IBM
More informationEnterprise Mobility Management
Enterprise Mobility Management Vodafone Global Enterprise Vodafone Power to you Delivering the truly mobile enterprise A Ready Business is truly connected allowing you to be ready for almost anything by
More informationBEST PRACTICES IN BYOD
1 BEST PRACTICES IN BYOD How Smart Enterprises Are Making It Work Whitepaper Whitepaper 2 In a recent report, research firm Ovum concludes that: It is clear that when it comes to planning and implementing
More informationApplication Development Best Practices
Application Development Best Practices THE ENTERPRISE MOBILUTION ERA An InfoStretch White Paper August 2014 Elevating confidence 3200 Patrick Henry Drive, Suite 250 Santa Clara, CA 95054 408.727.1100 info@infostretch.com
More informationHDAA BYOD Workshops May 2013
HDAA BYOD Workshops May 2013 Discussion Mobility Trends in Australia BYOD and Consumerisation of IT Implications Checklist 2 Macro Trends GEOGRAPHIES Asia Pacific fastest growing Smart Mobile Device market
More informationMobile and BYOD Strategy
Mobile and BYOD Strategy Bring Your Own Device Danairat T. Certified Java Programmer, TOGAF Silver danairat@gmail.com, +66-81-559-1446 1 Agenda Introduction to Mobile Technology Mobile Computing Bring
More informationMobile Security: The good, the bad, the way forward
Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &
More informationMOBILITY AS A SERVICE (MaaS)
www.wipro.com DEVELOP AND DEPLOY MOBILE APPLICATIONS TRANSFORMING THE WAY BUSINESSES MOBILITY AS A SERVICE (MaaS) Two of the most exciting technologies today, Mobility and Cloud, are helping enterprises
More informationDell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX Introducing Dell Enterprise Mobility Management Brandon Herrin and Jason Moody Agenda Mobility/BYOD needs across the workforce Introducing Dell
More informationNew-Age Undergraduate Programme
New-Age Undergraduate Programme B. Tech Mobile Applications & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique course provides dual career options
More informationHow to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
More informationHow we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
More informationThe Truth About Enterprise Mobile Security Products
The Truth About Enterprise Mobile Security Products Presented by Jack Madden at TechTarget Information Security Decisions 2013 Welcome to my enterprise mobile security product session! Instead of printing
More informationCYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
More informationEnterprise Mobility: The Impact of Changing Employee Behaviour
Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility richard.absalom@ovum.com / @RichAbsalom 23 April 2015 1 About Ovum Leading independent
More informationNew-Age Master s Programme
New-Age Master s Programme MCA (Information Security Management Services) (3 Year Full-Time Programme) Academic Year 2015 Page 1 Course Objective MCA (Information Security Management Services) This unique
More informationENTERPRISE APPS: BYPASSING THE IOS GATEKEEPER. Ohad Bobrov Avi Bashan
ENTERPRISE APPS: BYPASSING THE IOS GATEKEEPER Ohad Bobrov Avi Bashan AGENDA ios Ecosystem overview Enterprise Apps in the ios Ecosystem Bypassing the Gatekeeper Conclusions Q&A 2 ABOUT US OHAD BOBROV Over
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationRETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
More informationThe Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions jburroughs@uk.ibm.com Agenda Current State of Web Application Security Understanding
More informationOWASP Mobile Top Ten 2014 Meet the New Addition
OWASP Mobile Top Ten 2014 Meet the New Addition Agenda OWASP Mobile Top Ten 2014 Lack of Binary Protections added Why is Binary Protection important? What Risks Need to be Mitigated? Where to Go For Further
More informationCYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
More informationEnterprise Mobility Best Practices 2017 Analysts Predictions
Enterprise Mobility Best Practices 2017 Analysts Predictions Sponsored by Fiberlink John Jackson February, 2014 Agenda 1. Enterprise Mobility, the Third Platform, and a 2-3 Year Outlook 2. Mobile Enterprise
More informationThe Incident Response Playbook for Android and ios
SESSION ID: AIR-W03R The Incident Response Playbook for Android and ios Andrew Hoog CEO and Co-founder NowSecure @ahoog42 @NowSecureMobile Andrew Hoog Author of three books Incident Response for Android
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationBeauty or the Beast: The tale of your mobile app. Rob Kwok, Crittercism
Beauty or the Beast: The tale of your mobile app Rob Kwok, Crittercism Introduction & Agenda Why mobile performance matters Why delivering a great mobile experience is hard to do What metrics should you
More informationBest Practices - Remediation of Application Vulnerabilities
DROISYS APPLICATION SECURITY REMEDIATION Best Practices - Remediation of Application Vulnerabilities by Sanjiv Goyal CEO, Droisys February 2012 Proprietary Notice All rights reserved. Copyright 2012 Droisys
More informationBYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
More informationSecuring mobile apps in the Enterprise
Technical Brief Securing mobile apps in the Enterprise Balancing productivity with security Today s mobile apps empower employees to be more productive across the business, whether in sales, HR, field
More informationCyber Security key emerging risk Q3 2015
Cyber Security key emerging risk Q3 2015 The study is based on interviews with CIO:s, CISO:s and Head of Security in August and September 2015. November 2015 www.pwc.se Companies falling behind are more
More informationEnterprise mobile management a need or an option?
perspective Enterprise mobile management a need or an option? - Payal Patel, Jagdish Vasishtha (Jags) Abstract Even as native platforms are growing tighter with security features, the enterprise mobile
More informationTERRE ACTIVE / BLUECOAT ROLAND MARTY WOHIN GEHT DIE REISE. Territory Sales Manager Switzerland. Septembre 2013
WOHIN GEHT DIE REISE TERRE ACTIVE / BLUECOAT ROLAND MARTY Territory Sales Manager Switzerland Septembre 2013 1 NEXT GENERATION SECURITY Headquarters Branch Office Intelligence Internet Control Mobile Users
More informationBuilding a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved
Building a Mobile App Security Risk Management Program Your Presenters Who Are We? Chris Salerno, Consultant, Security Risk Advisors Lead consultant for mobile, network, web application penetration testing
More informationIT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
More informationKony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
More informationEnterprise mobility trends 2015 and beyond
Sponsored by >> Whitepaper Enterprise mobility trends 2015 and beyond How to best manage mobile in the workplace and deal with challenges from current and emerging technologies FEBRUARY 2015 resources
More informationHow End User Experience Management Adds Value to Mobile Device Management. It s All in The Name!
How End User Experience Management Adds Value to Mobile Device Management It s All in The Name! Excellent mobile end user experience drives gains in customer satisfaction and mobile workforce productivity
More informationBAE Systems PCI Essentail. PCI Requirements Coverage Summary Table
BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance
More informationCertification Programs
Registration Questions? Please contact us directly. 507 S. Grand Ave., Lansing, MI 48933 sfisher@mibankers.com (517) 342-9057 Certification Programs 2015 Following the lecture on day 2, students have the
More informationIntelligence Driven Security
Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings
More informationExactly the Same, but Different
Exactly the Same, but Different 1 Shayne Champion, CISSP, CISA, GSEC, ABCP Program Manager GO Cyber Security TVA v1.0 Agenda Define Mobile Device Security o o Similarities Differences Things you Should
More informationMobility Usage Statistics & Trends
Mobility Usage Statistics & Trends Presented by: RapidValue Solutions Date: 11 th August 2014 RapidValue Solutions Mobile Subscriptions RapidValue Solutions 2 Mobile Subscriptions Total mobile subscriptions
More informationONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014
ONE DEVICE TO RULE THEM ALL! 1993 2013 1 AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014 2 1 AGENDA Mobile Devices / Smart Devices Implementation Models Risks & Threats Audit Program
More informationEmerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us
Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca
More informationNew-Age Undergraduate Programme
New-Age Undergraduate Programme B. Tech Cloud Technology & Information Security (4 Year Full Time Programme) Academic Year 2015 Page 1 Course Objective This unique B. Tech course provides dual career options
More information