SECURING YOUR ENTERPRISE MOBILITY



Similar documents
Android & ios Application Vulnerability Assessment & Penetration Testing Training. 2-Day hands on workshop on VAPT of Android & ios Applications

The Protection Mission a constant endeavor

Mobile Device Management

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Weak Spots in Enterprise Mobility Management Dennis Schröder

TCS Hy5 Presidio Your Mobile Environment, Your Way Configure, Secure, Deploy. Mobility Solutions

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

Guideline on Safe BYOD Management

SPAN. White Paper. Key Elements of Enterprise Mobility Strategy. Elements of Enterprise Mobility Strategy

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Mobile Device and Application Strategy. Right Technology, Right Design, Right Price

How To Protect Your Mobile Device From Attack

Advanced ANDROID & ios Hands-on Exploitation

AirWatch Solution Overview

Security and Compliance challenges in Mobile environment

Security Testing Guidelines for mobile Apps

Protecting Corporate Data from Mobile Threats. And the emerging role for microsd-based security Art Swift CEO, CUPP Computing

6 Things To Think About Before Implementing BYOD

Gartner Security & Risk Management Summit 2015

DRIVING ENTERPRISE MOBILITY. Enterprise Mobility Solutions

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

If you can't beat them - secure them

Chris Boykin VP of Professional Services

Hands on, field experiences with BYOD. BYOD Seminar

THEODORA TITONIS VERACODE Vice President Mobile

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Software AG TechEd 2015 User Conference Mobile Enabler for Natural

White Paper. Data Security. The Top Threat Facing Enterprises Today

Mobile Application Hacking for ios. 3-Day Hands-On Course. Syllabus

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

On the Radar: Pulse Secure

BYOD Guidance: BlackBerry Secure Work Space

Managing Remote and Mobile Workers Adam Licata, Enterprise Mobility SE, TSO Brian Sheedy, Sr. Principal TEC, Endpoint Management

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

Mobile Application Security

Enterprise Apps: Bypassing the Gatekeeper

Bring Your Own Device (BYOD) & Customer Data Protection Are You Ready?

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mobile Security. Luther Knight Mobility Management Technical Specialist, Europe IOT IBM Security April 28, 2015.

IBM MobileFirst Launch David Lee Heyman

BEST PRACTICES IN BYOD

Application Development Best Practices

HDAA BYOD Workshops May 2013

Mobile and BYOD Strategy

MOBILITY AS A SERVICE (MaaS)

Dell World Software User Forum 2013

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Enterprise Mobility: The Impact of Changing Employee Behaviour

New-Age Master s Programme

ENTERPRISE APPS: BYPASSING THE IOS GATEKEEPER. Ohad Bobrov Avi Bashan

RETHINKING CYBER SECURITY Changing the Business Conversation

The Top Web Application Attacks: Are you vulnerable?

OWASP Mobile Top Ten 2014 Meet the New Addition

CYBER SECURITY, A GROWING CIO PRIORITY

Enterprise Mobility Best Practices 2017 Analysts Predictions

The Incident Response Playbook for Android and ios

Symantec Mobile Management Suite

Beauty or the Beast: The tale of your mobile app. Rob Kwok, Crittercism

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Cyber Security key emerging risk Q3 2015

Building a Mobile App Security Risk Management Program. Copyright 2012, Security Risk Advisors, Inc. All Rights Reserved

IT Self Service and BYOD Markku A Suistola

Kony Mobile Application Management (MAM)

Enterprise mobility trends 2015 and beyond

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Certification Programs

Intelligence Driven Security

Exactly the Same, but Different

Mobility Usage Statistics & Trends

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci

New-Age Undergraduate Programme

Transcription:

SECURING YOUR ENTERPRISE MOBILITY STRATEGY, OPERATION & TECHNOLOGY INTERACTIVE TRAINING WORKSHOP Burj Al Arab, Dubai th th th 16, 17 & 18 March 2015

ABOUT LUCIDEUS Lucideus is a cyber space security leader and a trusted standard for companies that need to protect their brands, businesses and dignity from debilitating cyber attacks. Our services include technology & strategy consultancy, training & capacity Building and vulnerability management THE TRAINING WORKSHOP ENTERPRISE MOBILITY THEORY & PRACTICAL RATIO STRATEGY (DAY 1) Management layer trainings with focus on policy formulation, strategy and implementation roadmap construction. OPERATIONS (DAY 2) Implementation of BYOD roadmap and overcoming challenges across the organization. Case study of successful BYOD & MDM deployment. TECHNOLOGY (DAY 3) Deep Dive hands on workshop on Mobile Technologies and their Vulnerability Management. 9:1 7:3 2:8 PAGE 1 OF 7

TH DAY 1-16 MARCH Secured Enterprise Mobility - Strategy & Management Enterprise Mobility Strategy and Mobile Center of Excellence Mobile enterprise and mobile security Mobility Strategy - Governance, Policy, Environment, and Security Mobile Security Canvas - Apps, Content, Users, Devices, Transactions, Network, Integration, Backend Infra App Strategy - Enterprise and B2C Device strategy and enterprise BYOD, COBO, COPE, CYOD Mobility management - MDM, MAM, MCM, MADP, EMM Mobile Center of Excellence and Governance Enterprise Mobility Maturity Mode TRAINER PROFILE 25 Year Experience in information security space with his last assignment as Senior VP and Global CISO of Bharti Airtel. He is a recipient of the Vishist Seva Medal by the President of India for innovative work in information security. Prior to Bharti, he was an advisor to a Big 4 Consultancy and Director and Head of the Indian Navy s Information Technology. FELIX MOHAN CEO, CISO ACADEMY He has been Member of the IBM Security Board of Advisors & RSA Security for Business Innovation Council. He has won the CSO Forum Security Visionary Award, and the RSA Security Strategist Award. PAGE 2 OF 7

TH DAY 2-17 MARCH Secured Enterprise Mobility - Operations Enterprise BYOD Roadmap & Implementation Challenges Enterprise BYOD Policy Formulation BYOD Implementation and Enablement across verticals and geographies Policy Considerations while implementing BYOD Mobile Device Management - Over the air - Device Independence and Multi Platform Support BYOD and HR Policy interlinking Vulnerability Management post BYOD Implementation Case Studies of Successful Implementation of BYOD TRAINER PROFILE 12 Year Experience in managing Information Technology and Security Strategy with his last assignment as Senior VP and CIO of BPTP Limited (one of india s largest real estate company). Prior to BPTP, Vilakshan was a senior consultant to MetLife Bank in New Jersey and GM Insurance as an application consultant in the USA. VILAKSHAN JAKHU CEO, WILL INFOTECH Co-Authored Whitepaper on SAP Performance Enhancement using Private Cloud, in conjunction with IBM He is a recipient of SAP Ace Award and CIO 100 Award in 2012 PAGE 3 OF 7

TH DAY 3-18 MARCH Unhack your Enterprise Mobility - Technology Vulnerability Management & Security testing for Enterprise Mobility Ecosystem Understanding Android and ios ecosystem (history, user base and application policies) OWASP Top 10 Mobile Threats, Malware in Mobile Applications Rooting and Jailbreaking Application Permission Model and Built-in Security API Decompile, Analyse and Patch, Local Datastore Inspection Runtime Inspection and Manipulation SSL Pinning and Tra c Interception Security best practices for Mobile Applications TRAINER PROFILE SAKET MODI CEO, LUCIDEUS Saket is the CEO of Lucideus Tech, a company involved in securing Enterprise Cyber Architecture from Cyber Attacks. He has been awarded the title of Indian Ambassador of Cyber Security in Education at National Education Awards 2013. He was a Part of Government of India s committee constituted for creation vocational course on cyber security under MHRD. As a Computer Science Engineer, Saket is an advisor to large nancial institutions mostly across South Asia and Europe. ADITYA MODHA VP, TECHNOLOGY, LUCIDEUS Aditya Modha, VP, Technology at Lucideus oversees critical technology projects and implementations at the company. He comes with over 7 years of on ground experience & knowledge acquired by over 200 projects he has worked on for web & mobile application security assessment. A computer science graduate, he has been a trainer in various international security conferences such as Hack In The Box, HackCon, OWASP AppSec among others. PAGE 4 OF 7

Training Specs Who Should Atend Innovation O ce and Strategy Team, IT Governance Professionals CIO & CISO Project and Corporate Governance, IT Audit Professionals Information Technology & Security Operations Team IT Risk management professionals & Mobile Application Developers Bene ts & Take Away Understand and Design enterprise mobility strategy with BYOD, COBO, COPE & CYOD Roadmap for your Organization. Mitigate against common vulnerabilities and security threats against mobile applications & their platforms. Crash Course into mobile device architecture, operating systems, mobile network connectivity and security features Live demonstrations and practical sessions of methods used to attack mobile devices, including jailbreaking, rooting, sidejacking, and web app attacks. Each Individual to be provided with Certi cate of Completion, Practical Toolkit (DVD) with tools used during the workshop, white papers, video tutorial etc. To top it all, experience the best of Middle Eastern hospitality at the only 7 star hotel in the world - The Burj Al Arab and network with top industry leaders. Bring Along Each Participant is required to carry a laptop, an Android & an ios Device for Live Practical Demonstrations. PAGE 5 OF 7

Schedule & Commercials th th th Schedule for 16, 17 & 18 March 2015 Delegate Registration 8:30am - 9:00am st 1 Session 9:00am - 1:00pm Networking & Lunch - 1:00pm -2:00pm nd 2 Session - 2:00pm - 5:00pm Investment for Participation USD 599 Per Head per Day USD 1499 Per Head for all Three Days Early Bird Discount - For Registrations before 3rd March 2015 USD 499 Per Head per Day USD 1199 Per Head for all Three Days PAGE 6 OF 7

Yearly Training Calendar March April May Enterprise Mobility Management 16TH 17TH 18TH Enterprise Web Application & E Commerce 12TH 13TH 14TH Digital Forensics & Incident Response 10TH 11TH 12TH 2015 June Network, Infrastructure & SOC 07TH 08TH 09TH July Cloud Computing & Big Data Analytics 19TH 20TH 21ST August Enterprise Mobility Management 16TH 17TH 18TH September Enterprise Web Application & E Commerce 13TH 14TH 15TH October Digital Forensics & Incident Response 11TH 12TH 13TH November Network, Infrastructure & SOC 15TH 16TH 17TH December Cloud Computing & Big Data Analytics 13TH 14TH 15TH PAGE 7 OF 7

FOR REGISTRATIONS & FURTHER INFORMATION Ms. Harneet +971 55 220 8510 +971 50 867 9196 registration@lucideustech.com Download the registration form : http://lucideus.com/pdf/dmm_registration.pdf Visit Us https://www.youtube.com/user/lucideust3ch https://www.facebook.com/lucideustech https://twitter.com/lucideustech www.lucideus.com info@lucideustech.com +91 11 26569899. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation is strictly prohibited without the prior written consent of Lucideus. No part of this document may be reproduced in any form or by any means without the prior written authorization of Lucideus. While every precaution has been taken in the preparation of this document, Lucideus assumes no responsibility for errors or omissions. Copyright of Lucideus 2015