National Webcast Initiative

 

Bring Your Own Risk
Protecting Confidential Information on Mobile Devices

Thursday, April 4th
2:00pm -- 3:00pm (Eastern)

 

Presenter:

 

Robert Myles, CISSP, CISM
State, Local Government and Education
National Practice Manager
Symantec

 

Archived Recording Now Available

 

The second webcast in the 2013 National Webcast series was held on April 4th with a featured presentation on Bring Your Own Risk: Protecting Confidential Information on Mobile Devices

Over 900 individuals representing 7 countries, 50 states, DC, and 1 U.S. territory registered for this event. Opening remarks were provided by Mr. Michael Aliperti, Senior Director of Programs at the Multi-State Information Sharing and Analysis Center, followed by Mr. Robert Myles, State, Local Government and Education National Practice Manager at Symantec.

The number of employees using personal mobile devices to access work-related data, including confidential information, is increasing.

In fact, the cross pollination of organization and personal data has become so pervasive that many organizations are fast-tracking security protocols for preventing data loss, combatting malware, and building sandboxes for untrusted data. But implementing untested security policies can be dangerous. What organizations need today are proven best practices that safely and securely address the inevitable rise of unmanaged mobile device use cases.

This webcast explored the most reliable, replicable strategies (from both the public and private sectors) for securing and managing user-owned mobile devices. The broadcast discussed tried-and-tested techniques for minimizing risk while maximizing business agility and employee productivity.

Format of Webcast:
This session featured an interactive Powerpoint presentation accompanied by audio.

Webcast Related Material:
[These links are provided because they have information that may be useful. The Multi-State Information Sharing and Analysis Center (MS-ISAC) does not warrant the accuracy of any information contained in the links and neither endorses nor intends to promote the advertising of resources listed herein. The opinions and statements contained in such resources are those of the author(s) and do not necessarily represent the opinions of the MS ISAC.]