Mobile computing creates a huge foundation for workforce efficiency and effectiveness as well an interesting toolbox for innovation. It creates an increased attack surface as well.?
Mobility poses many security-related challenges (such as anonymous connections, ?always on? connections, cleartext network traffic, wireless networks, etc.), most of which are not usually fully addressed.
We routinely see these issues uncovered in customer security assessments where innovation unknowingly led to security exposures.? We also occaisionally hear from business leaders and innovators that security concerns are slowing innovation.?
Our CTO Jerod Brennen is facilitating a Mobile Security Workshop to help you regardless of where your concerns lie. The content is meant to help those too fearful to forge ahead, as well as for those that have already jumped and are seeing an increase in related security issues.? We are presenting the workshop with Quick Solutions.??
This workshop covers the technical, procedural and administrative solutions available to protect your organization against the risks of mobile computing.? It also includes a class exercise to evaluate a real-life mobile computing policy and forensics procedures to capture and preserve evidence from mobile devices.
Workshop topics include:
???? The nature and criticality of risks involved in various types of mobile computing
???? Risks in using wireless networks and control measures to counter them
???? Security steps to protect handheld devices
???? Exposures in mobile device applications and appropriate control measures
???? Policy, standard, and procedural provisions necessary to counter mobile computing-related risks
???? Procedures for mobile device forensics
???? Auditing mobile computing environments
???? Products and product features that mitigate mobile computing-related risks
Download Mobile Security Workshop or simply register and join us!
fiona apple tri international criminal court ios 5.1 apple tv update new ipad release pregnant jessica simpson
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.