How to Take Control of End Point Security in the BYOD Era

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The biggest challenge of the bring-your-own-device (BYOD) era is reconciling the need to keep your workforce equipped with the latest, most productive technologies while, at the same time, taking steps to mitigate organizational risks of data leakage – not to mention the compliance aspects nearly all organizations must consider. 

In fact, Gartner recently listed mobile technologies as the No. 2 technology priority for enterprises – yet, a recent survey by ISACA showed that more than a third of enterprise IT security managers in the US admit that their organization either has no BYOD security policy in place, or they were unsure if one existed. In short, a gaping hole still exists with respect to BYOD policy development. The question is, where do you start when developing a useful policy tailored to your organization’s needs? 

This webinar will provide advice for IT, security, and risk professionals on how to work with other departments in your organization to develop a workable BYOD strategy that ensures greater end point protection. By enlisting the input of key stakeholders across your organization, those tasked with maintaining end point security can develop policies that are in line with business objectives while also taking steps to satisfy their organization’s risk and compliance requirements. 

This webinar will: 

  • Review recent BYOD trends as they relate to enterprise security
  • Discuss how data can be leaked from employee-owned devices, and some of the strategies, policies, and technologies that can be deployed to hedge against these risks
  • Provide you with a checklist of items you can use to develop your own corporate BYOD security policy strategy

Speakers

Photo of Drew Amorosi

Drew Amorosi

Deputy Editor, Infosecurity Magazine

Photo of John Pironti

John Pironti

President at IP Architects, LLC

Inka Traktman

Product Marketing Manager, EVault

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.