Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

"User on the Move": The Challenges of Securing the Borderless Boundaries of Your Evolving Mobile Workforce

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

A new paradigm in data security has surfaced. The ‘User on the move’ has given rise to the anytime, anywhere, any place generation of IT workers, challenging our traditional notions of security.

Compounding our understanding of data-centric security, this shift from the traditional three facets of ‘data at rest’, ‘data on the move’ and ‘data in use’ has disrupted our normal network boundaries and forced us to ask how we will get to the mobile workforce of 2018 and beyond.

In this webinar we will explore the future trends surrounding the proliferation of mobile devices and their security, ensuring people can do their jobs wherever they are while keeping your data safe.

Key takeaways:

  • Accessibility vs. security: The key challenges around securing a remote workforce without shackling the user
  • How data centric security has been fundamentally altered by the principal of ‘user on the move’
  • Understand that the traditional boundary of the network has to evolve to be more porous yet remain a feasible line of defence
  • Understand how the mobile security industry is evolving and how that will affect your workforce


Andrew Hay

Co-Founder & CTO, LEO Cyber Security

    Chris Payne

    Managing Director, Advanced Cyber Solutions

      Dan  Raywood

      Contributing Editor, Infosecurity Magazine

      Dominic Trott

      Research Manager, European Security Practice at IDC

        Brought to You by