How to Take Control of End Point Security in the BYOD Era

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

The biggest challenge of the bring-your-own-device (BYOD) era is reconciling the need to keep your workforce equipped with the latest, most productive technologies while, at the same time, taking steps to mitigate organizational risks of data leakage – not to mention the compliance aspects nearly all organizations must consider. 

In fact, Gartner recently listed mobile technologies as the No. 2 technology priority for enterprises – yet, a recent survey by ISACA showed that more than a third of enterprise IT security managers in the US admit that their organization either has no BYOD security policy in place, or they were unsure if one existed. In short, a gaping hole still exists with respect to BYOD policy development. The question is, where do you start when developing a useful policy tailored to your organization’s needs? 

This webinar will provide advice for IT, security, and risk professionals on how to work with other departments in your organization to develop a workable BYOD strategy that ensures greater end point protection. By enlisting the input of key stakeholders across your organization, those tasked with maintaining end point security can develop policies that are in line with business objectives while also taking steps to satisfy their organization’s risk and compliance requirements. 

This webinar will: 

  • Review recent BYOD trends as they relate to enterprise security
  • Discuss how data can be leaked from employee-owned devices, and some of the strategies, policies, and technologies that can be deployed to hedge against these risks
  • Provide you with a checklist of items you can use to develop your own corporate BYOD security policy strategy


Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

John Pironti

John Pironti Chief Information Risk Strategist, CompuCom

    Inka Traktman

    Inka Traktman Product Marketing Manager, EVault

      Brought to You by

      Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.