Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Stay Ahead of the Security Curve: How to Effectively Protect Your Mobile Data in a Mobile World

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Data leakage can come from almost any source it seems, but laptop loss and theft pose a severe security risk to any organisation. What's more, such data loss can do serious damage to an organisation's reputation and share price.

Even if the data is encrypted, the loss of a laptop can still cause serious problems for a business on several fronts, not least when it comes to business efficiency. And the fact remains that a missing laptop means confidential data is in the public domain.So how can you cover all your bases on the mobile computing front?Join us for an informative and educational webinar in which we will be looking at the many business and security issues that laptops create in a business environment, as well as some of the solutions available to counter these problems.

This webinar will:

  • Explain how to minimise the damage in the event of laptop loss.
  • Detail the easy steps you can take to protect your mobile assets.
  • Explain how laptop recovery technology works.
  • Educate you on the cost-effective procedures available to protect against information theft and loss.

This webinar is for:

  • Security and business professionals who are responsible for protecting confidential and sensitive information.
  • Managers involved with maintaining policy and/or regulatory compliance on critical and/or customer data.
  • Anyone wanting information on how to protect their mobile assets.

CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.


Geoff Glave

Geoff Glave Product Manager, Absolute Software

    Steve Gold

    Steve Gold, Infosecurity Magazine

      Magnus Muhlenbock

      Magnus Muhlenbock EDB Software

        Bob Tarzey

        Analyst and Director, Quocirca