At a time of unprecedented mobile device adoption - and evolving mobile security threats - 72% of organizations rate their state of mobile security as poor-to-adequate. This is the key point to emerge from the results of the Beyond BYOD: 2013 Mobile Security Strategies Survey, produced by Information Security Media Group and Accellion.
Register for this webinar and receive an overview and expert analysis of survey results, including:
Why do organizations rate their current state of mobile security so low?
Which policies and controls do organizations have in place to manage and secure identity and access management, content and the use of third-party applications?
What are the hot areas of mobile security investment in the coming year?
Expert panel includes Malcolm Harkins, Chief Security and Privacy Officer at Intel, and Elayne Starkey, CISO of the State of Delaware.
Background
Organizations of all sizes are dealing with the solution - mobility - before they even have had adequate time to manage the risks of the challenge: How do we secure the systems and data accessed broadly by employees' mobile devices? The Beyond BYOD: Mobile Security Strategies Survey, sponsored by Accellion, looks at how organizations will address today's top mobile security challenges, with emphasis on:
State of Security - Which mobile platforms will organizations support, and how do they rate their state of mobile security?
Policy - What formal policies do organizations have in place for concerns such as inventory, mobile device/application management and data/device encryption?
Controls - What security solutions are in place to manage and secure identity and access management, content and the use of third-party applications?
Metrics - How do organizations measure the tangible business results of mobile initiatives, including cost-savings and improved productivity?
Investments - What are the top areas of mobile security investment for the coming year?
In addition to delivering an overview of key survey results, this session includes a panel discussion analyzing the results and offering mobile security tips for organizations.
Expert panelists include Elayne Starkey, CISO of the State of Delaware, and Malcolm Harkins, Chief Security and Privacy Officer at Intel.
Webinar Registration
Premium Members Only
OnDemand access to this webinar is restricted to Premium Members.
Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.
Malcolm Harkins
Global CISO, Cylance
Harkins is responsible for all aspects of information risk and security at Cylance as well as public policy and customer outreach to help improve understanding of cyber risks. He spent 23 years with Intel, most recently as its first Chief Security and Privacy Officer. In this role, he was responsible for managing the risk, controls, privacy, security and other related compliance activities for all of Intel's information assets, products and services. Before becoming Intel's first CSPO, he was the chief information security officer (CISO), reporting to the chief information officer. Harkins also held roles in finance, procurement and various business operations.
Elayne Starkey
Chief Security Officer, State of Delaware
Starkey, working out of the Department of Technology and Information, is responsible for the enterprise-wide protection of information assets from high consequence events, including cyber and physical terrorism and natural disasters. She chairs the Delaware Information Security Officer Team and is a member of the Governor's Homeland Security Council. She previously served as the chief technology officer at DTI and the CIO for the Delaware Department of Public Safety.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.