Understanding and Facing up to Mobile Security Challenges
Sponsored by: IBM MaaS360
Date: 8 December
Time: 11AM London
We are now living in a mobile-first world – a fact which has not escaped the attentions of malicious actors looking to turn profit on personal and corporate data. The challenge now is how to navigate the mobile security minefield in order to unlock the real value of mobile. This minefield is littered with strains of malware intended to infect and destruct, while ransomware has been infiltrating organisations and locking operations in demand for bitcoin sums big and small.
As organisations know, mobile devices make an efficient entry point into the organisation, with measures having been ramped up in recent times to protect this specific endpoint - two-factor authentication, biometrics, and privileged identity management are just some of the protection techniques deployed by organisations. The need for organisations to identify, monitor and detect threats to applications and devices has never been more important – but how can organisations balance this requirement with other key areas such as productivity?
Join IBM’s Stephen McCormack for answers, insights and solutions to your mobile security challenges – this webinar will give you valuable insights into areas such as identity management, criminal reverse engineering and fraud. In a world where security professionals live by the mantra of ‘when, not if’, this exclusive webinar enables you to ask your security questions and pose your security challenges to enable you to understand and effectively deploy mobile security.
IBM MaaS360 Mobile Device Management - Digital Sales Team Leader
My role is to help my clients to address their Mobile Device Management strategy, enabling them to unlock the value of their Mobile Devices, as an IBM Maas360 specialist I use my background of over 12 years in IT and Technology to help my clients identify the right solution for their business to maximize the usefulness of mobile devices as productivity devices while ensuring the highest levels of security. In particular I help with the often thorny areas of BYOD strategy, Mobile Device Security planning and Integration of Mobile Devices with other IT infrastructure.
Key Learning Objectives
- Scalable, risk-based identity and access management
- Secure applications against malware attacks and criminal reverse engineering
- Detect high risk, fraudulent access and transactions
- Integrated security intelligence and visibility across device and network activity
- Chief Technology Officer
- Compliance and Risk Management Data
- Content & Information Architecture
- Desktop & Mobile System Management
- General Manager (Business Unit or Geographical)
- IT Asset Management
- IT Business Administration
- IT Ops Mgmt. / System Admin
- IT Professional
- IT Strategy & Enterprise Arch
- Messaging / Collaboration Architecture
- Solution Architect
- IT Analyst