Hi [[ session.user.profile.firstName ]]

A Layered Approach to Mobile Security

70% of security professionals agree mobile device vulnerability management is very important, but 67% of enterprises report they have no or few mobile controls deployed. Despite the bleak outlook, it is possible to reassert control over this rapidly growing security exposure. Join AimPoint Group Fou
70% of security professionals agree mobile device vulnerability management is very important, but 67% of enterprises report they have no or few mobile controls deployed. Despite the bleak outlook, it is possible to reassert control over this rapidly growing security exposure. Join AimPoint Group Founder and Principal Analyst Mark Bouchard and Tenable CEO Ron Gula and learn how to apply a layered approach to mobile device security to regain control, evaluate risks, and establish essential policies.

You’ll learn:

•Why mobile devices are inherently difficult to track, evaluate, and assess
•The four essential layers of an effective mobile device security strategy
•How to prioritize mobile device security activities
•Why scanning technologies need to change to assure effective vulnerability assessment of mobile devices
Recorded May 22 2012 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mark Bouchard, CISSP, AimPoint Group, and Ron Gula, CEO, Tenable Network Security
Presentation preview: A Layered Approach to Mobile Security
Recommended for you:
  • Date
  • Rating
  • Views
  • Six Key Capabilities For Securing Office 365 Email Six Key Capabilities For Securing Office 365 Email Ryan Kalember, Proofpoint SVP of Cybersecuritywith Guest Speaker Kelley Mak, Forrester Analyst Recorded: May 3 2016 62 mins
    Email remains a critical component of business process. Strong interest and adoption of Microsoft’s Office 365 online productivity and collaboration suite is pushing email to the cloud. However, Office 365 has many security and risk professionals scrambling to figure out what security controls are necessary to secure email.


    While Office 365 can provide native functionality baked in, enterprises need to understand the gaps and where additional security might be necessary to protect you from today’s advanced threats. Join Ryan Kalember, Proofpoint SVP of Cybersecurity, to discuss the key capabilities that enterprises should consider for their Office 365 email environment.


    Key takeaways include:
    • Why the shift to Office 365 increases criticality of email security
    • Common pitfalls to avoid in the planning stages
    • Key security capabilities to protect from advanced threats

    Learn more about how Proofpoint has helped customers find success with their Office 365 initiative with advanced security, end-to-end insights and rapid response capabilities, and email continuity.

    Guest speaker Kelley Mak of Forrester Research will also be on hand to discuss the industry at large from an independent perspective.
  • Key Findings from Symantec’s 2016 Internet Security Threat Report Key Findings from Symantec’s 2016 Internet Security Threat Report Kevin Haley, Director, Symantec Security Response Recorded: May 3 2016 57 mins
    Cyber attacks are increasing in number and sophistication. Today’s threats differ from those encountered a month ago. What can you do to improve your security posture?

    Register for our webcast and receive insights into protecting your organization and its brand, including simple steps to take now and in the future.
  • Corporate Governance for CISOs: Asset Management Corporate Governance for CISOs: Asset Management Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council Recorded: May 3 2016 58 mins
    Join Keyaan Williams, Senior Executive, C|CISO Programs at EC-Council for his Corporate Governance for CISOs webinar series! The first webinar in the series will cover the topic of Asset Management from an executive perspective. This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory do you maintain to manage your asset information? What relationship do asset management and change management share?
  • Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Stormy Weather Ahead: How to Navigate the Cloud and Stay Safe, ESG & Tufin Jon Oltsik, senior principal analyst, ESG & Maya Malevich, Director of Product Marketing, Tufin Recorded: May 3 2016 54 mins
    Between constraints of IT security skills and the rise of cloud adoption it is increasingly difficult to control security policies across the heterogeneous network. Network security and operations teams are expected to ensure and initiate connectivity while protecting the attack surface from the next cyber threat and complying with internal policies and industry regulations. Join us for a Webinar session with ESG senior principal analyst Jon Oltsik, as he reviews the latest findings of a recent survey on how cloud adoption is transforming network security operations. In this session we will also examine how security policy orchestration can help address some of the key challenges of managing security and connectivity in the cloud, and across hybrid cloud and physical networks.
  • Running Successful Risk Workshops Running Successful Risk Workshops Ian Beale Executive Advisor - CEB Audit and Risk Leadership Councils Recorded: May 3 2016 62 mins
    This event is designed for Heads of ERM, ERM Directors, ERM Managers, and other direct reports of the Chief Risk Officer. It is designed to teach the basics and also best practices of conducting a successful risk assessment workshop plus tactics for impactful workshop facilitation. Participants will learn a number of tactical ERM practices that can be implemented immediately.
  • April Monthly Threat Webinar – 0-Days & Virtual Patching April Monthly Threat Webinar – 0-Days & Virtual Patching Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro Recorded: Apr 29 2016 31 mins
    This month’s threat webinar will discuss how 0-days are used, who uses them, and what the good vulnerability researchers do to ensure people and organizations are protected.
  • Building An IT Vendor Risk Management Program Building An IT Vendor Risk Management Program Mike Rothman, Securosis | Tom Turner, BitSight Recorded: Apr 28 2016 58 mins
    Recent high profile data breaches have made it obvious that organizations often underestimate the risk their vendors present, and struggle to evaluate third party cyber risk.

    In this webinar Mike Rothman, Analyst & President of Securosis, and Tom Turner, President and COO of BitSight describe how organizations can build a systematic means to evaluate their IT risk presented by business partners and vendors.

    Viewers will learn about:

    - Understanding Third Party IT Risk
    - Structuring Vendor Risk Management Programs
    - Evaluating Vendor Risk
    - Ongoing Vendor Monitoring and Communication
  • Adopt IT Operations Analytics to Make Better Decisions, Faster Adopt IT Operations Analytics to Make Better Decisions, Faster Donnie Berkholz and Erin Avery Recorded: Apr 28 2016 53 mins
    In the digital era, IT has an extraordinary opportunity to become a data-driven business partners helping the business achieve its goals of revenue generation, cost reduction, and risk mitigation. However, IT reporting and analytics have historically focused on descriptive and diagnostic work – describing what happened and why. The speed and agility of the digital revolution demands the ability to not only describe what happened in the past but to predict what might happen in the future and to make recommendations about what should be done.

    IT operations analytics offers IT organizations a path to evolve the use of machine, operational and business data for more effective, forward-looking prioritization and decision-making. And in a recent BMC sponsored survey, 79% of IT pros said they would be more effective at their job if they had access to non-IT sources of data to help them make decisions in business context.

    Join Donnie Berkholz, 451 Research, and Erin Avery, BMC Software, for a high energy, fast paced discussion on adaptive, real-time analytics that any IT operations organization can adopt to become highly prescriptive and predictive.
  • Black Duck Hub 3.0:  Enhanced Policy Management Black Duck Hub 3.0: Enhanced Policy Management Pat Durante - Senior Director Education Services, John Beaudoin - Senior Instructional Designer, Dave Gruber - VP of Product Recorded: Apr 28 2016 58 mins
    Join us for our next customer webinar covering the new features available in Black Duck Hub 3.0.

    The latest version is designed to help Hub and Protex users streamline Continuous Integration (CI) and DevOps processes through robust policy management and rapid scanning. These capabilities provide complete visibility into the open source in apps and containers, accelerating development through early and continuous detection of vulnerabilities and out-of-policy code.

    During this webinar, we’ll show you how to leverage Hub 3.0 to establish policies around the use of open source software in order to lower your organizational security, license and operational risk.

    Following the demonstration, we’ll leave plenty of time for you to ask our product experts questions.

    You will learn:
    •Overview of the new features, including policy management, improved scanning, additional Linux distribution support, and integration with TeamCity
    •How to quickly establish open source security policies for existing and new projects
    •Ways to leverage policy violations to flag or fail builds in a continuous integration environment (such as Jenkins)
  • Driving Effective Data Governance & Protection – a view from Prudential Plc Driving Effective Data Governance & Protection – a view from Prudential Plc Sunil Choudrie, Christian Brindley, Keith Vallance, Tim Davie-Baguley, Helen Orrick Recorded: Apr 28 2016 60 mins
    Like many organisations, Prudential has to ensure it protects sensitive data. Getting it right results in satisfied customers, regulators and shareholders and avoids the reputational damage and legal penalties associated with a data breach. With the forthcoming EU General Data Protection Regulation now agreed for implementation, we think now is the right time for organisations to review their data governance and protection requirements. During this webinar we will cover today’s challenges in ensuring good data governance and enter into a panel discussion with Prudential about their approach and lessons learned, including their implementation of Symantec Data Loss Prevention and Boldon James data classification technology. There will also be an opportunity to engage in a Question and Answer session.

    So if you want to give your data governance program a head start, register today.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Layered Approach to Mobile Security
  • Live at: May 22 2012 5:00 pm
  • Presented by: Mark Bouchard, CISSP, AimPoint Group, and Ron Gula, CEO, Tenable Network Security
  • From:
Your email has been sent.
or close
You must be logged in to email this