Hi [[ session.user.profile.firstName ]]

Mobility and the Consumerization of IT: Securing & Embracing the Movement

Consumerization of IT demands require security leaders not only to keep up with the fast paced world of mobile devices, but be in the forefront predicting what’s next to come. This phenomenon has thrust information security into the business limelight, opening new doors for both exciting business po
Consumerization of IT demands require security leaders not only to keep up with the fast paced world of mobile devices, but be in the forefront predicting what’s next to come. This phenomenon has thrust information security into the business limelight, opening new doors for both exciting business potential and increased security risks. Now a workplace mainstay, incorporating a progressive approach that leverages the benefits of a mobile environment is necessary. Join Haden Land as he discusses the major trends influencing mobility, their security implications, solution examples from the Public sector, mobility lessons learned and explores the breadth of opportunity these disruptive technologies represent.
Recorded Jul 19 2012
48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Haden A. Land, CTO & VP, Engineering, Lockheed Martin Corporation
Presentation preview: Mobility and the Consumerization of IT: Securing & Embracing the Movement
Recommended for you:
  • Date
  • Rating
  • Views
  • Ransomware : A Disruption or Distraction? Ransomware : A Disruption or Distraction? Vipul Kumra,Consulting Engineer, FireEye India Live 60 mins
    It is 8:00 am, and you are on the way to work. You get a frenetic call from your office – “hackers are holding your computers hostage in exchange for a ransom”. Your order processing application is one of the casualties. Your last successful backup was over a month ago. Do you pay the ransom and regain control? Your money or your data?
    This scene may seem to be straight out of a Hollywood movie, but for several organisations, it has become an unfortunate reality today. Ransomware is a growing menace to enterprises and consumers alike, and given the recent trends observed by FireEye, it is here to stay. Some ransomware variants encrypt your critical files, others lock you out of the systems. Some demand bitcoins, others demand payment vouchers. Some are a disruption to your business, others are just a distraction.
    Join the FireEye webinar “Ransomware: A Disruption or Distraction", and get an in-depth view into the mechanics of ransomware. You will learn about:
    1.Ransomware: Impact & Trends
    2.The Economics of Ransomware
    3.A Distraction or Disruption
    4.Lessons Learned: Tackling Ransomware
  • May Monthly Threat Webinar: Go From Hunted to Hunting May Monthly Threat Webinar: Go From Hunted to Hunting Jon Clay, Sr. Manager, Global Threat Communications at Trend Micro Recorded: May 31 2016 48 mins
    Data breaches and targeted attacks continue to plague organizations across the globe. Threat actors seem to be able to penetrate and then reside within a network for a very long time, siphoning off data they can use to profit from. In this webinar, learn what the latest attack techniques are and how to change your strategy to one which takes you from being hunted to becoming the hunter.
  • Testing Reveals Five Common Pitfalls in DDoS Mitigation Testing Reveals Five Common Pitfalls in DDoS Mitigation Sahba Kazerooni Recorded: May 31 2016 46 mins
    Join DDoS Strike Vice President Sahba Kazerooni for an analysis of the most common vulnerabilities in DDoS mitigation, based on real data gathered from testing live production environments.
  • Who is Responsible for Securing your Workloads in the Cloud? Who is Responsible for Securing your Workloads in the Cloud? James Brown, VP of Global Solution Architecture Recorded: May 31 2016 5 mins
    Whilst it is clear the responsibility for security and compliance posture for on-premises infrastructure is owned by the customer, there is still uncertainty on who is responsible for the security of applications and the confidentiality of data stored in the public cloud. The reality is that it is a shared responsibility, but who owns what, and where is the handshake between the organisations?

    Did you know that Amazon web Services employs a "Shared Responsibility" security model? Do you really know your role and responsibilities within this shared security model? Watch this short video to find out who's responsible for what when securing your applications in the cloud.
  • Empower your mobile workforce: Enterprise Mobility Management made simple Empower your mobile workforce: Enterprise Mobility Management made simple Alex Shteynberg Technology Architect; David Hansford Technology Architect, Microsoft Corporation Recorded: May 31 2016 45 mins
    Your workforce is using 3+ devices, is working from many locations, uses both business apps and a plethora of personal apps, and all while expecting to access their data easily and securely. How do you implement a solution that empowers your workforce while protecting your Corporate assets and resources? Discover Enterprise Mobility Suite (EMS) - a comprehensive cloud solution designed specifically to address the challenges of a mobile workforce.

    Join this webcast to learn:

    What components make up EMS
    How to get up and running with EMS
    How to provide secure access to corporate data
    Protect everything—across devices, operating systems and applications
  • Introducing MobileIron Access: The Solution to Cloud-Mobile Data Security Introducing MobileIron Access: The Solution to Cloud-Mobile Data Security Vijay Pawar, MobileIron Director of Product Management Recorded: May 31 2016 46 mins
    With MobileIron Access, organizations can now secure cloud services, such as Box and Salesforce, on mobile devices. Organizations can now be assured that users only connect to enterprise cloud services via trusted apps on managed devices.

    MobileIron Access addresses a key security gap - employees accessing enterprise cloud services on unmanaged devices, via unmanaged apps and storing corporate data outside of IT control.

    View this webinar to learn how MobileIron Access:

    - Can enable access control to enterprise cloud services such as Box, Google Apps for Work, Office 365 and Salesforce

    - Prevent access to cloud services from apps and devices not authorized by IT

    - Establish a data boundary for mobile-cloud apps to keep business data within IT control at all times
  • Methods and Tools for Detecting Advanced, Targeted Cyber Threats Methods and Tools for Detecting Advanced, Targeted Cyber Threats Moderator: Stephen Pritchard - Speakers: Oren Aspir, Laurance Dine & John Pironti Recorded: May 31 2016 60 mins
    According to research institutes, 70-90% of malwares found in breach investigations are unique to that organization – meaning there is no chance of detecting them with traditional security measures. As advanced threats become more and more quite, sophisticated and stealthy – detection and analysis methods need to be adapted accordingly. Using behavioral analysis, machine learning, and progressive visualization tools allows organizations to better detect, analyze and respond to threats.

    In this webinar Mr. Oren Aspir, CTO at CYBERBIT Ltd. will review advanced threats stealth mechanisms and the methods to detect them – with focus on optimizing analysis processes and minimizing time intervals.

    Key Takeaways:
    • Advanced threats stealth and persistency mechanisms
    • Methods to minimize detection and analysis timeframes when confronting advanced and targeted threats
    • What tools can be used to facilitate detection and response for advanced threats
  • Outthink Mobile Malware: Learn how to protect your mobile devices Outthink Mobile Malware: Learn how to protect your mobile devices Adrian Davis, MD (ISC)² EMEA, Kaushik Srinivas, Strategy & Product Management for IBM Security Recorded: May 31 2016 61 mins
    The popularity of the smartphone and the bring your own device (BYOD) phenomena has given way to a new era in cybercrime – the era of mobile in which cybercriminals increasingly target phones and tablets as an attack vector. In fact, at any given time, mobile malware is infecting millions and millions of mobile devices globally, enabling criminals to get their hands on your personal information and money.
    2015 was witness to the largest and most notorious mobile malware attacks in history. Considering that the number of smartphone users worldwide will surpass 2 billion in 2016 (emarketer), mobile app downloads will have increased to 268 billion (Gartner) by 2017, and that most companies have dedicated very little resources towards mobile application security, the industry is ripe for even bigger malicious attacks. Mobile malware will continue to grow, being destructive and costly to corporations and users.
    Join (ISC)² EMEA and IBM as we demonstrate the effects of mobile malware and how to arm organisations to protect themselves against this growing concern.
  • SOC Aufbau und Optimierung – Make or Buy? SOC Aufbau und Optimierung – Make or Buy? Sven Schriewer, Director, FireEye as a Service, FireEye Recorded: May 31 2016 32 mins
    Ein Security Operations Center (SOC) soll aufgebaut oder erweitert werden. Jede derartige Investition erfordert eine Make-or-Buy Entscheidung.

    In diesem Vortrag erläutern wir zunächst, welche Funktionen ein SOC erfüllen sollte und mit welchen Kosten zur Erfüllung der Anforderung zu rechnen sind. Dann gehen wir auf die Herausforderung ein, Mitarbeiter für das SOC zu rekrutieren. Wir zeigen auf, welche quantitativen und qualitativen Kriterien für eine Make-or-Buy Entscheidung speziell bzgl. eines SOC relevant sind.
  • Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Neue Betrügerische „Hochstapler-Emails“ - Geschäftsführung als Angriffsvektor Marc Lindenblatt, Presales Engineer Proofpoint Recorded: May 31 2016 40 mins
    Proofpoint stellt neue dynamische Sicherheitslösung gegen betrügerische Emails vor

    Erfahren Sie in unserem Live-Webcast am 31. Mai, mehr über die Motivation und Folgen betrügerischer E-Mails und wie Proofpoint Unternehmen hilft, betrügerische E-Mails automatisch zu erkennen und vor Cyber-Kriminellen geschützt zu bleiben.
    Betrügerische E-Mails sind aufwendig erstellte Anfragen, die vorgeben von der obersten Führungsebene zu kommen und im letzten Jahr um mehr als 270 Prozent zugenommen haben. Die betrügerische E-Mail ist eine Bedrohung, die Mitarbeiter dazu verleiten soll, Gelder oder persönliche Informationen an Cyber-Kriminelle zu senden. Sicherheits-Tool werden sie nicht alarmieren. Es gibt keinen Erpresserbrief. Ihre Systeme laufen weiter und alles scheint wie immer. Das genau ist der Punkt.

    Erfahren Sie in dem Webcast
    • Wie diese betrügerischen Emails aussehen und warum sie so „gut“ funktionieren
    • Welche Auswirkungen diese betrügerische Emails auf die Security-Landschaft haben
    • Warum dynamische Analysen helfen, Unternehmen und deren Mitarbeiter zu schützen

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Mobility and the Consumerization of IT: Securing & Embracing the Movement
  • Live at: Jul 19 2012 9:00 pm
  • Presented by: Haden A. Land, CTO & VP, Engineering, Lockheed Martin Corporation
  • From:
Your email has been sent.
or close
You must be logged in to email this