Hi [[ session.user.profile.firstName ]]
Sort by:
    • Are You Serious? Now I Have to Worry About BYOD and IoT Threats?
      Are You Serious? Now I Have to Worry About BYOD and IoT Threats? John Pescatore, Director of emerging security trends at SANS & Paul Paget, CEO of Pwnie Express Recorded: Jun 1 2017 4:25 pm UTC 60 mins
    • We know it sucks, but BYOD and IoT are changing the way employees access your company's data. Next year more than 50% of the devices connecting to enterprise networks will be owned by employees. Within 3 years, IoT devices will have a significant presence in the enterprise. So why should you care about all these new devices showing up in your office? They carry all your company's critical data, and none of the security tools you have today can even see them. The security implications of this shift are huge, and already being felt.

      In this webinar John Pescatore will examine how to apply the CIS Critical Controls in an BYOD and IoT world. John, together with Pwnie Express CEO Paul Paget, will explore how to gain visibility and control over all wired, wireless, bluetooth and cellular network devices in and around an enterprise.


      Speaker Bios:

      John Pescatore joined SANS as director of emerging security trends in January 2013. He has 35 years' experience in computer, network and information security.

      Paul Paget brings more than 30 years of leadership experience in the technology and information security markets to his role as CEO of Pwnie Express.

      Read more >
    • The cyber security challenges faced by businesses adopting a BYOD strategy
      The cyber security challenges faced by businesses adopting a BYOD strategy Martin Cook, LogRhythm Recorded: Aug 16 2017 2:00 pm UTC 46 mins
    • This webinar will focus on the cultural shift from tightly controlled business networks of yesterday to the converged fabric adopted by businesses today. BYOD is becoming a normality for most organisations and it doesn't have to be a heavy burden for security teams with the right policies, people and technology in place. We'll dive into some of the options available for these challenges in this webinar and how having the right BYOD strategy can play an integral role in an organisation's preparation for EU GDPR compliance.

      We’ll address:
      - The security options available today to enable an efficient and safe BYOD strategy
      - How implementing a strong BYOD strategy can help compliance
      - How you can reduce the risk of suffering a damaging cyber-breach

      Read more >
    • Webinar Express: Securing BYOD Without MDM
      Webinar Express: Securing BYOD Without MDM Rich Campagna, VP Products, Bitglass Recorded: Sep 14 2016 5:00 pm UTC 29 mins
    • As employee-owned devices become the norm in the workplace, organizations without the appropriate security infrastructure lose control and visibility over corporate data accessed from these devices. Enabling secure BYOD has thus become one of the greatest challenges facing IT leaders.

      Mobile device management (MDM), seen by many as cumbersome and invasive, have struggled to see meaningful adoption among employees. Instead, enterprises are turning to data-centric security, capable of contextual access controls and real-time DLP. In this webinar, we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.

      Read more >
    • Briefings Part 3: The Future of BYOD Security
      Briefings Part 3: The Future of BYOD Security Amish Kohli, Solutions Engineer, Bitglass; Brandon Dunlap, Moderator Recorded: May 4 2017 5:00 pm UTC 58 mins
    • Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere. Join Bitglass and (ISC)2 for the 3rd part of our 3-part Briefings series on May 4, 2017 at 1:00PM Eastern where n this we discuss the trends driving growth in demand for BYOD, the drawbacks of MDM, and some of alternative solutions used to secure employee-owned devices without agents.

      Read more >
    • Major Trends Transforming BYOD Security
      Major Trends Transforming BYOD Security Rich Campagna, VP Products, Bitglass Recorded: Jun 15 2016 5:00 pm UTC 41 mins
    • By all accounts, support for BYOD is growing rapidly across all industries as IT leaders respond to end-user demands. Adoption, however, has stagnated due to privacy concerns, cumbersome third-party apps required to secure mobile devices, and issues supporting the latest operating systems.

      In this webinar, we will discuss the major trends that are reshaping the mobile landscape, from changing end-user needs to the shift toward data-centric security. Learn how IT leaders across all major sectors are rethinking their approach to mobile security to keep pace with evolving employee behaviors.

      CPE Credit available for attendance.

      Read more >
    • Solving IoT & BYOD Challenges: The Answers are in your Network
      Solving IoT & BYOD Challenges: The Answers are in your Network Shaun Henderson & Peter Connolly, ExtraHop Networks Recorded: Jan 18 2017 6:00 pm UTC 20 mins
    • Whether they are ready for it or not, IT Operations teams have the Internet of Things, including BYOD devices such as smart watches, added to their list of responsibilities. With employees bringing in potentially compromised devices, it's time for enterprise IT to understand their environment and not just tick the compliance box. On the other hand, IoT poses an opportunity for IT organizations to add significant value to the business by providing real-time operational intelligence. A new monitoring approach called wire data analytics analyzes communications on the network to extract valuable IoT security, performance, and even operations data—and requires no agents! Tune in for a technical deep-dive into the network impact of IoT, how to make the most of your data from connected devices, and how to mitigate potential security and threat risks involved.

      Read more >
    • Data-centric protection: the future of BYOD security
      Data-centric protection: the future of BYOD security Bitglass Recorded: Jul 12 2016 5:30 pm UTC 45 mins
    • Enabling secure BYOD has long been a challenge for IT. Attempts to secure these devices with agents and device management tools like MDM have been met with widespread employee concerns about privacy and usability, and as a result, organizations see low rates of adoption. Requiring that employees use these install these cumbersome device management tools or access data solely from managed devices are solutions fraught with issues. Employees need the flexibility to work from any device, anywhere.

      In this webinar, we'll discuss how IT can limit risk of data leakage amid changing user habits. Learn how organizations across all industries are enabling secure mobility and productivity with a zero-touch, agentless solution.

      Read more >
    • Top 5 BYOD & Mobile Security Trends in 2016
      Top 5 BYOD & Mobile Security Trends in 2016 Holger Schulze Recorded: Apr 14 2016 4:00 pm UTC 71 mins
    • What are the biggest inhibitors of BYOD adoption in the workplace? How do mobile threats impact an organization’s overall security posture? What types of operational and financial burdens are likely to occur as a result of BYOD?

      Join the webinar – Top 5 BYOD & Mobile Security Trends in 2016 – on Thursday, April 14, 2016 at 12 pm ET / 5 pm GMT.

      Join this webinar as we discuss the key findings of the 2016 BYOD and Mobile Security Survey conducted with the 300,000 member Information Security Community on LinkedIn.

      Hear data security experts from Bitglass, Blancco Technology Group, Check Point Technologies, Skycure, and Tenable Network Security discuss the top trends influencing enterprise mobility and BYOD, including:

      • The biggest inhibitors to BYOD adoption in the workplace
      • The impact of mobile threats on your organization’s overall security posture and incidents
      • Operational and financial burdens caused by security threats
      • Recommendations on the proper data management methods/tools to minimize security risks and ensure regulatory compliance

      Read more >