BYOD – Why It’s Good for You and How to Secure It

Presented by

Graham Williamson and Andrew Ferguson, KuppingerCole

About this talk

Mobile devices have won. Whether it’s a cell phone or tablet they are the device of choice for users wanting to access corporate resources. This webinar will discuss the options for supporting these devices as a business imperative. At one end of the spectrum there’s the “corporate device only” approach, at the other end is a BYOD approach. Either approach is acceptable provided it’s based on a risk assessment and adheres to corporate policy. This presentation will address the security issues organizations are facing in supporting access to corporate resources from users with mobile devices. Join us as we discuss the importance of establishing a secure BYOD strategy, the security controls you will need to have in place and the need for strong authentication. About the Presenters Graham Williamson has 25 years experience in the Information Technology industry with expertise in identity management and access control, enterprise architecture and services-oriented architecture, electronic commerce and public key infrastructure, ICT strategy development and project management. Andrew Ferguson is one of the founders and key shareholders of Internet Commerce Australia (ICA) and a shareholder of KuppingerCole (Asia Pacific). He is a Senior Consultant with KuppingerCole with a 20 year career in Identity and Access Management and a total of 40 years in the IT sector. He has worked for the UK Ministry of Defence (British Army), Somerset Constabulary & the Metropolitan Police Force in London, in Retailing IT with Debenhams & MFI Warehouses, in Transport & Logistics IT & Consulting with PWC, Unilever, P&O Containers and the Port of Melbourne Authority; and Telecommunications & IT Systems Integration with both Telstra & Optus Communications, plus AT&T, EDS and UCSL.

Related topics:

More from this channel

Upcoming talks (27)
On-demand talks (3432)
Subscribers (176693)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.