Best Practices for Mobile Security

Presented by

Andrew Jaquith, CTO, Perimeter E-Security

About this talk

Mobile devices are quickly becoming the most commonly used computing device. For the first time, sales of Post-PC tablets and smartphones have surpassed those of traditional laptop and desktop PCs. But, depending on who is doing the talking, devices like the iPad are either the best aid to productivity since the invention of the wheel, or the First Horseman of the impending apocalypse. Perimeter E-Security CTO, Andrew Jaquith will help you learn more about: 1) Cutting through the fear, uncertainty and doubt (FUD) surrounding the Post-PC devices 2) What you really need to worry about with mobile devices 3) What distractions you can safely ignore 4) 5 essential security controls every company needs to protect their Post PC devices, regardless of size or industry 5) Q&A with Andrew

Related topics:

More from this channel

Upcoming talks (19)
On-demand talks (3501)
Subscribers (180271)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.