­Identity is the New Perimeter Part 4: Identity and BYOD

Logo
Presented by

Tyson Whitten, CA; Brandon Dunlap, Brightfly; Scott Morrison, CTO, Layer 7

About this talk

The Bring Your Own Device [BYOD] trend is in full swing as the growth of mobile devices within the enterprise explodes. How do you enable secure data access for mobile applications? How do you deal with user authentication? How do you allow broader adoption for enterprise applications on user owned devices? Join (ISC)2 and CA for the next part of our Security Briefings series on October 25, 2012 as we outline solutions to these issues, explore different mobile security approaches, and discuss, through case studies, how others have solved these problems.

Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (299)
Subscribers (113475)
(ISC)² hosts regular panel discussions on hot button infosecurity topics featuring thought leaders and visionaries from the industry who answer questions from the audience.