Tyson Whitten, CA; Brandon Dunlap, Brightfly; Scott Morrison, CTO, Layer 7
The Bring Your Own Device [BYOD] trend is in full swing as the growth of
mobile devices within the enterprise explodes. How do you enable secure
data access for mobile applications? How do you deal with user
authentication? How do you allow broader adoption for enterprise
applications on user owned devices? Join (ISC)2 and CA for the next part
of our Security Briefings series on October 25, 2012 as we outline
solutions to these issues, explore different mobile security approaches,
and discuss, through case studies, how others have solved these problems.