Hi [[ session.user.profile.firstName ]]

Addressing BYOD Security and Compliance through Mobile Risk Management

The invasion of employee-owned devices, consumer-grade OS's, and unsanctioned mobile apps is exposing organizations to a new wave of security threats and compliance concerns. But the shift to a BYOD world also presents a unique opportunity to re-invent your endpoint security and data protection strategies with a greater focus on securing and managing the apps and the data, rather than the devices themselves, and providing employees with greater flexibility without compromising on security and compliance.

Join Dan Ford from Fixmo to learn about the following topics:

- Security and compliance impacts of BYOD
- Threats and vulnerabilities in iOS, Android and BlackBerry
- Preventing jailbroken OS's, policy hacking and other dangerous exploits
- Protecting your data on BYOD through an IT-controlled secure sandbox approach
- Mobile Risk Management as a strategic approach to security and compliance in a BYOD world
Recorded Jul 12 2012 47 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Daniel Ford, CSO, Fixmo
Presentation preview: Addressing BYOD Security and Compliance through Mobile Risk Management

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [PANEL] How to Simplify Cyber Risk Management? May 13 2020 3:00 pm UTC 60 mins
    Panelists TBA
    In today’s multi-cloud and hybrid environments, CISO's are struggling to secure assets, manage security policies across clouds, monitor and mitigate risks, while also supporting the business. How are CISOs solving the challenge of complexity?

    Join this panel of experts to learn how to simplify cyber risk management as well as maximize the value of your team and technology.
    - Risk scoring and security controls
    - How to identify risks for organizations and their third-party vendors
    - How to prevent, detect, and respond to, privacy and network security incidents
    - Best of vulnerability and risk management in a multi-vendor environment
    - Best practices and use cases across industries
  • Data Privacy in 2020 and Beyond May 13 2020 3:00 pm UTC 60 mins
    Panelists TBA
    Is your organization aware of the main differences in data regulations around the world?

    Join this panel of industry leaders for an interactive Q&A roundtable to get a comprehensive look into the different data privacy and security requirements. The panel will also discuss what to expect in 2020 and beyond.

    Viewers will learn more about:
    - What's new on the data privacy and compliance landscape
    - Main differences between data regulations around the world and what this means for your organization
    - Expert recommendations regarding best tools and practices for achieving and maintaining compliance
    - The future of data privacy
    - What to expect in 2020 and beyond
  • [PANEL] Email Security Strategies and Solutions Apr 15 2020 3:00 pm UTC 60 mins
    Panelists TBA
    With email security breaches constantly making headlines, it is crucial for organisations to be ahead of the curve. Join this interactive panel of industry experts as they discuss the latest trends in email security and how to prevent becoming the next international headline.

    Join this Q&A panel to learn more about:

    - Emerging trends in email attacks
    - How to stay on top of the latest threats
    - Best solutions to protect your organization
  • [PANEL] Insider Threats Apr 14 2020 3:00 pm UTC 60 mins
    Panelists TBA
    As there have been countless insider threat breaches recently, it’s no surprise that research suggests that up to 60% of cyberattacks are due to insider threats. With so much at stake, it's vital for organizations to protect against insider threats.

    Join this interactive panel of industry experts as they discuss:

    -How to protect your organisation from insider threats
    -Latest technologies and solutions
    -Benefits of early and timely detection
  • [PANEL] Security as a Service Apr 13 2020 3:00 pm UTC 60 mins
    Panelists TBA
    As in-house security becomes increasingly complex and costly, organizations are in need of a reliable and safe security provider. Join industry experts as they discuss the latest trends in SEaaS, including:

    -Why your organisation needs to move towards SEaaS
    -The different models of security as a service
    - SEaaS solutions and strategies
  • Social Engineering Threats to Enterprise Security Feb 18 2020 5:00 pm UTC 60 mins
    Diana Kelley | Tyler Cohen Wood | Stephanie Carruthers | Samantha Davison
    Join us as we review social engineering tactics and attack methods. Learn about the latest trends in social engineering, the risk to your organization's cybersecurity and what steps to take to mitigate it.

    Viewers will learn more about:
    - How social engineers exploit human behavior
    - Most common types of social engineering attacks
    - New in phishing, baiting, tailgating and more
    - Managing access and insider threats

    This episode is part of The (Security) Balancing Act series with Diana Kelley. Viewers are encouraged to ask questions during the live Q&A.
  • [PANEL] IoT Security in 2020 Feb 12 2020 4:00 pm UTC 60 mins
    Peter Wood, Terence Jackson, Brian Russell, Kalani Enos, & Alexandre Blanc
    With the proliferation of the Internet of Things, IoT devices are often added into enterprise environments without due consideration for the security and privacy risks they pose to the business. Oftentimes, IT security teams do not have full visibility into how many IoT devices are connected to the network. This creates security gaps, as IoT devices are notoriously vulnerable to hacks and attacks.

    Join this interactive panel experts to learn about how enterprises can enhance endpoint, and therefore IoT security.

    Attendees will learn more about:
    - IoT and today's enterprise
    - What's on your network? How do you evaluate IoT devices?
    - Why visibility is key
    - Controlling access to your IoT environment
    - Vendor risk and holding vendors accountable for their IoT equipment
    - Areas for automation and where to reduce your IT security team's involvement
    - Patching and upgrading
    - Expert recommendations for enhancing IoT security

    Speakers:
    Peter Wood, Partner, Naturally Cyber LLP (Moderator)
    Terence Jackson, CISO, Thycotic
    Brian Russell, IoT Working Group Co-Chair, Cloud Security Alliance (CSA)
    Kalani Enos, Founder & CEO, KEnos Technologies LLC
    Alexandre Blanc, Director of Security, Adaware (an Avanquest company)
  • [PANEL] Proactive Security Strategies and Best Practices Feb 11 2020 4:00 pm UTC 60 mins
    Roselle Safran, Sean Webb, Michelle McLean, Michelle Drolet & Chris Calvert
    In today’s business landscape it is important to take a proactive approach to security rather than a reactive approach. Join leading security experts as they discuss the safest ways to protect your organisation in 2019 and beyond.

    Join this Q&A panel to learn more about:

    - Key organisational benefits to practising proactive security
    - Technologies powering security
    - Best practices and recommendations for a more secure organization

    Speakers:
    Roselle Safran, President, Rosint Labs (Moderator)
    Sean Webb, Information Security Manager, Patriot One Technologies Inc.
    Michelle McLean, Vice President of Product Marketing, StackRox
    Michelle Drolet, CEO & Co-Founder, Towerwall
    Chris Calvert, VP of Product Strategy, Respond Software
  • Healthcare Security – It Stinks Jan 30 2020 4:00 pm UTC 60 mins
    Christos Simotas, Senior Information Security Consultant, I.T. Security Corp
    Healthcare is a goldmine for hackers. Not just any kind of hacker though but for almost all kinds of levels. From the NOOB script kiddes sending out ransom ware emails to the advanced reverse engineer creating push to kill insulin pump and heart defibrillators exploits which can be triggered from half a kilometer away.
    This industry's cyber security cost is expected to rise from 7 billion in 2018 to 27 billion by 2026, yet from 2005 to today over 268 million records have been reported breached in the United States alone. That's 85%.
    Financial gain is the main motivator for hackers because healthcare records are highly valued for their personal, financial, and medical data. This type of information is worth roughly 50 times more than credit card or Social Security data, since it can be used for Medicare fraud – the most profitable type of identity theft.
    We will look at some of the most common attacks the healthcare industry has been exposed to and a live demonstration of exploiting one of the oldest technologies that was implemented 1959 and is still being used today.
    Let’s dive deep into the underground world of healthcare.
  • How Private is My Healthcare Data? Surprise! Recorded: Jan 28 2020 59 mins
    Debra Baker | Ellie Daw | Michelle Finneran Dennedy | Karen Schnell | Anna Kirkland Smith
    Join well-known women in privacy and cybersecurity for an exclusive keynote panel on ransomware and IoT threats to healthcare data, and steps to take in 2020 to better secure it.

    Viewers will also learn about Google’s Project Nightingale, as well as have the opportunity to ask questions during the live webinar.

    Speakers:
    - Debra Baker, CISSP CCSP, Host and Technical Program Manager at RedSeal
    - Ellie Daw, Research Scientist at Crimson Vista, Inc.
    - Michelle Finneran Dennedy, CEO at DrumWave
    - Karen Schnell, Cybersecurity Business Architect and Adjunct Professor in Computer Science
    - Anna Kirkland Smith, Data Scientist, MetLife

    This keynote panel is part of International Data Privacy Day 2020 and will be available Live on January 28th, as well as an on-demand.

    Data Privacy Day is an international effort to create awareness about the importance of respecting privacy, safeguarding data and enabling trust.
  • How To Prevent Bias in Machine Learning Recorded: Jan 23 2020 58 mins
    Diana Kelley, Microsoft I Deveeshree Nayak, University of Washington, Tacoma I Marcae Bryant-Omosor, USAA
    Machine Learning is not immune to bias. In fact, often times it can actually amplify bias.

    As organizations are increasingly turning to ML algorithms to review vast amounts of data, achieve new efficiencies and help make life-changing decisions, ensuring that bias does not creep in ML algorithms is now more important than ever.

    So, how can we protect ML systems from the “garbage in, garbage out” syndrome?

    If undetected or left unchecked, feeding "garbage" biased data to self-learning systems can lead to unintended and potentially dangerous outcomes.

    Join us as we discuss bias in Machine Learning. Learn about the risk of ML bias, how to detect it and how to prevent it.
  • Privacy: Regulatory Pressure is the Consequence of a Broader Problem Recorded: Jan 22 2020 48 mins
    Matthew Karnas, Senior Manager, Cybersecurity at EY
    Many organizations are feeling the pressure to find privacy compliance solutions as an ever-increasing number of regulatory requirements are being introduced locally, nationally, and globally. In their attempts to demonstrate prompt compliance with multiple regulations, organizations could be speeding past their actual privacy problems. To avoid a “tail wagging the dog” situation with a compliance-driven approach, organizations should focus on examining why these privacy regulations are being introduced in the first place In this webinar, we will discuss common privacy problems facing organizations through examples with an emphasis on the privacy needs of customers over compliance checklists.

    In this presentation, you will learn:
    The current state and drivers of organizational privacy programs.
    How to identify areas of focus within privacy programs based on customer needs which drives compliance requirements.
    How to lead discussions with colleagues in support of a customer focused, need-based privacy program at your organization.
  • Why Does It Take So Long to Find a Job? Thoughts for Your 2020 Career Search Recorded: Jan 22 2020 48 mins
    Kathleen Smith, CMO, ClearedJobs.Net/CyberSecJobs.Com
    A recent CyberSecJobs.Com survey found that 45% of information security professionals did not know how to find a job. And while this is a staggering number, it is more than likely under-representing how proficient most information security professionals feel in the area of career search and professional development. Putting together a strategy on how to find a new opportunity and support your career is not something most are taught and most often it is a struggle to pull together all the key components to create the next step in your career.

    This webinar highlights the challenges that most information security professional face when looking for their next career opportunity, explains why these happen and how to over come them. This session will also highlight the key tools every information security professional should be working on daily to insure that they are not left stranded when needing to find their next opportunity.
  • Balancing Data Privacy & Security in 2020 Recorded: Jan 21 2020 58 mins
    Dr. Christopher Pierson | Shahrokh Shahidzadeh | Michelle Drolet | George Wrenn
    How has the compliance landscape changed in 2020? Is your organization aware of the main differences in data regulations around the world?

    Join this panel of industry leaders for an interactive Q&A roundtable to get a comprehensive look into the different data privacy and security requirements. The panel will also discuss what to expect in 2020 and beyond.

    Viewers will learn more about:
    - CCPA is now in effect and what this means for you
    - The main differences between GDPR and CCPA
    - Best tools, practices, required policies and cultural game changers for commercial and government environments
    - Other data regulations on the horizon
    - Recommendations for 2020

    Speakers:
    - Dr. Christopher Pierson, CEO & Founder, BLACKCLOAK
    - Shahrokh Shahidzadeh, CEO, Acceptto
    - Michelle Drolet, CEO, Towerwall
    - George Wrenn, CEO & Founder, CyberSaint Security

    This Q&A panel is part of Privacy Month.
  • Intrusion Analysis Foundation for SoC Analysts Recorded: Jan 14 2020 64 mins
    Kevin Cardwell
    The first step in developing an effective incident response capability is learning the methods of attack that can be used to compromise systems and networks. In this webinar you will learn the fundamentals of incidents, and how information can be extracted to determine the extent of the attack. The webinar will show the latest types of attacks, and what to look for when these types of attacks are carried out against the enterprise.

    Within the webinar, you will learn the characteristics of a number of attacks, and a process to evaluate these attacks for the possibility of an intrusion. The section on intrusion analysis will show the data that can be scavenged after a variety of different types of attacks. These attacks can be from the most basic type all the way through advanced emerging threat attacks. The systematic process you will not only learn, but also see demonstrated will allow you to analyze virtually all types of intrusions.
  • Privacy: Regulatory Pressure is the Consequence of a Broader Problem Recorded: Dec 2 2019 49 mins
    Matthew Karnas
    Many organizations are feeling the pressure to find privacy compliance solutions as an ever-increasing number of regulatory requirements are being introduced locally, nationally, and globally. In their attempts to demonstrate prompt compliance with multiple regulations, organizations could be speeding past their actual privacy problems. To avoid a “tail wagging the dog” situation with a compliance-driven approach, organizations should focus on examining why these privacy regulations are being introduced in the first place In this webinar, we will discuss common privacy problems facing organizations through examples with an emphasis on the privacy needs of customers over compliance checklists.

    In this presentation, you will learn:
    The current state and drivers of organizational privacy programs.
    How to identify areas of focus within privacy programs based on customer needs which drives compliance requirements.
    How to lead discussions with colleagues in support of a customer focused, need-based privacy program at your organization.
  • How to Prevent 81% of Phishing Attacks from Sailing into Your Inbox with DMARC Recorded: Nov 7 2019 59 mins
    Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist
    Only ~20% of companies use DMARC, SPF, and DKIM, global anti-domain-spoofing standards, which could significantly cut down on phishing attacks. But even when they are enabled and your domain is more secure, 81% of phishing attacks still continue to sail right through to the end-user.


    In this webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, will teach you how to enable DMARC, SPF, DKIM the right way! Then, learn the six reasons why phishing still might get through to your inbox and what you can do to maximize your defenses.


    What you’ll learn:

    How to enable DMARC, SPF, and DKIM

    Common configuration mistakes

    How to best configure DMARC and other defenses to fight phishing

    Techniques to empower your users to identify and avoid phishing attempts that make it through your surface-level defense
  • When Machines Fight Machines: Cyberbattles and the New Frontier of AI Recorded: Oct 16 2019 50 mins
    Marcus Fowler, Director of Strategic Threat at Darktrace
    AI is sometimes spoken about like something that will, in the future, secure networks. However, AI cyber security is already deployed by numerous companies to detect and autonomously respond to increasingly advanced, fast-moving, and stealthy threats. At the same time, attackers are developing malicious AI, which will be almost impossible to detect. Companies that fail to deploy AI today may find themselves unable to detect the threats of tomorrow. In this session, learn about how the use of unsupervised machine learning allows companies to benefit from cyber AI within weeks, why building trust with security teams is so essential, and use cases of cyber AI beyond threat detection and response.
  • Leveraging Community Involvement for Career Development Recorded: Jul 17 2019 41 mins
    Kathleen Smith, CMO, ClearedJobs.Net/CyberSecJobs.Com
    There is more to community involvement than fun runs and bake sales. Many of the conferences and organizations in the information security community are volunteer run. In our workdays, we rarely get a chance to work on overall career development and yet, we need challenges to improve our technical and nontechnical skills. Join us as we review best practices for volunteering, how to leverage these for career development and how to best engage your employers, or prospective employers.
  • 10 Tips Every Job Seeker Should Know Recorded: Mar 20 2019 49 mins
    Kathleen Smith, CMO, ClearedJobs.Net/CyberSecJobs.Com
    In a recent CyberSecJobs.Com survey, only 54% of the community said that they knew how to find a job. Of those 54% the top tool for finding a job was asking friends. Finding a job is a full time job. Do you have all of the tools available to you to find your next job? Spend a few moments with Kathleen Smith a Recruiting Marketing expert and hear about the top tips you want to make sure you always have at your fingertips to find your next opportunity.
For Certified Members and Information Security Professionals Globally
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker (C|EH), Computer Hacking Forensics Investigator (C|HFI) and EC-Council Certified Security Analyst (E|CSA)/License Penetration Tester (L|PT) programs, and various others offered in over 60 countries around the globe.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Addressing BYOD Security and Compliance through Mobile Risk Management
  • Live at: Jul 12 2012 7:00 pm
  • Presented by: Daniel Ford, CSO, Fixmo
  • From:
Your email has been sent.
or close