Bring Your Own Destruction

Aamir Lakhani, Senior Solutions Technical Global Architect, World Wide Technology
BYOD is the word of the day. Everyone is jumping at the chance to buy a solution that solves the BYOD issues. However, enabling BYOD for an organization is much more than picking a single vendor solution. It is about understanding mobile risks and building a mobile secure ecosystem. This talk will examine how to build a complete BYOD solution taking into account multiple attack vectors and ways to solve the issue.
Aug 21 2012
30 mins
Bring Your Own Destruction
Join us for this summit:
  • Channel
  • Channel profile
Up Down
  • Mobile Device Application Vulnerabilities Recorded: Feb 7 2013 41 mins
    The presentation will take a look at current mobile device vulnerabilities as well as how applications and data can be exploited from mobile devices. We will look at tools and techniques that have been traditionally used for network vulnerabilities and see how they are being modified to attack mobile users. Lastly, we will briefly explore some techniques large corporations are using to mitigate these types of attacks.
  • Identity Services Engine - An Independent Look Recorded: Nov 9 2012 45 mins
    Join WWT's Aman Diwakar, Security Solutions Architect, for this in-depth review of Cisco's Identity Services Engine (ISE).

    • ISE Features
    oTrustsec Overview
    oFeatures and Benefits
    Consolidated Services/Software Packages
    Session Directory
    Flexible Service Deployment
    Policy Extensibility
    Manage Security Group Access
    System-wide monitoring and troubleshooting
    • Design
    oPersonas and Architecture
    oDeployment Models
    oSizing/Design Guidance
    oTips and Caveats
    • Licensing
    oLicensing and Packaging
    oHardware/Software SKUs
    oUpgrades and Migration
    • Roadmap
    oFuture services
  • WWT is Master Certified in Security and Unified Communications Recorded: Oct 24 2012 5 mins
    Jim Kavanaugh, Don Seiler and Ladi Adefala talk about what it means to our customers that WWT is Cisco Master certified in Security and Unified Communications.
  • Already in the Cloud? It Isn’t Too Late to Secure It Recorded: Oct 18 2012 49 mins
    Review the approach and considerations required to secure your enterprise cloud as experienced by two of WWT’s brightest Technical Solutions Architects faced with solving Cloud and Security challenges across their Fortune 500 clients and the Federal government.
  • Maintaining Compliance in Your Public, Private or Hybrid Cloud Recorded: Oct 17 2012 49 mins
    Join World Wide Technology’s National Technical Solutions Architects, Tim Adams and Erik Vesneski, as they address the considerations to mitigate risks and meet compliance standards in a cloud environment.
  • Bring Your Own Destruction Recorded: Aug 21 2012 30 mins
    BYOD is the word of the day. Everyone is jumping at the chance to buy a solution that solves the BYOD issues. However, enabling BYOD for an organization is much more than picking a single vendor solution. It is about understanding mobile risks and building a mobile secure ecosystem. This talk will examine how to build a complete BYOD solution taking into account multiple attack vectors and ways to solve the issue.
Securing business through technology and process
In conjunction with one of the nation's leading technical tradeshows, the Geek Day Security Channel features compelling technology thought leadership on the industry's best-of-breed security solutions providers.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Bring Your Own Destruction
  • Live at: Aug 21 2012 4:00 pm
  • Presented by: Aamir Lakhani, Senior Solutions Technical Global Architect, World Wide Technology
  • From:
Your email has been sent.
or close
You must be logged in to email this