Phones, Phablets and Clouds - Securing the New Infrastructure

Presented by

Steve Durbin, Managing Director, Information Security Forum (ISF)

About this talk

The technological landscape in the workplace has dramatically changed over the past ten years with the introduction of the ultraportable, smart mobile phone, tablet, phablet and many others. The benefits and opportunities are clear; a mobile, connected workforce able to multitask and communicate precise information globally with minimal disruption. Despite the undeniable corporate and consumer interest, the security and privacy implications of cloud and mobile connected devices are concerning many security professionals. Many organisations are still playing catch up - BYOD polices are only starting to be embedded, reviewed and updated. IT departments are overwhelmed with the amount of devices entering the workplace and connecting to corporate networks. Ultimately, employers must accept that cloud and mobile working will appear as the de facto corporate infrastructure and should place a strong emphasis on employees understanding risks and their responsibilities in protecting corporate and personal data. But how? This webcast will suggest ways to educate and inform users on operating in a safe and secure manner in a cloud and mobile environment.

Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (139)
Subscribers (21664)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user