Rolling Meadows, IL, USA (1 April 2015)—In today’s mobile world, companies need a strong combination of policies, training, device management, controls and application security. To help IT and security professionals implement a successful mobile strategy for both company-owned and BYOD devices, global IT association ISACA is presenting a free virtual conference, titled “Mobile Security Matures: Managing the New Mobile Enterprise 2.0,” 15 April 2015, from 8:15 a.m. to 5:00 p.m. EDT (UTC–4).
“Mobile devices have transformed organizations through increased productivity, convenience and accessibility. But many of these devices are not owned by the company and pose additional risk,” said Robert E Stroud, CGEIT, CRISC, international president of ISACA and vice president of strategy and innovation at CA Technologies. “ISACA’s virtual conference will help attendees ensure their mobile security is solid and able to adapt, as mobile risks and opportunities continue to evolve.”
During the virtual conference, thousands of attendees will participate in educational sessions, network with peers from around the world, and interact with exhibitors and sponsors in a virtual exhibit hall. Sessions include:
- “Will Your Mobile Policies Survive a Road Trip?” presented by Bryan Barringer, enterprise mobility consultant with SearchCIO. Barringer will provide guidance and tools to review mobile policies in light of the current BYOD climate.
- “Options for File Sync and Storage,” presented by Lisa Phifer, partner of CoreComm. Phifer will discuss how file sync and storage solutions have changed, and new options that are available.
- “State of Mobile Malware,” presented by Bill Dean, director of Computer Forensics and Security Assessment for Sword & Shield Enterprise Security. Dean will discuss malware threats that exist in the mobile environment and what enterprises should most be concerned about regarding the current threat landscape.
- “Mobile Application Security Assessments,” presented by Georgia Wideman, CEO of Bulb Security. Wideman will provide guidance on performing security assessments for custom applications and how they differ from traditional application assessments.
Attendees can earn up to five free continuing professional education (CPE) credits for attending the virtual conference. To register, visit Mobile Security Matures: Managing the New Mobile Enterprise 2.0
With more than 115,000 constituents in 180 countries, ISACA (www.isaca.org) helps business and IT leaders build trust in, and value from, information and information systems. Established in 1969, ISACA is the trusted source of knowledge, standards, networking, and career development for information systems audit, assurance, security, risk, privacy and governance professionals. ISACA offers Cybersecurity Nexus (CSX), a comprehensive set of resources for cybersecurity professionals, and COBIT, a business framework that helps enterprises govern and manage their information and technology. ISACA also advances and validates business-critical skills and knowledge through the globally respected Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in the Governance of Enterprise IT (CGEIT) and Certified in Risk and Information Systems Control (CRISC) credentials. The association has more than 200 chapters worldwide.
Participate in the ISACA Knowledge Center: www.isaca.org/knowledge-center
Follow ISACA on Twitter: https://twitter.com/ISACANews
Join ISACA on LinkedIn: ISACA (Official), http://linkd.in/ISACAOfficial
Like ISACA on Facebook: www.facebook.com/ISACAHQ
Joanne Duffer, +1.847.660.5564, firstname.lastname@example.org