Building and Managing an Effective Mobile Security Strategy

On-Demand Webinar

Most organizations today allow employees and other users to bring their own mobile devices onto the enterprise network to access corporate data. But in many cases, security teams still do not have comprehensive, enforceable security policies that take into account the many technologies and networks that users may employ to connect their mobile devices.

In this webinar, attendees will get advice on how to build a sound, effective mobile security strategy that works across locations and devices --and that can be enforced across the enterprise.

Attend this webinar and you'll:

  • Receive a roadmap for updating your remote work security strategy and BYOD policy
  • Learn about the variety of tools available for securing smartphones, and those tools' limitations
  • Get tips for what to tell home workers about securing any mobile or remote devices that may connect to the corporate network

Fill out the form to watch the webinar

By submitting this form, you are confirming you have read and agree to our Privacy and Cookies Policies.

speaker 1

John Burke

Senior IT Security Engineer


John Burke is a senior IT Security Engineer for Iberia Bank.A graduate of Auburn University, John has more than 20 years in IT experience. John has worked in banking and healthcare technology risk systems, as well as broad experience managing security for other disciplines. He is a Certified Computer Forensics Examiner, Certified Web Application Penetration Tester, and a Certified Ethical Hacker. 


speaker 2

Shimon Oren

VP Of Research & Deep Learning

Deep Instinct

Shimon N. Oren is VP of Research & Deep Learning at Deep Instinct. Prior to joining Deep Instinct in 2016, Shimon served for 14 years as an officer in the Israel Defense Force's elite cyber unit. Shimon's background includes a wide range of cyber security and research positions, where he managed multifunctional teams of hackers, researchers and engineers. Over the years Shimon has worked extensively with a variety of industry, defense and intelligence partners and agencies in North America and Europe. He is a recepient of the President of Israel Award for Outstanding Military Service, holds a B.Sc in Electrical Engineering and a graduate degree in Finance and Tech management. 




speaker 3

Sara Peters

Senior Editor 

Dark Reading 

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior to that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI working group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.