Most organizations today allow employees and other users to bring their own mobile devices onto the enterprise network to access corporate data. But in many cases, security teams still do not have comprehensive, enforceable security policies that take into account the many technologies and networks that users may employ to connect their mobile devices.
In this webinar, attendees will get advice on how to build a sound, effective mobile security strategy that works across locations and devices --and that can be enforced across the enterprise.
Attend this webinar and you'll:
Senior IT Security Engineer
IBIRIA Bank
John Burke is a senior IT Security Engineer for Iberia Bank.A graduate of Auburn University, John has more than 20 years in IT experience. John has worked in banking and healthcare technology risk systems, as well as broad experience managing security for other disciplines. He is a Certified Computer Forensics Examiner, Certified Web Application Penetration Tester, and a Certified Ethical Hacker.
VP Of Research & Deep Learning
Deep Instinct
Shimon N. Oren is VP of Research & Deep Learning at Deep Instinct. Prior to joining Deep Instinct in 2016, Shimon served for 14 years as an officer in the Israel Defense Force's elite cyber unit. Shimon's background includes a wide range of cyber security and research positions, where he managed multifunctional teams of hackers, researchers and engineers. Over the years Shimon has worked extensively with a variety of industry, defense and intelligence partners and agencies in North America and Europe. He is a recepient of the President of Israel Award for Outstanding Military Service, holds a B.Sc in Electrical Engineering and a graduate degree in Finance and Tech management.
Senior Editor
Dark Reading
Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior to that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI working group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.