Contain Yourself - Analysis of BYOD Secure Containers

"In today's world, everyone wants access to information from his or her personal mobile device. As a business, this includes your customers and/or employees. What if the information they want access to is highly sensitive? While it's tempting to resist these pressures for security reasons, providing mobile access can be a significant competitive advantage and most importantly keep your customers and employees happy and productive. The reality is that in order to survive in a connected world, we must provide a way to meet these demands without sacrificing security."
Watch Now

Spotlight

Hosted by Jeff Peters, editor at HackSurfer, and featuring Kevin Epstein, VP of Information Security Products at Proofpoint. Kevin discussed the human factor in cybersecurity, phishing, the Internet of Things, and other user questions around cybercrime.


OTHER ON-DEMAND WEBINARS

Enterprise Risk – Taming the Devil in the Data

"In a landscape filled with new threats and new regulations, risk management has never been more critical to senior leaders across all sectors. The growth of data is increasing exponentially, organizations are suffering from volatility across all risk types, and need to re-think their enterprise risk strategy. At the heart of this strategy is the need for a single consistent view of the data, and a data-centric, multi-platform approach to secure valuable customer and corporate data assets, end-to-end. Join our experts as they discuss a new generation of risk technologies which use a holistic approach to data management and address the risks inherent when data is at rest in storage, in motion on the network, and in use in analytics and business processes"

"The Changing Role of the Chief Information Security Officer"

Veracode

In this special videocast sponsored by Veracode and moderated by Dark Reading, two of the IT security industry’s best-known voices – Chris Wysopal, CTO & CISO of Veracode and Jim Nelms, CISO of The Mayo Clinic – will discuss the changing role of the CISO and how the importance of that role is growing within the organization.

CRITERIA FOR A SUCCESSFUL ENTERPRISE MOBILE APP DEPLOYMENT: SECURITY, USABILITY, AND ANALYTICS

Apperian

Organizations now understand the importance of delivering mobile apps and content to 100% of their potential users, whether BYOD employees, contracted workers, or others in the extended enterprise. But how can you ensure your mobile app deployment is successful for all stakeholders, i.e. IT, the lines of business, and end users? Listen to Maribel Lopez, Principal at Lopez Research, as she discusses how organizations are creating apps that matter and distributing them quickly with the highest levels of security and adoption. Featured Speakers Maribel Lopez, Principal, Lopez Research Stephen Skidmore – Director of Product Marketing, Apperian.

Lessons Learned from Recent Cyber Incidents: Google Plus, Facebook, Reddit, and What You Need to Know

ACA Compliance Group

Join Raj Bakhru, Partner at ACA Aponix, on Tuesday, November 27 at 11:00am ET as he examines recent high-profile breaches involving Google Plus, Facebook, Reddit, British Air, and Colorado Timberline, and others. Raj will discuss what your firm can learn from these incidents, key protections you can implement to avoid similar breaches, and how regulations come into play. Discussion Topics. What led to these breaches? What lessons can we learn? What companies can do to prevent and respond to breaches.