SC Magazine eConference: Mobile Security - Vulnerabilities and how to overcome them
Where: Your computer
Earn CPE Credits for attending*
Attackers follow the money - or in infosec terms, the data. And that makes mobile an attractive target, as data increasingly goes mobile, with mobile banking, social networking, web surfing and the blurring of work and business use - as well as being a tracking device with a microphone and camera.
So what are the issues? First comes policy - whether it's BOYD, COYD, BOYE, or any of the new acronyms to have sprung up, and how do we tackle the issues. Then there is the device, the operating system, the apps that run on it, and how to integrate them into our overall security approach and risk appetite. What do we do to prevent data leakage, whether accidental or deliberate, and how do we secure data beyond the perimeter. And finally - what are we going to do about Google Glass and other wearable technology?
Questions? Email email@example.com to receive updates on upcoming events, or if you experience a technical problem.
For sponsorship opportunities email;
Dennis Koster, Account Manager at:
Martin Hallett, Account Director at: