Click here to register now!
Date: 20th September 2016
Time: 2:00 p.m BST
Earn 1 CPE credit when you attend*
Regulations and policies to manage the security risk of personal devices are all well and good, but the underlying technology of BYOD also needs to be considered. How effective can BYOD security be?
- Learn what are the biggest threats to your network from staff mobile devices
- Discover how attackers undermine your policy
- Identify the leading mistakes made by your users.
- Adopt an approach that delivers what your policy promises.