Bruce Sarkisian presented at this seminar coordinted by the CISO Executive Network. The dam has been breached and the influx of personally owned endpoint devices has flooded our member’s environments. Executives are leading the charge in hopes of big savings by not having to deploy or manage company-owned assets. CISO members are scrambling to implement policies and solutions to manage and secure those personally owned endpoints that now have company data on them.
A 2013 CISO member priorities survey revealed that Mobile Endpoint Management and Security is the number one project and technology priority with almost 85 percent claiming its their number one project planned for 2013, and nearly 60 percent stating they will be acquiring such technologies to manage and secure those endpoints.
In this breakfast roundtable series, CISO members and industry experts discussed the most effective way to manage the risks posed by these pervasive endpoints. They covered the types of policies required, the legal implications of co-mingling personal and company data, device confiscation for legal holds and forensics, “sandbox” encryption, and more.
Topics for discussion included:
- Endpoint protection
- Mobile device management
- Trends/recommendations on what applications to allow to pass through existing security technologies/services NAC, device registration, monitoring, BYOD, VDI
Participants will be eligible to claim 4 CPE credit hours.
September 10, 2013