Securing the Anywhere, Anytime of Mobile Computing
| Nov 19, 2015 | Cybersecurity
Few would argue that mobile communications are an integral component of today’s enterprise computing infrastructure. From smartphones to tablets to specialized hand-held devices, all are used by individuals and organizations to increase flexibility and productivity given their “anywhere and anytime” utility. Yet to fully realize the benefits of mobility, agencies need to address the security hurdles of mobile computing. And BYOD can’t be allowed to mean “bring your own disaster.” Watch this discussion on mobile security, effective policy and privacy considerations, and case examples of agencies making mobility work for secure operations.
Moderator:
- Dan Waddell, Regional Managing Director, North America Region, (ISC)2
Speakers:
- Linus Barloon II, IT Security Branch Manager, Office of the Sergeant at Arms, U.S. Senate
- Leo Scanlon, Acting Division Director, Office of Information Security, Office of the Secretary, Department of Health and Human Services
- Rick Walsh, Lead for Army Commercial Mobile, Cybersecurity Dictorate, Office of the CIO, U.S. Army