• Securing the Anywhere, Anytime of Mobile Computing

    | Nov 19, 2015 | Cybersecurity

    Few would argue that mobile communications are an integral component of today’s enterprise computing infrastructure. From smartphones to tablets to specialized hand-held devices, all are used by individuals and organizations to increase flexibility and productivity given their “anywhere and anytime” utility. Yet to fully realize the benefits of mobility, agencies need to address the security hurdles of mobile computing. And BYOD can’t be allowed to mean “bring your own disaster.” Watch this discussion on mobile security, effective policy and privacy considerations, and case examples of agencies making mobility work for secure operations.


    • Dan Waddell, Regional Managing Director, North America Region, (ISC)2


    • Linus Barloon II, IT Security Branch Manager, Office of the Sergeant at Arms, U.S. Senate
    • Leo Scanlon, Acting Division Director, Office of Information Security, Office of the Secretary, Department of Health and Human Services
    • Rick Walsh, Lead for Army Commercial Mobile, Cybersecurity Dictorate, Office of the CIO, U.S. Army


    You’re one step away from unlimited access!

    Complete the form below and get unlimited access to everything in our resource library. Best of all, we’ll remember you the next time you visit.

    Email Address


    First Name

    Last Name


    Phone [xxx-xxx-xxxx]


    Already Registered?

    Enter your email address