ISMG Announces 2013 Mobile Security Survey Results Webinar

ISMG Announces 2013 Mobile Security Survey Results Webinar

Information Security Media Group (ISMG), publisher of BankInfoSecurity, today announces the launch of its latest webinar, "Beyond BYOD: 2013 Mobile Security Survey Results," which will debut June 25 at 3:30 p.m. ET.

At a time of unprecedented mobile device adoption - and evolving mobile security threats - 72 percent of organizations rate their state of mobile security as poor-to-adequate. This lack of mobile preparedness is one of many key points to emerge from the results of the Beyond BYOD: 2013 Mobile Security Strategies Survey, produced by ISMG and Accellion, Inc., the pioneer in providing enterprise-class, secure mobile file sharing solutions.

Organizations of all sizes are dealing with the influx of mobile devices on their network, and haven't yet had adequate time to manage the risks associated with securing the systems and data accessed broadly by employees' mobile devices. The "Beyond BYOD: Mobile Security Survey Results" webinar, sponsored by Accellion, investigates how organizations will address today's top mobile security challenges, with emphasis on:

  • State of Security - Which mobile platforms will organizations support, and how do they rate their state of mobile security?
  • Policy - What formal policies do organizations have in place for issues such as inventory, mobile device/application management and data/device encryption?
  • Controls - What security solutions are in place to secure identity and access management, content and the use of third-party applications?
  • Metrics - How do organizations measure the tangible business results of mobile initiatives, including cost-savings and improved productivity?
  • Investments - What are the top areas of mobile security investment for the coming year?

In addition to delivering an overview of key survey results, this session will include a panel discussion, featuring mobile security experts Elayne Starkey of the State of Delaware and Malcolm Harkins of Intel, who will analyze the results and offer mobile security tips for organizations.

Register for the webinar at https://www.bankinfosecurity.com/webinars/beyond-byod-2013-mobile-security-survey-results-w-356.

About the Presenters:

Tom Field, Vice President, Editorial, ISMG

Field is an award-winning journalist with over 20 years experience in newspapers, magazines, books, events and electronic media. A veteran community journalist with extensive business/technology and international reporting experience, he has written news, sports, features, fiction and analysis for publications ranging from Editor & Publisher to Yankee Magazine, and he has held editorial management positions at weekly and daily newspapers, as well as a global business/technology magazine. An accomplished public speaker, Field has developed and moderated scores of podcasts, webcasts, roundtables and conferences, and he has appeared on C-SPAN, The History Channel and Travel Channel television programs.

Elayne Starkey, Chief Security Officer, State of Delaware

Starkey, working out of the Department of Technology and Information, is responsible for the enterprise-wide protection of information assets from high consequence events, including cyber and physical terrorism and natural disasters. She chairs the Delaware Information Security Officer Team and is a member of the Governor's Homeland Security Council. She previously served as the chief technology officer at DTI and the CIO for the Delaware Department of Public Safety.

Malcolm Harkins, Chief Security and Privacy Officer, Intel

Harkins is vice president and chief security and privacy officer (CSPO) at Intel Corporation. In this role, he's responsible for managing the risk, controls, privacy, security and other related compliance activities for all of Intel's information assets, products and services. Before becoming Intel's first CSPO, he was the chief information security officer (CISO), reporting to the chief information officer. Harkins also held roles in finance, procurement and various business operations.

About Accellion:

Accellion, Inc. is a well-funded, private company that provides enterprise class mobile file sharing solutions to enable secure, anytime, anywhere access to information while ensuring enterprise security and compliance. More than 11 million users and 1,800 of the world's leading corporations and government agencies including Procter & Gamble; Indiana University Health; Kaiser Permanente; Lovells; Bridgestone; Ogilvy & Mather; Harvard University; Guinness World Records; US Securities and Exchange Commission; and NASA use Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT costs. Accellion file sharing solutions can be deployed in public, private and hybrid cloud environments and provide the ease-of-use business users need while giving the enterprise organization the flexibility, scalability and protection it needs. For more information please visit www.accellion.com or call (650)-485-4300. Follow Accellion's Blog, Twitter, Facebook and LinkedIn.

About ISMG:

Information Security Media Group publishes BankInfoSecurity, CUInfoSecurity, GovInfoSecurity, HealthcareInfoSecurity, InfoRiskToday, DataBreachToday and CareersInfoSecurity. These digital media sites offer news, views, research and education on the top industry, security, regulatory and technology challenges facing information security leaders worldwide. Each site is guided by an advisory board of renowned thought-leaders from business, government and education.

ISMG's suite of educational webinars offers hands-on training by knowledgeable practitioners and is available to individual and corporate subscribers.

ISMG's custom research, including the Healthcare Information Security Today, Faces of Fraud and Cloud Computing Security surveys, is routinely featured at leading industry events, such as RSA Conference and BAI Payments Connect.



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.