The risks associated with employees now bringing their own smartphones, tablets and mobile storage devices to the job remain a topic on the minds of every information security professional in nearly all organizations.

While much has been and will continue to be written on this topic, risk management strategies by many CISO’s are still too often trying to develop defenses that reject this trend rather than trying to find ways to embrace this trend as a means to cut costs and improve productivity.

In an exclusive case study now being offered in a webinar format, Intel CISO Malcolm Harkins details the security challenges and business opportunities of BYOD. And, he explains how the move forced the company to re-think enterprise security to accommodate employees’ smart phones, tablets and other mobile devices.

By attending this webinar, you will learn how to:

•           Involve employees in developing an effective mobile policy;

•           Create a layered security approach to manage the risks;

•           Build the BYOD business case and calculate ROI

This webinar is offered on two (2) separate dates:  Tuesday – October 23, 2012 (3:30 PM Eastern) and Monday – November 26, 2012 (10:00 AM Eastern)

Click here to register and learn more details.

If applicable, please pass this information along to those privacy, network security, risk management and information security team members in your organization.

Pin It on Pinterest