Main Nav


The evolution of mobile devices shows no signs of slowing, and with each new generation, the devices become more efficient tools that employees increasingly rely on to conduct both their corporate and personal business. Apps that allow the user to access sensitive corporate data are prime targets for hackers and provide a wide range of access ports to data. Controlling security breaches of mobile devices is complex due to the varying software and device types. Additionally, many organizations have no restrictions on use of personal devices.

Mobile device security experts and practitioners will discuss the best approaches to this new and evolving challenge. Organizations who have developed successful mobile device security programs will share how they developed and gained management support for their plans.

Topics will include:

Understanding and controlling risks in an increasingly mobile world
Managing the human factor and increasing security awareness across the enterprise
User case studies
Benchmarking and metrics for a mobile security program
Current threat landscape, and what"s on the horizon

Who should attend?

Chief technology officers (CTO)
Chief security officers (CSO)
IT architects
Security architects
Cyber risk managers
Security analysts
Program managers

If you are interested in speaking at the 2013 Mobile Device Security Summit, please contact Jennifer Santiago, Summit Content Manager.

- Receive a discount of up to $500 for any full course paid for by Wednesday, November 28, 2012.
- Receive a discount of up to $250 for any full course paid for by Wednesday, December 12, 2012.
- No refunds available after Wednesday, December 19, 2012.