Mobile devices, whether company owned or personally owned (BYOD), have become the preferred endpoint for most companies. Tablets and smartphones outnumber desktops and laptops. Since many attacks originate through weaknesses in the endpoints, these mobile devices must be better controlled.
This series reviews the latest methods for securing mobile endpoints. Topics of discussion will likely include:

Topics

  • Mobile device management
  • Encryption
  • Compartmentalization
  • Virtual desktop
  • Mobile application validation

Date & Time

November 18, 2015 | 8:00 AM – 12:00 PM

For more information, contact Lisa Prickril at prickrill@ballardspahr.com.

Register