CISO Dallas Summit | October 11, 2018 | Dallas, TX, USA

session


Share:

How to Protect Your Enterprise Across the Entire Spectrum of Mobile Risk

Executive Boardroom - 11:15 am - 11:40 am

Mobile devices have access to a treasure trove of enterprise data - yet, unlike fixed endpoints such as PCs and servers that are protected using a host of endpoint security, vulnerability management and perimeter-based secure web gateways and firewalls, most enterprises today have a blind spot when it comes to accounting for mobility in their security plans. Providing adequate protection begins with taking an accurate inventory of risks and their relative importance across the various vectors exposed by a mobile device. Here, we will overview such risks by categorizing them across the application, content, device and network vectors, together with examples of how exploits actually occur and some best practices that enterprises should consider in securing mobility. 

Key takeaways: 

  1. Mobile devices pose a significant risk to enterprise data and as such needs a comprehensive security strategy 
  2. Mobile risk presents itself across multiple threat vectors including applications, web and content, device and network

Sponsored by:

Lookout

Lookout View details

 
 

, , View details