Rolling Meadows, IL, USA (21 August 2013)—The mobile world is growing more complicated every day and enterprises need to adapt, prepare and respond. To help enterprises with mobile device management (MDM), ISACA, a global association of 110,000 IT professionals, is hosting a free virtual conference, Managing the Mobile Onslaught: Securing Endpoints to Apps, on Wednesday, 18 September 2013, from 7:45 a.m.-4:30 p.m. CDT (UTC-5).
**September Event Also Shares BYOD Guidance**
In this virtual conference, attendees will learn how to develop, manage and enforce a bring-your-own-device (BYOD) policy that protects enterprise data, while also meeting the requirements of evolving regulatory compliance and privacy rules.
In his keynote session, “Balancing the Corporate Risks and Rewards of Mobile Devices,” John Pironti, CGEIT, CISA, CISM, CISSP, CRISC, ISSAP, ISSMP, president of IP Architects, LLC, will examine the risk and reward associated with mobility and BYOD. He will explain how to implement a mobile device strategy that adheres to regulatory requirements and how to handle and recover critical data on a lost or exploited mobile device.
“As organizations and individuals embrace mobility for its diverse business benefits, they must take great care in its use to ensure that the privacy, security, and integrity of their valuable information assets are preserved,” said Pironti. “In this virtual conference, we will discuss how to strike a delicate balance and manage the risks that these powerful and useful devices introduce.”
Other educational sessions include:
*The Anatomy of an MDM Platform: Must Haves and Key Considerations, presented by Jack Madden, author of Enterprise *Mobility Management: Everything You Need to Know About MDM, MAM, and BYOD
*Mobile Application Management, presented by Jack Gold, founder and principal analyst, J. Gold Associates
*2013 Mobile Platform Update, presented by Lisa Phifer, President, Core Competence Inc.
During ISACA’s virtual conference, participants can attend these educational sessions, network with peers from around the world, and interact with exhibitors and sponsors in a virtual exhibit hall. Additionally, attendees can earn up to five free continuing professional education (CPE) hours.
To register for the event, visit www.isaca.org/elearning. To learn more about ISACA’s global events, visit www.isaca.org/conferences.
About ISACA
With more than 110,000 constituents in 180 countries, ISACA® (www.isaca.org) helps business and IT leaders maximize value and manage risk related to information and technology. Founded in 1969, the nonprofit, independent ISACA is an advocate for professionals involved in information security, assurance, risk management and governance. These professionals rely on ISACA as the trusted source for information and technology knowledge, community, standards and certification. The association, which has 200 chapters worldwide, advances and validates business-critical skills and knowledge through the globally respected Certified Information Systems Auditor® (CISA®), Certified Information Security Manager® (CISM®), Certified in the Governance of Enterprise IT® (CGEIT®) and Certified in Risk and Information Systems Control™ (CRISC™) credentials. ISACA also developed and continually updates COBIT®, a business framework that helps enterprises in all industries and geographies govern and manage their information and technology.
Participate in the ISACA Knowledge Center: www.isaca.org/knowledge-center
Follow ISACA on Twitter: https://twitter.com/ISACANews
Join ISACA on LinkedIn: ISACA (Official),
Like ISACA on Facebook: www.facebook.com/ISACAHQ
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.