190 likes | 524 Views
The Global Enterprise Mobility Community. The Five Myths of Enterprise Mobility Tuesday 6 th March, 2012 10am - 11am (GMT) with Sharon Clancy, Editor-in-Chief of the Enterprise Mobility Network, Nick McQuire, Principal Analyst at IDC and Andrew Moloney, Security Expert and
E N D
The Five Myths of Enterprise Mobility Tuesday 6th March, 2012 10am - 11am (GMT) with Sharon Clancy, Editor-in-Chief of the Enterprise Mobility Network, Nick McQuire, Principal Analyst at IDC and Andrew Moloney, Security Expert and CEO at Artisan Consulting.
10.00-10.10am Welcome & introductions by Sharon Clancy 10.10-10.20am Introduction to the Enterprise Mobility Network 10.20-10.45am Interview with Sharon Clancy, Nick McQuire and Andrew Moloney 10.45-10.55amQ&A 10.55-11.00am Closing remarks
Nick McQuire, Research Director, IDC Andrew MoloneyCEO, Artisan Consulting
Nick McQuireResearch Director, IDC Sharon Clancy,Editor-in-Chief, Enterprise Mobility Network Andrew MoloneyCEO, Artisan Consulting
The Five Myths of Enterprise Mobility Nick McQuireResearch Director, IDC
The Five Myths of Enterprise Mobility • Companies can afford to wait until technology has stabilised before deploying a mobility strategy
The Five Myths of Enterprise Mobility • Increased mobility for workforces means increased risk of security breaches • The consumerisation of IT is having no impact on sectors that use rugged mobile devices
The Five Myths of Enterprise Mobility • A Mobile Device Management strategy is an optional extra, not an essential tool • Enterprises can manage mobility in-house behind the firewall without outsourcing to a cloud-based platform
Nick McQuireResearch Director, IDC Sharon Clancy, Editor-in-Chief, Enterprise Mobility Network Andrew MoloneyCEO, Artisan Consulting
Why Enabling your Mobile Workforce may actually make you more Secure Andrew MoloneyCEO, Artisan Consulting
Identifying the risks Getting a handle on your information A holistic assessment of your information security posture Risk brought about by process Risk brought about by practice
Five Steps to Improving Mobile Security • Define your “Playground” • Put a basic mobile policy in place • Put in place a basic Mobile Device Management (MDM) platform • Apply some basic security controls • Assert identity
How “Going Mobile” can improve information security • Encryption • Geolocation • Biometrics • OTP (One Time Passcode/ Password) • OOB (Out of Band) • Secure Element
FIVE KEY REMINDERS 1. Assess how Information is already at risk in your business - through Process - through Practice 2. Don't assume that broader market trends will not impact your business - plan accordingly 3. Think holistically about “End Points”- extend systems, policies, process and strategies to encompass them 4. Think holistically about the broader security benefits 5. Don't Panic. The sky isn't falling...
Thank You! www.enterprisemobilitynetwork.com