The use of laptops and smart phones is growing - and so exponentially, are mobile breaches. To protect highly sensitive corporate data, CIOs need to take risk strategies more seriously. These include centralized management, auditing and reporting, and policy enforcement.
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Managing Mobile Menaces
1. Managing Mobile Menaces A Strategy for Managing Mobile Risks By Nalneesh Gaur, CISSP [email_address] Diamond Management & Technology Consultants
2. Mobile Technology Space is Crowded Wide Area (CDMA, WiMax, 3G) Plugged Special Purpose Connectivity Multi- Purpose Device Tablet PC Smartphone PDA Memory stick Local Area (Wi-Fi, BT) Digital Camera Notebook PC Mobile technology refers to the plethora of portable solutions that enable organizations to conduct business from anywhere at anytime Mobile Phone OnStar Next Slide MP3 Player GPS Slide 2
3.
4.
5.
6. Combat Mobility Risks with MTRS Next Slide Slide 6 M obile T echnology R isk S trategy (MTRS) Governance Execution Roadmap Business Case Security Require-ments
7.
8.
9.
10.
11.
12.
13.
14. Questions? Click on the questions tab on your screen, type in your question (and name if you wish) and hit send.