CSO Perspectives Seminar on Mobile Security
 
05/15/2012
7:30 am - 8:30 amRegistration and Networking Breakfast
8:30 am - 8:45 amOpening Remarks
Bob Bragdon, Publisher, CSO magazine
8:45 am - 9:45 amEnabling a Secure Mobile Environment for the State of Illinois
Rafael Diaz, CISO, The State of Illinois
There are many reasons state governments take a positive view when enabling mobility for state employees and constituents.  Whether it’s providing more access to government services for citizens, or developing more cost-effective business processes and service models, or capitalizing on the myriad third-party providers providing mobile services, or simply eliminating paper, the benefits of providing a modern, mobile-enabled environment are substantial.  But so are the challenges.  Privacy and confidentiality present key challenges.  So do the special considerations for first responders in public safety and emergencies.  Join us as we explore the variety of unique challenges government faces when enabling a secure mobile environment.
 
View Presentation

9:45 am - 10:15 amMobile Application Security: Why Mobile Apps Could Be Our Worst Enemy
Ryan English, Director, Application Security Testing Services, HP
 
Mobile apps are the hottest thing in IT these days.  They’ve rapidly emerged for a range of constituents including the enterprise, consumers, sales reps, boards of directors -- and even infants.  In the last 12 months alone, more than 400,000 mobile applications have been launched, and many of them were created by marketing teams -- not engineering groups.  All of this means that security professionals need to be savvy about the threats they pose.  Join us for this session as we explore mobile application security essentials.  We’ll examine the the three key layers that make up a mobile application, along with the top ten mobile app vulnerabilities that have surfaced in the last two years.
 
View Presentation

 
10:15 am - 10:45 amNetworking Break
10:45 am - 11:25 amSecuring Information Assets in an Insecure Mobile World
Brian Hengesbaugh, Partner, Baker & McKenzie
 
As the consumerization of IT accelerates and more mobile devices attach to corporate networks, organizations are bumping up against legal pitfalls involving how they can potentially (an unintentionally) exceed authorized access and unknowingly violate cross-border laws and the Computer Fraud and Abuse Act. Join us for this session to get a top legal expert's view on the practical legal steps any business should take to protect itself from mobile security threats and related pitfalls.
 
View Presentation

 
11:30 am - 12:00 pmAchieving Success with a Flexible Workplace
Peter Tosto, Global Portfolio Strategist, IBM Security Services
 
Today’s workers increasingly meet, share, discover and get work done with technology.  In this hyper-connected world, employees expect to work from anywhere, at any time, with any device. That said, the flexible workplace creates significant security risks because of this expanded, multi-device access.  Nonetheless, it also provides new tools and technologies -- like virtualization -- that can make the workplace far more secure than before.  The challenge for security professionals is balancing this promise of greater productivity, innovation and increased access with the security concerns that come with it.  Join us as we explore what flexible workplace enablers are doing successfully, and how their actions are resulting in increased productivity and cost reduction.
 
View Presentation

 
Mobile is Here to Stay, So Here’s How to Be Ready
Dean Weber, Director and CTO, CyberSecurity, CSC
 
Our business technology consumers are demanding access to corporate data from devices that we have little control over, against an unknown security posture, and with questionable applications downloaded from untrustworthy sources.  Moreover, as more and more organizations are targeted by sophisticated, automated and coordinated attacks, the challenges continue to increase across the emerging threat landscape now including mobile.  Traditional efforts to head off these threats are too often accomplished with narrow approaches of various bolt-on point solutions across antivirus, firewall, intrusion prevention, and single sign-on.  The onslaught of mobile devices adds yet another attack surface, and one far weaker than the traditional computing platforms we use for access to our corporate networks.  Join us for this session to learn about how to control these risks by restricting what these devices can access based on risk appetite.  We’ll also examine CSC’s enterprise situational awareness capability that enables an organization’s current security components to be integrated for a centralized view of their mobile exposure, security-related practices, processes, events, and alerts — all presented in an actionable and consolidated dashboard.
 
View Presentation

 

 

12:00 pm - 1:15 pmNetworking Lunch with Discussion Tables

Join a moderated discussion table to share strategies and connect with your peers to hear how they're resolving the same issues with which you grapple every day.

BYOD within the Enterprise: Taking control and benefiting from implementation
Like it or not, your users are demanding access to internal resources on non-company-owned devices.  We’ll discuss how companies are dealing with those demands and finding a good balance between keeping users happy while keeping with security policy.
Hosted by Entrust

Mobile Device Vulnerabilities and Exposures: Understanding the Threats and Mitigating the Risks
While many people talk about mobile devices as being vulnerable and insecure, most IT professionals do not fully understand what those vulnerabilities and exposures are, or how they can effectively identify them within their own environment and protect themselves against exploits. This discussion will focus on the emerging methodology for assessing and identifying the vulnerabilities and exposures that exist on different mobile devices and operating systems
Hosted by Fixmo
 
Moving Your Email Securely to the Cloud
Archiving in the cloud is rapidly growing in popularity and offers a variety of benefits that are attractive to companies of all sizes and all industries. Join us and find out how to be sure you are truly protected from a legal, compliance and security standpoint.
Hosted by Perimeter E-Security 

1:15 pm - 2:00 pmTaming the Chaos of Mobile Security and Consumerized IT: A Panel Discussion
Jim Huddleston, Director, Global IT Risk Management, Publicis Groupe
David C. Ogbolumani, Director, Global IT Security, Kellogg Company
Marc Varner, Senior Director, Global Information Security, McDonald's Corporation
Jeffrey Wright, CSO, Allstate Insurance Company
Bob Bragdon, Publisher, CSO magazine

CSOs are up to their eyeballs with the onslaught of mobile devices. Employees want to open their iPads to corporate applications with 4-digit pin authentication. The pressure is turning security frameworks, end-user computing and application development worlds on their heads. Join us for an enlightening discussion on bringing order and reason to the brewing chaos.

2:00 pm - 2:30 pmA Case for BYOD: Policing What’s Not Yours
David Lowe, Vice President, Enterprise Sales, Samsung Telecommunications America
 
A recent survey reveals that two-thirds of businesses that allow personal devices to be used at work don’t have a formal policy in place to manage them.  With sensitive data residing on most corporate devices, the absence of policy exposes the organization to considerable risks.  But with employees demanding to use the device of their choosing, how should businesses balance the desires of their employees with the need to maintain corporate security?  Join us as we examine the opportunities and challenges of the BYOD workplace and provide real-world examples of companies and industries that have successfully -- and sometimes unsuccessfully -- secured employee-owned mobile devices used in corporate settings.
 
View Presentation

 
2:30 pm - 3:00 pmWhere's Our Data Now?
Jeffrey Wright, CSO, Allstate Insurance Company
For some large enterprises, the allure of BYOD programs and the flexibility they give a workforce with diverse needs and work habits have been just too appealing to pass up.  But as the learning curve evolves, so do the challenges that surface when application security and data resident on a long list of various devices pose threats.  Join us for this case study revealing 20/20 hindsight on the dos and don’ts of BYOD, and how one company has taken steps to reign in and right size their approach.
 
View Presentation

3:00 pm - 3:45 pmMobile Device Lessons Learned
Jim Huddleston, Director, Global IT Risk Management, Publicis Groupe
 
As many organizations seek a logical path in wrestling with the onslaught of new devices attaching to the enterprise, many global companies have learned some early and valuable lessons.  For global advertising giant Publicis and their 50,000 employees, the challenge is unfolding in two ways.  On the one hand, they need to continuously grapple with how new devices will be used in a business context along with the many new ways needed to support them.  On the other, they must enable development platforms to create customer advertising solutions requiring visibility on the very same new and emerging devices.  All of this creates an atmosphere of urgency, combined with cautious, careful steps through policy, mobile device management, and particularly through customer information controls, protection and security.  Join us for this session and learn how they’re not only fulfilling this tall order, but how they’re planning ahead.
 
View Presentation

 
3:45 pm - 4:00 pmClosing Remarks and Conference Concludes
Bob Bragdon, Publisher, CSO magazine