Network World Presents: BYOD/MDM - Chicago
 
June 28, 2012
7:15 am - 8:15 amRegistration and Continental Breakfast
8:15 am - 8:30 amWelcome and Opening Remarks
Robin Layland, Contributing Writer, Network World Challenge Series; President, Layland Consulting
8:30 am - 9:15 amEmbracing the Mobile Imperative
Robin Layland, Contributing Writer, Network World Challenge Series; President, Layland Consulting

Mobility in the enterprise -- and our daily lives -- is here to stay, and its footprint and influence is expanding. What does the broader mobile environment look like? What are the drivers, benefits and challenges of the BYOD/COPE craze? There are numerous enterprise mobility management approaches available (and still emerging!) for handling BYOD, COPE and other challenges. All, of course, have their advantages and tradeoffs. Generally, how do they stack up against one another?

Join us for this session to gain insight into proactive steps you can take to embrace the mobile future, secure your environment and adapt to future growth.
 
9:15 am - 10:00 amSimplifying Enterprise Mobility: BYOD Style
Jason Herman, Account Executive, AirWatch
 
According to a recent study conducted by an AirWatch partner, 40 percent of workers use personal devices to access business content.  For companies considering implementing a BYOD policy, they must consider their options carefully.  Join us as we explore what to look for in flexible models for asset management, policy enforcement, and distribution of profiles and apps based on device ownership.
 

10:00 am - 10:30 amRefreshments and Networking Break
10:30 am - 11:00 amManaging the Brave New World of Mobile Diversity
Jason O'Sullivan, Senior Director, Technology, Classified Ventures

To get a handle on the increasingly diverse mobility requirements of its employees, Classified Ventures developed an articulate plan to scope the issue, align resources, develop policy and execute in a way that offers flexibility yet mitigates risk and security vulnerabilities. The company’s mobile initiative – designed to give its online businesses a competitive edge in operations as well as recruiting talent – includes laptops, tablets smart phones, and data plans. On the agenda next: provisioning virtual desktops, building an internal app store and deploying an MDM platform. In this session, get a behind-the-scenes look at how Classified Ventures integrated key tools and services so far, and hear what’s in store for the company’s mobile future.

11:00 am - 11:45 amBYOD and Enabling Mobility for All
Jerry Gosnell, Customer Solutions Director - Enterprise Mobility, SAP
Organizations are permitting, and even encouraging employees to bring their own mobile devices into the workplace to be used for work purposes. This trend is shifting how devices are procured, paid for, managed and supported.  While many organization may look to BYOD as a way to lower the cost of enterprise mobility, the true value should be placed on bringing productivity and communications advantages to a much broader group of employees, thereby enabling ‘mobility for all’.  Join us for this session to learn how SAP, a global company with over 40,000 mobile devices in use, has realized significant business benefit from mobilizing employees around the globe and embracing BYOD policies in over 10 countries. Driven by the consumerization of IT and the company’s mobile-solution focus, SAP offers all employees the option to use either a corporate-owned or personally owned mobile device for work. Learn from SAP’s firsthand expertise, and explore the importance of mobile applications when defining your BYOD strategy.
 
11:45 am - 12:20 pmEnterprise Mobility Management Done Right: A Panel Discussion
Douglas Darch, CEL Practice Group Chair, Baker & McKenzie LLP
Brian Kemper, Director, IT Strategy, Hospira, Inc.
Marc Varner, Senior Director, Global Information Security, McDonald's Corporation
Robin Layland, Contributing Writer, Network World Challenge Series; President, Layland Consulting

Sometimes the best enterprise advice comes from those who’ve aggressively adopted diverse mobile device management policies, or those who haven’t for important reasons, or those who’ve bumped into a few walls along the way — and especially those who can share what went right and wrong that can benefit others. Don’t miss this revealing discussion chock full of inside stories and critical tips.

12:20 pm - 1:30 pmLunch with Hosted Table Discussions
 
•  Who’s Really In Charge?  Join us as we discuss the competing priorities of BYOD. - Absolute Software 
•  Simplifying Enterprise Mobility: BYOD Style - AirWatch
•  Securely Mobilizing Non-Native Enterprise Applications - Array Networks
•  Defining a Secure BYOD Policy for Devices & Applications - Dell SonicWALL
•  Mobile App Strategies in a BYOD World - SAP
1:30 pm - 2:15 pmHow You Can Achieve BYOD Without Compromise
Tom Wilburn, Vice President of Worldwide Mobility Sales , Cisco
 
As smartphones become smarter, tablets become the norm, and wireless Internet access becomes ubiquitous, the practice of BYOD is gaining traction.  Companies big and small across many different industries are turning to these technologies to create innovative new business offerings to attract customers and enable greater flexibility and productivity in the workforce.  These innovations used to come with compromise, often forcing IT to relinquish control or loosen security standards.  But today, new wireless technologies enable IT to truly embrace BYOD without compromise.  Join us for this session as we explore mobility and security advancements that will dramatically shape the enterprise and drive further growth and innovation.
 
2:15 pm - 2:45 pmBest Practices with MDM in a BYOD World
Tim Williams, Director of Product Management, Absolute Software

When organizations choose client management tools for desktops and laptops, they don't typically need to re-evaluate them for three or four years. So why is it that the MDM solution you chose six months ago already seems outdated?  Is it even possible to choose a tool that can keep up with all the changes?  Join us for this session as we explore best practices in this fast-moving area.

Beyond MDM: Securely Mobilizing Non-Native Applications for Safe and Seamless BYOD
Lior Rapaport, Product Line Manager, DesktopDirect, Array Networks, Inc.
 
The consumerization of IT is in full swing.  Employees want tablet access to business applications, often from personal mobile devices.  Standing in the way is a lack of native support for key enterprise applications and the risk of directly connecting personal devices to the corporate network.  Join us for this session as we discuss ways to seamlessly ‘mobilize’ any enterprise application and how to keep personal devices ‘off-network’ to eliminate the potential for attack and data leakage.
 
BYOD Ate My Network, But My Next Generation Firewall Saved it
Eric Crutchlow, Senior Product Manager, Dell SonicWALL
 
Allowing or even requiring users to choose their own network access devices has become an irreversible trend.  While BYOD offers cost benefits and potential productivity enhancements, IT is painfully aware of the security, bandwidth and support challenges that come with it.  To embrace the challenge, companies are turning to next-generation firewalls to enable and secure this trend.  Join us for this session to hear how mid-market organizations have successfully taken on BYOD with next-generation firewalls.
 
2:45 pm - 3:15 pmRefreshments and Networking Break
3:15 pm - 3:45 pmEstablishing Corporate Mobile Device Policies
Scott P. Seder, Attorney at Law, Roberts McGivney Zagotta LLC

Every organization’s mobile requirements are different. How do you determine the right set of mobile policies for your situation? Are BYOD programs worth the trouble, and how can IT incorporate them while still maintaining control?

In this session, you’ll learn the differences between managed devices and managed environments, and how you can implement a framework to identify the right policies for your organization.

Assessing Organizational Risk and Security with Mobile Device Use
Marc Varner, Senior Director, Global Information Security, McDonald's Corporation

Securing any part of IT first involves a collaborative assessment of the organization’s risk tolerance -- not only from a risk perspective, but to also understand what the business is trying to accomplish.  For the effort to be successful, this requires a proactive approach of engaging the business early and often, and a willingness to engage constituents you may not have been working with traditionally.  From there, organizations can better understand the resources they need to move forward in building policies, establishing budgets, creating user agreements, identifying sanctioned mobile platforms, and more.

In this session, you’ll learn how to use your organization’s appetite for risk as the foundation of your enterprise mobility management policy.
 
Mobile Apps: Deploying, and Managing Them

With new mobile form factors come the cries for corporate apps that are mobile-friendly. But how do you securely provision and maintain them?

Join this session to understand the notion of enterprise app stores and how to tackle a few important deployment decisions up front that will save pain and aggravation down the road.

3:45 pmConference Concludes
Robin Layland, Contributing Writer, Network World Challenge Series; President, Layland Consulting