Network World's BYOD & Mobility Management Tech Seminar - Houston
 
Thursday, October 4, 2012
7:15 am - 8:15 amRegistration and Continental Breakfast
8:15 am - 8:30 amWelcome and Opening Remarks
Robin Layland, Contributing Writer, Network World Challenge Series, and President, Layland Consulting
8:30 am - 9:15 amEmbracing the Mobile Imperative
Robin Layland, Contributing Writer, Network World Challenge Series, and President, Layland Consulting

Mobility in the enterprise -- and our daily lives -- is here to stay, and its footprint and influence is expanding. What does the broader mobile environment look like? What are the drivers, benefits and challenges of the BYOD/COPE craze?

There are numerous enterprise mobility management approaches available (and still emerging!) for handling BYOD, COPE and other challenges. All, of course, have their advantages and tradeoffs. Generally, how do they stack up against one another? Join us for this session to gain insight into proactive steps you can take to embrace the mobile future, secure your environment and adapt to future growth.
 
 
9:15 am - 10:00 amBring Your Own Design: Implementing BYOD Without Going Broke or Crazy
Jeanette Lee, Sr. Technical Marketing Engineer, Ruckus Wireless
 
When it comes to BYOD, few companies want to implement every bell and whistle because (a) they don’t have time, (b) they don’t have the skilled staff, (c) they don’t have the budget, (d) they don’t see the need, or more likely, (e) all of the above. Since Wi-Fi takes center stage in any BYOD initiative, the good news is most organizations already have the right network components to address their BYOD basics without having to purchase more network equipment. This session will focus on how to simply address BYOD issues without a lot of pain and anguish. Topics will include identifying and managing devices, providing simple device security and access, role-based access, and visibility.
 
 
10:00 am - 10:30 amRefreshments and Networking Break
10:30 am - 11:00 amManaging the Brave New World of Mobile Diversity
Link Alander, Vice Chancellor and CIO, Lone Star College System

At Lone Star College, students are bringing in every type of mobile device – from laptops to smart phones to tablets – and the university has to be ready to accommodate them. In addition, the university also has been rolling out tablets in classrooms to be used as instructional tools. But this highly mobile environment, which is cultivating an open learning environment and academic freedom, must also be managed and secured. In this session, hear about the policies, technologies and security tactics the university is adopting to ensure it can mitigate risk while still empowering users to successfully work anywhere, anytime on any device.

11:00 am - 11:45 amHow You Can Achieve BYOD Without Compromise
Scott Gainey, Senior Director Products & Solutions Marketing, Security, Cisco
 
As smartphones become smarter, tablets become the norm, and wireless Internet access becomes ubiquitous, the practice of BYOD is gaining traction.  Companies big and small across many different industries are turning to these technologies to create innovative new business offerings to attract customers and enable greater flexibility and productivity in the workforce.  These innovations used to come with compromise, often forcing IT to relinquish control or loosen security standards.  But today, new wireless technologies enable IT to truly embrace BYOD without compromise.  Join us for this session as we explore mobility and security advancements that will dramatically shape the enterprise and drive further growth and innovation.
 
 
11:45 am - 12:20 pmEnterprise Mobility Management Done Right: A Panel Discussion
Link Alander, Vice Chancellor and CIO, Lone Star College System
Ron Dinwiddie, Senior Vice President, Information Technology, Houston Federal Credit Union
Michael Miller, Director of Information Technology, Energy Maintenance Services
Luis Oliveira, VP of IT, Ignite Restaurant Group
Robin Layland, Contributing Writer, Network World Challenge Series, and President, Layland Consulting

Sometimes the best enterprise advice comes from those who’ve aggressively adopted diverse mobile device management policies, or those who haven’t for important reasons, or those who’ve bumped into a few walls along the way — and especially those who can share what went right and wrong that can benefit others. Don’t miss this revealing discussion chock full of inside stories and critical tips.

12:20 pm - 1:30 pmLunch with Hosted Table Discussions

•  Who's Really in Charge? - Absolute Software
•  When is Your Device No Longer Yours? - Apperian
•  Onboarding - BlueCat Networks
•  BYOD without Compromise - Cisco
•  Embracing BYOD in the Enterprise - Novell
•  Optimizing RF Performance - Ruckus Wireless
•  Mobile App Strategies in a BYOD World - SAP
1:30 pm - 2:15 pmBYOD and Enabling Mobility for All
Steve Gallington, Mobility Visionary, SAP

Organizations are permitting, and even encouraging employees to bring their own mobile devices into the workplace to be used for work purposes. This trend is shifting how devices are procured, paid for, managed and supported.  While many organization may look to BYOD as a way to lower the cost of enterprise mobility, the true value should be placed on bringing productivity and communications advantages to a much broader group of employees, thereby enabling ‘mobility for all’.  Join us for this session to learn how SAP, a global company with over 40,000 mobile devices in use, has realized significant business benefit from mobilizing employees around the globe and embracing BYOD policies in over 10 countries. Driven by the consumerization of IT and the company’s mobile-solution focus, SAP offers all employees the option to use either a corporate-owned or personally owned mobile device for work. Learn from SAP’s firsthand expertise, and explore the importance of mobile applications when defining your BYOD strategy.
2:15 pm - 2:45 pmBest Practices with MDM in a BYOD World
Geoff Glave, Senior Product Manager, Absolute Software

When organizations choose client management tools for desktops and laptops, they don't typically need to re-evaluate them for three or four years. So why is it that the MDM solution you chose six months ago already seems outdated?  Is it even possible to choose a tool that can keep up with all the changes?  Join us for this session as we explore best practices in this fast-moving area.
Embracing BYOD in the Enterprise
Paul DePond, President and CEO, Novell
 
More than ever, employees are using their personally-owned devices and computers to get work done at home, on the road and even in the office. And for good reason--employees report being more productive and satisfied when they can work on their own devices. However, IT departments and CIOs report being more concerned about security threats and the increased management burden these devices often bring. Attend this session to learn how, with the right tools and policies, your organization can start down the path to embracing BYOD. You'll also walk away with prudent steps you can take to balance productivity with security while minimizing IT burden.
2:45 pm - 3:15 pmRefreshments and Networking Break
3:15 pm - 3:45 pmEnterprise Mobility: Five Best Practices for a Successful Mission
Alan Murray, SVP of Products, Apperian
 
With as many as three-quarters of employees now bringing their personal devices to work, the question companies are asking is no longer if they should support BYOD, but how. Apperian has helped many of the world’s largest corporations manage the full lifecycle of mobile apps securely, and we’ve established key strategies designed to answer that question. Join us in this session where we’ll share five best practices to follow and key steps to take to move your company’s mobility strategy forward.
BYOD is Real. Are You Ready?
Jason Davis, Senior Sales Engineer , BlueCat Networks

BYOD is here to stay. Today’s increasingly mobile workforce and the growing desire of employees to bring their own devices to work have led to an exponential increase in the number IP devices that IT must manage. The challenge for IT administrators is how to empower users of personal devices with network access without compromising security or overwhelming IT staff. Join BlueCat Networks for an informative presentation on how to prepare your network infrastructure for BYOD.
3:45 pm - 4:15 pmBuilding Policies, Security and Compliance for a Mobile Initiative
Asif Dhanani, Senior Director of Information Security and Compliance, Frac Tech Services International (FTSI)
Securing any part of IT first involves a collaborative assessment of the organization’s risk tolerance. From there, organizations can better understand how to build policies, implement security, create user agreements, identify sanctioned mobile platforms, and leverage MDM to manage and control their mobile environments. In this session, learn how FTS International, a leading provider of services for the oil and gas industry, is mapping its policies and security for a BYOD initiative that’s adding real business value.
 
 
4:15 pmClosing Remarks and Conference Concludes
Robin Layland, Contributing Writer, Network World Challenge Series, and President, Layland Consulting