Network World Presents: BYOD/MDM - DC
 
Tuesday, October 2, 2012
7:15 am - 8:15 amRegistration and Continental Breakfast
8:15 am - 8:30 amWelcome and Opening Remarks
Robin Layland, Contributing Writer, Network World Challenge Series, and President, Layland Consulting
8:30 am - 9:15 amEmbracing the Mobile Imperative
Robin Layland, Contributing Writer, Network World Challenge Series, and President, Layland Consulting

Mobility in the enterprise -- and our daily lives -- is here to stay, and its footprint and influence is expanding. What does the broader mobile environment look like? What are the drivers, benefits and challenges of the BYOD/COPE craze? There are numerous enterprise mobility management approaches available (and still emerging!) for handling BYOD, COPE and other challenges. All, of course, have their advantages and tradeoffs. Generally, how do they stack up against one another?

Join us for this session to gain insight into proactive steps you can take to embrace the mobile future, secure your environment and adapt to future growth.
 
9:15 am - 10:00 amBring Your Own Design: Implementing BYOD Without Going Broke or Crazy
Eric Stresen-Reuter, Technical Director, Ruckus Wireless

When it comes to BYOD, few companies want to implement every bell and whistle because (a) they don’t have time, (b) they don’t have the skilled staff, (c) they don’t have the budget, (d) they don’t see the need, or more likely, (e) all of the above. Since Wi-Fi takes center stage in any BYOD initiative, the good news is most organizations already have the right network components to address their BYOD basics without having to purchase more network equipment. This session will focus on how to simply address BYOD issues without a lot of pain and anguish. Topics will include identifying and managing devices, providing simple device security and access, role-based access, and visibility.
 
10:00 am - 10:30 amRefreshments and Networking Break
10:30 am - 11:00 amBuilding a Mobile Enterprise that’s Secure, Flexible and Effective
Seth Kaplan, CTO, Molina Healthcare
For several years, Molina Healthcare had a well-controlled mobile strategy. But the advent of smart phones and tablets, and a growing corps of employees asking to use them, called for a new plan. So the healthcare provider carefully mapped out and implemented an initiative that manages risk and protects privacy while giving choice to its more than 5,000 employees. In this session, hear how Molina Healthcare crafted and adopted new policies, assessed and chose suitable technologies, and created a mobile enterprise that helps it more effectively serve nearly 4.3 million individuals and families.
 
11:00 am - 11:45 amHow You Can Achieve BYOD Without Compromise
Paul Durzan, Director of Business Development, Cisco
 
As smartphones become smarter, tablets become the norm, and wireless Internet access becomes ubiquitous, the practice of BYOD is gaining traction.  Companies big and small across many different industries are turning to these technologies to create innovative new business offerings to attract customers and enable greater flexibility and productivity in the workforce.  These innovations used to come with compromise, often forcing IT to relinquish control or loosen security standards.  But today, new wireless technologies enable IT to truly embrace BYOD without compromise.  Join us for this session as we explore mobility and security advancements that will dramatically shape the enterprise and drive further growth and innovation.
 
11:45 am - 12:20 pmEnterprise Mobility Management Done Right: A Panel Discussion
Robert Duffy, Chief Information Officer, Department of Homeland Security, Office of Inspector General
Martin Gomberg, Global Director I.T. Governance, Security and Business Protection, A&E Television Networks
Jerry Hermes, Chief Information Officer, Navy Federal Credit Union
Seth Kaplan, CTO, Molina Healthcare
Mike Uwe Dickersbach, Vice President, Information Technology, Thayer Lodging Group
Robin Layland, Contributing Writer, Network World Challenge Series, and President, Layland Consulting

Sometimes the best enterprise advice comes from those who’ve aggressively adopted diverse mobile device management policies, or those who haven’t for important reasons, or those who’ve bumped into a few walls along the way — and especially those who can share what went right and wrong that can benefit others. Don’t miss this revealing discussion chock full of inside stories and critical tips.

12:20 pm - 1:30 pmLunch with Hosted Table Discussions

•  Who's Really in Charge? - Absolute Software
•  BYOD without Compromise - Cisco
•  BYOD Security, Compliance & Risk Management - Fixmo
•  Embracing BYOD in the Enterprise - Novell
•  Optimizing RF Performance - Ruckus Wireless

1:30 pm - 2:00 pmBest Practices with MDM in a BYOD World
Geoff Glave, Senior Product Manager, Absolute Software

When organizations choose client management tools for desktops and laptops, they don't typically need to re-evaluate them for three or four years. So why is it that the MDM solution you chose six months ago already seems outdated?  Is it even possible to choose a tool that can keep up with all the changes?  Join us for this session as we explore best practices in this fast-moving area.
Embracing BYOD in the Enterprise
Mitch Lauer, Director of Business Development, Novell

More than ever, employees are using their personally-owned devices and computers to get work done at home, on the road and even in the office. And for good reason--employees report being more productive and satisfied when they can work on their own devices. However, IT departments and CIOs report being more concerned about security threats and the increased management burden these devices often bring. Attend this session to learn how, with the right tools and policies, your organization can start down the path to embracing BYOD. You'll also walk away with prudent steps you can take to balance productivity with security while minimizing IT burden.

2:00 pm - 2:30 pmRefreshments and Networking Break
2:30 pm - 3:00 pmBYOD Security and Compliance: Understanding the Threats and Mitigating the Risks
Daniel Ford, Chief Security Officer, Fixmo

With the proliferation of mobile devices and apps, organizations are being exposed to a growing range of vulnerabilities, security threats and operational risks. In addition to physical loss and theft, mobile devices are quickly becoming a primary attack vector for cyber criminals and a growing source of corporate data leakage and compliance policy violations. This session will present an emerging methodology for assessing and identifying the vulnerabilities and exposures that exist on different mobile devices, and steps that can be taken to mitigate and manage the associated risks of corporate data leakage, privacy loss, cyber attacks and regulatory compliance breaches.
3:00 pm - 3:30 pmCorporate Policies on Mobile Devices: A Legal Perspective
Scott P. Seder, Attorney at Law, Roberts McGivney Zagotta LLC

Many companies are still in the early stages of determining their mobile device strategies. Crucial to a successful implementation is understanding how mobile devices will impact day-to-day operations, external and internal communications, privacy, access and more – and then establishing policies that provide the right balance of governance and flexibility to establish a successful mobile initiative. In this session, learn about the ramifications of BYOD, and learn how you can implement a framework to identify the right policies for your organization.

3:30 pmConference Concludes