TMC's SecureIT Conference Locks in BYOD Program
TMC's (News - Alert) new security conference sets agenda to focus on protecting the multi-device enterprise environment
Norwalk, CT-April 24, 2013-TMC today announced programming for its SecureIT Conference
to take place on Tuesday, July 23, 2013 at the NYU Kimmel Center in New York City. This intense one-day event will bring together leading industry experts, solutions providers, end users and IT professionals to learn cutting-edge industry trends and practices to ensure critical information and communication assets are protected amidst the Bring Your Own Device (BYOD) peak.
"As BYOD becomes the norm in enterprises, it is essential for companies to be aware and armed with the information they need to combat potential security threats to their systems," said Rich Tehrani (News
), TMC CEO and conference chairman. "In an age where a single malware family dubbed BadNews has rapidly infected over 9 million Android devices, we believe the SecureIT Conference is the best resource for industry security information to combat such threats."
The BYOD trend and related developments, such as virtualization and the cloud, have generated higher risk levels in enterprises. As a result, it is imperative for companies to provide enterprise security knowledge and tactics to their IT professionals. TMC's SecureIT Conference will hit a host of hot topics in the world of BYOD, focusing on ways to protect organizations' people, devices, apps and business processes. Sessions will approach the BYOD phenomenon from multiple aspects including:
Why BYOD Requires New Ways to Cover Your Assets
BYOD and Enterprise Security - "Bring Your Own Destruction?": IT professionals' roles in risk management have increased, although they lack the visibility, tools, policies and rules and support at all levels to do so effectively. What are the personal and competitive requirements?
How the Bad Guys View Your Enterprise and Its Targets of Opportunity: This panel explores how BYOD has changed enterprise security, providing easier access to bad actors with intentions to exploit. It examines why they go after what they do and their weapons of choice.
Identity is the New Perimeter: Who are You and What are You Using?: Explore the evolution of identity authentication post-BYOD where firewalls, antivirus and malware protection are no longer sufficient.
Moving from Mobile Device Management to Mobile Applications Management-Do You Really Know What is Out There and How It Can be Managed?: Building on the issues surrounding identity, the panel will provide perspectives on the challenges of identity separation and focus on solutions as to who and how the confluence of people, devices and apps can and should be managed.
Why are We Purposely Exposing Ourselves? How Unprotected File Transfers Invite Disaster: Find out how to assure your company does not fall victim to "reply to all" problems and other issues related to the safe sending of files from any device to any device.
Protecting Data Integrity: Find out why Metadata Framework technology is a preferred choice for making decisions and managing access controls, and appropriate use for securing the data that BYOD pervasiveness is helping exponentially increase.
BYOD and the Cloud-Friend and/or Foe?: A diverse panel will discuss the pros and cons of the cloud as both facilitator of what has in fact become somewhat of a problem known as "applications creep," but also as a viable solution for IT regaining control.
BYOD and the Secure Network Connection: Learn about the security challenges associated with BYOD and the significance of IT professionals' role in implementing policies and rules to protect against security threats.
Encryption and Certificates-Who is Minding the Keys?: A diverse panel of industry experts will provide perspectives and recommendations as to what you need to consider to assure that your security measures are being optimized instead of compromised.
CIO/CSO Roundtable-Reestablishing IT Centrality: CSOs and CIOs will discuss their views on: how to meet rapidly changing circumstances as they seek to balance BYOD management mandates and simultaneously keep their companies safe; BYODs and compliance; obtaining executive- and enterprise-wide buy-in on investing in security; getting users to understand and follow BYOD best practices and adhere to corporate policies and rules.
TMC's SecureIT Conference is supported by platinum sponsor Cisco (News
To become a sponsor, please contact TMC's Dan Gold
at 203-852-6800 x105.
For the latest SecureIT Conference news, updates and information, follow the event on Twitter (News
) at @SecureITexpo
TMC is a global, integrated media company that supports clients' goals by building communities in print, online, and face to face. TMC publishes multiple magazines including Cloud Computing
, M2M Evolution
, and Internet Telephony
. TMCnet is the leading source of news and articles for the communications and technology industries, and is read by as many as 1.5 million unique visitors monthly. TMC produces a variety of trade events, including ITEXPO
, the world's leading B2B communications event, as well as industry events: 3D Printing Conference & Expo; Asterisk (News
) World; AstriCon; ChannelVision (CVx) Expo; Cloud4SMB Expo; DevCon5 - HTML5 & Mobile App Developers Conference; M2M Evolution Conference & Expo; Mobile Commerce Zone Conference & Expo; SecureIT; Small Cell Summit, StartupCamp; Super Wi-Fi Summit; SIP Trunking-Unified Communications Seminars; Wearable Tech Conference & Expo; WebRTC Conference & Expo; and more. Visit TMC Events
for additional information.
Media and Analyst Contact:
Edited by Alisen Downey
[ Back To TMCnet.com's Homepage ]