BYOD and Clouds: "The Perfect Storm" (Part 2) - A Politics of Security Webcast
September 19, 2013
This webcast series examines how BYOD and cloud computing are fundamentally changing traditional security models by allowing personal devices beyond IT control to enter the perimeter and interact with internal systems. The security and compliance implications of this are significant and organizations are often uncertain of the path to take to ensure minimal risk to their environment.
Part 2 of this series covers:
- The risks and safeguards related to cloud storage repositories
- Mobile application risks
- Mobile application security in an ‘any device/any channel’ engagement model