Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

BYOD and Clouds: "The Perfect Storm" (Part 2) - A Politics of Security Webcast

On September 19 at 2PM ET, please join us for the Politics of Security webcast titled BYOD and Clouds: “The Perfect Storm” (Part 2).   The Politics of Security series of webcasts is designed to help security executives (CISOs, CSOs, and VP of Information Security, etc.) learn from their peers about today's security and compliance challenges and understand some of the mitigation strategies that are being adopted.

This two part webcast examines how BYOD and cloud computing are fundamentally changing traditional security models by allowing personal devices beyond IT control to enter the perimeter and interact with internal systems.  Such technologies also allow applications and sensitive data to be hosted and stored outside corporate environments. The security and compliance implications are significant and organizations are uncertain of the path to ensure minimal risk to their environment.

Part 2 of the webcast series covers risk and countermeasures for:

  • Cloud based file storage
  • Social networks
  • Mobile applications on unmanaged devices

Register for Part 2

Key Speakers:

  • Mike Towers                VP Information Security Assurance, GlaxoSmithKline
  • Todd Bearman            CISO, Towers Watson 
  • Mark Leary                  VP Information and CISO, Xerox
  • Marcus Ranum            CSO, Tenable Network Security
  • Craig Shumard            Principal, Shumard and Associates, LLC, Emeritus CISO, Cigna

If you’re struggling to define BYOD and cloud strategies for your environment, put this webcast in your calendar.

And be sure to view the recording of Part 1 in which we cover:

  • How BYOD deployments are impacting security risk
  •  How various organizations are updating their security processes to account for these deployments
  •  What safeguards are being implemented to mitigate risk as they are deployed

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io Vulnerability Management

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.