Star 0

Abstract

More Smartphones and tablets connecting to corporate networks can create massive security risks, multiplying threat vectors and data leakage. This panel shares new research on risk management strategies that can enable enterprises to realise the business benefits of mobile devices and applications, including Bring-Your-Own-Device. Learn how leading CISOs are adapting to the mobile paradigm.