Mobile Security, BYOD & How to do it Right

European Identity & Cloud Conference 2012
17.04. - 20.04.2012, Munich, Germany

BYOD stands for “Bring Your Own Device”.   On the train or at the airport you will observe an impressive number of different devices being used by business travellers - notebooks, netbooks, iPads, iBooks, tablets and smartphones.   For a long time organizational IT departments have tried to limit the number of these devices to a small list to make the problem manageable.  However, the reality is that most IT departments have failed.

It increasingly looks like the solution is to accept that users want to use these devices, and to accept that innovation especially around smartphones and tablet PCs is far faster than organizational IT departments can adapt to manage.  The key success is to focus on managing and securing information i.e. “information security”, rather than on the devices themselves i.e. “technology security”. 


BYOD stands for “Bring Your Own Device”.   On the train or at the airport you will observe an impressive number of different devices being used by business travellers - notebooks, netbooks, iPads, iBooks, tablets and smartphones.   For a long time organizational IT departments have tried to limit the number of these devices to a small list to make the problem manageable.  However, the reality is that most IT departments have failed.

It increasingly looks like the solution is to accept that users want to use these devices, and to accept that innovation especially around smartphones and tablet PCs is far faster than organizational IT departments can adapt to manage.  The key success is to focus on managing and securing information i.e. “information security”, rather than on the devices themselves i.e. “technology security”.  

After attending this workshop you will be able to:

  • Explain the main risks associated with mobile and employee owned devices based on real life examples.
  • Explain the risks associated with allowing employees to use their own mobile devices for their work in the organization.
  • Describe best practices for controlling and securing access to information using mobile devices.
  • Describe best practices for securing data accessed by employees using their own mobile devices.

This Workshop qualifies for 2.5 Group Learning based CPEs

Learning level:  Overview

KuppingerCole is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: www.learningmarket.org

For more information regarding administrative policies such as complaint and refund, please contact Mr. Levent Kara at our office's telephone +49 211 23707710, email: lk@kuppingercole.com


Securing the communication of Mobile Devices

20.04.2012 13:30-15:00

Securing the communication of Mobile Devices


With the rising amount of Mobile Devices and Apps, a new challenge drives the integration and security teams in companies. Harmless and business critical applications run on the same device of managers and workers. The well established software deployment policies do not work well in this dynamic environment. Clearly identifying the privileged user and securing the content of his communication is a real challenge.

The second part of the talk will highlight the recommended principles and implementation parts of a secure, manageable and payable architecture for providing valued mobile apps to the different users and devices in your company.

Process Maturity Needs

20.04.2012 15:00-16:00

Process Maturity Needs


Recent and not so recent developments like SOA, BYOD, or Cloud Services as a common denominator require reliable, fine grained, actively managed and monitored authentication and authorization. This simple truth has been frequently spread since quite a while and should be widely known meanwhile. Less understood are the necessary preconditions for the organization regarding a minimum process maturity and minimum level of having things organized. This closing part of the workshop will provide you with a view on the complementing organizational implications and consequences.



© 2014 KuppingerCole