Mobile devices are an essential, exciting and often productivity enhancing way of life for many individuals. Apple iOS and Android based devices, taking the form of smart phones and tablets, are everywhere you look. Notebook computers are getting thinner and lighter, but also more powerful. Portable removable storage is rapidly expanding in capacity and dramatically dropping in price per byte of storage. Increasing pressure is being placed on enterprise management to allow and support a wide array of mobile communications, computing, and storage devices in the modern workplace.
Heated debates are raging over whether Bring Your Own Device (BYOD) is acceptable in the workplace, both inside and outside of the office. These inexpensive and highly powerful information and communications technologies have also unfortunately spawned many serious risks to organizations and individuals, ranging from unauthorized network connections to theft and serious data leakage.
In this hard hitting and timely workshop, we will take a top down approach in covering risks and policies requirements down to practical safeguard alternatives and audit procedures for mobile computing applications.
- Understanding mobile applications risks
- Identify key controls in mobile applications
- Address policy requirements
- Understand how mobile applications fit into the corporate data and security infrastructure
Bonus: You will receive the ISACA Mobile Computing Security Audit/Assurance Program for COBIT 4.1
Questions? Contact us
Phone: +1 (781) 784-4390
Fax: +1 (781) 253-2066
Email: fill out form below