The Future of BYOD: Securing the Mobile Enterprise
Grant Moerschel is co-founder of WaveGard, a cybersecurity consulting firm that empowers clients in a quest to reduce sensitive data risks. His 24 years of experience encompasses network engineering, IT risk management, and next-generation security controls. In past lives, he worked at PricewaterhouseCoopers and Tetra Tech. In addition to his writing for InformationWeek, he authored a WiFi security book for McGraw-Hill, a Cisco security technologies book for Cisco Press, and (ISC)2 courseware. He loves hanging out with his family, running, cooking, and building projects and gadgets. He earned his BS from the University of Delaware.
Co-founder and President
Rick Dreger is co-founder of WaveGard, a cybersecurity firm focused on helping our clients protect sensitive data and securely embrace new technologies. With nearly 20 years of experience in the cybersecurity and related enterprise technology fields, he enjoys solving complex business IT problems. When he's not geeking out with technology, he enjoys plenty of time with the family, cooking elaborate recipes, and catching up with friends. He has an EE/BME degree from Duke University and a Masters of Computer Engineering from Villanova University.
Editor and Moderator
Wendy Schuchart is a technology journalist with more than a decade of experience in enterprise IT. Most recently, Schuchart was the senior site editor of TechTarget's CIO Media Group. She has also served as section editor for UBM's Network Computing and Secure Enterprise. Connect with her on Twitter @wendyschuchart.
Mobile device platforms continue to infiltrate the enterprise and users are clamoring for deeper and broader access. Anytime anywhere work possibilities are multiplying and controlling access is getting more challenging. BYOD devices are directly connecting to email, associating with corporate wireless networks, and downloading files from cloud data stores on a regular basis. Beware the risks that uncontrolled mobility places on your data and your organization’s reputation…
In this webcast you’ll learn about some of the current thinking on mobility management as it relates to security, identity and resource access. In particular we’ll address:
- What type of mobile management is appropriate for my organization
- How can I enhance the existing network infrastructure to support mobility initiatives
- Ways for making BYOD a success while adequately protecting corporate data
It’s not too late to get ahead of the mobility curve! Just be ready and be smart about your mobility strategy.