Mobile Security Strategies: Stop Feeling Like a Babysitter
Senior Security Analyst
John H. Sawyer is a senior security analyst with InGuardians, specializing in network, mobile and Web application penetration testing. John's experience in enterprise IT security includes penetration testing, system and network hardening, intrusion analysis, and digital forensics. John has developed and taught cybersecurity training for a large university and spoken at events for industry and law enforcement. He has consulted with federal, state and local law enforcement agencies on malware analysis, hacker attacks and digital forensics. John is the author of the popular blog "Evil Bytes" at DarkReading.com, and
is a member of the winning team from DEF CON 14 and 15's Capture the Flag competition
Founder, VP of New Ventures, Mobility
Charlie brings over 20 years of IT sales, marketing and product management experience to TITUS. He helped found TITUS in 2005, and has been responsible for product management and marketing. Currently, Charlie is responsible for the Mobility Business Unit, focusing on building mobile apps to complement the current TITUS family of products.
Charlie previously held management positions in product management and business development at Entrust, where he led the development of web certificate products as well as digital signature security solutions. Previous to Entrust, he spent seven years at Microsoft building successful customer and partner relationships. While at Microsoft, he was responsible for growing the Microsoft Certified Solutions Provider channel. Charlie started his career at IBM where he acted as a Systems Engineer and Consultant specializing in database and application development tools.
Wendy Schuchart is a technology journalist with more than a decade experience in enterprise IT. Most recently, Schuchart was the senior site editor of TechTarget's CIO Media Group. She has also served as section editor for UBM's Network Computing and Secure Enterprise. Connect with her on Twitter
Many companies and agencies have jumped on the bring-your-own-device (BYOD) bandwagon without fully evaluating the risks posed by company data on personally owned devices. Even with new mobile device management (MDM) solutions providing tight containerization and content management features, policies and controls are being implemented that focus more on user behavior than protecting the data itself.
Attend this webinar to learn how to:
- Protect your data while allowing users the freedom to use their own devices
- Develop policies that are more likely to get buy-in from management and users
- Use data classification to enhance the protection of data on mobile devices
- Evaluate MDM solutions that will protect your data without completely squashing productivity and functionality
Register for this webinar to learn how you can keep your data in check without feeling like a mobile device babysitter.