SECURING the ENDPOINT and MOBILE DEVICES
SPONSORED by: IBM, Okta, and Oracle
Mobile devices, whether company owned or personally owned (BYOD), have become the preferred endpoint for most companies. Tablets and smartphones outnumber desktops and laptops. Since many attacks originate through weaknesses in the endpoints, these mobile devices must be better controlled.
This series reviews the latest methods for securing mobile endpoints. Topics of discussion will likely include:
___________________
NOTE: CISO attendees are eligible to earn 4 CPE credit hours. Attorney attendees are eligible to earn CLEs. Registrants must be present to claim their credit hours.