Glynn Stokes has been in the computer industry for over 25 Years.
His background encompasses almost every aspect of the IT industry, from Sales to Engineering, from PCs to Mainframe to Networking and now Security.
He has been with Trend Micro over 7 years. Staring as a Senior System Engineer he has worked with all kinds of business from small resellers through to the very large corporate. With his broad knowledge he has built a reputation of being a trusted advisor.
Embracing BYOD: Are you exposing critical data?
Companies that allow BYOD have an advantage, but only if they have a complete security strategy for the devices - and the data that's now mobile. The mobile threat landscape reached new levels in 2011, with a staggering spike in the volume of mobile malware, especially those targeting the Android platform,causing problems for IT administrators, as unlike company-issued devices, these do not come with equipment device management features enabled. If a BYOD policy is employed, how do companies minimise the risk? This presentation on consumerisation takes an in-depth look at the security issues to consider, including:
Also learn about a complete range of security solutions that allow you to:
Copyright © 2012 The University of Queensland, authorised by AusCERT Program Committee, maintained by: firstname.lastname@example.org