ISACA’s Virtual Conference Provides Tactics for Mobile Security

Rolling Meadows, IL, USA (27 June 2012)—Increasingly, enterprises are embracing the bring-your-own-device (BYOD) phenomenon to support growing mobile workforces and increase productivity. ISACA’s latest virtual conference will help enterprises ensure safe, productive business use of mobile devices and understand mobile application ecosystems, mobile security threats and corresponding business risks. The conference also will address privacy and security challenges of BYOD under the EU privacy and data protection legislation.

ISACA, a global association of 100,000 IT professionals, will provide guidance on keeping IT running securely in the face of our mobile society at the event titled Mobile Security Imperatives 2012 on Thursday, 19 July 2012, from 7:45 a.m.–4:30 p.m. EDT (UTC-4). Attendees will learn from industry specialists and network with peers from around the world, all without leaving their desks.

“The variety of devices and platforms and the modern workforce’s desire for constant connectivity have created increased security concerns and make the implementation and management of a truly mobile enterprise very challenging,” said Greg Grocholski, CISA, international president of ISACA and chief audit executive at Dow Chemical. “This conference will provide proven approaches and guidance, and will specifically address EU legislation that must be considered.”

During live Q&A sessions at the virtual conference, attendees can interact directly with global leaders in the industry who will present sessions including:

  • Understanding Bring-Your-Own-Device Legal Issues Under European Privacy and Data Protection Law, presented by Johan Vandendriessche, Independent Technology and Privacy Lawyer
  • BYOD:  Preparing Your Organization for the Connectivity Wave, presented by John Harris, chief architect and global VP of IT strategy at GlaxoSmithKline and founder of Corporate IT Forum
  • Diverse Mobile Platforms, Complicated Security, presented by Lisa Phifer, president of Core Competence Inc.
  • Safeguarding Mobile Applications, also presented by Lisa Phifer

During the virtual seminar, participants can attend sessions, connect with other attendees and “visit” exhibitor booths. Attendees can earn up to five free continuing professional education (CPE) hours. To learn more about ISACA’s global events, visit www.isaca.org/conferences.

ISACA provides a variety of ways for IT and business professionals to create strong mobile security programs and strategies. Resources about mobile security, including the free Securing Mobile Devices white paper and Mobile Computing Security Audit/Assurance Program, are available from the ISACA web site. Ongoing discussions on mobile security are taking place in ISACA’s Knowledge Center, and further courses on the topic are offered in ISACA’s two- and four-day Training Courses.

About ISACA

With more than 100,000 constituents in 180 countries, ISACA® (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy and education on information systems (IS) assurance and security, enterprise governance and management of IT, and IT-related risk and compliance. Founded in 1969, the nonprofit, independent ISACA hosts international conferences, publishes the ISACA® Journal, and develops international IS auditing and control standards, which help its constituents ensure trust in, and value from, information systems. It also advances and attests IT skills and knowledge through the globally respected Certified Information Systems Auditor® (CISA®), Certified Information Security Manager® (CISM®), Certified in the Governance of Enterprise IT® (CGEIT®) and Certified in Risk and Information Systems Control (CRISC) designations.

ISACA continually updates and expands the practical guidance and product family based on the COBIT framework. COBIT helps IT professionals and enterprise leaders fulfill their IT governance and management responsibilities, particularly in the areas of assurance, security, risk and control, and deliver value to the business.

Participate in the ISACA Knowledge Center: www.isaca.org/knowledge-center

Follow ISACA on Twitter: https://twitter.com/ISACANews

Join ISACA on LinkedIn: ISACA (Official), http://linkd.in/ISACAOfficial

Like ISACA on Facebook: www.facebook.com/ISACAHQ