|[April 24, 2013]
TMC's SecureIT Conference Locks-In BYOD Program
NORWALK, Conn. --(Business Wire)--
TMC (News - Alert) today announced programming for its SecureIT
Conference to take place on Tuesday, July 23, 2013 at the NYU Kimmel
Center in New York City. This intense one-day event will bring together
leading industry experts, solutions providers, end users and IT
professionals to learn cutting-edge industry trends and practices to
ensure critical information and communication assets are protected
amidst the BYOD peak.
"As BYOD becomes the norm in enterprises, it is essential for companies
to be aware and armed with the information they need to combat potential
security threats to their systems," says Rich Tehrani (News - Alert), TMC CEO and
conference chairman. "In an age where a single malware family dubbed
BadNews has rapidly infected over 9 million Android devices, we believe
The SecureIT Conference is the best resource for industry security
information to combat such threats."
The Bring Your Own Device (BYOD) trend and related developments such as
virtualization and the cloud, have generated higher risk levels in
enterprises. As a result, it is imperative for companies to provide
enterprise security knowledge and tactics to their IT professionals.
TMC's SecureIT Conference will hit a host of hot topics in the world of
BYOD focusing on ways to protect organizations' people, devices, apps
and business processes. Sessions will approach the BYOD phenomenon from
multiple aspects including:
Why BYOD Requires New Ways to Cover Your Assets
BYOD and Enterprise Security - "Bring Your Own Destruction ":
IT professionals' roles in risk management have increased although
they lack the visibility, tools, policies and rules, and support at
all levels to do so effectively. What are the personal and competitive
How the Bad Guys View Your Enterprise and its Targets of
Opportunity: This panel explores how BYOD has changed enterprise
security, providing easier access to bad actors with intentions to
exploit. It examines why they go after what they do and their weapons
Identity is the New Perimeter: Who are You and What are you Using :
Explore the evolution of identity authentication post-BYOD where
firewalls, antivirus and malware protection is no longer sufficient.
Moving from Mobile Device Management to Mobile Applications
Management-Do You Really Know What is Out There and How it Can be
Managed : Building on the issues surrounding identity, the panel
will provide perspectives o the challenges of identity separation and
focus on solutions as to who and how the confluence of people, devices
and apps can and should be managed.
Why are we Purposely Exposing Ourselves How Unprotected File
Transfers Invite Disaster: Find out how to assure your company
does not fall victim to "reply to all" problems and other issues
related to the safe sending of files from any device to any device.
Protecting Data Integrity: Find out why Metadata Framework
technology is a preferred choice for making decisions and managing
access controls and appropriate use for securing the data that BYOD
pervasiveness is helping exponentially increase.
BYOD and the Cloud-Friend and/or Foe : A diverse panel will
discuss the pros and cons of the cloud as both facilitator of what has
in fact become somewhat of a problem known as "applications creep,"
but also as a viable solution for IT regaining control.
BYOD and the Secure Network Connection: Learn about the
security challenges associated with BYOD and the significance of IT
professionals' role in implementing policies and rules to protect
against security threats.
Encryption and Certificates-Who is Minding the Keys : A diverse
panel of industry experts will provide perspectives and
recommendations as to what you need to consider to assure that your
security measures are being optimized instead of compromised.
CIO/CSO Roundtable-Reestablishing IT Centrality: CSOs and CIOs
will discuss their views on: How to meet rapidly changing
circumstances as they seek to balance BYOD management mandates and
simultaneously keep their companies safe; BYODs and compliance;
Obtaining executive- and enterprise-wide buy-in on investing in
security; Getting users to understand and follow BYOD best practices
and adhere to corporate policies and rules.
TMC's SecureIT Conference is supported by platinum sponsor Cisco (News - Alert).
for SecureIT Conference is now open, with special $399 early bird
pricing until May 3, 2013. For media registration, please contact Ashley
To become a sponsor, please contact TMC's Dan
Gold at 203-852-6800 x105.
For the latest SecureIT Conference news, updates and information, follow
the event on Twitter (News - Alert) at @SecureITexpo.
TMC is a global, integrated media company that supports clients' goals
by building communities in print, online, and face to face. TMC
publishes multiple magazines including Cloud
Telephony. TMCnet is the leading source of news and
articles for the communications and technology industries, and is read
by as many as 1.5 million unique visitors monthly. TMC produces a
variety of trade events, including ITEXPO,
the world's leading B2B communications event, as well as industry
events: 3D Printing Conference & Expo; Asterisk (News - Alert) World;
AstriCon; ChannelVision (CVx) Expo; Cloud4SMB Expo; DevCon5 - HTML5 &
Mobile App Developers Conference; M2M Evolution Conference &
Expo; Mobile Commerce Zone Conference & Expo; SecureIT; Small Cell
Summit, StartupCamp; Super Wi-Fi Summit; SIP Trunking-Unified
Communications Seminars; Wearable Tech Conference & Expo; WebRTC
Conference & Expo; and more. Visit TMC
Events for additional information.
[ Back To Cloud Computing 's Homepage ]