BYOD - Dealing with Party CrashersBYOD is here whether you like it or not. You've been agonizing over your BYOD policy and perhaps selected a vendor solution from the likes of Good Technology or MobileIron to manage device access and enforce policies. What about the employees with smart phones that are less inclined to play by the rules? We will go over some chinks in the armor and what options you have in stopping data exfiltration and unauthorized usage. We'll focus on iPhone and Android from a smart phone prospective but the preventive measures are universal.BIO:Brent Morris is an Information Security Analyst at VyStar Credit Union where he spends most of his time focusing in the areas of web and enterprise security. His interests include operating system, virtualization, forensics, intrusion detection, malware analysis and vulnerability detection. Brent has been a speaker at security events such as the SANS Mobile Device Security Summit, and the Jacksonville Linux User Group.
Admission Ticket 0.00