Mobile Security: Endpoint to Perimeter Protection

Wednesday, October 28, 2015 | 4:40PM–5:30PM | Meeting Room 203-204
Session Type: Professional Development
The explosion of BYOD is forcing higher educational institutions to rethink the way they manage endpoint devices and access to campus networks. Apply too much security, and students will find workarounds to get to the data they need. Be too lax on security, and you incur too much risk. Achieving the ideal balance requires a strategy from endpoints to network perimeters.


OUTCOMES: Discover how to devise an action plan for operational, network, and endpoint security * Learn how to detect, assess, and remediate security risks * Learn how to mount a better defense against malware

Presenters

  • Kim Cary

    Chief Information Security Officer, Pepperdine University
  • Paul Dupree

    CIO & AVP of I.T. Services, Asbury University