“SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER...
Transcript of “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER...
ISACA Kenya Annual Conference
“SECURE KENYA II- CYBER SECURITY & DATA
GOVERNANCE IN A GROWING
ECONOMY”
29th - 31st July 2015
Bring-Your-Own-Device (BYOD) Security
Challenges in Enterprises
Presenter: Ibrahim Juma
AGENDA
Key Trends in Enterprise Mobility and BYOD
Information Security and Risk Management in the New World of
Enterprise Mobility
Mobile Enterprise Evolution
Threats, Vulnerabilities and Risk factors for consideration
Common Myths of BYOD Security
Mobile Security Framework, Risk Management and Compliance
Objective:
Provide a better understanding of the Security Risks related to
Mobile Devices (BYOD )and the Key considerations for an effective
Mobile Security Risk Management Strategy
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
MOBILE ENTERPRISE EVOLUTION
Risk-based Information Security for Enterprise Mobility
MOBILE SECURITY MATURITY MODEL
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
Risk-based Information Security for Enterprise Mobility
THE END