Mobile computing devices have revolutionized the way business is conducted today. Despite the many benefits associated with mobile computing, organizations are faced with huge risk to business and personal information. Mobile computing devices present significant risks to organizations because of the nature of information that may be stored on them, and because they may provide access to other services that store or display non-public data.
This is the first in a series of practical webinars on mobile computing risk, best practices, and information sharing.
This one hour webinar will focus on the following:
- Current Mobile Threats and Vulnerabilities
- Effective Mobile Computing Guidelines & Best Practices
- Open Q&A
To view slides from this webinar or listen to the recorded session, please visit our Resource Center.