TIME |
AGENDA |
09:00 |
Welcome note |
09:05 |
Welcome address by Chairman, Stewart White, Chief Executive Officer, Akhet Consulting |
09:20 |
Keynote address: The Mobile Security Landscape
- Roadmap for the next 5 years
- Threat reports
- Pain points of CTOs
- Current threat landscape and counter measures
Anil Prakash, Director General, India Security Council for ICT & Telecom |
10:05 |
Future Tense - Privacy and Security in Mobility
- Mobile Security - what's the latest?
- Vulnerabilities and behavior that will shape tomorrow's breaches
- The state of mobile privacy, what's the price of FREE
- Laws and regulations coming to a legislature near you
Nader Henein, Regional Director, Advanced Security Solutions - Advisory Division, BlackBerry |
10:35 |
Networking morning break- Power Breakfast
Speed networking session - Get introduced to peers and potential business partners |
11:20 |
Next-Generation Mobile Security Gateways for 3G & 4G Networks
- Security threats with the growing mobile demand
- New security threat vectors that are impacting the mobile network
- Layer 2 and Layer 3 MPLS security designing
- New security risks presented by the new Long Term Evolution (LTE) architecture
- VLAN design for a secure LAN
Muhammad Noman Usman, Network Manager, Public Authority for Consumer Protection, Sultanate of Oman |
Creating Business Driven Mobile Device Management (MDM) Strategies
MDM is still in its infant stages. Many organisations do not seem to understand the need for MDM to be in place before encouraging BYOD. Analysts predict that by 2017 half of employers will not be required to supply devices to the employees. Enterprises would need to look into innovative programs that are not only meant for corporate. With more and more employees bringing in their own devices there is an urgent need to incorporate a MDM strategy. |
11:50 |
BYOD - How to make it work? Developing a Successful Initiative
- How to initiate a BYOD process securely
- How to develop a secure MDM policy
- A look at the security policies and logistics involved
Illyas Kooliyankal, Director - Information Security (CISO), ADS Holding & ADS Securities |
12:20 |
Networking Lunch Break |
The World of BYOD - How Mobility can Transform your Business
It is essential for IT professionals to be proactive and understand what the employees would like to use and find ways on how to make that possible. IT professionals have to embrace consumerization and look at strategic approaches, built around policies and management tools. One size does not fit all so policies need to be flexible and fluid to allow changes. Corporate IT has to change its mindset to better embrace mobility. This session will equip you with the right methodologies needed to implement BYOD, an in-depth look into the cost and benefits of BYOD. |
13:30 |
Case Study by Google:
Android Wear - Getting Security Right when Developing for the Wearable
Android world
- The Android security model
- New security considerations for Wearables
- The right security framework and approach for Wearables application developers
- Incorporating Wearables into a enterprise's MAM framework, what to look for, and what to avoid
- Google Play Services in your mobile application management strategy for Wearables
Grant Allen, Technology Program Manager, Principal Architect, Google |
14:15 |
Mobile First - Why Corporations are Embracing Enterprise Mobility
- What corporations can achieve by embracing a Mobile First approach
- How personal devices and Bring your own device
(BYOD) strategies are affecting the workplace
- Biggest mobile trends
- Business apps are here to stay
Justin Prince, Mobility Consultant, Technical Art Concepts (TACME) |
14:45 |
Enterprise Mobility, the Good, the Bad and Cost of Doing Nothing
- How can the enterprise mobilize their workforce
- What are the benefits of the modern mobile workforce
- What are we going to do about this Bring Your Own Device (BYOD) movement we are seeing
- Enabling mobility across the enterprise - The costs involved and more importantly, the cost of doing nothing
Corbett Hoxland, Solutions Specialist, Mobility, Microsoft Gulf |
15:15 |
Mobility without Vulnerability: Comprehensively Managing your BYOD Vision
- Enabling BYOD with a complete mobile adoption strategy
- Mobilize business process and workforce
- Protect corporate data and apps on mobile devices
- Creating a successful BYOD policy
Haider Pasha, CTO & Head of Technical Sales and Services, Symantec |
15:45 |
Networking Afternoon Refreshments |
“New security loopholes are constantly popping up because of wireless networking. The cat-and-mouse game between hackers and system administrators is still in full swing” Kevin Mitnick
Ransomware is an upcoming trend. Hackers now want monetary gains and are more malicious than they ever were! It is crucial for security companies to always be a step ahead.
Hackers are very innovative and are always devising new ways to attack the OS. How can this be prevented? By the end of the presentation you will be more knowledgeable about the different types of hackers and how they think when it comes to selecting targets. Based on several factors you will be able to find out if you potentially can be the next victim! |
16:15 |
Innovation showcase - Android vs iOS
This showcase will highlight the differences in the various OS. For an in-depth discussion and to learn about the different platforms available and how to ensure your policies are secure enough for the various OS, attend Mobile Security workshop on Day 3!
How to Ensure you are One Step Ahead of the Hacker?
- What and who in hacking? (different types of hackers)
- How hackers think (selecting targets and attacks)
- Are you a target?
- Security threats in the mobile landscape of organizations
- How the proliferation of new devices can rock the security of an organisation
- Ransomware for mobile devices
- Mitigating the risks
Tudor Enache, Principal Security Consultant, Help AG |
Technology Enabled Crimes
Globalisation has caused the increase of technology enabled crimes. Cyber attacks have become common occurrences and they still continue to be a costly affair. |
16:55 |
Mobile Governance (mGov): Extending the Government to EveryOne, AnyTime,
AnyWhere
- mGov security challenges
- Prevent hackers and ransomware
- Changing expectations of service from Governments: Smart Governments
- Mobile Governance (mGov): The next frontier
- Mobile Governance (mGov): Future and extensions into wearable computing including devices like Google Glass
Asif Iqbal, Digital Forensics, Fraud and Security Investigator, Founder, Athena Labs |
17:30 |
End of Day 1 of the Mobility Forum 2014 |