This podcast interview session will take a look into our mobile devices (super computers in our pocket) and the built in (or lack there of) security around them.
Can we rely on our devices out of box as long as they’re managed or has the time come where we need to take mobile security to the next level?
Questions that David will ask speaker:
1. Mobile devices are essentially a smaller version of a computer that can fit in your pocket. They’re on us and in use almost all the time. Confidential information flows to, from and through them, yet we don’t seem to secure them to the same level as a computer. Is that because they’re just secure out of the box? Or are we missing something?
2. What types of threats and attacks should we be concerned about with our mobile devices?
3. A lot of organizations may say we use MDM (mobile device management) to secure our mobile fleet of devices. Is an MDM sufficient?
4. If out of the box security and usage of an MDM is not quite enough, what addition protections should we be looking at?
5. How should different usage patterns and user interfaces of mobile devices factor into an organization's model of the mobile security threat and mobile security solutions?
6.Obviously budgets and staff have an influence on just how much security you can deploy and manage. What would be the top 3 items that all businesses and mobile users should put into place to help protect their mobile devices?
Moderator:
@David Whale - Director Information Security, Fasken Martineau Dumoulin LLP
Speaker:
@Seth Hallem - CEO & Chief Architect, Mobile Helix
Recorded on 06-17-2022
Becoming a Testifying Expert
IG/Data Gov Education
How to Effectively Balance Insider Risk and Employee Privacy
Data: The Next Great Lake
Three Reasons to Use AI for Document Review
Avoiding Burnout for Lit Support Professionals
Budget: Lessons Learned
ILTA CEO Podcast: Winter 2022 Peer to Peer
ILTACON Europe 2022: HopsCast #2, Arctic Wolf
ILTACON Europe 2022: Hopscast #1, FileTrail
Q4 ILTA Business Partner Spotlight: CoreTech Leasing
The Hybrid Lit Support Model
Improve Staffing with Technology: Case Study on Development of a Staffing Tool
InfoSec Risk Reduction 101 for Remote & Hybrid Document Review Operations
Leading Your Firms Through Today’s Legal Technology Challenges
Weird eDiscovery
Protecting Your Custom Software-Security Scanning and Runtime
Attorney Task Management: Beyond LPM
Information Governance Policies and Practices for Small Firms
Connecting the Dots - People, Process, Tech
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
A Prairie Home Companion: News from Lake Wobegon