Reshaping Financial Services IT: CIO Best Practices for the Shift Toward Mobile
Dr. Larry Ponemon, Chairman, Ponemon Institute
Ojas Rege, VP Strategy, MobileIron
April 1st 8:00 AM PDT (San Francisco) / 4:00 PM BST (London)
April 2nd 9:00 AM HKT (Hong Kong) / 6:00 PM PDT (San Francisco)
Widespread consumer adoption of mobile technology has set in motion a fundamental shift within financial services organizations. CIOs are learning to leverage the power of mobility to deliver a strategic business advantage by helping their firms become more efficient and flexible. For the first time, MobileIron will share data from a Ponemon Institute survey of 400 financial services organizations about the future of BlackBerry, BYOD, apps, and governance.
Join MobileIron VP of Strategy Ojas Rege and Ponemon Institute Chairman and Founder Dr. Larry Ponemon for a practical and “eyes-wide-open” look at the issues CIOs and CISOs in financial services will need to address as mobile becomes a fundamental part of their computing environment.
Key topics include:
• Financial services mobile adoption forecasts
• Trends in migration to multi-OS environments
• Dependencies for successful mobile strategy deployment
• Implications of user experience and security
This session will be recorded and available for replay.
Sponsored by Lumension, the 2013 State of the Endpoint is our third annual study that tracks endpoint risk in organizations, the resources to address the risk and the technologies deployed to manage threats.
This study reveals that the state of endpoint risk is not improving. The greatest increase in IT security risk is occurring across mobile devices and third party applications. Eighty percent of respondents indicated that laptops and other mobile data-bearing devices pose a significant security risk to their organization's networks or enterprise systems because they are not secure.
Malware attacks are also increasing. More than half of the respondents indicated their organizations experienced more than 25 malware attempts or incidents each month. This is causing an increase in IT operating expenses.
Based on the findings, the following are a few of the recommendations:
Create acceptable use policies for personally owned devices in the workplace.
Conduct risk assessments and consider the use of an integrated endpoint security suite.
Establish governance practices for privileged users at the device level to define acceptable use of mobile, BYOD and corporate-owned asset as well as limit the installation of third-party applications.
For a complete report of our findings and recommendations, please read the entire study which is available at (click to download study).
Could BYOD increase the risks of a healthcare data breach and medical identity theft? The third annual study on Patient Privacy and Data Security reveals the explosion of mobile devices used in healthcare organizations.