Reshaping Financial Services IT: CIO Best Practices for the Shift Toward Mobile
Dr. Larry Ponemon, Chairman, Ponemon Institute
Ojas Rege, VP Strategy, MobileIron
April 1st 8:00 AM PDT (San Francisco) / 4:00 PM BST (London)
April 2nd 9:00 AM HKT (Hong Kong) / 6:00 PM PDT (San Francisco)
Widespread consumer adoption of mobile technology has set in motion a fundamental shift within financial services organizations. CIOs are learning to leverage the power of mobility to deliver a strategic business advantage by helping their firms become more efficient and flexible. For the first time, MobileIron will share data from a Ponemon Institute survey of 400 financial services organizations about the future of BlackBerry, BYOD, apps, and governance.
Join MobileIron VP of Strategy Ojas Rege and Ponemon Institute Chairman and Founder Dr. Larry Ponemon for a practical and “eyes-wide-open” look at the issues CIOs and CISOs in financial services will need to address as mobile becomes a fundamental part of their computing environment.
Key topics include:
• Financial services mobile adoption forecasts
• Trends in migration to multi-OS environments
• Dependencies for successful mobile strategy deployment
• Implications of user experience and security
This session will be recorded and available for replay.
Efficient communication and collaboration amongst physicians, nurses and other providers is critical to
the coordination and delivery of patient care, especially given the increasingly mobile nature of today’s
clinicians and the evolution of the accountable care organization (ACO) model.
For healthcare IT leadership, the ability to satisfy the clinical need for more efficient communications
technologies must be balanced with safeguarding protected health information (PHI) to meet compliance and security requirements. As a result, the industry continues to rely primarily on pagers for provider-to-provider communications, which creates inefficiencies that can have a considerable economic and productivity impact.
To quantify this impact, The Imprivata Report on the Economic Impact of Inefficient Communications in
Healthcare surveyed more than 400 healthcare providers in the U.S. about the typical communication
process during three clinical workflows: patient admissions, coordinating emergency response teams and
patient transfers. (Click to download the complete study)
Ponemon Institute and Emerson Network Power are pleased to present the results of the 2013 Cost of Data Center Outages. First conducted in 2010, the purpose of this benchmark study is to determine the full economic cost of unplanned data center outages and is the second study in a two-part research series on the topic of data center outages.
The 2013 Cybersecurity Salary Benchmarking Report is now available. The number one reason security professionals leave an organization is due to compensation. Security teams and HR professionals need salary benchmarking information to retain key staff and make offers to new team member. Based on this need we developed the 2013 Cybersecurity Salary Benchmarking Report, giving managers the information needed to:
* Compare staff compensation to industry averages
* Retain top talent
* Make competitive offers to new team members
* Increase staff budgets
* Avoid vulnerabilities that result from staffing shortages
"In past years, organizations have commissioned us to produce salary studies for their own knowledge. We are now making this comprehensive report available to all organizations through SecureWorld Insight, a partnership with Ponemon Institute and SecureWorld Expo. As the market for top quality IT security professions gets more competitive, this information becomes increasingly important to assure proper staff budgets and to avoid vulnerabilities that result from unfilled roles." - Dr. Ponemon.
The Compensation and Role of Security Teams report is now available for purchase at www.secureworldinsight.com.
The 2013 study represents the tenth year Ponemon Institute has conducted its
Privacy Trust Study for Retail Banking. This annual survey-based research series
asks consumers to indicate how secure and confident they feel when sharing their
personal information with their primary banking institutions. (Click to download research briefing)
We are pleased to present the 2013 Cost of Data Breach: Global Analysis, our eighth annual benchmark study concerning the cost of data breach incidents for companies located in nine countries. (Click to download study)
We are pleased to present the results from The Economic & Productivity Impact of IT Security on Healthcare study, sponsored by Imprivata. While the implementation of new technologies is designed to improve efficiency and enhance patient care, it also has the potential to introduce risk, so IT departments must ensure that these new systems meet security and regulatory compliance requirements to keep private information protected. The purpose of this study is to determine the industry-wide economic and productivity impact of this paradigm. (Click to download study)
We are pleased to present the results from Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers sponsored by Nok Nok Labs. In this study we investigate consumers' perceptions about how organizations are confirming their identity and determine what they would consider to be the ideal steps and technologies used to ensure their identity is protected. (click to download study)
The purpose of the Big Data Analytics in Cyber Defense study sponsored by Teradata and conducted by Ponemon Institute is to learn about organizations’ cyber security defenses and the use of big data analytics to become more efficient in recognizing the patterns that represent network threats. Click to download study.
Sponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon
Institute to understand the differences between non-malicious and malicious data breaches and
what lessons are to be learned from the investigation and forensic activities organizations
conduct following the loss or theft of sensitive and confidential information. The majority of
respondents in this study believe it is critical that a thorough post-breach analysis and forensic
investigation be conducted following either a non-malicious or malicious security breach. (Click to download study)
(Click to download study) We are pleased to present the results from the 2012 Most Trusted Companies for Privacy study. This is an objective study that asks consumers to name and rate organizations they believe are most committed to protecting the privacy of their personal information. This annual study tracks consumers’ rankings of organizations that collect and manage their personal information.