Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Building a Usable Mobile Data Protection Strategy

via YouTube

Overview

Explore a comprehensive mobile data protection strategy in this one-hour conference talk from GrrCON 2017. Delve into the evolution of IT, the shift towards mobility, and the challenges of securing data in an increasingly mobile world. Learn about device management, modern worker expectations, and the importance of agility in security approaches. Examine key topics including app stores, Bluetooth security, mobile insecurity, and cloud integration. Discover specific tools and programs like Cisco Ice, Apple Device Enrollment Program, and Android Enterprise. Address critical security concerns such as username passwords, unsecured devices, and managed vs. unmanaged apps. Gain insights on implementing per-app VPNs, securing iOS accounts, and developing an effective mobile security checklist.

Syllabus

Introduction
Mobility
The oldschool IT
The big shift
Data is everywhere
Choice
App Stores
Bluetooth
Power
Mobile Insecurity
Device Management
The Modern Worker
High Expectations
Be Agile
Bonus Points
Cisco Ice
Apple Device Enrollment Program
Breaking Bad
Security in Context
Office 365
Moving to the cloud
Integration
Android Enterprise
Mobile Threat Protection
Username Passwords
Unsecured Device
Secure Device
Managed Unmanaged Apps
PerApp VPN
iOS Accounts
Checklist
What we didnt cover
Whitepaper
Thank you

Reviews

Start your review of Building a Usable Mobile Data Protection Strategy

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.