Enterprise Security Forum
Sponsored by BlackBerry
Troy, MI | Tuesday, February 13, 2018
Hosted by NCS Madison and proudly sponsored by BlackBerry, we are bringing together 20 IT Security leaders from multiple regions ranging from CIOs, CISOs, VPs and Directors of IT and IT Security.
Presentations & Discussion Topics
Enterprise IoT Adoption Trends, Lessons, Implications
Review how organizations are planning for the Enterprise of Things, from a security perspective. Based on research across 200 decision makers worldwide, you’ll hear insights on current business objectives, organizations and technical challenges, and learn recommended approaches.
- Primary business risks to address
- IOT endpoint data usage priorities by industry and approaches for securing IoT endpoints
Externalization: Securely Connecting, Sharing, Collaborating with Everyone Needed
Learn use cases for how externalization can enable new business services, increase productivity and enable your business to create new services and respond faster to opportunities. We’ll take a deep dive into a real-life use case in Financial Services.
- Learn business drivers for externalization
- Discover approaches to protect both personal privacy and corporate intellectual property
The Connected Worker and the Enterprise of Things
The smartphone is the primary communication and computing device for many of today’s consumers. This dependency on mobile devices will translate into a majority of enterprise computing outside of traditional PC computing. This will have the greatest impact with on campus (non-office-based) and off campus mobile workers who are becoming increasingly connected by rich real time communications powered by mobile applications running on wearable devices such as smart glasses. The rise of IoT in the enterprise, or the Enterprise of Things, will allow these workers to instantly connect with assets in the field to gain immediate understanding of the situation around them.
This session will explore the impact that these connected workers and endpoints will have on your enterprise and its ability to drive growth. Attendees will also learn security concerns that come with these new tools and how to best address them.
How Does Mobility Effect Cyber Planning in Your Business
One of the biggest challenges faced by CSOs and IT security professionals: quantifying security risk. Security budgets are often slashed when businesses look at security as a cost center not as a value. The impact of large-scale data breaches using real-world examples.
- Understand why IT security is ultimately about economics and how that impacts decision-making criteria
- Learn to build an effective business case for investing in security products and services
Detroit Marriott Troy
200 W Big Beaver Rd.
Troy, MI 48084
|8:00-9:00||Welcome & Breakfast|
|9:00-9:30||Presentation & Discussion|
|9:30-10:00||Presentation & Discussion|
|10:00-10:30||Presentation & Discussion|
|10:30-11:00||Presentation & Discussion|
Proudly Sponsored By:
NCS Madison Corp.
101 W Grand Ave, Suite 200
Chicago, IL 60654