(314) 504-0530 info@bac-mail.com

BYOD & Securing Mobile Technologies

  • CPE Credits: sixteen (16) two-day program or eight (8) for one-day program
  • Prerequisites: None
  • Learning Level: Basic
  • Instructional Method: Group/Live
  • Field of Study: Information Technology – Technical
Course Revision Date: March 1, 2023

Back to Training Catalog >

Course Description
As the world becomes more interconnected, integrated and intelligent, mobile devices are playing an ever-increasing role in changing the way people live, work and communicate.

Personal computing devices are becoming more and more portable — laptops, tablets, smart phones, USB thumb drives, etc., securing the sensitive information stored on those devices is more important than ever. The small size and portability of these devices mean they can be easily lost or stolen, placing both personal as well as corporate data at risk.

This two-day program will address the challenges in securing data and processing, limiting communication to designated parties, protecting sensitive data from the loss of a mobile device and methodologies for designing and implementing a viable, controlled and sustainable enterprise-wide BYOD policy.

Audience
IT Managers, auditors, and system administrators, managers of telecommunications, info security professionals, HR managers, financial officers (CEO, CFO, COO), senior management (CIO, CXO, CSO) and IT professionals who through their involvement in managing or directing the IT infrastructure have responsibility for mobile technology management.

This particular two-day program would also be of value to financial and operational audit professionals as well as non-IT audit professionals tasked with the responsibility for assessing their organization’s BYOD and mobile technology strategies.

Objectives
After completing this seminar, participants will be able to:

  • Identify the unique risks associated with mobile technologies and the necessity of a viable mobile risk management initiative.
  • Recognize the essential elements in a comprehensive, enterprise-wide, BBYOD policy, the importance of protecting end user privacy and securing enterprise data.
  • Understand the critical importance for security and controls over employee and enterprise devices accessing sensitive systems and protected data.
  • Identify the importance of implementing and managing a comprehensive mobile device management strategy.
  • Have a working knowledge of the current risks, threats and exposures facing 21st century organizations doing business in virtual global marketplaces.
  • Be better prepared to assist their organization in securing its operations, minimizing its security exposure, and mitigating the possibility of data loss via mobile devices.
  • Identify existing exposures and weaknesses within their organization’s mobile communication operations, which would make the organization a potential target for cyber terrorists, cyber criminals, data thieves.
  • Have a better appreciation of the steps and elements required to develop an audit ICQ and program for assessing BYOD and mobile technology internal controls.
Course Outline

Please contact Al with a request for a detailed course outline…

albert@bac-mail.com

Need more information?

If have questions or would like more information about any of our courses please contact us using the form below. We look forward to hearing from you.

12 + 11 =

Request a Consultation Today

We provide a variety of consultation services and training options to fit the demanding and changing needs of our clients. Contact us today and we will help you determine the best way to meet your goals.

cybersecurity and infrastructure security angency

BAC is a vetted, current provider of training courses through the NICCS Education and Training Catalog. BAC’s courses are aligned to the specialty areas of the National Cybersecurity Workforce Framework.