Mobile Security eSummit
Event Agenda

Registration is free!
Watch this space for updates and announcements!

JANUARY 26, 2017

12:10 PM - 1:15 PM ET
KEYNOTE: Nine Years into Mobility, Has Security Caught Up?
Georgia Weidman, Founder & CTO, Shevirah Inc.
Moderated by Katherine Teitler, Director of Content, Information Security, MISTI

Sponsored by 


For the past nine years, mobility has been disrupting the corporate enterprise in a manner on the magnitude that PCs disrupted mini-computers and mainframes in the 1990s. Yet most corporations continue to approach security as if there are still hard perimeters, corporate-owned endpoints and internal corporate applications. 

But mobility equals employee-owned end points, connecting over public networks, to cloud based applications. How does perimeter security address this?
Mobility comes with unique threats that mobile security solutions attempt to address. Do they? What are the gaps? What should organizations do?

These questions will be answered by Georgia Weidman, author of Penetration Testing, A Hands-on Introduction to Hacking, published the Smartphone Pentest Framework, developed under a DARPA Cyber-Fast Track Grant.  Her research into penetration testing mobile devices has led her to a deep understanding of how mobile security solutions claim to make corporate data secure on employee devices. Weidman presents how penetration testing techniques, used successfully for years against servers and applications, can uncover the actual threats against mobility in the Enterprise.

1:15 PM - 1:25 PM ET
Visit our sponsors in the Exhibit Hall!

1:25 PM - 2:25 PM ET
Governing Your Mobile Landscape: 10 Governance Issues That Need to be Addressed
Doug Davidson, Director, Business Technology Services, GBQ Partners, LLC
Moderated by Katherine Teitler, Director of Content, Information Security, MISTI 

Businesses are choosing to implement mobile form factors and applications to enable new processes, improve existing processes, improve services, deliver new products to customers and allow employees to telework. Some companies are opening their networks to employee device choices in BYOD programs. As with anything benefits have to be balanced with the costs. And many times organizations are not making mobile decisions with full knowledge of the business risks of mobile computer or a full understanding of whether they are attaining the desired benefits. Join us for a discussion of the governance issues related to mobile computing.

Check back for agenda additions and updates!



(ISC)² members: (ISC)² members who attend MISTI virtual events or eSummits may be eligible for one CPE credit each applicable webcast subject to (ISC)² approval. Please refer to (ISC)² Guidelines before reporting CPE activity directly on www.ISC2.org


By registering for this event you agree to receive details and announcements related to the event from MISTI and other MISTI communications. We may also provide your contact information to third-party event sponsors.