Mobile users and security

I have the pleasure to announce that I will co-teach with Alessio Pennasico  a new clusit training about mobile security.
Image via Wikipedia
Mobile users are a big reality in nowadays corporate networks. New devices with browsing capability are introduced by vendor every day, from the new smartphones (android or iPhone) from the tablet (the many android tablets, apple Ipad, rim Playbook and Microsoft windows 7 tablets), to new cloud os as Google chrome OS IT managers need to face a completely new set of requirement to secure network and users operation in such a fragmented and complex environment.
To secure such an environment we should rethink security process changing the way we create process, policies, manage updates, deal with new applications and so on.
This is a whole new world and full of interesting challenges. 
The seminars will be delivered in Milan the 2262011 and in Rome the 7/7/2011.
If you’re interested in clusit events you can click here:

Quale sicurezza per l’utente mobile?
Gio 7/07/2011
4 ore

Quale sicurezza per l’utente mobile?
Mer 22/06/2011
4 ore
Iscrizioni aperte

Enhanced by Zemanta
Antonio Ieranò
CSO, Cyber Security Architect, technical evangelist, consultant, writer, journalist and trainer
I am a Security Manager and architect, CSO, BDM, marketing specialist, and tech evangelist with over 20 years of experience serving as a community liaison, subject matter expert, and high-profile trainer for key technologies and solutions. My experience includes acting as the public face of Huawei technology and before Cisco security technologies; leading pan-European technical teams in development of new Cisco security products; and serving as a key public speaker and trainer on behalf of new high-tech products. My expertise spans IT development and implementation, marketing strategy, legal issues, and budget / financial management.

Specialties and Executive Expertise
IT Strategy, Technical Audits, Enterprise Architecture & Applications, Technical Sales Liaison, Solution Architecture, Network Design, Architecture, & Security, Vulnerability Assessment & Management, Systems Engineering, Data Privacy, Cloud Computing, Marketing Strategy, Budget Management, Social Media Marketing, High-Impact Presentations,incident handling, Forensics, Italian companies, Authentication, Infrastructure security, Security manager, Security issues, Attacks, Security infrastructure, Data encryption

Security and Technical Advisoring
Project Management
Business Development and Marketing

To the official site of Related Posts via Taxonomies.

CC BY-NC-SA 4.0 Mobile users and security by The Puchi Herald Magazine is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.