Date(s) - Jan 11, 2018
8:30 am - 12:30 pm
8:30 a.m Arrival, Check-in & Networking
8:45 a.m. ISSA Announcements
9:00 a.m. – TBD Presentation from Panda Security
9:50 a.m. Refreshment Break
10:10 a.m. – Presentation
11:00 a.m. Refreshment Break
11:20 a.m. – The Connected Worker and the Enterprise of Things, by BlackBerry
12:10 p.m. Concluding Remarks / Door Prizes
Lunch will be provided after the event!
Title: The Connected Worker and the Enterprise of Things
Abstract: The smartphone is the primary communication and computing device for many of today’s consumers. This dependency on mobile devices will translate into a majority of enterprise computing outside of traditional PC computing. This will have the greatest impact with on campus (non-office-based) and off campus mobile workers who are becoming increasingly connected by rich real time communications powered by mobile applications running on wearable devices such as smart glasses. The rise of IoT in the enterprise, or the Enterprise of Things, will allow these workers to instantly connect with assets in the field to gain immediate understanding of the situation around them. This session will explore the impact that these connected workers and endpoints will have on your enterprise and its ability to drive growth. Attendees will also learn security concerns that come with these new tools and how to best address them.
Bio: Chris Hazelton is Director, Product Marketing for Enterprise Software at BlackBerry. A former industry analyst turned IT software marketer, Chris has been working in management and security for enterprise endpoints for over 10 years. Chris leads the product marketing team for BlackBerry Enterprise software and services that secure today’s Enterprise of Things for over 20,000 companies around the world. He also oversees Global Industry Analyst Relations as well as BlackBerry’s Competitive Intelligence. Prior to BlackBerry, Chris led the Enterprise Mobility research practice at 451 Research where he authored over 500 reports on emerging mobile software and services impacting IT. While at IDC, Chris was the worldwide smartphone analyst, researching emerging trends in the mobile and wireless space that impacted the design and deployment of smartphones in enterprise and consumer markets.
Abstract: In a time when enterprise security breaches are a commonplace and endpoints are often entry points for advanced persistent threats (APT) and targeted attacks, it is important to understand your organization’s endpoint security. Some endpoint security products offer a basic level of protection, but are not necessarily equipped for the onslaught of advanced targeted attacks. This is where the EDR comes into play.
James has been involved with the malware industry since 2003, he has helped to design and construct malware analysis teams, procedures, and processes. James helped advise legislators on the first antispyware legislation to be proposed to the US Congress. He has provided security based editorial content for EarthLink ISP subscribers as well as conducted interviews for various news outlets such as Investors Business Daily, MSNBC, and local radio programs.
In 2007 James co-authored a paper with Ryan Hicks titled Permissive Botnets, it explored the possibility of botnets existing solely of compromised machines growing into a hybrid threat with volunteered devices, much like SETI. The paper was accepted by EICAR for presentation at their conference. Along with this paper he has also created several hours of unique content focused on endpoint security.