Implementing the Perfect Travel Laptop Program

Posted on in Presentations

Large organizations ignore international travel as a risk. Impenetrable core facilities provide a false sense of security if the weak link crated by border crossings is not controlled. This session will present a case study for implementing a travel laptop program to mitigate this risk.

Pre-Requisites: Understanding of mobile and end-point security as it relates to international travel and border crossing for large organizations.

Brian Warshawsky


Manager of Export Control Compliance, University of California Office of the President

Security Strategy & Architecture Professional Development & Personnel Management Mobile & IoT Security Human Element

risk management endpoint security encryption strategy & trends data security BYOD



Share With Your Community