Implementing the Perfect Travel Laptop Program


Posted on in Presentations

Large organizations ignore international travel as a risk. Impenetrable core facilities provide a false sense of security if the weak link crated by border crossings is not controlled. This session will present a case study for implementing a travel laptop program to mitigate this risk.

Pre-Requisites: Understanding of mobile and end-point security as it relates to international travel and border crossing for large organizations.


Participants
Brian Warshawsky

Manager of Export Control Compliance, University of California Office of the President

Security Strategy & Architecture Professional Development & Personnel Management Mobile & IoT Security Human Element

risk management endpoint security encryption strategy & trends data security BYOD


Topic

Subtopic


Share With Your Community