Bloor organises regular events for our end-user and vendor communities including:
- Annual Bloor Symposium
- Executive programme events such as roundtables, workshops and seminars
- Executive peer-to-peer networking events
- Tele-briefings and Webinars
- We have close relationships with many of the most successful CIOs around the world
- The calibre of our facilitator, often an ex-CIO, will create a frank, honest, and constructive atmosphere where you can gain the insight into what your target audience thinks.
- Being vendor, media & research agnostic, we are recognised by the CIO community as an independent voice, able to create mutually-beneficial conversations between CIOs and vendors
- This event has passed.
Take back control - Techniques and technologies to tame rogue device, user and application exposures
Event Navigation
This interactive panel will discuss the key issues, techniques and technologies needed to gain visibility and control in order to tame rogue device, user and application exposure. Led by Fran Howarth, security practice leader at Bloor Research, this expert/practitioner session will share tools, considerations and processes to improve operations, advance security posture and protect reputation. The topic examines the issues from a 360 degree perspective including: use cases, reasoning, technical requirements, control implementation challenges and successes with regards to network asset intelligence, BYOD, endpoint and access compliance and threat prevention from a customer perspective.
- Gain an insight into what is driving the increase in rogue threats and gained advice on the best methods to minimise these security gaps
- Determine how to get the upper hand with regards to visibility
- Understand how to enable secure BYOD and appropriately curb restrictions
- Discover how to fortify endpoint security and maintain compliance
- Develop an understanding of how to formulate policy and controls
Slidedecks and Event Materials
There is one file to download for this event: