From the CEO with her iPad to the IT guru with the latest laptop technology to the intern with a new Android media player, users love to bring their personal electronics to work and connect them to corporate assets. Most users never think that connecting a phone or ebook reader could pose a security risk to the entire network. But it most certainly can. And regardless of written security policy, users continue to do it. Join Mike Danseglio, CISSP, former security authority at Microsoft and world-renowned security expert, as he shows how this happens every day along with the impact of each occurrence. For each type of vulnerability, Mike will explain potential data compromise, impact to the business, and more. But you don’t want to know just the pain. You also want the solution! Mike won’t let you go without detailed demonstrations of protecting corporate assets from those nasty devices using off-the-shelf hardware and software tools.
You will learn:
- The features of Windows Server that enable device blocking and permitting
- How to identify and map approved devices
- How to say "yes" to unapproved devices without compromising corporate security