- Google’s mobile Chrome apps could challenge mobile enterprise incumbents 6 December 2013 | 9:34 am
- AT&T drops device subsidy with new tariff 5 December 2013 | 3:09 pm
- UK government to invest in rural coverage and driverless cars 5 December 2013 | 10:55 am
- Deutsche Telekom partners with Twitter 5 December 2013 | 10:51 am
- US firm looks to disrupt international call market 4 December 2013 | 4:17 pm
Managing Trust In The Smartphone Age
There are many important security issues being raised and topics that merit attention:
I’d highlight infrastructure weakness and the importance of correct security management of networks, privacy of the customer information, Cybersecurity, and the security of the device itself. Smartphones now have a number of attack vectors and access methods, are capable of running programs can be affected by malware, used for sensitive company and personal information, and used for many purposes such as banking, payments and shopping. We are also seeing uses such as smart meters, intelligent transport and medical, all of which require secure development and deployment.
I will be looking forward to hearing a stimulating and interesting range of expert speakers talking about these subjects and more, and seeing you all at the forum.
Chairman ETSI OCG security
Chairman GSMA security Group
With the increase of connected devices on the market and the value of subscriber data on the network, developing security and maintaining subscriber trust is a billion dollar challenge for all operators. In 2013 the security challenges that telco operators face will continue to grow and the need to understand usage trends, mobility and cloud services will have an impact on how security services are delivered.
Network security does not have a one-size-fits-all solution with hundreds of considerations to incorporate. Network Security: Managing Trust in Smartphone Age will offer a unique format for leading security specialists and business leaders to exchange ideas, gain valuable knowledge, and share their real-world risk management experiences.
- Where is the value in security?
- How aggressive should you be against threats?
- Beating rogue applications
- Growth in M2M and protecting unmonitored devices
- Fraud issues and the impact on profits
- Overcoming new threats on an all IP Network
- How is security affected with multiple devices and new access points?
- How vulnerable is the network to new threats within femto and small cells?
- Avoiding IP gateway misconfiguration
- CIOs, CISOs and CFOs, and chief security, risk, compliance, process and technology officer
- IT VP and Directors
- Network security executives and directors
- Infrastructure and Data centre Managers
- Security Managers
- Application Developers
- Cloud Specialists
- Associations, Analysts, Key media
Great opportunity to meet colleagues who are exploring this fascinating topicdu (Informa’s SDM event)
Excellent event which includes many great presentations and excellent networking opportunitiesDetecom (Informa’s SDM event)
Value of global mobile security market will reach $1.6bn by end of 2012Visiongain
Only 5% of global smartphones and tablet devices have security softwareJuniper