Don’t be a Victim: Defending the Borderless Enterprise

  • Date 05 Jun 2018

Don’t be a Victim: Defending the Borderless Enterprise

05 Jun 2018, 10:30 - 11:30

Information Security Exchange

In any adversarial scenario, your offensive and defensive tactics are dictated by two things: the capabilities and/or tactics of your adversary and the terrain. It has become popular to say that the network perimeter has disappeared; though the lines have been blurred - we still have to be on the defensive. How do we operate safely on the continuously converging cloud and mobile domains? How do we identify and protect against the capabilities and tactics of our adversaries when they are often operating against devices, networks, and infrastructure we don't own? This session will help prepare you.

Learning Outcomes:

  1. Understand the latest mobile vulnerabilities and their impact.
  2. Understand new and unexpected attack vectors.
  3. Learn about the critical elements for establishing and evaluating mobile device fleet security posture.
  4. Learn about additional cloud authentication and authorization considerations.
  5. Learn how to establish a defendable micro-perimeter for enterprise resources, regardless of location.


  • James Plouffe


    Lead Solutions Architect


    James has been in IT and Security for nearly 20 years. He leads technical integration efforts for MobileIron and serves as a technical consultant for...





We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.