- Premium Members Only Content - Exclusive Video -
Security leaders agree: You can't realistically say "no" to the bring-your-own-device movement. But you also cannot say "yes" without taking on significant mobile security challenges. None any bigger than identity and access management.
Elayne Starkey of the State of Delaware and Malcolm Harkins of Intel are two CSOs who stepped into the BYOD movement early, and they are open about the lessons their organizations have learned.
In this video interview, Starkey and Harkins discuss:
New approaches to IAM;
Privacy challenges to be tackled;
How to use mobility to enhance security.
It's no longer a question of if organizations will support the bring-your-own-device phenomenon. It's a question of "how?"
And in terms of mobile security, it's no longer a matter of simply ensuring device safety. Organizations now must focus on protecting data and networks, as well as ensuring a whole new level of identity and access management.
In this exclusive video interview, we hear from two BYOD pioneers:
Elayne Starkey of the State of Delaware tells why her agency was a leader, not a laggard, in mobile security and what her team is doing today to improve IAM across the state.
Malcolm Harkins of Intel talks not only about his approach to IAM, but also how the company responds to global privacy regulations, as well as uses mobile devices to create new forms of security.
For organizations that have just entered or are considering the BYOD revolution, these mobile security tips are valuable. And they come from the first-hand experience of two mobile pioneers.
Harkins is responsible for all aspects of information risk and security at Cylance as well as public policy and customer outreach to help improve understanding of cyber risks. He spent 23 years with Intel, most recently as its first Chief Security and Privacy Officer. In this role, he was responsible for managing the risk, controls, privacy, security and other related compliance activities for all of Intel's information assets, products and services. Before becoming Intel's first CSPO, he was the chief information security officer (CISO), reporting to the chief information officer. Harkins also held roles in finance, procurement and various business operations.
Starkey, working out of the Department of Technology and Information, is responsible for the enterprise-wide protection of information assets from high consequence events, including cyber and physical terrorism and natural disasters. She chairs the Delaware Information Security Officer Team and is a member of the Governor's Homeland Security Council. She previously served as the chief technology officer at DTI and the CIO for the Delaware Department of Public Safety.