Best Practices for Managed and Unmanaged Device Security
Cybersecurity continues to be a hot topic in many boardrooms. Breaches, data theft, and lawsuits are all risks associated with being online, but what about the risks to your internal projects? Many a project has been ground to a halt due to missed security milestones, missing paperwork, and certifications. Don’t let your project teams get blindsided by cybersecurity requirements!
The topic of device security is a constant in the tactical field of security controls. Administrators deploy security agents and controls in order to mitigate if not prevent malware, botnet activity, and data theft. This practice is commonplace and is seen as an essential component of every security program.
Interestingly, the unmanaged device problem goes unnoticed. As more and more enterprise compute shifts to non-standard and closed platforms, the question of what risk these devices pose to today's organizations is becoming more significant. What is certain, is that these devices are here to stay, and are growing in number.
In this session, we will discuss risks to enterprises and cybersecurity projects posed by connected devices, be they personal and small, or operational technology at the heart of the practice.
The relevance of this topic will continue to grow proportionally as the number of these devices continues to explode. The tsunami of IoT devices necessitates at a minimum a conversation of what this could mean to today's Security and Project Management professionals.
Topics of Discussion
In this session, we will discuss the following:
- Current trends and topics in Cybersecurity and how they relate to Project Management
- Understanding the aspects of cybersecurity that can impact project delivery
- The dark side of the cloud
- Privacy requirements and compliance
Ajay K. Sood
With over 20 years of real-life experience, in-the-trenches business experience in the IT security space Ajay is a seasoned veteran when it comes to introducing disruptive security brands to the Canadian market. Ajay has been published and quoted by numerous news sources (CTV, Global News, Financial Post, Reuters, The Hill Times, POLITICO, IT World Canada, etc.) He has been a speaker and a panellist at Security Education Conference (SecTOR) and has been a panel speaker for Thompson Reuters and the Cyber Security Summit. Ajay has chaired the CLX Forum, as well as the Editor of Canadian Cybersecurity 2018: An Anthology of CIO/CISO Enterprise-Level Perspectives and 2020.
One (1) PDU is applicable for PMPs who attend this one (1) hour event.
The talent triangle allocation is 0.5 Strategic Business Management and 0.5 Technical.
Cancellations must be received by 5:00 pm, 5 business days before the event and must be sent in writing by email to email@example.com. There will be a 20% administration fee charged for cancellations, subtracted from the refund. Cancellation/refund requests will not be accepted less than 5 business days before the event. However, substitutions are welcome. Please let us know by 12:00 noon the day before the event of the person you wish to substitute by emailing firstname.lastname@example.org.
Photography & Filming: Photographs, audio, and video are sometimes captured during PMI Toronto events. By registering, attendees hereby grant PMI Toronto and its representatives permission to photograph and/or record them at events, and distribute (both now and in the future) the attendee's image or voice in photographs, social media, videotapes, electronic reproductions, and audiotapes of such events and activities.
It is no longer possible to register for this event