Best Practices for Managed and Unmanaged Device Security

Ways of Working

Cybersecurity continues to be a hot topic in many boardrooms. Breaches, data theft, and lawsuits are all risks associated with being online, but what about the risks to your internal projects? Many a project has been ground to a halt due to missed security milestones, missing paperwork, and certifications. Don’t let your project teams get blindsided by cybersecurity requirements!

The topic of device security is a constant in the tactical field of security controls. Administrators deploy security agents and controls in order to mitigate if not prevent malware, botnet activity, and data theft. This practice is commonplace and is seen as an essential component of every security program.

Interestingly, the unmanaged device problem goes unnoticed. As more and more enterprise compute shifts to non-standard and closed platforms, the question of what risk these devices pose to today's organizations is becoming more significant. What is certain, is that these devices are here to stay, and are growing in number.

In this session, we will discuss risks to enterprises and cybersecurity projects posed by connected devices, be they personal and small, or operational technology at the heart of the practice.

The relevance of this topic will continue to grow proportionally as the number of these devices continues to explode. The tsunami of IoT devices necessitates at a minimum a conversation of what this could mean to today's Security and Project Management professionals.

Topics of Discussion

In this session, we will discuss the following:

  • Current trends and topics in Cybersecurity and how they relate to Project Management
  • Understanding the aspects of cybersecurity that can impact project delivery
  • The dark side of the cloud
  • Privacy requirements and compliance

Our Speaker 

Ajay K. Sood

Ajay-Sood_GTIS_Speaker.png

 

 

With over 20 years of real-life experience, in-the-trenches business experience in the IT security space Ajay is a seasoned veteran when it comes to introducing disruptive security brands to the Canadian market.  Ajay has been published and quoted by numerous news sources (CTV, Global News, Financial Post, Reuters, The Hill Times, POLITICO, IT World Canada, etc.) He has been a speaker and a panellist at Security Education Conference (SecTOR) and has been a panel speaker for Thompson Reuters and the Cyber Security Summit.  Ajay has chaired the CLX Forum, as well as the Editor of Canadian Cybersecurity 2018: An Anthology of CIO/CISO Enterprise-Level Perspectives and 2020.

PDU Allocation

One (1) PDU is applicable for PMPs who attend this one (1) hour event.

The talent triangle allocation is 0.5 Strategic Business Management and 0.5 Technical.

 

 

 


Cancellation and Refund Policy

Cancellations must be sent in writing by email to info@pmitoronto.ca. Please see the PMI Toronto Courses Cancellation and Refund Policy for further information.


Photography and Filming Policy

Photographs, audio, and video are sometimes captured during PMI Toronto events. By registering, attendees hereby grant permission to photograph and record them at events, and distribute (both now and in the future) the attendee’s image or voice in photographs, social media, videotapes, electronic reproductions, and audiotapes of such events and activities.

It is no longer possible to register for this event

It is no longer possible to register for this event

Information

Type of category: Other

Type of activity: Ways of Working

Date: December 3rd, 2020

Hour: 7:00PM to 8:00PM

# of PDUs: 1

Price

Members:$5.00

Non-Members & Guests: $20.00

Location

Online