Video

Mobile Security: The IAM Challenge

CSOs Elayne Starkey, Malcolm Harkins on Enabling BYOD
Mobile Security: The IAM Challenge

Security leaders agree: You can't realistically say "no" to the bring-your-own-device movement. But you also cannot say "yes" without taking on significant mobile security challenges. None any bigger than identity and access management.

See Also: The Application Security Team's Framework For Upgrading Legacy Applications

Elayne Starkey of the State of Delaware and Malcolm Harkins of Intel are two CSOs who stepped into the BYOD movement early, and they are open about the lessons their organizations have learned.

In this video interview, Starkey and Harkins discuss:

  • New approaches to IAM;
  • Privacy challenges to be tackled;
  • How to use mobility to enhance security.

Starkey is CSO for the State of Delaware, a role she's held for seven years. She is responsible for the enterprisewide protection of information assets from high-consequence events, including cyber and physical terrorism and natural disasters.

Harkins is vice president of Intel's Information Technology Group and CISO and general manager of information risk and security. The group is responsible for managing the risk, controls, privacy, security and other related compliance activities for all of Intel's information assets. Before becoming Intel's first CISO, Harkins held roles in finance, procurement and operations.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.