Jim Bourke will discuss best practices for dealing with mobile device policy management in the profession today.
Jim will go beyond the basics in this session and provide real life, best practices tips and advice, as demonstrated and deployed in his own firm to help professionals manage this growing phenomenon.
Collaborating today involves Cloud / Social / Mobile! Having a tight mobile device policy in place is critical to collaborating successfully, while protecting corporate and other sensitive information.
It is very difficult to overstate the challenge. As firms enable broader access to more and more information – including highly valuable firm and client information – they need to ensure that the devices used to access that information are secure, that the devices can be remotely managed and de-authorized, and that information on those devices can be destroyed or disposed of securely. But at the same time, the rise of BYOD (bring your own device) and CYOD (choose your own device) means giving up a large measure of control over those devices because, in some cases, they are no longer owned by the organization but rather by individuals who maintain full control and authority over them.
You’ll walk away from this session knowing how to take your mobile device management policy to the next level and have the knowledge of best practices as deployed within our industry.
CPA, CITP, CFF, CGMA,
You must be logged in and own this session in order to