tiero - Fotolia

#GRCchat: Enterprise mobile security best practices

Join SearchCompliance Sept. 18 to discuss the state of enterprise mobile security and how to adapt BYOD policies to best protect company data.

Mobile device use in the workplace has gone global -- and so have the data security concerns that come with it. These devices are particularly vulnerable to data security breaches, but strict enterprise mobile security controls potentially offset the flexibility that employees tout as one of the biggest benefits of mobility. As a result, mobile security strategy is a top concern as organizations struggle to balance mobility's risks with its many rewards.

Join SearchCompliance on Twitter Thursday, Sept. 18, at 12 p.m. EDT to discuss enterprise mobile security best practices, including how to minimize bring your own device(BYOD) risks without sacrificing the upsides of employees' mobile device use, and the compliance ramifications of data leakage. SearchCompliance editors will lead the chat from the site's Twitter handle, @ITCompliance, joined by other TechTarget writers, editors and experts. Tweet chat questions will include discussions on how to integrate mobile security into enterprise data protection strategy and BYOD policy best practices.


Date: Thursday, Sept. 18, 2014
Time: 12 p.m. EDT
Host: @ITCompliance
Hashtag: Use and follow #GRCchat

Is this your first #GRCchat? Whether you’re a newbie or returning tweet jammer, read the following pointers before signing on:

  • To follow the conversation, type "#GRCchat" into Twitter's search bar. From this page, select "All" to view tweets in real time.
  • Your first #GRCchat tweet should be introductory, including your name, title and organization.
  • @ITCompliance will ask a series of questions related compliance automation, starting at 12 p.m. EDT (Q1, Q2, etc.). In your tweeted responses to each question, please preface with A1 (Answer 1), A2 and so on, then remember to include "#GRCchat". Each tweet sent during the chat should include the hashtag. Other hashtags to consider include #mobilesecurity and #ITCompliance.
  •  Please note that Twitter allows only 140 characters per tweet. You are welcome to tweet multiple responses to each question (consider using format "1 of 2" or "1/2" to identify there is more) 
  • Throughout the discussion, retweet (RT) and favorite tweets you agree with and reply to those you don't.

Please direct questions, RSVPs or other concerns to SearchCompliance Editor Ben Cole. "See" you on Twitter!

Next Steps:

Read recaps from our most recent #GRCchat to learn why information governance  is a key consideration in big data e-discovery and how to tackle the many complications of e-discovery management.

Dig Deeper on Information technology governance

Join the conversation


Send me notifications when other members comment.

Please create a username to comment.

Does your enterprise have mobile security standards in place?

No we don't.  Mobile security standards haven't been discussed while cloud security and implementation has been the main focus.  However, after reading about a mobile-first security strategy, I will be leading more discussions on this topic.



Genome, why do you think mobile security has lagged behind cloud at your org? Is it based on your particular industry and employees, or something else?