Webcast: Control Measures Designed to Protect Mobile Technology Assets (XCMPMTW17)
Tell a Friend About This EventTell a Friend
 

Every business organization has mobile technology assets such as laptop computers, tablets, and smartphones. These devices generally store, or have access to important data owned by the entity and because they do, there is risk associated with their use. This session looks at the devices in use, explores the types of risk that exists related to mobile assets, and shows methods available to help mitigate this risk. Control over mobile assets can be an area of weakness for organizations. Those tha

5/23/2017
When: 05/23/2017
12:00 PM until 2:00 PM
Where: Webcast
CALCPA
4173375Z
United States
Presenter: Karl Egnatoff, CPA


Online registration is closed.
« Go to Upcoming Event List  

AcronymXCMPMTW17
CPE2 hours
VendorCalCPA
Category
Accounting & Auditing
LevelBeginning
PrerequisiteNone
Adv PrepNone
Yellow Book?No
Designed forAccounting and other business professionals that need an understanding of risks and controls for mobile technology tools
Registration
Member$60
CPA Non-Member$94

The Member rate applies to LCPA members, other state society members, and non-CPA staff of LCPA members. To register online, use the ‘Register’ button above. To register by phone, call the LCPA Member Service Center at 800.288.5272 or 504.464.1040, Monday through Friday, 8am to 5pm.

Course Description

 Every business organization has mobile technology assets such as laptop computers, tablets, and smartphones. These devices generally store, or have access to important data owned by the entity and because they do, there is risk associated with their use. This session looks at the devices in use, explores the types of risk that exists related to mobile assets, and shows methods available to help mitigate this risk. Control over mobile assets can be an area of weakness for organizations. Those that take this session will have an advantage as they address security issues related to the mobile technology that has become so prevalently used by businesses today.

Objectives

 Once participants have completed this session they should be able to:

  • List the security risks that affect electronic information stored on mobile devices
  • Develop vetting and selection processes for cloud storage providers
  • Explain what is meant by mobile device management and how it can help protect organization data

Major Topics

  • The importance of security for mobile technology
  • Protecting information resident in the Cloud and accessed with mobile devices
  • Securing data stored by mobile devices