Webcast: Control Measures Designed to Protect Mobile Technology Assets (XCMPMTW18)
Tell a Friend About This EventTell a Friend
 

Every business organization has mobile technology assets such as laptop computers, tablets, and smartphones. These devices generally store, or have access to important data owned by the entity and because they do, there is risk associated with their use. This session looks at the devices in use, explores the types of risk that exists related to mobile assets, and shows methods available to help mitigate this risk. Control over mobile assets can be an area of weakness for organizations. Those tha

2/6/2018
When: 02/06/2018
12:00 PM until 2:00 PM
Where: Webcast
CALCPA
4173375X
United States
Presenter: Karl Egnatoff, CPA


Online registration is closed.
« Go to Upcoming Event List  

Acronym XCMPMTW18
CPE 2 hours
Vendor CalCPA
Category
Accounting & Auditing
Level Beginning
Prerequisite None
Adv Prep None
Yellow Book? No
Designed for Accounting and other business professionals that need an understanding of risks and controls for mobile technology tools
Registration
Member $60
CPA Non-Member $94

The Member rate applies to LCPA members, other state society members, and non-CPA staff of LCPA members. To register online, use the ‘Register’ button above. To register by phone, call the LCPA Member Service Center at 800.288.5272 or 504.464.1040, Monday through Friday, 8am to 5pm.

Course Description

 Every business organization has mobile technology assets such as laptop computers, tablets, and smartphones. These devices generally store, or have access to important data owned by the entity and because they do, there is risk associated with their use. This session looks at the devices in use, explores the types of risk that exists related to mobile assets, and shows methods available to help mitigate this risk. Control over mobile assets can be an area of weakness for organizations. Those that take this session will have an advantage as they address security issues related to the mobile technology that has become so prevalently used by businesses today

Objectives

 Once participants have completed this session they should be able to:

  • List the security risks that affect electronic information stored on mobile devices
  • Develop vetting and selection processes for cloud storage providers
  • Explain what is meant by mobile device management and how it can help protect organization data

Major Topics

  •  The importance of security for mobile technology
  •  Protecting information resident in the Cloud and accessed with mobile devices
  •  Securing data stored by mobile devices

Note: Login instructions will be provided by the webcast vendor (CalCPA).