Bloor organises regular events for our end-user and vendor communities including:
  • Annual Bloor Symposium
  • Executive programme events such as roundtables, workshops and seminars
  • Executive peer-to-peer networking events
  • Tele-briefings and Webinars
We have found that CIOs and other senior executives are keen to engage in discussion and debate with technology partners. Bloor brings relevant service and technology partners together with our CIO and leadership communities, in ways that maximise the value to both, making them mutually beneficial conversations. Bloor events enable CIOs and other senior executives to come together with technology vendors and service providers in a non-sales environment for the mutual benefit of both the vendor and the business. What sets Bloor apart from other providers are three key points:
  • We have close relationships with many of the most successful CIOs around the world
  • The calibre of our facilitator, often an ex-CIO, will create a frank, honest, and constructive atmosphere where you can gain the insight into what your target audience thinks.
  • Being vendor, media & research agnostic, we are recognised by the CIO community as an independent voice, able to create mutually-beneficial conversations between CIOs and vendors
Bloor is happy to assist you if your organisation is running or participating in an event. For instance, we can provide a speaker on an appropriate topic from among our independent analysts or a facilitator. Where appropriate we can carry out background research on the issues being addressed. For more information, please contact us.
Loading Events

« All Events

  • This event has passed.

Take back control - Techniques and technologies to tame rogue device, user and application exposures


Date:
30th April, 2014
Time:
2:40 pm - 3:05 pm
Event Category:
Attending from Bloor:

More Information / Register

This interactive panel will discuss the key issues, techniques and technologies needed to gain visibility and control in order to tame rogue device, user and application exposure. Led by Fran Howarth, security practice leader at Bloor Research, this expert/practitioner session will share tools, considerations and processes to improve operations, advance security posture and protect reputation. The topic examines the issues from a 360 degree perspective including: use cases, reasoning, technical requirements, control implementation challenges and successes with regards to network asset intelligence, BYOD, endpoint and access compliance and threat prevention from a customer perspective.

  • Gain an insight into what is driving the increase in rogue threats and gained advice on the best methods to minimise these security gaps
  • Determine how to get the upper hand with regards to visibility
  • Understand how to enable secure BYOD and appropriately curb restrictions
  • Discover how to fortify endpoint security and maintain compliance
  • Develop an understanding of how to formulate policy and controls

Slidedecks and Event Materials

There is one file to download for this event: