Bloor organises regular events for our end-user and vendor communities including:
  • Annual Bloor Symposium
  • Executive programme events such as roundtables, workshops and seminars
  • Executive peer-to-peer networking events
  • Tele-briefings and Webinars
We have found that CIOs and other senior executives are keen to engage in discussion and debate with technology partners. Bloor brings relevant service and technology partners together with our CIO and leadership communities, in ways that maximise the value to both, making them mutually beneficial conversations. Bloor events enable CIOs and other senior executives to come together with technology vendors and service providers in a non-sales environment for the mutual benefit of both the vendor and the business. What sets Bloor apart from other providers are three key points:
  • We have close relationships with many of the most successful CIOs around the world
  • The calibre of our facilitator, often an ex-CIO, will create a frank, honest, and constructive atmosphere where you can gain the insight into what your target audience thinks.
  • Being vendor, media & research agnostic, we are recognised by the CIO community as an independent voice, able to create mutually-beneficial conversations between CIOs and vendors
Bloor is happy to assist you if your organisation is running or participating in an event. For instance, we can provide a speaker on an appropriate topic from among our independent analysts or a facilitator. Where appropriate we can carry out background research on the issues being addressed. For more information, please contact us.
Loading Events

« All Events

  • This event has passed.

Mobile and Smart Device Conference 2012 - Protecting and securing your corporate data in an evolving consumerised enterprise

5th December, 2012 @ 9:00 am
6th December, 2012 @ 5:10 pm
Event Category:
Attending from Bloor:

More Information / Register

Key reasons for attending

  • New case studies from corporate and public sector practitioners who have successfully mobilised employees within the enterprise
  • The latest developments around enterprise consumerisation, including how to focus on securing your data as opposed to the device
  • A special focus on building, securing and auditing enterprise mobile applications
  • Learn how to drive adherence to security policies within your organisation by building trust with your employees

Corporate IT departments continue to support the platforms that their workforces are asking for. The key for security professionals is to change the focus from which devices to enable or not, to securely getting the company’s greatest asset, corporate data, out to end users.

The MIS Training Mobile and Smart Device Security Conference 2012 will provide you with the opportunity to learn from leading experts who have leveraged flexible technology strategies to address today’s enterprise mobility challenges in a way that can be securely managed in the future.

This conference will showcase case studies from companies who are at the forefront of the drive to securely mobilise the enterprise to enable staff to become more productive and unlock new business opportunities.