The Security Dos and Don’ts of BYOD and Endpoint Management

Date: Wednesday, February 28 at 10 a.m. PT / 1 p.m. ET

DEK: Managing and protecting an increasingly dispersed end user base

Although Bring Your Own Device (BYOD) has long been a reality in the workplace, the remote work and hybrid work trends that were brought about by the pandemic has only added to the number of personal devices being used for work. Unless properly managed, these personal devices can pose enormous security risks. In this session, you will learn various techniques for getting a handle on the BYOD devices used across your organization. In this Webcast, you will learn:

  • Why it’s OK to say no to certain types of devices
  • Strategies for creating device health policies
  • Some of the most common security risks posed by BYOD devices

Here is the AGENDA for the summit:

9 a.m. PT / 12 noon ET
Hybrid Workforce Security: Real-World Tips and Strategies

10 a.m. PT / 1 p.m. ET
The Security Dos and Don’ts of BYOD and Endpoint Management

11 a.m. PT / 2 p.m. ET
Top Third-Party Tools

Register now!

About the presenter:
Brien Posey, Freelance technology author & 22-time Microsoft MVP

Brien Posey is a freelance technology author and 22-time Microsoft MVP. Throughout his career, Brien has written or contributed to dozens of IT books, and created numerous full-length video training courses and published thousands of blog posts on a huge variety of IT and space related topics. Many of those blog posts can be found in his Poseys Tips and Tricks column, or in his new Posey’s Moonshot column.

Duration: 1 hour


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.