Ensure Systems Are Protected And Compliant: Examine Encryption Options And Mobile Security Regulatory Requirements To Ensure Appropriate Security Measures Are In Place.
Official Website: http://www.haymarketevents.com/conferenceProgramme/304/minimise-leakage-people-devices-data-move
Added by mBLAST on October 16, 2008