Speakers

Jason Hammond, CISSP Advisor, Solution Strategy Greater North - CA Technologies, Inc.

Jason Hammond is Advisor of Solution Strategy in Security Management for CA Technologies. Jason is responsible for leading solution strategy and architectural direction around security management solutions for the Greater North region of CA’s North American operation. In this role Jason aligns CA’s strategy for securing identities, access, and information to the business objectives of CA’s customers in the Midwest United States and Canada.



Eve Maler, Principal Analyst - Forrester Research, Inc.

Eve Maler is a principal analyst serving Security & Risk Professionals. She is an expert on emerging identity and security solutions, identity federation, consumer-facing identity and web access management, distributed authorization, privacy enhancement, and web services security. Eve helps clients manage risk and utilize business opportunities through identity and access management business and technology strategy. She is based in the Seattle area.



Scott Morrison, CTO - Layer 7 Technologies

Scott Morrison is the Chief Technology Officer at Layer 7 Technologies, providing the visionary innovation and technical direction for the company. He has extensive technical and scientific experience in a number of industries and universities, including senior architect positions at IBM. He is one of the four co-editors for the WS-I Basic Security Profile. Scott is a much sought-after author and speaker. He has published over 50 book chapters, magazine articles, and papers in medical, physics, and engineering journals.






Join this Mobile Security Workshop with CA Technologies and Forrester Research, Inc.

February 7, 2013 | 9am-1pm

CA Technologies Office
8 Floor - 125 Commerce Valley Drive West (see map)
Thornhill, Ontario
* lunch will be served

The bring-your-own-device (BYOD) trend is in full swing as the growth of mobile devices within the enterprise explodes. How do you enable secure data access for mobile applications? How do you deal with user authentication? How do you allow broader adoption of enterprise applications on user owned devices? Join CA and Layer 7 at our Mobile Security Workshop, as we outline solutions to these issues, explore different approaches to mobile security, and use case studies to illustrate how others have solved these problems.

Join this workshop to learn about:
  • The latest mobile trends and opportunities
  • Emerging mobile risks and how these can be addressed
  • A reference architecture for secure enterprise mobility

Mobile Security Workshop - Toronto