Registration and Welcome Coffee & Tea
Welcome address and opening remarks by Gary Clarke, Country Manager IDC
Country Manager, IDC Australia
Cutting through the Mobility hype
This presentation highlights the issues that IDC believes will shape the Asia-Pacific mobile business services market in 2012. The growing trend around the Consumerisation of IT has exasperated some organisations and exhilarated others. Some companies see it as adding massive complexity to an already confused IT environment. Others see it as an excellent way to embrace change and drive engagement, productivity and revenue. Regardless, it is hard to deny that mobility, consumerisation and cloud have combined to create a tumultuous and exciting mobile services environment for vendors, partners and enterprise organisations. This presentation addresses the mobility issues beyond email and internet access - security, applications, near field communications and mobile analytics.
Associate Vice President Asia Pacific End User & Mobility Research, IDC Asia/Pacific
Rethinking Information Security for Mobile Devices
Information risk and security has always been to some extent a balancing act. On the one hand, you can view the risk and control functions that we’re trying to manage as increasing cost, and constraining the use of data and systems. And so therefore, you might have some view within the company or some users that this should just be completely opened.This session will cover how Intel IT division addressed a balancing act to address risk and security and will discuss how we plan to create and extend computing technology by helping to make devices, the cloud, the data and the people secure.
Enterprise Solutions Architect, Australia and New Zealand, McAfee
So, you need a mobility strategy. The Five things you must do.
For many companies, creating a mobility strategy is a confronting, confusing and potentially costly exercise. Organisations need to understand how they can create a flexible mobility strategy that delivers to their specific business demands.
CISA Senior Technical Staff Member, Chief information Security Office, IBM Corporation
How to successfully mobilise your enterprise
How do you measure the benefits of a mobile device strategy? In this presentation, Andrew Fox will outline the five principals for defining a mobile enterprise application strategy, benchmarked best practices for taking your business mobile, and documented examples of mobile-driven benefits by process area.
Head of Mobile Business Solutions, SAP Australia & New Zealand
Making devices easier to manage with automated mobile device management
Best practice IT systems automation should deliver a complete network view - from a single pane of glass. Join Craig who will discuss how to automate mobile device management, taking a holistic view of your IT Systems management – giving you the visibility you need to efficiently, consistently and reliably track, locate, update, backup and wipe all the mobile devices on your network - automatically. Craig will showcase how Kaseya’s automated mobile device management solution has been adopted by enterprises to address real-world BYOD issues.
Director of Professional Services Australia & New Zealand, Kaseya
The Porter Davis Homes Story
Two years after implementing SAP, Porter Davis Homes is in good shape due to the process and structural disciplines this new business management software has introduced. However, useability and it’s ability to marry strict process controls with real time construction issues on site continued to erode the benefits of the SAP platform.
The solution to these issues needed to be device independent, integrate with SAP and provide a live experience with real time data.
Through live demonstrations, see how Porter Davis Homes have applied a new mobile solution via a low-cost pilot and a flexible and responsive partnership. Aiming to provide a comprehensive, documented and enriched client experience for home inspections and a robust, timely and accurate ordering system for construction; the technology is generating Board level excitement and commitment to the project.
Group Information Systems Manager, Porter Davis Homes
5 Building Blocks for a successful BYOD program
The BYOD debate is raging and conflicting views abound. Denis will discuss the 5 building blocks for a successful BYOD program being mobile policy, security/privacy, user support, personal spend management and governance. Denis will outline a practical framework to deploy BYOD in stages with appropriate check-points to ensure the business outcomes are achieved.
CEO, Mobile Mentor
Mobility Platforms and the Interaction-oriented revolution
What do people really mean when they talk about delivering their mobility through a platform? Alan will take a closer look at the benefits that Mobility Platforms bring to the table, compare and contrast different classes of platforms and identify the business drivers that might help you to recognise the best type to suit your needs.
A User-Interaction-oriented architecture approach to delivering mobile functionality
Alan will challenge traditional systems-oriented apps thinking for mobility with the alternative of a flexible, future-ready view of the world - the Interaction-oriented Architecture. He´ll discuss and provide examples of how, for delivery to postPC devices everywhere, the best user result is achieved when the focus "All starts with the USER".
Alan will demonstrate how BlinkMobile’s Interaction-oriented Architecture delivers on this philosophy allowing you to create more useful and agile mobile functions that can be consumed on the devices of today and into the future.
Founder & Product Architect, BlinkMobile Interactive
Legal and Risk Considerations in Developing BYOD Policies
The advantages of BYOD programs are clear with increased mobility providing corresponding improvements on productivity and efficiencies. Formal BYOD programs, combined with supporting solutions and policies to ensure security and compliance, are fast-becoming the predominant models for enabling broad employee mobility, across multiple industries, and around the globe. However, BYOD programs also come with costs and risks, which if not managed properly, can have severe consequences.
This session will consider the legal and risk issues arising in developing and implementing BYOD programs and will specifically provide guidance on developing BYOD policies. Issues which will be considered include due diligence; managing data loss and data security; cost and insurance implications for employees and employers and privacy law and telecommunications law issues. Guidance will also be provided on best practice in developing BYOD policies including:
- Device selection and corporate application selection;
- Acceptable use guidance;
- BYOD support considerations;
- Protecting data and integrity;
- Monitoring of communications;
- Ramifications for violating BYOD policies;
- Handling of security breaches, malware attacks or the loss or theft of a device; and
- Decommissioning devices.
Senior Associate, Corrs Chambers Westgarth
All Sponsors Panel
Afternoon Tea/Prize draw & Close of Conference
* This Agenda is subject to change.