Wednesday, May 10

Start: 11:30am

End: 12:00pm

Every company that either has employees in Europe or processes personal data for a company located in Europe will need a GDPR compliance strategy. As IDC wrote, "EMM is crucial for GDPR." This session will describe some of the key requirements of GDPR and outline the role of the MobileIron solution as an important part of a compliance program.

Wednesday, May 10

Start: 1:15pm

End: 1:45pm

In this session, we’ll walk through all of the integration and complementary points that Microsoft Enterprise Mobility + Security (EMS) brings to your existing MobileIron implementation. This session will explain how to configure identity (Azure AD) for admin/self-service, conditional access (Access/Azure) for unified endpoints, application policies (Intune MAM) for Microsoft apps, and data encryption (Azure Information Protection).

Tuesday, May 9

Start: 11:30am

End: 12:00pm

This session offers an introduction to different single sign-on (SSO) technologies including single sign-on, same sign-on, and seamless sign-on. Attendees will gain a better understanding of how each approach works and the pros and cons from the perspective of a user and IT admin. We will also discuss how MobileIron Access can be used to configure seamless sign-on.

Thursday, May 11

Start: 11:30am

End: 12:00pm

In this session, we’ll demonstrate the innovative management capabilities of MobileIron Cloud. We’ll explain how it supports advanced app management, discuss integrations with partner ecosystems and API management, and explain our vision on identity, access, and desktop management. We’ll also demonstrate some of the unique and incredibly flexible management capabilities of MobileIron Cloud.

Wednesday, May 10

Start: 2:00pm

End: 3:15pm

As the web of security and privacy regulations grows, more organizations must be able to meet these standards. This session will explain some of the different compliance regulations and what industry certifications mean to you. We will discuss what each certification tells you about a product, explain who is generally covered by each of these certifications, and discuss strategies that MobileIron customers can use to meet their regulatory and compliance obligations.

Thursday, May 11

Start: 10:00am

End: 11:15am

Security threats are constantly evolving and ever-increasing. Reports like the Verizon Data Breach Investigations Report (VzDBIR) have suggested that mobile is “not a major source of incidents or breaches,” but is that really the case? And, if so, can we really expect it to last? Join this session for a frank analysis of emerging mobile threats and learn how to defend against them. This session will also review the third edition of the MobileIron Security and Risk Review (MSRR). Fortune favors the prepared, and mobile security is no different. Arm yourself!

Tuesday, May 9

Start: 1:30pm

End: 2:00pm

As mobile employees increasingly use mobile apps to access cloud services, enterprises must mitigate the growing threat of data loss. MobileIron Access specifically targets the risk of data loss as cloud data goes mobile. MobileIron Access ensures that only secured devices, managed apps, and sanctioned cloud apps are allowed to connect to enterprise cloud services like Office 365 and Salesforce. Join this session to learn how you can secure cloud services on mobile using MobileIron Access.

Thursday, May 11

Start: 11:30am

End: 12:00pm

Customers moving to cloud services face the prospect of trusting cloud providers with their sensitive data. MobileIron Access can help by bringing context-aware security to cloud services. To do so, Access needs some sensitive customer data (SAML and SSL keys). Customer security teams are understandably reluctant to entrust such critical security secrets to a 3rd party. This will be a technical deep-dive, starting with how Access can help customers address general cloud security challenges and then exploring the unique challenges and solutions involved in securing Access itself. Customers will see how Access protects their secrets from everyone, even MobileIron and be better equipped to help their security team’s feel comfortable in trusting MobileIron Access to help them secure the cloud.

Wednesday, May 10

Start: TBD

End: TBD

The integration of the Entrust Datacard Mobile Smart Credential solution with the MobileIron platform will enable organizations to extend their existing security investments, such as smart cards and Personal Identity Verification (PIV) cards, to mobile devices, giving them secure access to resources without requiring employees to use additional hardware like smart card readers or tokens

Join Entrust Datacard for this interactive roundtable to help you explore:
WHY move to a mobile desktop
HOW to transition smoothly using Derived Credentials
YEAH BUT what about these issues...

Wednesday, May 10

Start: TBD

End: TBD

Join Dave Jevans, Vice President of Mobile Security at Proofpoint, to unearth dynamic threats that target your mobile devices and their users. This roundtable discussion will examine the risks of app threats, zero day attacks, Wi-Fi vulnerabilities, fake Wi-Fi attacks and URL threats delivered over SMS and iMessage. Become part of the conversation as we unearth how organizations are at risk and now employees can be targeted by attackers. We will discuss case studies, and have a roundtable discussion of how organizations like yours are taking steps to protect themselves and their employees.

Tuesday, May 9

Start: 2:15pm

End: 3:30pm

This workshop will demonstrate how organizations can enable cloud security controls using MobileIron Access and a federated system like Active Directory Federation Services. Attendees will have the chance to enroll their devices and experience Access conditional policies, including single sign-on (SSO), using certificate-based authentication. We will also demonstrate the split-tunnelling capabilities of MobileIron Access.

Tuesday, May 9

Start: 3:45pm

End: 5:00pm

The SSO Workshop will take you through the possibilities of leveraging MobileIron solution to enhance productivity of end users by utilizing the latest single sign on methods. The session would take you through a challenging problem statement, which an organization would face today or in the near future. It will guide you through different approaches to different SSO methodologies and aims at providing you with deeper understanding to SSO. It would also showcase how you can get rid of passwords using MobileIron Tunnel and Access. The attendees will also get to take back a step-by-step guide to implement the learning from this workshop.

Tuesday, May 9

Start: 10:00am

End: 11:15am

In this technical session, we’ll walk through MobileIron’s validated design for Office 365 across unified endpoints. This will include best practices for deploying MobileIron Access in global enterprises while learning how to provide secure authentication methods to Office 365. This session will also walk through certificate-based authentication for Office365 ActiveSync and modern authentication applications.

Wednesday, May 10

Start: 2:00pm

End: 3:15pm

Join this session to understand how core system processes interact internally. We will show you how key log files are read and analyzed to identify Core performance issues and hung threads. Learn how to troubleshoot Core with the help of built-in options such as system monitor, queue activation, and in-memory queue monitor. We'll also show you how to analyze system monitor logs, troubleshoot and understand the certificate check job process, and learn which database optimizations and cleanup options are available on Core. This is an advanced presentation and should only be attended by veteran MobileIron mobility administrators.

Wednesday, May 10

Start: 10:00am

End: 11:15am

Android powers more mobile devices across more verticals than any other OS. Its wide deployment presents endless opportunities as well as challenges for both mobile admins and users. Learn how Android’s enterprise features offer strong protection for corporate apps and data across different devices and deployment models. Explore how the work profile and work-managed device are suited for BYOD and COSU deployments. Attendees will also get an in-depth view into new features such as “always-on” VPN, work challenge, and Google Play integration for companies to manage and secure corporate apps and data.

Tuesday, May 9

Start: 3:45pm

End: 5:00pm

Attend this session to learn how to simplify device deployment through MobileIron and the Apple Device Enrollment Program (DEP). Learn how to quickly configure all of the account settings, apps, and corporate resources your employees need to start working as soon as they power on their iOS devices. You will also gain a better understanding of the Volume Purchase Program (VPP) and how you can make the most of your iOS investment to purchase and distribute paid apps at scale to unlock productivity in the organization.

Wednesday, May 10

Start: 11:30am

End: 12:00pm

This session will dive into the security architecture of Android to help you understand how Google is stopping dangerous apps and implementing protections at the operating system level that can be controlled by MobileIron.

Tuesday, May 9

Start: 1:30pm

End: 2:00pm

Android is the mobile OS that powers more devices across more verticals than other devices. Its wide deployment offers opportunities and challenges for admins and users. Learn how Android’s enterprise features offer strong protection for corporate apps and data across different devices and deployment models. Explore how the work profile and work managed device are suited for BYOD and COSU deployments and get an in-depth view into new features such as “always-on” VPN, work challenge and Google Play integration for companies to manage and secure corporate apps and data.

Thursday, May 11

Start: 10:00am

End: 11:15am

Learn how to eliminate on-premises MobileIron Cloud Sentry servers to make your MobileIron Cloud Sentry deployment successful via Amazon Web Services or Microsoft Azure. The MobileIron Cloud standalone Sentry is a component of a MobileIron Cloud deployment that controls access to ActiveSync-enabled email servers including Office365. Attend this session and come away with best practices for optimizing your implementation.

Tuesday, May 9

Start: 10:00am

End: 11:15am

Learn about the benefits of switching to MobileIron Cloud. Avoid common mistakes and discover best practices for device policy and management, user enrollment, and app distribution. Attend this session to find the best path to a successful roll-out.

Tuesday, May 9

Start: 2:15pm

End: 3:30pm

Monitoring the health of every MobileIron deployment is critical to maintaining security and performance. MobileIron Monitor is a dashboard-based, on-premises solution that allows IT and system admins to monitor MobileIron Core and Sentry servers and related services. Attend this session to learn about MobileIron's latest product release and its key features and benefits.

Tuesday, May 9

Start: 11:30am

End: 12:00pm

Learn best practices for deploying MobileIron Tunnel for iOS. Discover what's possible and learn how to successfully deploy some commonly used, publicly available apps such as Lync, Skype, and SalesForce1, as well as other apps in your organization.

Wednesday, May 10

Start: 1:15pm

End: 1:45pm

Come to our session if you want to learn about Windows 10 Tunnel for desktop and mobile. You will learn about requirements, installation and configuration. We will show examples based on business use cases with QA. After this session, you should be able to setup Tunnel for Windows and experience its capabilities!

Thursday, May 11

Start: 10:00am

End: 11:15am

In the modern enterprise, end users rarely work on just one type of operating system. In a typical workday, an employee might use multiple devices, including an iPhone, Windows 10 Surface tablet, and an Android device. As a result, organizations need to unify the security and management of all these modern endpoints to ensure a unified user experience while safeguarding corporate data. MobileIron is uniquely capable of supporting a massively scalable, multi-OS fleet of mobile and PC devices so users can stay productive wherever they work, on any device. Attend this presentation to learn about the setup and management capabilities for Windows, iOS, Android, and other devices used in the organization today. Learn how to unify device security and management so users can access data effectively regardless of which OS they use.

Tuesday, May 9

Using EMM, organizations can effectively secure and manage PCs, significantly reduce PC TCO, and deliver a far better user experience. However, until recently, gaps in the EMM model prevented IT organizations from fully embracing EMM as the way to secure and manage desktops. With the introduction of MobileIron Bridge, the gaps in the EMM model have now been closed, allowing organizations to move from the old world to the new by accelerating the adoption of EMM. Attend this session to learn how MobileIron Bridge enables organizations to fast track to EMM to lower costs, improve security, and embrace low-touch, over-the-air PC management.

Wednesday, May 10

Start: 1:15pm

End: 1:45pm

With the introduction of MobileIron Core 9.4, IT admins can secure and manage Windows 10 desktops faster and more easily than ever before. MobileIron Bridge and MobileIron Core work seamlessly together with a brand new and intuitive user interface introduced in Core 9.4. This new interface addresses top use cases such as configuring Outlook, removing bloatware, establishing browser and printer settings, invoking a GPO editor and supporting expanded Bitlocker. See how you can get up and running quickly and enable your organization to start taking advantage of low PC TCO using a modern EMM approach for securing and managing desktops.

Wednesday, May 10

Start: 11:30am

End: 12:00pm

Using EMM, organizations can effectively secure and manage Macs and deliver a far better user experience. With the introduction of MobileIron EMM for Mac, organizations can now comprehensively manage Mac desktops as part of their overall multi-OS management platform. Attend this session to learn how MobileIron EMM enables organizations to fast track to EMM to lower costs, improve security, and enable low-touch, over-the-air Mac management.

Tuesday, May 9

Start: 11:30am

End: 12:00pm

Organizations using traditional PC management tools are challenged with a high-touch, high-cost model of PC security and management today. However, EMM is increasingly playing a central role in modern PC security and management by enabling organizations to move to a low-touch model of securing and managing Windows 10 desktops. Using a modern EMM approach, organizations can significantly reduce their PC TCO and deliver a better user experience. Attend this session to learn how your organization can reduce desktop security and management costs by up to 80% across operational, helpdesk, and licensing costs.

Tuesday, May 9

Start: 1:30pm

End: 2:00pm

MobileIron Bridge is the first solution to unify mobile and desktop operations by extending EMM capabilities to Windows 10. IT organizations can now provision, secure, and manage Windows 10 PCs more cost-effectively and easily enforce actions from existing Powershell scripts. Attend this session to learn how the MobileIron Professional Services organization can help your enterprise get started quickly by using a sample set of scripts that minimize IT time and effort.

Tuesday, May 9

Start: 1:30pm

End: 2:00pm

IT admins have expressed the interest of managing Mac desktops/laptops securely and seamlessly. MobileIron EMM solution via its powerful admin management capability deliver the management for Mac devices similar to managing other platforms such as iOS and Android devices. Attend this session to learn how MobileIron enables organizations to fast track to EMM for lower cost, better security and low touch, over-the-air Mac management. This roundtable is also to exchange ideas with customers how they would like to see the Macs are managed using modern EMM approach yet covering functionalities provided by traditional desktop management.

Tuesday, May 9

Start: 11:30am

End: 12:00pm

Using EMM, organizations can effectively secure and manage PCs, significantly reduce PC TCO and deliver a far better user experience. Attend this roundtable to discuss how EMM can greatly modernize PC operations, the role MobileIron Bridge can play in helping your organization fast track to EMM, the top use cases and types of devices that lend themselves well to the modern approach and much more. Bring your questions, thoughts and ideas to the table and walk away with greater insight on modern PC security and management strategy and execution.

Wednesday, May 10

Start: 11:30am

End: 12:00pm

The Internet of Things (IoT) is one of the most hyped technologies today. While IoT has potential to be transformative in enterprises, few have been able to see its benefits because of two main hurdles: security and scale. Attend this roundtable to meet the IOT product leads, and discuss what the Internet of Things is, what it isn’t, strategies to leverage it in your organization and any other questions that are top-of-mind.

Wednesday, May 10

Start: 10:00am

End: 11:15am

By enabling unified endpoint management, Windows 10 offers a new and innovative management approach that is faster and easier than traditional legacy tools. This session is the first of a two-part workshop that demonstrates how MobileIron offers an Apple DEP-like experience for Windows 10 PCs. In this workshop, we will investigate MobileIron Bridge as a solution for mapping legacy GPOs to the modern enterprise. The session will be highly interactive and feature deep dives into theory of operations, technology demonstrations, and hands-on activities. Attendees will leave prepared to investigate and evaluate MobileIron for their Windows 10 deployment.

Wednesday, May 10

Start: 2:00pm

End: 3:15pm

In part 2 of this Windows 10 workshop, we will investigate Microsoft’s underlying EMM technology and how it can be used for basic onboarding tasks as well as advanced security use cases. Topics include Windows enrollment, MobileIron Tunnel, and Windows Information Privacy (WIP). This session will be highly interactive, build on previous material about the theory of operations, and include technology demonstrations and hands-on activities. Attendees will leave prepared to investigate and evaluate MobileIron for their Windows 10 deployment.

Tuesday, May 9

This session will be a technical Q&A with Google’s Android engineers and product managers on Android security. Come with questions, leave with Android security answers.

Tuesday, May 9

Start: 3:45pm

End: 5:00pm

The Internet of Things (IoT) is one of the most hyped technologies today. While IoT has the potential to transform enterprise processes, few organizations have been able to realize its benefits because of two main hurdles: security and scale. In the first half of this session, we’ll explain what IoT is (and isn't) and how to leverage it in your organization. The second half will provide a technical deep dive on MobileIron’s roadmap for IoT and ways MobileIron’s platform can help address the challenges in your own IoT initiatives.

Wednesday, May 10

Start: 10:00am

End: 11:15am

With recent large scale mobile breaches, mobile security should no longer be a blind spot and is now front and center in the enterprise security world. In this interactive discussion, we will:
Cut through the noise and explore how much of enterprise mobile risk is real vs FUD
Define Mobile Threat Defense: What are the components of a complete mobile security strategy,
Explore best practices: How large enterprises are leveraging the powerful MobileIron–Appthority integration to protect their mobile workforce without increasing IT/Security team's workload.

Wednesday, May 10

Start: 2:00pm

End: 3:15pm

Publish, update. Rinse, repeat. Discuss best practices and pitfalls related to securely transfer app binaries, screenshots and meta-data across organizational boundaries between development and IT operations, re-signing external developed apps with your Apple-issued digital identities or Android Keystores, and upload of in-house apps into MobileIron Apps@Work. Learn how organizations like yours have leveraged self-service and automation to save countless man-hours, reduce lead times from development release to availability in Apps@Work, and enable true DevOps-style, agile continuous app delivery

Thursday, May 11

Start: 11:30am

End: 12:00pm

Embrace native capabilities in mobile OS’s with AppConfig.org tools, technologies, and best practices, to enable a simple open way to configure and secure mobile apps.

AppConnect SDKs and wrapping tools, extend native capabilities providing enhanced strength security, encryption and management for stringent, or demanding use cases or verticals. Together, MobileIron AppConfig.org and AppConnect technologies offer seamless and complementary solution space for customer mobile app integrations.

This session delves into trends, and product developments for AppConfig.org technologies (iOS, Google for Work) and AppConnect frameworks (iOS, Android) and provides recommendations on when to use native AppConfig.org or AppConnect app security frameworks

Wednesday, May 10

Start: TBD

End: TBD

Every facet of computing employed in the enterprise must be protected from cyber attacks, and in most cases they are. Companies deploy firewalls, access gateways, email filters, and countless agents, to monitor an endless number of endpoints. Yet, it is likely that the most vulnerable computing devices in the enterprise - mobile phones and tablets, are rarely considered for active threat defense.

This session will demonstrate the reality of the threat to mobile devices and explain the strengths and weaknesses of today’s mobile security models. You will see live attacks on iOS and Android devices, to gain real insight into what mobile threats are possible, and to see the surprisingly easy ways by which they are perpetrated. You will also hear actual global threat data, that documents the level of risk already in the wild, and discuss trends going forward.

We will then transition to the characteristics required to solve for the risk of mobile threats, and learn how the Zimperium mobile threat defense (MTD) platform provides real-time, on-device protection against even zero-day exploits. We will end with a discussion on the growth of IoT in the enterprise, and the synergies in solving for existing, and coming challenges, within the mobile landscape.

Wednesday, May 10

Start: TBD

End: TBD

Encrypted containerization of corporate data is the solution of choice for enabling BYOD. PIM, corporate messaging, files and corporate applications need to be easily accessed in a single location, but still securely managed by the EMM administrator. Success comes from building high levels of security on the device without compromising function and performance for the end user – there seems to be almost no middle ground.

From an enterprise security perspective, many BYOD projects fail or have low adoption because what seems to work in the lab, does not work in the field. This roundtable will focus on understanding what to deliver the mobile end user to do their jobs, without compromising network security