Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to develop an effective, long-term security strategy focused on business outcomes in this 29-minute conference talk. Explore why focusing on every piece of malware may not be the most effective approach and discover how to create a trust-based security framework that protects sensitive cloud services and critical data. Gain insights into implementing a zero-trust strategy, leveraging identity management for enhanced security, and balancing protection with user productivity. Master the art of compliance management, malware protection, and risk mitigation while addressing app-based threats and end-user exploitation. Walk away with practical knowledge on implementing outcome-focused security measures that ensure only authorized users on enrolled, threat-free devices can access critical business data, ultimately simplifying work processes while maintaining robust organizational security.
Syllabus
Introduction
Apple devices under threat
Why are they being targeted
What can we do
Compliance Management
Protecting Against Known and Unknown Malware
AppBased Risks
End User Exploitation
Taught by
Jamf