Conferences that solve current IT challenges

Enterprise Mobility Strategies

Strategies to help solve today's current mobility challenges

April 12, 2012


7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded



Conference location: Donald E. Stephens Convention Center Rosemont (O'Hare) Illinois


A rapid shift has once again presented itself in the industry. With the advances in smartphones and tablet computing, employees are now even more productive than ever before. However, these advancements have also caused headaches for the IT professionals responsible for managing the mobile environment.

How do you support the mobile workforce while dealing with the challenges of secure access, policy management as well as training and support.

What You Will Learn

In this one day conference attendees will learn:

  • How to design a mobile program that supports your internal business unit ‘customers’ as well as external customers

  • How to balance enterprise IT security with the organization’s requirement of anytime access

  • How to mitigate risk by designing mobile device policies that enhance security while not lessening productivity

  • How cloud computing will support the mobile stack

  • Where you should invest in your mobile application strategy

  • How to manage your carrier relationships

  • The next set of technology trends that will affect the mobile environment

  • How to establish a program that supports BYOD that everyone can live by

  • What do you manage the rise of the mobile workforce also known as Mobilocracy?

Conference Program

8:00am - 9:00am - Registration and Continental Breakfast

Soo Hoo


Business & IT: Finding the Fit and Setting the Mobility Strategy

Ed Soo Hoo, Global Strategic Partner Lead, HP Technology Consulting

Users are demanding more mobile options and IT is responsible for safeguarding the organization’s information assets. At the same time, CIOs are eager to increase mobility while CFOs are looking for ROI. How should you set a strategy that helps drive the business forward but has safeguards in place that do not preclude leveraging mobility for business innovation?

In this session, attendees will learn:

  • Where mobility fits in their organization
  • How IT and the business should work together
  • Who the stakeholders are and what is important to them
  • How to set realistic expectations with users
  • How to determine ROI measurements
  • How to leverage mobility to move the business forward

10:00am -10:30am - Refreshment Break



How to Leverage Mobility for Business Process Improvements

Sanjib Sahoo, CTO, OptionMonster Holdings, Inc.

Mobility in many ways is still in the early stages. However, it is imperative for CIOs and IT leaders to determine how to leverage mobility as a competitive differentiator for their organizations.

In this session attendees will learn:

  • How to redesign business (customer facing) processes
  • How to establish centers in-house for development of leading applications
  • How to reduce procurement barriers to enterprise device adoption



Architecture: How to Mesh Mobile Devices and Applications with Current Systems

David McNeely, Senior Director of Product Management, Centrify

Increasing an organization’s mobility has tremendous value for the enterprise but it can wreak havoc on the architecture if not properly planned for. How do you keep your internal business units mobile and happy, while at the same time ensuring that your architecture does not hit a snag?

In this session attendees will learn: 

  • How to modify your architecture to support mobility
  • How to design your next generation architecture with mobility as the norm
  • How to increase robustness with respect to wireless medium
  • How to increase trustworthiness in the form of enhanced security

12:30pm - 1:30pm Luncheon



Applications: How to Design Applications with a ‘Mobility First’ Mentality

J Schwan, Founder and President, Solstice Consulting and Bottega Sol

Due to the ease of use and plethora of mobile applications, most organizations feel that they need to develop mobile applications just to stay relevant. But before you jump in and design applications based on user demand you need to think through what makes sense for your organization.

In this session attendees will gain an understanding of the following:

  • What are the business drivers
  • Weigh the options – mobile App versus mobile website
  • Consider where the app will be used and who will be using it
  • How to follow standard UI conventions
  • How to design based on the needs of the intended users
  • How to test, test and test

2:30pm - 3:00pm - Refreshment Break



MDM: How to Develop and Implement Policies to Manage and Secure Mobile Devices

Michael Marchuk, Director of Client Solutions, Network Data Systems

Mobility isn't a new technology for many companies especially in the retail or distribution industry, but is now a critical trend that is plaguing most CIO's in any industry. With the growth of tablet sales predicted to reach around 200 million units by 2014, CIO's are concerned that they could potentially lose control of the IT environment with every senior executive bringing in a new device that they received as a gift from their spouse and demanding that they have access to the critical business information anywhere, anytime and anyway. Many questions will arise in terms of “do we allow users to bring your own (BYO) devices”, “do we lock applications down”, “what do we do when the device is lost or stolen,” etc.

This session will focus on guiding IT leaders on balancing the considerations required to effectively and efficiently manage the mobile device throughout its full lifecycle. A well-balanced mobility management program starts with:

  • establishing a solid foundation by understanding the business user requirements;
  • identifying necessary security and compliance requirements;
  • establishing the corporate mobility policies, guidelines, processes, and procedures;
  • determining the approach for managing the mobile device (e.g. complete device, application and data management, or just data management).

The critical success factors of the enterprise mobility program are implementing a right-sized mobility management platform that is able to control costs, mitigate risks, and reduce help desk calls while preserving the mobile device as a valuable efficient tool for the business.







BYOD: How IT Departments are Managing the Challenges and Capitalizing on the Opportunities

Jeff Kane, BDM, Verivo
Panelists will include:
Praveen Moturu, Chief Enterprise Architect, Navistar
Asad Syed, CISSP-ISSAP, CISM, CISA, Lead IAM Security Engineer, Office Max
Ricardo Lafosse, Senior Security Engineer, Rehabilitation Institute of Chicago
Diana Salazar, Infrastructure, Security & Operations - IT Security Compliance, NORC at the University of Chicago
and other IT leaders sharing experiences and lessons learned

IT organizations across the board are struggling with consumerized devices through their respective organizations. With issues of security, manageability, accessibility, ownership, etc. how can all of this be managed?

In this session attendees will learn from a panel of enterprise IT leaders as to how they are managing and controlling the situations that arise without precluding productivity.

Conference Price: $259.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


As is always the case at CAMP IT Conferences events, the talks will not include product presentations.  During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.