As Conference Chair of the Cloud Identity Summit, I am happy to announce we are hosting a tweet jam on Thursday, June 26. The one-hour long event on Twitter will examine the topic of mobile security and current approaches to managing it, and act as a preview to discussions and sessions at CIS in July.
Anyone with a Twitter account is invited to join the conversation with our lineup of panelists.
Mobile devices are now an inherent part of everyday life. Gartner expects 26 billion devices to be Internet-enabled by 2020, with mobile phone sales expected to total 1.8 billion units within the next year. It's clear that mobile represents a great business opportunity for companies as well as a huge IT security problem. While organizations understand that the proliferation of mobile devices can't be stopped as BYOD becomes commonplace, most do not have the necessary security policies in place to address the security implications of a mobile world.
Please join us on June 26 at 10:00 a.m. PT/1:00 p.m. ET for a tweet jam, hosted by the Cloud Identity Summit and moderated by Dana Gardner, principle analyst at Interarbor Solutions. The Jam will feature experts from the mobile and security community, including vendors, industry analysts, influencers and media. During the one-hour long discussion, we will explore mobile security, including single sign-on and authentication/authorization, and dive into the potential risks and opportunities regarding the protection of the modern enterprise. To access the discussion, please follow the #CISmcc hashtag during the allotted discussion time.
And for those of you who are unfamiliar with tweet jams, here is some background information:
What is a Tweet Jam?
A tweet jam is a one hour "discussion" hosted on Twitter. The purpose of the tweet jam is to share knowledge and answer questions on a chosen topic. Each tweet jam is led by a moderator and a dedicated group of experts to keep the discussion flowing. The public (or anyone using Twitter interested in the topic) is free (and encouraged!) to join the discussion.
Whether you're a newbie or veteran Twitter user, here are a few tips to keep in mind:
Have your first #CISmcc tweet be a self-introduction: name, affiliation, occupation.
Start all other tweets with the question number you're responding to and the #CISmcc hashtag.
Example: "Q4: Mobile poses a lot of interesting questions regarding identity and access management, especially within the enterprise #CISmcc"
Please refrain from product or service promotions. The goal of a tweet jam is to encourage an exchange of knowledge and stimulate discussion.
While this is a professional get-together, we don't have to be stiff! Informality will not be an issue!
A tweet jam is akin to a public forum, panel discussion or Town Hall meeting. Please be focused and thoughtful.
If you have any questions prior to the event or would like to join as a participant, please direct them to Rod McLeod (email@example.com). We anticipate a lively chat and hope you will be able to join!
Registration is now openfor the Cloud Identity Summit 2014, July 19-22, in Monterey, Calif.