First published on CloudBlogs on Feb 21, 2017
In the second part of my conversation with Andrew Wilson (CIO, Accenture ) we talk about time-traveling humpback whales, how an organization as big as his uses mobile and cloud-based security, and we play an intense game of “ IT Would You Rather .” Andrew also shares some very helpful advice about how to look at mobile security as a function of the device + app + data + the user. This multi-part and multi-layer approach to security is really valuable and worth considering – so, please, don’t get thrown off by the whales. He also has more feedback about my driving. .
In the second part of my conversation with Andrew Wilson (CIO, Accenture ) we talk about time-traveling humpback whales, how an organization as big as his uses mobile and cloud-based security, and we play an intense game of “ IT Would You Rather .” Andrew also shares some very helpful advice about how to look at mobile security as a function of the device + app + data + the user. This multi-part and multi-layer approach to security is really valuable and worth considering – so, please, don’t get thrown off by the whales. He also has more feedback about my driving. .
To Learn more about Microsoft Enterprise Mobility + Security, visit: http://www.microsoft.com/ems .
Next week, I meet up with Dan Morales , the CIO of the godfather of online shopping: eBay . You can subscribe to these videos here , or watch past episodes here: www aka.ms/LunchBreak .Published Sep 08, 2018
Version 1.0Brad Anderson
Iron Contributor
Joined September 06, 2018
Security, Compliance, and Identity Blog
Follow this blog board to get notified when there's new activity