Michael Davis, profile picture

Michael Davis

Sort by
Can You Steal From Me Now? Mobile and BYOD Security Risks
Make Mobilization Work - Properly Implementing Mobile Security
Cost Justifying IT Security
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Applicaiton Security - Building The Audit Program
IT Security As A Service
ISACA CACS 2012 - Mobile Device Security and Privacy