The document discusses securing mobile technology with a focus on a data-centric approach to security amidst the evolution of mobile and web computing. It outlines various security programs and technologies, emphasizing risk assessment, asset management, and the importance of data governance and application governance. The author advocates a proactive strategy in mobile security that involves inventorying, classifying, and protecting data while monitoring control effectiveness.
Related topics: