Wednesday, June 4th 2025

Zero Data at Rest: A New Chapter in Mobile Security Strategy

5:30 PM - 8:00 PM ET | New York, NY

Event Overview

Zero trust has dominated the strategy of organizations around secure internal and external access of both end users and privileged users. With the meteoric growth of mobile devices, the recognized threat of mobile devices requires a strategy that is consistent with the rest of the organization. Just as importantly, BYOD (bring your own device) is a desired state for employees and contractors as well as the organizations they support. However, ensuring that corporate data is protected while preserving user privacy is not being addressed by current strategies.

Despite widespread investment in mobile device management (MDM) and application
controls, core questions persist. Can organizations truly secure data if it lives on the device? Is compliance compatible with BYOD culture? And how do we move from managing risk reactively to designing resilience into mobile access itself?

This executive roundtable invites security and IT leaders to explore a new approach – one that replaces data residency with data separation, and puts usability and privacy on equal footing with security. 

Register to join this exclusive roundtable to explore:

  • How a virtual phone model addresses the four competing demands of mobile security: privacy, cost, compliance, and convenience.
  • Real-world lessons from deploying virtual mobility solutions across highly regulated and high-risk sectors.
  • Strategies to tackle shadow IT, reduce device sprawl, and support multiple user roles—without compromising control or visibility.
  • Why organizations are replacing “or” with “and” in their BYOD strategies – unlocking better outcomes without more complexity.

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

 

Sean D. Mack

Managing Director

ISMG

 

Jim Cushman

President

Hypori

Speakers

Drawing on experience in both defense and enterprise sectors, Jim Cushman, President of Hypori will share lessons on reframing mobile strategy for today’s regulatory, financial, and human realities.

This session will be:

  • Chatham house rule
  • Peer driven
  • Pitch free

Subject matter expert

Jim Cushman

President

Hypori

Cushman has more than 30 years of experience in strategic product development and scaling mission-
critical technology companies. He focuses on implementing operational excellence and leads zero-trust mobile security initiatives for defense, government and commercial markets. He oversees product
strategy, engineering and operations while driving the company’s expansion into fintech, healthcare and
enterprise markets requiring protection from cybersecurity attacks

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

Morton's The Steakhouse

Club Quarters Hotel World Trade Center, 136 Washington

St, 10006 New York

Underwritten by

Hypori is a  cybersecurity company specializing in secure virtual mobile infrastructure (VMI) solutions that enable organizations to provide secure access to enterprise applications and data from any mobile device, without compromising user privacy or storing data on the device.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Severless: Accelerating Development for Data-Intensive Workloads

June 24, 2025

Agentic AI and the Access-Trust Gap

June 25, 2025

The Critical Role of the SOC in Modern Defense

August 19-20

Virtual Summit: Cybersecurity Implications of AI, Global

Upcoming ISMG Events

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Severless: Accelerating Development for Data-Intensive Workloads

June 24, 2025

Agentic AI and the Access-Trust Gap