+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

BYOD and Information Security - Is this an Oxymoron?

  • Training

  • 60 Minutes
  • Compliance Online
  • ID: 5975731
This BYOD and information security webinar will help you explore the current state of BYOD in the workplace, the need to evaluate the risk to the organization prior to deployment, the critical need for identifying and communicate a strong legal strategy, select the right mobile device management solutions (based on risk assessment), ability to develop and implement strong BYOD policies, is BYOD right for your organization, and how the “Cloud” impacts information security with BYOD.

Why Should You Attend:

A survey of 650 information and security professionals about how the 'bring your own device' (BYOD) trend is impacting their organizations finds one-quarter of them forbid use of personally owned devices such as smartphones and tablets on the network. However, the majority that does often lack meaningful policies or security controls related to these devices. BYOD continues to impact the way organizations are able to protect their IT infrastructure. The 'SANS Survey on Mobility/BYOD Security Policies and Practices' found about one-third acknowledging they lack meaningful BYOD security policies. When asked what kind of products or services they're utilizing for mobile devices, roughly half indicated a mix of data protection via encryption, secure access to corporate resources, and while less than half used anti-malware or data-loss prevention, for example. However, 67% expects to implement cloud-based provisioning in the next 12 months.

BYOD programs in the enterprise can liberate employees and trim the bottom line. But it also brings hidden costs and security risks to a corporate network. This is not some passing fancy, it is here to stay and not dealing with the impact on your infrastructure will place you a vulnerable situation. Being able to get your arms around the BYOD revolution is the first step in bring a structured implementation process to the organization.

This webinar will provide valuable assistance to all organizations that are looking to deploy BYOD into their IT enterprise. The focus will be upon addressing the issues and begin to develop a viable strategy framework for deploying BYOD within your organization.

Areas Covered in the Webinar:

The webinar will cover the following areas:
  • Current State of BYOD in the workplace.
  • Need to evaluate the risk to the organization prior to deployment.
  • Identify the three types of risk BYOD brings to an organization.
  • Critical need for identifying and communicate a strong legal strategy.
  • Select the right mobile device management solutions (based on risk assessment).
  • Ability to develop and implement strong BYOD policies.
  • Should you deploy BYOD in your organization.
  • How the “Cloud” impacts information security with BYOD.

Who Will Benefit:

This topic applies to personnel in any organization that needs to implement BYOD on their IT infrastructure. The employees who will benefit most include:
  • Senior Management
  • IT Security Managers
  • IT Managers
  • IT Security Compliance
  • Risk Managers
  • HR Managers

Course Provider

  • Thomas DeLaine
  • Thomas DeLaine,