SlideShare ist ein Scribd-Unternehmen logo
1 von 25
BYO: BYO A GOOD THING?…………………………………
Head of Information Security
Company85
Phil Cracknell, FBCS, CISSP, MIRM
DILBERT © (2013) Scott Adams. Used by permission of Universal Uclick. All rights reserved.
BYOD grows like a weed
The ability of
corporations to deal
with it grows like…
petrified wood
BYOD has stirred plenty of controversy
Companies are either embracing it to its fullest extent
or avoiding it like the plague
It is one of the few technology shifts that can ‘creep’
into an organisation from the top down!
Current Adoption
BYOD or BYO seemed to emerge around 2009 as a
questionable solution to rising IT costs
• More functional/sexy technology now available for
personal consumption
• Company or user initiated?
• Is it inevitable?
• How should businesses approach it?
Where did BYO come from?
So why is there a greater apparent fear of BYO than
any other recent technology shift?
– Less control of IT?
– Less ownership?
– Implied greater personal use?
Fear
When employees invest their own money in a device, they
naturally feel
“it’s mine, so I should be able to do what I want with it.”
When the company pays for a device, employees are more
inclined to accept rules and restrictions
The Balancing Act
From the user perspective
“I don’t want to carry my own phone and a company one”
“I don’t want to use my personal phone for work”
“I can’t use my work phone to the degree I require for
personal use”
“I want the latest technology of my choice, not the ones my
company choose”
A good thing
BYOD can potentially save your company money and
help make your employees happier and more
productive
It could drive massive and essential changes to larger
businesses in terms of network zoning, data
segregation and classification (Internal security
defences)
There’s always a ‘however’
BYOD brings along with it a number of risks, from
security to compatibility and everything in between
– Legal
– HR issues
– Device loss/insurance/replacement
– Policy
BYOD Risks
1: Exposed data
2: Passwords in the wild
3: Declining productivity
4: Compatibility issues
5: Bandwidth overuse/wireless bottlenecks
6: Device management
7: Virus infections
People
BYOD presents several technical risks but
ultimately they are linked to people and
behaviour
BYOD brings out the best and worst in people,
and the user types can be easily categorised
The Millennials
I blame them for it all!!!
It's the Millennials pouring into all our workplaces.
They put the pressure on management to allow
them to use their own mobile devices on the
job, not some antiquated corporate-issued
BlackBerry. That's sooo 1998!!
They want to work odd hours and over weekends.
They actually want their business lives and
personal lives to blend.
The Techies
They've found a friend in Android.
With BYOD in place, they are free to poke
fun at the consumerised Apple-users,
compare App stores, support and
functionality – and all in the name of work!
Android offers the flexibility that techies
crave, and also serves up some pretty cool
apps for monitoring systems remotely and
other IT job functions.
The Main Board
CEOs and the like have a hallowed place in
the BYOD world. Whatever they want, they
get.
Like Captain Kirk with an MBA, these
business leaders shout for more power, “all
you can give me and then more!” and the
trusty IT engine room shall provide it.
From Apple devices on the day of launch, to
an IT throwback such as the BlackBerry it’s
pretty clear where the BYOD fire started...
The Older Generation
BYOD isn't for everyone, but that hasn't
stopped some companies from mandating the
policy across the workforce.
Half of employers will require employees to
supply their own device for work purposes by
2017, says a Gartner survey of CIOs.
Pity the worker who doesn't want to put up
the cash for a fancy mobile device, sign over
privacy rights, and then be expected to surf
social networks for support when things go
wrong.
Who loves the iPhone and iPad more than
anyone else? Salespeople, of course!
They like to keep things simple, love to
give dynamic presentations, and hate
typing on keyboards. They also like to
blend their personal and work lives.
The iPad with its bold Retina display was
simply made for salespeople in the
workplace.
The Salespeople
The Clock-watchers
Entry-level and hourly workers have much to
gain from BYOD, many of whom don't qualify for
a corporate-issued device. Now they can tap into
the power of personal mobile technology to do
their jobs.
It's a freedom they've never had before.
Great, right? Well, BYOD also opens the doors to
work outside of defined work hours, in the form
of work-related email and text messages
bombarding hourly workers after they have
punched out.
Expect a slew of lawsuits for unpaid overtime.
The Moaners
Every workforce has moaners. Nothing is ever good
enough, and BYOD is no exception. BYOD was
trumpeted by moaners who wanted to use their own
devices instead of a corporate-issued relic.
They complained about having to carry around two
devices all the time.
Now that BYOD has arrived, they're still complaining.
Expectations of privacy, security controls on personal
devices, and policies chock full of legal jargon.
The moaner makes the remote wipe capability of
MDM a must!
The Social Networkers
Social networking addicts love BYOD. It
makes social networking easier to do at
work.
One of the top concerns with BYOD is that
it will lead to less productive workers.
Some companies even ban or limit the use
of Facebook and others at work.
On a related note, companies also better
not infringe on an employee's right to
social media privacy in a BYOD policy.
The Bad Employees
In the wrong hands, BYOD can be
disastrous. The problem for us is that it
will soon be in every employees
hands!
Most companies have disgruntled
employees. BYOD effectively makes it
easier for a ‘bad’ employee to steal
stuff and hide it somewhere in the
cloud, even claiming ignorance to the
actual location of where the data was
‘moved’ or coped to ;-)
Vendor FUD
Despite the inevitable flood of Fear, Uncertainty and Doubt
spewed from our vendor community – many of the risks with
BYO are INTERNAL and staff-related
Use BYOD to clean up your wild west – embrace it! BYOD will, if
done right, make your world more secure not less
Some essentials for survival of BYO
Get a clear mandate from the board
– What is in scope? BYOD doesn’t have to mean mobiles, tablets and laptops – ask the hard
questions
Data Classification and Zoning
– Ensure you know where your important/confidential data is
– Ensure policies and technology control access to this data
– Control entry to and placement on your network – a BYO DMZ? Hell yes!
Get an MDM (Mobile Device Management) solution
– Remote wipe
– Device barring and exclusion
– Remote enforcement of PIN lock and other features
BYO – A good thing?
Thank you!
Phil Cracknell, FBCS, CISSP, MIRM
Head of Security and Privacy services at
Company85
uk.linkedin.com/in/cracknell
@pcracknell

Weitere ähnliche Inhalte

Was ist angesagt?

New Assumptions for Designing for the Social Web
New Assumptions for Designing for the Social WebNew Assumptions for Designing for the Social Web
New Assumptions for Designing for the Social WebChris Messina
 
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile FirstAD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile FirstJohn Head
 
Be Prepared For Byod
Be Prepared For ByodBe Prepared For Byod
Be Prepared For ByodNováccent
 
Facebook And Apple Are Serious About Augmented Reality
Facebook And Apple Are Serious About Augmented RealityFacebook And Apple Are Serious About Augmented Reality
Facebook And Apple Are Serious About Augmented RealityBernard Marr
 
Mobile technology
Mobile technologyMobile technology
Mobile technologyhillarz
 
8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World 8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World Bernard Marr
 
7 Amazing Everyday Examples Of Nanotechnology In Action
7 Amazing Everyday Examples Of Nanotechnology In Action7 Amazing Everyday Examples Of Nanotechnology In Action
7 Amazing Everyday Examples Of Nanotechnology In ActionBernard Marr
 
Social mobile usage Don't Leave Social at the Office
 Social mobile usage   Don't Leave Social at the Office Social mobile usage   Don't Leave Social at the Office
Social mobile usage Don't Leave Social at the OfficeHeath McCarthy
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtRoopa Nadkarni
 
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?Bernard Marr
 
Mobile writing by the numbers
Mobile writing by the numbersMobile writing by the numbers
Mobile writing by the numbersAnn Wylie
 
Mobliciti's Mobile & Cloud Technical Showcase
Mobliciti's Mobile & Cloud Technical Showcase Mobliciti's Mobile & Cloud Technical Showcase
Mobliciti's Mobile & Cloud Technical Showcase Aanya Ali
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends PostTBledsoe
 
Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti
 
The Digital Workplace Revolution
The Digital Workplace RevolutionThe Digital Workplace Revolution
The Digital Workplace RevolutionAtlas Cloud
 
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...Axios Systems
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media GovernanceJesse Wilkins
 
BYOD Trends, Challenges, Pitfalls and Tips
BYODTrends, Challenges, Pitfalls and TipsBYODTrends, Challenges, Pitfalls and Tips
BYOD Trends, Challenges, Pitfalls and TipsAxios Systems
 
What Will a Future Workforce Look Like?
What Will a Future Workforce Look Like?What Will a Future Workforce Look Like?
What Will a Future Workforce Look Like?Candarine
 
CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?John Newton
 

Was ist angesagt? (20)

New Assumptions for Designing for the Social Web
New Assumptions for Designing for the Social WebNew Assumptions for Designing for the Social Web
New Assumptions for Designing for the Social Web
 
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile FirstAD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
 
Be Prepared For Byod
Be Prepared For ByodBe Prepared For Byod
Be Prepared For Byod
 
Facebook And Apple Are Serious About Augmented Reality
Facebook And Apple Are Serious About Augmented RealityFacebook And Apple Are Serious About Augmented Reality
Facebook And Apple Are Serious About Augmented Reality
 
Mobile technology
Mobile technologyMobile technology
Mobile technology
 
8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World 8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World
 
7 Amazing Everyday Examples Of Nanotechnology In Action
7 Amazing Everyday Examples Of Nanotechnology In Action7 Amazing Everyday Examples Of Nanotechnology In Action
7 Amazing Everyday Examples Of Nanotechnology In Action
 
Social mobile usage Don't Leave Social at the Office
 Social mobile usage   Don't Leave Social at the Office Social mobile usage   Don't Leave Social at the Office
Social mobile usage Don't Leave Social at the Office
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holt
 
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
 
Mobile writing by the numbers
Mobile writing by the numbersMobile writing by the numbers
Mobile writing by the numbers
 
Mobliciti's Mobile & Cloud Technical Showcase
Mobliciti's Mobile & Cloud Technical Showcase Mobliciti's Mobile & Cloud Technical Showcase
Mobliciti's Mobile & Cloud Technical Showcase
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends Post
 
Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016
 
The Digital Workplace Revolution
The Digital Workplace RevolutionThe Digital Workplace Revolution
The Digital Workplace Revolution
 
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance
 
BYOD Trends, Challenges, Pitfalls and Tips
BYODTrends, Challenges, Pitfalls and TipsBYODTrends, Challenges, Pitfalls and Tips
BYOD Trends, Challenges, Pitfalls and Tips
 
What Will a Future Workforce Look Like?
What Will a Future Workforce Look Like?What Will a Future Workforce Look Like?
What Will a Future Workforce Look Like?
 
CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?
 

Andere mochten auch

Imad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOImad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOGlobal Business Events
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015IANS
 
Building security leaders ISSA Virtual CISO Series
Building security leaders   ISSA Virtual CISO SeriesBuilding security leaders   ISSA Virtual CISO Series
Building security leaders ISSA Virtual CISO SeriesAaron Carpenter
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobPriyanka Aash
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Maurice Dawson
 

Andere mochten auch (8)

Imad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOImad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIO
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015
 
So you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to SuccessSo you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to Success
 
MESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - UpdatedMESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - Updated
 
#%! My CISO Says
#%! My CISO Says#%! My CISO Says
#%! My CISO Says
 
Building security leaders ISSA Virtual CISO Series
Building security leaders   ISSA Virtual CISO SeriesBuilding security leaders   ISSA Virtual CISO Series
Building security leaders ISSA Virtual CISO Series
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)
 

Ähnlich wie Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good thing?

Byod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldByod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldKévin CÉCILE
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper4imprint
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi namboori
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleLogicalis
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD HandbookBarcoding, Inc.
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsTrefor Smith
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docxssuserf9c51d
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docxmattinsonjanel
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
BYOD Security
BYOD SecurityBYOD Security
BYOD SecurityHexnode
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"NEORIS
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’John Davis
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceRihab Chebbah
 
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
S w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docxS w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docx
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docxjeffsrosalyn
 

Ähnlich wie Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good thing? (20)

Byod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldByod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional world
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
BYOD
BYODBYOD
BYOD
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
 
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
S w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docxS w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docx
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
 

Mehr von Global Business Events

Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Global Business Events
 
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Global Business Events
 
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Global Business Events
 
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Global Business Events
 
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Global Business Events
 
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationHakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationGlobal Business Events
 
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Global Business Events
 
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Global Business Events
 
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Global Business Events
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...Global Business Events
 
John Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyJohn Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyGlobal Business Events
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Global Business Events
 
Keith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingKeith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingGlobal Business Events
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseGlobal Business Events
 
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Global Business Events
 
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Global Business Events
 
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Global Business Events
 
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Global Business Events
 
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Global Business Events
 

Mehr von Global Business Events (20)

Cio Event
Cio EventCio Event
Cio Event
 
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
 
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
 
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
 
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
 
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
 
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationHakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
 
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
 
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
 
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
 
John Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyJohn Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security Anxiety
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Keith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingKeith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined Everything
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
 
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
 
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
 
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
 
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
 
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
 

Kürzlich hochgeladen

Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.thamaeteboho94
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...ZurliaSoop
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxlionnarsimharajumjf
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...amilabibi1
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoKayode Fayemi
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityHung Le
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 

Kürzlich hochgeladen (17)

in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven CuriosityUnlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
Unlocking Exploration: Self-Motivated Agents Thrive on Memory-Driven Curiosity
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 

Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good thing?

  • 1. BYO: BYO A GOOD THING?………………………………… Head of Information Security Company85 Phil Cracknell, FBCS, CISSP, MIRM
  • 2. DILBERT © (2013) Scott Adams. Used by permission of Universal Uclick. All rights reserved.
  • 3. BYOD grows like a weed The ability of corporations to deal with it grows like… petrified wood
  • 4. BYOD has stirred plenty of controversy Companies are either embracing it to its fullest extent or avoiding it like the plague It is one of the few technology shifts that can ‘creep’ into an organisation from the top down! Current Adoption
  • 5. BYOD or BYO seemed to emerge around 2009 as a questionable solution to rising IT costs • More functional/sexy technology now available for personal consumption • Company or user initiated? • Is it inevitable? • How should businesses approach it? Where did BYO come from?
  • 6. So why is there a greater apparent fear of BYO than any other recent technology shift? – Less control of IT? – Less ownership? – Implied greater personal use? Fear
  • 7. When employees invest their own money in a device, they naturally feel “it’s mine, so I should be able to do what I want with it.” When the company pays for a device, employees are more inclined to accept rules and restrictions The Balancing Act
  • 8. From the user perspective “I don’t want to carry my own phone and a company one” “I don’t want to use my personal phone for work” “I can’t use my work phone to the degree I require for personal use” “I want the latest technology of my choice, not the ones my company choose”
  • 9. A good thing BYOD can potentially save your company money and help make your employees happier and more productive It could drive massive and essential changes to larger businesses in terms of network zoning, data segregation and classification (Internal security defences)
  • 10. There’s always a ‘however’ BYOD brings along with it a number of risks, from security to compatibility and everything in between – Legal – HR issues – Device loss/insurance/replacement – Policy
  • 11. BYOD Risks 1: Exposed data 2: Passwords in the wild 3: Declining productivity 4: Compatibility issues 5: Bandwidth overuse/wireless bottlenecks 6: Device management 7: Virus infections
  • 12. People BYOD presents several technical risks but ultimately they are linked to people and behaviour BYOD brings out the best and worst in people, and the user types can be easily categorised
  • 13. The Millennials I blame them for it all!!! It's the Millennials pouring into all our workplaces. They put the pressure on management to allow them to use their own mobile devices on the job, not some antiquated corporate-issued BlackBerry. That's sooo 1998!! They want to work odd hours and over weekends. They actually want their business lives and personal lives to blend.
  • 14. The Techies They've found a friend in Android. With BYOD in place, they are free to poke fun at the consumerised Apple-users, compare App stores, support and functionality – and all in the name of work! Android offers the flexibility that techies crave, and also serves up some pretty cool apps for monitoring systems remotely and other IT job functions.
  • 15. The Main Board CEOs and the like have a hallowed place in the BYOD world. Whatever they want, they get. Like Captain Kirk with an MBA, these business leaders shout for more power, “all you can give me and then more!” and the trusty IT engine room shall provide it. From Apple devices on the day of launch, to an IT throwback such as the BlackBerry it’s pretty clear where the BYOD fire started...
  • 16. The Older Generation BYOD isn't for everyone, but that hasn't stopped some companies from mandating the policy across the workforce. Half of employers will require employees to supply their own device for work purposes by 2017, says a Gartner survey of CIOs. Pity the worker who doesn't want to put up the cash for a fancy mobile device, sign over privacy rights, and then be expected to surf social networks for support when things go wrong.
  • 17. Who loves the iPhone and iPad more than anyone else? Salespeople, of course! They like to keep things simple, love to give dynamic presentations, and hate typing on keyboards. They also like to blend their personal and work lives. The iPad with its bold Retina display was simply made for salespeople in the workplace. The Salespeople
  • 18. The Clock-watchers Entry-level and hourly workers have much to gain from BYOD, many of whom don't qualify for a corporate-issued device. Now they can tap into the power of personal mobile technology to do their jobs. It's a freedom they've never had before. Great, right? Well, BYOD also opens the doors to work outside of defined work hours, in the form of work-related email and text messages bombarding hourly workers after they have punched out. Expect a slew of lawsuits for unpaid overtime.
  • 19. The Moaners Every workforce has moaners. Nothing is ever good enough, and BYOD is no exception. BYOD was trumpeted by moaners who wanted to use their own devices instead of a corporate-issued relic. They complained about having to carry around two devices all the time. Now that BYOD has arrived, they're still complaining. Expectations of privacy, security controls on personal devices, and policies chock full of legal jargon. The moaner makes the remote wipe capability of MDM a must!
  • 20. The Social Networkers Social networking addicts love BYOD. It makes social networking easier to do at work. One of the top concerns with BYOD is that it will lead to less productive workers. Some companies even ban or limit the use of Facebook and others at work. On a related note, companies also better not infringe on an employee's right to social media privacy in a BYOD policy.
  • 21. The Bad Employees In the wrong hands, BYOD can be disastrous. The problem for us is that it will soon be in every employees hands! Most companies have disgruntled employees. BYOD effectively makes it easier for a ‘bad’ employee to steal stuff and hide it somewhere in the cloud, even claiming ignorance to the actual location of where the data was ‘moved’ or coped to ;-)
  • 22. Vendor FUD Despite the inevitable flood of Fear, Uncertainty and Doubt spewed from our vendor community – many of the risks with BYO are INTERNAL and staff-related Use BYOD to clean up your wild west – embrace it! BYOD will, if done right, make your world more secure not less
  • 23. Some essentials for survival of BYO Get a clear mandate from the board – What is in scope? BYOD doesn’t have to mean mobiles, tablets and laptops – ask the hard questions Data Classification and Zoning – Ensure you know where your important/confidential data is – Ensure policies and technology control access to this data – Control entry to and placement on your network – a BYO DMZ? Hell yes! Get an MDM (Mobile Device Management) solution – Remote wipe – Device barring and exclusion – Remote enforcement of PIN lock and other features
  • 24.
  • 25. BYO – A good thing? Thank you! Phil Cracknell, FBCS, CISSP, MIRM Head of Security and Privacy services at Company85 uk.linkedin.com/in/cracknell @pcracknell