Recent presentation I made at CSO Perspectives April 2011: Striking a Culturally Acceptable Balance Between Supporting Consumerized IT and Practical Security Boundaries
2. Striking a Culturally Acceptable Balance Between Supporting Consumerized IT and Practical Security Boundaries Al Raymond, CIPP, CISSP Chief Privacy Officer & IT Risk Mgmt PHH Corporation
14. Information Security Vs. ‘ The Business ” Bottom Line : It Is Ultimately a Business Risk Decision Classic Struggles throughout the Millennia
15. Gartner's Top IT Predictions for 2011 “ Consumerization of IT is no longer a phenomenon to be contained or resisted.” The attention of users and IT organizations will shift from devices, infrastructure and applications - and focus on information and interaction with peers. And this change is expected to herald the start of the post-consumerization era. * Gartner's Top Predictions for IT Organizations and Users, 2011 and Beyond: IT's Growing Transparency Nov 2010
16. Gartner's Top IT Predictions for 2011 Translation : Resistance is Futile * Gartner's Top Predictions for IT Organizations and Users, 2011 and Beyond: IT's Growing Transparency Nov 2010
*Dave Codack, vice-president of employee technology and network services at TD Bank Financial Group in Toronto
Younger users may be turned off from companies with stodgy technology or draconian policies since many younger workers are using social media sites extensively at home, it is unreasonable to think that they will change their habits at work. After waiting 30 minutes for a ten year old work Pentium PC to boot Windows 98 we can see how the concept of a shiny new notebook you can call your own would be appealing
Report: Ovum / European Association for e-Identity and Security (EEMA) – Nov 2010.
That terminator is out there. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, or remorse, or fear. And it absolutely will not stop, ever, until you are dead
Continued convergance is the use of personal devices at work and work devices for personal use
THREE TIPS FOR PROTECTING EMPLOYEE PRIVACY IN AN AGE OF PERSONAL MOBILE DEVICES - 2011 Global IAPP Privacy Summit –Washington, DC Dave Dobrotka, Director, Information Risk Governance United Healthcare; KarriemShakoor, Senior Director, Systems Operations Blue Cross Blue Shield of Michigan, Sean Wessman, Manager, Advisory -IT Risk Transformation Ernst & Young Vicki Kamenova, Manager, Advisory -IT Risk Transformation, Ernst & Young
In the corporate sector, the biggest risk is not social media. It is that social networking has shined a bright, white light on the limits of our current security programs.
Your policies must contemplate technology advances
What can IT live with while still giving users what they want - Boxtone. GoodLink, Symantec
Connection Contract is signed when connecting personal device to corporate network. EE agrees to adhere to company controls and his personal privacy will be respected. If not, company has grounds for investigation
Connection Contract is signed when connecting personal device to corporate network. EE agrees to adhere to company controls and his personal privacy will be respected. If not, company has grounds for investigation