THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.

Slides:



Advertisements
Similar presentations
Security Policy. TOPICS Objectives WLAN Security Policy General Security Policy Functional Security Policy Conclusion.
Advertisements

Rider Universitys BYOD Story. First two short films…… Dilbert Humorous skit about an employee, desperate to get his work done more efficiently tries to.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Security for Mobile Devices
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Chapter 12 Strategies for Managing the Technology Infrastructure.
Information Systems Security Officer
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Solution Briefing Business Productivity in Action Keynote.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Ecosystem.
Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Mobile Work Exchange Spring Town Hall April 30, 2013 Planning for Tomorrow’s Mobile.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Security considerations for mobile devices in GoRTT
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
Children’s Hospital Requirements for Remote Access.
Information Assurance Policy Tim Shimeall
Presented by Team Alpha MOBILE DEVICE SECURITY 1.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
IT Governance: COBIT, ISO17799 & ITIL. Introduction COBIT ITIL ISO17799Others.
Note1 (Admi1) Overview of administering security.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Working with HIT Systems
Introduction to Information Security
Presented By T. J. Crayne Panelists Wayne Stillwagon, Executive VP, Miller’s Supplies At Work Steve Gordon, President, Independence Business Supply Robert.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Montgomery County, Maryland Technology Approach & Trends at Montgomery County March 8, 2012 Dieter Klinger Acting CIO Chief, Enterprise Systems and Operations.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Chapter 8 Auditing in an E-commerce Environment
Describe the potential of IT to improve internal and external communications By Jim Green.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Chapter 11 Implementing Social Commerce Systems. Learning Objectives 1.Describe the major issues in the social commerce implementation landscape. 2.Discuss.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Internet of Things Business Case Template. Powered by InfoTech, provided by Atlantic BT Summarize the business case for analyzing the Internet of Things.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Moving to BYOD Gary Audin 1.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Managed IT Services JND Consulting Group LLC
Workshifting Transform your business – empower your people.
Total Enterprise Mobility Comprehensive Management and Security
BYOD Security Risks Presentation by Ravi Namboori Visit
Mobile Devices in the Corporate World
BYOD: Short-term Gain Without Long-term Pain?
Impact of IT Consumerisation on Enterprise Security
IS4680 Security Auditing for Compliance
Introduction to Soonr by ….
I have many checklists: how do I get started with cyber security?
Introduction to BYOD EIT, Author Gay Robertson, 2017.
IT & Security Training Skills.
In the attack index…what number is your Company?
Presentation transcript:

THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano

Introduction  How is Mobility Changing the Way Organizations Do Business?  The Possible Shift  Systems of Engagements  The demand for smartphones and tablets

Introduction  The Explosion of Smart phones and Tablets

Embracing The Trend  Not a passing trend  Increase in productivity, happiness and morale  Cost reduction  The reinvention of IT

Support and Manageability of the Work Force  The Key Strategic Areas  Formal Strategy  Analyze business processes  The CIO and he/she critical role Oliver Bussman & SAP  Chief Mobility Officer

Support and Manageability of the Work Force Cont.  The Acquisition, Tracking, and Managing of Mobile Devices  Strategic sourcing method  Agreement on devices  Strategy and expense policies  Usage and compliance policies

Support and Manageability of the Work Force Cont.  The Service Desk and the Expectation to Service Employee’s Devices  Well-equipped service desk  Device configurations and remote control capabilities  Remote support strategy

Support and Manageability of the Work Force Cont.  Policies and guidelines to help organizations embrace mobility  Mobile Device Management Policy  Lax governance and non-compliance issues  Policies on hardware and devices

Support and Manageability of the Work Force Cont.  Mobile Device Support Solutions  Automate policies through MDM System

Security and Controls  Security has been one of the greatest concerns with BYOD  IT cannot treat devices like they “own them”  Instead must come up with a different strategy  Must protect the organizations information and enable functionality to meet business objects; those goals are not always in sync

Security and Controls  MDM Vendor Cost Comparison

Security and Controls  Risk Assessment

Security and Controls  IT and users share responsibility of securing the devices  Implementing a security awareness program Remind users to physically secure their devices when traveling Locking devices with a password Using encryption where possible

Employee Performance  Adoption to New Trends  Elimination of training.  Become mentors to others.  Transition away from the IT Department.  Comfort level with familiar devices.  Early adoption of new devices.  Productivity Gains.  Internal Knowledgebase

Employee Performance  Employee Creativity  Greater Success Rate.  Continuous Improvement in current position.  Morale building  Better accessibility to current business tools.

Employee Performance  Negative Employee Performance  Unwarranted multi-tasking  Risk of inappropriate content viewing  Wasted time on personal calls and s

Company and User Protection  Potential Risks Loss of data Unauthorized use Viral infection Compromise of confidential data Litigation Damaged reputation  Controlled Environment  Secured data being accessed at anytime.  Proper Communication and Education.  Audited Policies and Procedures.  Proper handling of disgruntled employees.

Conclusion  Summary of Proposed Solutions and Best Practices  SAP  Guidelines for Implementing BYOD  Lessons Learned Embrace the trend Corral “Wild West” Security What’s next?

Questions?