BYOD: Short-term Gain Without Long-term Pain?

Slides:



Advertisements
Similar presentations
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Advertisements

BYOD Guide Created using iThoughts [...] [...]. BYOD Guide.
© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
©2011 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
OneDrive for Business Introduction First Time Use First Time Use Access from Computer Access from Computer Access from Internet Access from Internet Access.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
NLRB: Information Security & FISMA Daniel Wood, Chief IT Security February 19, 2004.
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
© 2012 Bradford Networks. All rights reserved. Secure BYOD.
Computer Associates Solutions Managing eBusiness Catalin Matei, April 12, 2005
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
A NASSCOM ® Initiative DSCI-KPMG Survey 2010 State Of Data Security and Privacy in the Indian Banking Industry Vinayak Godse Director- Data Protection,
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
© 2012 Bradford Networks. All rights reserved. Secure Mobility Safely Onboarding Personal Devices to Corporate Networks.
Technology Trends and the Productivity Gains for Life Sciences Companies Randy Paroda, Director of Product Development September 17, 2013.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Security Snapshot Assessment Maximizing Return on Security Investment What assets do we have? What is running on those assets? What is our risk level?
Jeff Wettlaufer Sr. Technical Product Manager System Center SESSION CODE: MGT308 B T jeffwettlaufer E
Copyright © 2008 Juniper Networks, Inc. 1 Juniper Networks Access Control Solutions Delivering Comprehensive and Manageable Network Access Control Solutions.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Information Security tools for records managers Frank Rankin.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Moving to BYOD Gary Audin 1.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Complete Cloud Security Anyone, anywhere, any app, any device.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
IT Risk Management Assessor SPECTRIM Tool Training
Governance and Oversight
Cybersecurity - What’s Next? June 2017
DART Technology Nicole Fontayne-Bardowell, MPA Vice President & CIO
Higher Education’s 2016 Top 10 IT Issues: Divest, Reinvest,
Network Access Control 101 Securing the Critical Edge of Your Network
Past, present & future at Pepperdine University
Compliance with hardening standards
Information Technology Assessment Review
Evolving the Cyber Security Program
Leverage What’s Out There
Texas A&M IT Who we are in brief…
I have many checklists: how do I get started with cyber security?
Network Access Control 101 Securing the Critical Edge of Your Network
Company Overview & Strategy
Building a Security Operations Center
Technology Management- A CIO Perspective
IT Development Initiative: Status and Next Steps
Organisation Model Assistant Director: IT & Digital
Student Records Registration
UConn NIST Compliance Project
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
| UNC.
EDUCAUSE Security Professionals Conference 2018 Jason Pufahl, CISO
Bridging the Gap Operations and Security
Drew Hunt Network Security Analyst Valley Medical Center
IS Risk Management Framework Overview
Student Records Registration
In the attack index…what number is your Company?
Information Technology Organization Overview RFP #220-05
PROF-W10 Up for a Challenge? Learn How to Become a Successful Higher Education CISO Joanna Grama EDUCAUSE Neal Fisch Randy Marchany Tina Thorstenson California.
Presentation transcript:

BYOD: Short-term Gain Without Long-term Pain?

What We Are Dealing With …

Introductions Kim Cary, Pepperdine University Bruce Klein, Rowan University Tom Murphy, Bradford Networks

Why do you consider BYOD Risky? Configuration Managed Unmanaged Devices Consistent Diverse Applications Corp Push User Downloaded Risk Websites Contained Open Endpoint Protection Mature Emerging

Who’s Responsible for Defining Policies? Compliance Security Operations Staff Policy Awareness and Administration Compliance / Risk Officer Governance, Risk, Compliance Audit and Reporting Security Operations Center Incident Response / Forensics Identify/Access Management CISO Vulnerability Assessment CSO Security Engineering Director of Security CIO Wired/Wireless Network Administration Endpoint IT Strategy & Architecture Network Operations Center VP of Infrastructure App/Service Help Desk / IT Support Server/DB Project Management Faculty/ & Staff Bus Unit General Mgr Bus Analyst / IT Liaison Students Business Line Management Bus Process Monitoring & Operations Application Dev/QA/Test Exec VP Mgr Staff

How granular are your policies … by role, location, device? Profiles Information Locations Devices Info 1 Info 2 Info 3 Loc 1 Loc 2 Loc 3 Loc 4 Laptop Smart Phone iPad Desktop Executives g h a Perm Staff Temp Staff Student Guest

How do you mature BYOD processes? Embrace Contain Block Disregard Visibility Automation

What speed bumps did you hit? Confidentiality/Integrity/Accessibility People Process Technology Other …

What best practices would you share? Executive Support Granularity of Policies Acceptable Use Policy Communication / Guidance / Common Services Technology Rollout Process Registration/Accountability Remediation