Augmented reality & IoT RISKS AND REWARDS 14 November 2016

Slides:



Advertisements
Similar presentations
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Advertisements

The State of Network Security 2012: Attitudes and Opinions.
Mobility in Government Consolidation & Wrap-up Lee Naik3 Oct 2013.
© 2011 Underwriters Laboratories Inc. ICPHSO 2011 Annual Meeting “The Art of Information Sharing” T. Khoi Do.
© 2005, QEI Inc. all characteristics subject to change. For clarity purposes, some displays may be simulated. Any trademarks mentioned remain the exclusive.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Social Media Sessions Internal Management Jeff Richardson Diti Haniotis Digital & Online Communications Specialist Kraft Foods.
Ethical Implications of Social Media Use in Organizations Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque,
The EHR: Benefits for Privacy and Security How the EHR Protects Health Information.
CREATING THE ENTERPRISE SOCIAL MEDIA GAME PLAN September 2013.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Tromso Telemedicine and eHealth ConferenceJune 2007 Care in the Home: What the Elderly Expect David Garwood, Secretary Patient and Citizen Task Force.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
All data from the 13 th Annual MetLife U.S. Employee Benefit Trends Study unless otherwise noted Metropolitan Life Insurance Company, NY, NY L [exp1116][All.
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
Developing a Social Media Policy Manish Mandhyan, CRCM, CAMS.
12 Functions of Food Service
Andy Lillesve Anwar Aglan Paul Moyryla
Samantha Schreiner University of Illinois at Urbana- Champaign BA 559 – Professor Michael Shaw December 15 th, 2008 A Survey of IT Governance Through COBIT,
POLICIES = CONTROL Simply stated, a policy lays out what management wants employees to do and a procedure describes how it should be done.
ISACA’S 2015 IT RISK/REWARD BAROMETER: A GLOBAL LOOK AT IOT SECURITY October 2015.
TOP 10 TECHNOLOGY INITIATIVES Robert G Parker July 12, 2013.
BYOD? WHO MATTERS? IMPACT ON 21 ST CENTURY LEARNING.
Business Communication Today
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Internet of Things Business Case Template. Powered by InfoTech, provided by Atlantic BT Summarize the business case for analyzing the Internet of Things.
Mobile Technology and Insurance Employee Benefit Programs By Scott Warner.
ISACA: 2016 AND BEYOND MATT LOEB (CGEIT, CAE) ISACA CHIEF EXECUTIVE OFFICER.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Total Enterprise Mobility Comprehensive Management and Security
Cloud Computing for the Enterprise November 18th, This work is licensed under a Creative Commons.
THE SOUND OF SILENCE: AN EVALUATION OF CDC’S PODCAST INITIATIVE Quynh-Chau, M., Myers, Bradford A. (2013). The Sound of Silence: an evaluation of CDC's.
MSBC 648 DIGITAL COMMUNICATIONS Enhancing Digital Communications: Challenges and Policy Recommendations Michael Eaton.
Security and resilience for Smart Hospitals Key findings
Delivering an outcomes focused cCBT Service Key learnings
PMO Awareness and Support Presentation
Challenges and opportunities for the CFO
Transforming business
Design a 360 Degree Feedback Program
MODELOS DE GESTIÓN DE CALIDAD
Checklist: EFE Marketing Principles, Sub-Initiatives & Objectives
IT Professional Perspective IT Strategy, Policy and Governance
EVALUATION OF BUSINESS TRANSFORMATION
Advisory Solution Delivery 24x7x365 Production Support
The ePhyto Solution A Guide to implement the ePhyto System
Benefits of Social Media and Networking Technologies
Strategy By Digital Marketing Training In FaridabadDigital Marketing Training In Faridabad.
STRATEGIC LEARNING AND DEVELOPMENT. STRATEGIC LEARNING AND DEVELOPMENT:SESSION PLAN 1.Learning and development defined 2.Elements of L&D 3.Components.
Digital Transformation Asia 2018 – CALL FOR SPEAKERS
Overview of Electronic Commerce
Coping with the Future: The Challenge of Change
Consumer Empowerment through Education
Professional Learning
ITP Maturity Model Survey 2018
JOINED AT THE HIP: DEVSECOPS AND CLOUD-BASED ASSETS
Fuelling Futures Helping businesses, schools and colleges provide workplace experiences for young people with special educational needs and disabilities.
BETTER AND PROPER ACCESS TO PACIFIC MICRODATA
Regulation for Smart Grids
COBIT 5: Framework, BMIS, Implementation and future Information Security Guidance Presented by.
Engaging with Augmented Reality
The Role of Healthcare Payers in Digital Health Literacy
Computer Services Business challenge
TELENOR LAUNCH DIGITAL MYANMAR REPORT
Securely run and grow your business
IT-audit case PEMPAL, Skopje, April 2019.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Enterprise Networking Market Size to Exceed $90 bn by 2025 Growing at CAGR.
Digital Transformation Barometer 2018
Presentation transcript:

Augmented reality & IoT RISKS AND REWARDS 14 November 2016

ISACA’s IT Risk/Reward Barometer surveys two audiences on the risks and rewards of emerging technologies:

Consumers are more optimistic about the use of AR, identifying clear ways it can benefit both their personal and professional lives, including the top three areas outlined above.

The Consumer Perspective

The business technology professionals surveyed are more cautious The business technology professionals surveyed are more cautious. They see positive applications of AR, but are concerned about cost, privacy issues and more. Only 21% said they’re sure the benefits outweigh the risks—but we expect these numbers to change quickly as enterprises become more familiar with AR and its potential to drive value for enterprises, their employees and those they serve.

The Business/IT Perspective

Tips for Adopting AR in the Workplace ISACA offers the following recommendations to help organizations realize the benefits and overcome potential barriers of AR applications: Extend social media monitoring to AR platforms. Leverage and extend current social media policies and monitoring to augmented reality platforms. Consider how AR can improve your business. Training, diagnostics and marketing are three areas with particularly strong potential. Review your governance framework and update your policies. Incorporate use of AR as part of the business into organizational policies and procedures— including BYOD (bring your own device) and privacy policies. Build security into every part of the process. Security is a crucial component of AR initiatives that helps ensure confidence in the data.