BRING YOUR OWN DEVICE Presenter: Rachelle R. Green Duffy & Sweeney, Ltd.

Slides:



Advertisements
Similar presentations
A centre of expertise in data curation and preservation DCC Workshop: Curating sApril 24 – 25, 2006 Funded by: This work is licensed under the Creative.
Advertisements

1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
Should We Do It? BYOD. Group X06 NAH ZHENG XIANG PHILSONA M TAY WEN YIN (JASLYN)A U WONG CHIH YONGA E GOH AIK HWEEA L Our Team.
Security for Mobile Devices
Bring Your Own Device (BYOD) Security By Josh Bennett & Travis Miller.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
BYOD: The Corporate Dilemma Seeking an Approach Virtuous Insights Consulting Services Aug 2012 Virtuous Insights © Virtuous Insights Consulting.
Office 365 for Enterprises ITExpo February 2, 2012.
© Robert G Parker – UW-CISA 2010 S-1 New and Emerging Technologies 3 - New and Emerging Technologies.
Copyright © AIIM | All rights reserved. #AIIM The Global Community of Information Professionals aiim.org Information Management and Social Media Jesse.
Information Governance Community of Practice Information Awareness Month – May 2011 Knowledge Cafe Sponsored by the Institute of Information Management.
Corporate Records Management (Practitioner) Information Governance Policy Team NHS Connecting for Health.
This time it’s personal: consumerising records management
Driving change in information risk within the financial services industry Subtitle Date.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
BYOD Guide Created using iThoughts [...] [...]. BYOD Guide.
© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing the BYOD Management Gap: the evolution of enterprise mobility.
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
Phil Brady Regulatory Projects Coordinator Department of Financial Institutions.
Developing a Records & Information Retention & Disposition Program:
Business Plug-In B7 Ethics.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Solution Briefing Business Productivity in Action Keynote.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Class 14: Information Governance Jason R. Baron UMD Seminar on Ediscovery LBSC 708X/INFM 708X May 3, 2012.
With Gaggle!!!!. WRPS had been using Gaggle.net for student . We were pleased with the filtering and notification- Google did not provide this level.
 Value Proposition  Key Features  A Closer Look  Operational Support  Essential Payback Employee Access TM Your Window to Employee and Manager Self-Service.
1 SIM Chicago Consumerization of IT Ken O’Brien October 29th, 2009.
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
TELUS Work Styles Copyright © TELUS Corporation. All rights reserved. Neither the whole nor any part of this work maybe copied, scanned, reproduced, or.
Data Protection, Freedom of Information and Information/Records Management.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
STORAGE MANAGEMENT/ EXECUTIVE: Managing a Compliant Infrastructure Processes and Procedures Mike Casey Principal Analyst Contoural Inc.
Security considerations for mobile devices in GoRTT
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
Developing a Social Media Policy Manish Mandhyan, CRCM, CAMS.
Mobility In the Enterprise Friend or Foe? Bob West, CEO, Echelon One 2012 Workshop on Cyber Security and Global Affairs 20 Junio, 2012 Barcelona, España.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Module 7 Planning and Deploying Messaging Compliance.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
 Audio is also available over a phone line: ◦ Dial in number: ◦ Conference Code:  Submit questions at any time during the presentation:
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Teamplay Connect, compare, collaborate.
TMS - Cooperation partner of TÜV SÜD EFFECTIVE SERVICE MANAGEMENT based on ISO/IEC & ISO/IEC
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Microsoft Virtual Academy Preparing for the Windows 8.1 MCSA Module 5: Managing Devices & Resource Access.
Data management with mobile devices © 2014 wheresjenny.com Data management with mobile devices.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
CLOUD VIRTUALIZATION MLArchiver for vCloud Air Archiving | eDiscovery | Records Management | Analytics Stephen Catanzano August.
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Moving to BYOD Gary Audin 1.
Data Management With Mobile Devices ©2015 albert-learning.com Data management with mobile devices.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Workshifting Transform your business – empower your people.
Total Enterprise Mobility Comprehensive Management and Security
BYOD Security Risks Presentation by Ravi Namboori Visit
Mobile Devices, BYOD, and the Workforce: Responsible Mobile Computing,
Transforming business
Uniting Office 365 and PRINCE2, UPrince and Project Online Make Managing Structured Projects More Efficient Without Increased Overhead Costs OFFICE 365.
Reducing Cost and Risk During an Investigation
Mobile Commerce and the Internet of Things
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Strong Security for Your Weak Link:
Chris Ince ISO Lead Auditor Security Risk Management Ltd
Presentation transcript:

BRING YOUR OWN DEVICE Presenter: Rachelle R. Green Duffy & Sweeney, Ltd.

OVERVIEW Relatively new phenomena Cell phones have been in workplaces for years, but huge increase in use of smart phones and tablets raise new issues re: safety, security, privacy, and wage and hour compliance Issues and resolutions vary by company

A New Style of IT – Data, Data Everywhere… MainframeClient/ServerInternet Mobile, Social, Big Data & the Cloud Every 60 seconds: 698,445 Google searches 217 new mobile web users 695,000 status updates 98,000+ tweets 168 million+ s sent 1,820 TB of data created 11 million instant messages

BYOD Adoption Whats Driving BYOD Adoption? Consumerization of IT Increased Productivity Appeal of consumer technology Convenience for users Increased accessibility Reduced expenses Recruiting tool 75% of surveyed organizations allow employee BYOD! 51% could bring any device, with little to no policy measures Only 24% had any sort of compliance policy in place

BYOD Implementation Scenarios EmbraceContainDisregardBlock High Low Business Value Security Pressure Embrace – Allow everyone to use all devices to access all resources Contain – Allow some people to use some devices to access some resources Disregard – Ignoring the presence of personally owned devices in a corporate environment Block – Ban the use of consumer- grade products or services by explicitly prohibiting their use in an appropriate policy Gartner, NAC Strategies for Supporting BYOD Environments, December 2011, Lawrence Orans and John Pescatore

What is Information Governance? Gartner defines information governance as the specification of decision rights and an accountability framework to encourage desirable behavior in the valuation, creation, storage, use, archival and deletion of information. It includes the processes, roles, standards and metrics that ensure the effective and efficient use of information in enabling an organization to achieve its goals

Employment Issues Wage/Hour Expense Reimbursement Harassment Global Trade/encryption Records & Info Management Legal Hold/Discovery Increased Productivity & Accessibility Cool factor/morale Convenience/work-life Physical & Cyber Security Confidentiality Privacy v. monitoring Data flows/access Mobile Device Management NAC IT Infrastructure Hardware savings Bandwidth/Network App selection/development

The Implementation Roadmap Defining BYOD The Scope of BYOD Security Issue Spotting Privacy Issue Spotting Components of a BYOD program BYOD Policy fundamentals

Security Issue Spotting Managing Devices PoliciesTrainings Enforcement

Privacy Issue Spotting International Workforce Access to Data Retention Litigation Hold and E- Discovery

Other Best Practices Understand your mobile device population– Hypo Make Enrollment EasyConfigure Devices Over-the-AirProvide Self-ServiceDesignate Personal Information as SecureIsolate Corporate from Personal DataContinuously MonitorManage Data UsageConsider how Policy Impact ROI

Additional Concerns EEO and Harassment Records Management and Data Collection International Challenges Wage & Hour Risks Safety Concerns

QUESTIONS?