BYOD – Panel Discussion Introductions – Who, where, what have you done so far in BYOD  Peter Mariahazy – MBM, Director of Technology & HR  John Messer.

Slides:



Advertisements
Similar presentations
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
Advertisements

MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
BRING YOUR OWN DEVICE Presenter: Rachelle R. Green Duffy & Sweeney, Ltd.
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Bring Your Own Device (BYOD) Security By Josh Bennett & Travis Miller.
AirWatch United Kingdom Pricing Mobile Device Management Including Mobile Application Management and Mobile Management Effective April 1, 2012.
Mobile Device Protocol Sunil Vallamkonda 11/19/2012.
An Evolving Process for K-12 School Districts Dr. William Waller VSTE Board of Directors GRAETC Chair Coordinator, Technology Services Richmond.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
HELP US HELP YOU: MAKING YOUR MOBILE DEVICE WORK FOR YOU IT Pro Name Company Name Date Note: Consider having one of your execs present this with you to.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
BYOD Guide Created using iThoughts [...] [...]. BYOD Guide.
SMARTPHONE & TABLET CONSIDERATIONS. Smartphones and Tablets – PROVIDE VALUE FOR COUNCILS Enables mobility - Streamline business process - Remote access.
MOBILIZING CRM ONE STEP AT A TIME Mark Wright, Sybase Senior Systems Consultant Nora Tucker, Sybase Product Marketing Manager Bill Laberis, IDG.
MOBILE DEVICE MANAGEMENT IN THE REAL WORLD! JOE ATNIP, CONCEPT TECHNOLOGY INCORPORATED JAMES BOCK, COMMUNITY BANK & TRUST JUDY LONG, FIRST CITIZENS NATIONAL.
Everything you want to know about managing mobile devices in the enterprise Ivan Hemmans hemmans.com From A to Z.
1.How many X86 servers do you have? Are you running any HP equipment in your data center? 2.What mission critical applications are you running on these.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Emerging Risks in a Mobile.
Team G-Force: Jason, Veronica, Doug and Socrates Multiple Device Authentication for the Cloud MSIT
Understanding Business Ethics
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Copyright 2004 John Wiley & Sons, Inc Information Technology: Strategic Decision Making For Managers Henry C. Lucas Jr. John Wiley & Sons, Inc Dinesh.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
RJC Certification - (COP 9) Bribery and Facilitation Payments Training Module – March 2014.
AGENDA Welcome and introductions Brief introduction to PSI Mobile Technical Overview Demonstration Q and A Next Actions.
BYOD Charter Purpose and Scope
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Introduction + Track Time is a enterprise grade web based software with robust features to simplify Time.
1. 2 Single Admin Interface to Manage all mobile users and their devices: Add/Remove User profiles Add/Remove/Modify User Groups Set access permissions.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Good MDM IOS Overview Presented by: Jerry Wen 02/09/2012.
WNYRIC Standards Wireless Design Considerations Mat Dziuba November 14, 2012.
Application Management
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication.
How Mobile Transforms the Enterprise
Designing a BYOD Strategy Bruce Hockin Head of Solutions Strategy Avnet Technology Solutions.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
ORNL Site Report ESCC July 15, 2013 Susan Hicks David Wantland.
Mobile Technology and Insurance Employee Benefit Programs By Scott Warner.
Moving to BYOD Gary Audin 1.
Tech and Construction Mobile Technology in the Field Allen Small, Distribution Director Austin Energy SWEDE 2015 Workshop.
HR: Leading People, Leading Organizations © 2006 SHRM SHRM Weekly Online Survey: September 29, 2006 Workplace Privacy Sample comprised of 442 randomly.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Total Enterprise Mobility Comprehensive Management and Security
BYOD Security Risks Presentation by Ravi Namboori Visit
Alexander County Schools Review of Board of Education Policies Technology Responsible Use 3225/4312/7320 Internet Safety 3226/4205 Technology In The Educational.
Phase 4: Manage Deployment
Barracuda Mobile Device Manager
Deployment Planning Services
Easily secure your EDGE data, unlock the value
Mobile Devices, BYOD, and the Workforce: Responsible Mobile Computing,
How to Define a Successful Mobility Strategy
Transforming business
Mobile Data Solutions Inc
Mobile Device Management options in Office 365 and beyond
Impact of IT Consumerisation on Enterprise Security
Protect sensitive information with Office 365 DLP
Microsoft Intune MAM without Device Enrollment
5 Business Benefits of Mobile Device Management [MDM]
Future of the Information management
Microsoft 365 Business Technical Fundamentals Series
Chapter 10. Mobile Device Security
Presentation transcript:

BYOD – Panel Discussion Introductions – Who, where, what have you done so far in BYOD  Peter Mariahazy – MBM, Director of Technology & HR  John Messer - SoCal, Director of Information Systems  Craig Newbanks - GIS, Sr. Security Engineer  Jon Karis - Zoom, MIS/IT  Neal Liu - NWG, Director of Information Technology

 Forrester’s study of US information workers revealed that 37% are doing something with technology before formal permissions or policies are instituted.  Gartner survey of CIO’s – 80% of employees will be eligible to use their own equipment with employee data on board by  CompTIA survey – 51 % of large companies are not doing BYOD at all. Less than half companies believe it boosts productivity.

7 Tips for Establishing a Successful BYOD Policy  Specify What Devices Are Permitted.  Establish a Stringent Security Policy for all Devices.  Define a Clear Service Policy for Devices Under BYOD Criteria.  Make It Clear Who Owns What Apps and Data  Decide What Apps Will Be Allowed or Banned.  Integrate Your BYOD Plan With Your Acceptable Use Policy.  Set Up an Employee Exit Strategy. (CIO Magazine - May 17, 2012)

Ten Commandments  Create Thy Policy Before Procuring Technology  Seek The Flocks' Devices  Enrollment Shall Be Simple  Thou Shalt Configure Devices Over the Air  Thy Users Demand Self-Service  Hold Sacred Personal Information  Part the Seas of Corporate and Personal Data  Monitor Thy Flock - Herd Automatically  Manage Thy Data Usage  Drink from the Fountain of ROI (MaaS 360 The Ten Commandments of BYOD)

HQ requirements – Ted presentation on Wednesday  GIS/Xerox Policy  Looking for thoughts and input from cores.

Core consideration options/parameters  Update Core Electronic Data and Use policies  Employee release of both number and waiver for remote wipe  HR implications  Fair Labor Standards Overtime  PCI, HIPAA requirements  Driving safety  Core Support Level Commitment of Employee Devices

Core consideration options/parameters  Acceptable use (Facebook, appropriate content, content, etc.)  Data retrieval and discovery  Access Control – Remote wipe  MDM  MAS360  MS Mobile Device Management  How to control/identify devices