Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
Introducing the Mason Infotech BYOD Commercial Smart Solution Presented by Mark Powelll-Mason Infotech Ltd January 2013.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Imation Mobile Security Research Presentation August 2013 What is happening with our data?
BYOD: Privacy and Security Andrew Paterson, Senior Technology Officer.
Objectives Overview Differentiate among laptops, tablets, and servers Describe the purpose and uses of smartphones, digital cameras, portable media players,
Steps to Compliance: Bring Your Own Device PRESENTED BY.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility. Simplify authentication.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
New Data Regulation Law 201 CMR TJX Video.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Your storage on the ground; Your files in the cloud.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Information Security Technological Security Implementation and Privacy Protection.
BYOD Charter Purpose and Scope
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
Using Technology to Manage Information Chapter 14.
Security considerations for mobile devices in GoRTT
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Mobile Device Security Drew Hayes Christ Liechty November 27, 2007.
Presented by Team Alpha MOBILE DEVICE SECURITY 1.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Desktop Security: Making Sure Your Office Environment is Secure.
Describe the potential of IT to improve internal and external communications By Jim Green.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
OIT and IT providers across campus are launching an awareness campaign to provide tips and resources to help you stay safe online and protect AU resources.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Created by Alexis Ford Research done by Rebecca Tanner Ford 1.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Šarūnas Končius Technology Strategist of Microsoft Microsoft Lithuania.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Moving to BYOD Gary Audin 1.
Mobile Device Security Management Leyna Belinsky.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Appendix A: Designing an Acceptable Use Policy. Overview Analyzing Risks That Users Introduce Designing Security for Computer Use.
Fourth ICT Security Conference 2017
Tim Carter Sales Director Sybase Confidential Propriety.
Challenges facing Enterprise Mobility
Impact of IT Consumerisation on Enterprise Security
Introduction to BYOD EIT, Author Gay Robertson, 2017.
IT & Security Training Skills.
Chapter 10. Mobile Device Security
Presentation transcript:

Kacper Rams, Matt Starr, Megan Stephens

Overview BYOD Introduction Risks Controls

Introduction Increase in use of portable devices 10 billion devices by exabytes of data transmitted via networks 74% employees using personal devices for work o 44% using them outside the company location

What is a device? Workstation Tablet Smartphone USB drive

BYOD in the business The needs of the business vs. the capabilities of the device Business implementation methodology o BYOD-as-a-Replacement o BYOD-as-a-Complement o BYOD-as-an-Alternative

Risks IT governance policies and personal devices o Who owns the data on a personal device? o How can you regulate usage on personal devices?

Risks Security issues o Malware and viruses o Network upkeep

Controls Clear IT security policies o acceptable uses Controlled internet access o network security o VPN o WIPS

Controls Device securitization Mobile Device Management o Identity and access Management Mobile application o Encrypted communication o Malware and virus protection

Q&A