BYOD and Information Security - Is this an Oxymoron?

Instructor: Thomas DeLaine
Product ID: 702600
Training Level: Basic to Intermediate
  • Duration: 60 Min

recorded version

1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section

Training CD

One CD is for usage in one location only.
(For multiple locations contact Customer Care)
CD and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-963-2556


Read Frequently Asked Questions

This BYOD and information security webinar will help you explore the current state of BYOD in the workplace, the need to evaluate the risk to the organization prior to deployment, the critical need for identifying and communicate a strong legal strategy, select the right mobile device management solutions (based on risk assessment), ability to develop and implement strong BYOD policies, is BYOD right for your organization, and how the “Cloud” impacts information security with BYOD.

Why Should You Attend:

A survey of 650 information and security professionals about how the "bring your own device" (BYOD) trend is impacting their organizations finds one-quarter of them forbid use of personally owned devices such as smartphones and tablets on the network. However, the majority that does often lack meaningful policies or security controls related to these devices. BYOD continues to impact the way organizations are able to protect their IT infrastructure. The "SANS Survey on Mobility/BYOD Security Policies and Practices" found about one-third acknowledging they lack meaningful BYOD security policies. When asked what kind of products or services they're utilizing for mobile devices, roughly half indicated a mix of data protection via encryption, secure access to corporate resources, and while less than half used anti-malware or data-loss prevention, for example. However, 67% expects to implement cloud-based provisioning in the next 12 months.

BYOD programs in the enterprise can liberate employees and trim the bottom line. But it also brings hidden costs and security risks to a corporate network. This is not some passing fancy, it is here to stay and not dealing with the impact on your infrastructure will place you a vulnerable situation. Being able to get your arms around the BYOD revolution is the first step in bring a structured implementation process to the organization.

This webinar will provide valuable assistance to all organizations that are looking to deploy BYOD into their IT enterprise. The focus will be upon addressing the issues and begin to develop a viable strategy framework for deploying BYOD within your organization.

Areas Covered in the Webinar:

The webinar will cover the following areas:

  • Current State of BYOD in the workplace.
  • Need to evaluate the risk to the organization prior to deployment.
  • Identify the three types of risk BYOD brings to an organization.
  • Critical need for identifying and communicate a strong legal strategy.
  • Select the right mobile device management solutions (based on risk assessment).
  • Ability to develop and implement strong BYOD policies.
  • Should you deploy BYOD in your organization.
  • How the “Cloud” impacts information security with BYOD.

Who will Benefit:

This topic applies to personnel in any organization that needs to implement BYOD on their IT infrastructure. The employees who will benefit most include:

  • Senior Management
  • IT Security Managers
  • IT Managers
  • IT Security Compliance
  • Risk Managers
  • HR Managers

Instructor Profile:

Thomas (T.J.) DeLaine, is an information security professional with 20 years of experience and is well versed in diverse regulatory touch points for defense, government and commercial organizations. His information security disciplines are in governance/compliance, program and project management, test development/management and identity management. T.J. is a Certified Information Systems Security Professional (CISSP) and Provisional Auditor, Information Security Management Systems Scheme (ISO 27001). He has held previous positions as a Communications Security Officer, IT Security Governance Analyst, Signals Warfare Officer, and Maintenance Logistical Support Division Officer. T.J. is a graduate of Chaminade University of Honolulu in Business Administration.

Follow us :
ComplianceOnline Banking Summit 2016 | Risk Management and Data Security - 80390SEM
21 CFR Part 11 Compliance for SaaS/Cloud Applications - 80202SEM

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed