Read Frequently Asked Questions
BYOD and Information Security - Is this an Oxymoron?
This BYOD and information security webinar will help you explore the current state of BYOD in the workplace, the need to evaluate the risk to the organization prior to deployment, the critical need for identifying and communicate a strong legal strategy, select the right mobile device management solutions (based on risk assessment), ability to develop and implement strong BYOD policies, is BYOD right for your organization, and how the “Cloud” impacts information security with BYOD.
Why Should You Attend:
A survey of 650 information and security professionals about how the "bring your own device" (BYOD) trend is impacting their organizations finds one-quarter of them forbid use of personally owned devices such as smartphones and tablets on the network. However, the majority that does often lack meaningful policies or security controls related to these devices. BYOD continues to impact the way organizations are able to protect their IT infrastructure. The "SANS Survey on Mobility/BYOD Security Policies and Practices" found about one-third acknowledging they lack meaningful BYOD security policies. When asked what kind of products or services they're utilizing for mobile devices, roughly half indicated a mix of data protection via encryption, secure access to corporate resources, and while less than half used anti-malware or data-loss prevention, for example. However, 67% expects to implement cloud-based provisioning in the next 12 months.
BYOD programs in the enterprise can liberate employees and trim the bottom line. But it also brings hidden costs and security risks to a corporate network. This is not some passing fancy, it is here to stay and not dealing with the impact on your infrastructure will place you a vulnerable situation. Being able to get your arms around the BYOD revolution is the first step in bring a structured implementation process to the organization.
This webinar will provide valuable assistance to all organizations that are looking to deploy BYOD into their IT enterprise. The focus will be upon addressing the issues and begin to develop a viable strategy framework for deploying BYOD within your organization.
Areas Covered in the Webinar:
The webinar will cover the following areas:
- Current State of BYOD in the workplace.
- Need to evaluate the risk to the organization prior to deployment.
- Identify the three types of risk BYOD brings to an organization.
- Critical need for identifying and communicate a strong legal strategy.
- Select the right mobile device management solutions (based on risk assessment).
- Ability to develop and implement strong BYOD policies.
- Should you deploy BYOD in your organization.
- How the “Cloud” impacts information security with BYOD.
Who will Benefit:
This topic applies to personnel in any organization that needs to implement BYOD on their IT infrastructure. The employees who will benefit most include:
- Senior Management
- IT Security Managers
- IT Managers
- IT Security Compliance
- Risk Managers
- HR Managers
Thomas (T.J.) DeLaine, is an information security professional with 20 years of experience and is well versed in diverse regulatory touch points for defense, government and commercial organizations. His information security disciplines are in governance/compliance, program and project management, test development/management and identity management. T.J. is a Certified Information Systems Security Professional (CISSP) and Provisional Auditor, Information Security Management Systems Scheme (ISO 27001). He has held previous positions as a Communications Security Officer, IT Security Governance Analyst, Signals Warfare Officer, and Maintenance Logistical Support Division Officer. T.J. is a graduate of Chaminade University of Honolulu in Business Administration.
ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange.
Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time.
If you have any concern about the content of the webinar and not satisfied please contact us at below email or by call mentioning your feedback for resolution of the matter.
We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email firstname.lastname@example.org or call +1-650-620-3937.
This training hasn't been reviewed yet.
Complimentary Webinar: The Evolving Role of the Chief Information Security Officer Information Security Awareness Training - Why It is Important?