BYOD and Information Security - Is this an Oxymoron?

Instructor: Thomas DeLaine
Product ID: 702600
Training Level: Basic to Intermediate
  • Duration: 60 Min
This BYOD and information security webinar will help you explore the current state of BYOD in the workplace, the need to evaluate the risk to the organization prior to deployment, the critical need for identifying and communicate a strong legal strategy, select the right mobile device management solutions (based on risk assessment), ability to develop and implement strong BYOD policies, is BYOD right for your organization, and how the “Cloud” impacts information security with BYOD.

recorded version

1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section
Last Recorded Date: Feb-2013

Training CD / USB Drive

One CD/USB is for usage in one location only.
(For multiple locations contact Customer Care)
CD/USB and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-362-2367


Read Frequently Asked Questions

Why Should You Attend:

A survey of 650 information and security professionals about how the "bring your own device" (BYOD) trend is impacting their organizations finds one-quarter of them forbid use of personally owned devices such as smartphones and tablets on the network. However, the majority that does often lack meaningful policies or security controls related to these devices. BYOD continues to impact the way organizations are able to protect their IT infrastructure. The "SANS Survey on Mobility/BYOD Security Policies and Practices" found about one-third acknowledging they lack meaningful BYOD security policies. When asked what kind of products or services they're utilizing for mobile devices, roughly half indicated a mix of data protection via encryption, secure access to corporate resources, and while less than half used anti-malware or data-loss prevention, for example. However, 67% expects to implement cloud-based provisioning in the next 12 months.

BYOD programs in the enterprise can liberate employees and trim the bottom line. But it also brings hidden costs and security risks to a corporate network. This is not some passing fancy, it is here to stay and not dealing with the impact on your infrastructure will place you a vulnerable situation. Being able to get your arms around the BYOD revolution is the first step in bring a structured implementation process to the organization.

This webinar will provide valuable assistance to all organizations that are looking to deploy BYOD into their IT enterprise. The focus will be upon addressing the issues and begin to develop a viable strategy framework for deploying BYOD within your organization.

Areas Covered in the Webinar:

The webinar will cover the following areas:

  • Current State of BYOD in the workplace.
  • Need to evaluate the risk to the organization prior to deployment.
  • Identify the three types of risk BYOD brings to an organization.
  • Critical need for identifying and communicate a strong legal strategy.
  • Select the right mobile device management solutions (based on risk assessment).
  • Ability to develop and implement strong BYOD policies.
  • Should you deploy BYOD in your organization.
  • How the “Cloud” impacts information security with BYOD.

Who will Benefit:

This topic applies to personnel in any organization that needs to implement BYOD on their IT infrastructure. The employees who will benefit most include:

  • Senior Management
  • IT Security Managers
  • IT Managers
  • IT Security Compliance
  • Risk Managers
  • HR Managers

Instructor Profile:

Thomas (T.J.) DeLaine, is an information security professional with 20 years of experience and is well versed in diverse regulatory touch points for defense, government and commercial organizations. His information security disciplines are in governance/compliance, program and project management, test development/management and identity management. T.J. is a Certified Information Systems Security Professional (CISSP) and Provisional Auditor, Information Security Management Systems Scheme (ISO 27001). He has held previous positions as a Communications Security Officer, IT Security Governance Analyst, Signals Warfare Officer, and Maintenance Logistical Support Division Officer. T.J. is a graduate of Chaminade University of Honolulu in Business Administration.

Follow us :
Reduce costs for compliance with data integrity: 21 CFR Part 11, SaaS/Cloud, EU GDPR
REACH and RoHS Compliance: Gain a Deeper Understanding

Refund Policy

Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange.

Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time.

If you have any concern about the content of the webinar and not satisfied please contact us at below email or by call mentioning your feedback for resolution of the matter.

We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email call +1-888-717-2436 (Toll Free).

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed