11
Kacper Rams, Matt Starr, Megan Stephens

Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls

Embed Size (px)

Citation preview

Page 1: Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls

Kacper Rams, Matt Starr, Megan Stephens

Page 2: Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls

Overview

• BYOD Introduction

• Risks

• Controls

Page 3: Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls
Page 4: Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls

Introduction

Increase in use of portable devices

• 10 billion devices by 2018

• 15 exabytes of data transmitted via networks

• 74% employees using personal devices for worko 44% using them outside the company location

Page 5: Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls

What is a device?

• Workstation

• Tablet

• Smartphone

• USB drive

Page 6: Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls

BYOD in the business

• The needs of the business vs. the capabilities of the device

• Business implementation methodologyo BYOD-as-a-Replacemento BYOD-as-a-Complemento BYOD-as-an-Alternative

Page 7: Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls

Risks

• IT governance policies and personal deviceso Who owns the data on a personal device?o How can you regulate usage on personal devices?

Page 8: Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls

Risks

• Security issueso Malware and viruseso Network upkeep

Page 9: Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls

Controls

• Clear IT security policieso acceptable uses

• Controlled internet accesso network securityo VPNo WIPS

Page 10: Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls

Controls

Device securitization• Mobile Device Management

o Identity and access Management

• Mobile applicationo Encrypted communicationo Malware and virus protection

Page 11: Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls

Q&A