Your SlideShare is downloading. ×
0
June 26, 2014 presented by…
Johan Hammerstrom
Community IT Innovators
Webinar Series
Build Your Own
BYOD Policy
Webinar Tips
• Ask questions
Post questions via chat
• Interact
Respond to polls during webinar
• Focus
Avoid multitasking...
About Community IT
Community IT Innovators partners with nonprofits to help them solve
their strategic & day-to-day IT cha...
About the Presenter
Johan Hammerstrom
President
jhammerstrom@communityit.com
@hammerstromj
Agenda
I. BYOD…a brief history
II. Information Services Model
III. Risks v. Benefits
IV. Building your own BYOD Policy
V. ...
Bring
Your
Own
Device
Choose
Your
Own
Device
Bring
Your
Own
App
Mobile
Device
Management
Containers
BYOD, a brief history…
Empowering Users
Balancing Priorities
Person
al
Organizatio
n
Model
www.stratechery.com, Ben Thompson
Data
Services
Apps
OS
Hardware
• Email
• Files
Data
•Exchange Server
•File ServerServices
• Outlook
• Word, Excel, PowerPointApps
• WindowsOS
• Dell, HP,...
• Email
• Files
Data
•Exchange Server
•File ServerServices
• Outlook
• Word, Excel, PowerPointApps
• WindowsOS
• Dell, HP,...
• Email
• Files
Data
•Office 365, Google Apps
•Box, DropBox, OneDriveServices
• Outlook, mobile mail
• Word, Excel, PowerP...
www.stratechery.com, Ben Thompson
Organization
BYOD
Organization
BYOD Organization
Organization
BYOD Mobile First
Organization
BYOD Mobile First
BYOA
Organization
BYOD Mobile First
BYOA
Risks
• Security
• Legal
• Financial
Benefits
• Adoption
• Cost
• Flexibility
Benefits of BYOD
1. Reduce hardware & support costs
2. Work flexibility
3. Employee availability
4. User adoption and sati...
Risks of BYOD
1. Information Security
2. Legal
3. Financial
Risks of BYOD
(b)
Person
al
(a)
Org
1. Information Security Risks
a) Organization
– Data leakage
– Vector into the company
b) Personal
– Onerous security meas...
2. Legal Risks
a) Organization
– Lack of certainty in case law and legislation
b) Personal
– Personal device could be conf...
3. Financial Risks
a) Organization
– Stipends can be more expensive than a single
corporate plan
– IT Support can become e...
Build your own BYOD
1. Inventory your data
• How sensitive is it?
• Compliance regulations?
2. Identify work roles
• Acces...
Build your own BYOD
1. Identify Benefits
• Prioritize for your Organization
• Establish your strategy
2. Identify Risks
• ...
Program Staff Development Executive
Sensitive Data
Medical Records
Donor Contacts Yes Yes
Financial System Yes
HR Records
...
Program Staff Development Executive
Risks
Info Security low moderate high
Legal low low high
Financial low low moderate
Program Staff Development Executive
Benefits
Reduce costs Yes
Work Flexibility Yes Yes
Availability Yes Yes
User adoption ...
3 case studies
1. Goal: 90% of 150,000
workforce
2. Custom Authentication
System
3. Reason: Avoid locked-in
corporate environment
Aggress...
1. 20% use their own device
2. Increasing restrictions on
personal device use
3. Reason: Security concerns
4. Dropsmack!
C...
1.Identified data sensitivity
2.Created 3 work roles
3.Cost/Benefit analysis
4.Device Policy
Flexible BYOD
Upcoming Webinar
Thursday July 24
4:00 – 5:00 PM EST
SharePoint
Taking Another Look
Matthew Eshleman & Steve Longenecker
After the webinar
• Connect with us
• Provide feedback
Short survey after you exit the webinar. Be sure to
include any que...
Community IT Webinar - Build your own BYOD Policy
Community IT Webinar - Build your own BYOD Policy
Community IT Webinar - Build your own BYOD Policy
Upcoming SlideShare
Loading in...5
×

Community IT Webinar - Build your own BYOD Policy

334

Published on

As part of our continuing webinar series we explore the phenomenon of BYOD and discuss various approaches for creating an effective BYOD policy for your organization.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
334
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Poll: For mobile devices, what does your organization provide?
    Poll: For laptops and desktops, what does your organization provide?
  • Transcript of "Community IT Webinar - Build your own BYOD Policy"

    1. 1. June 26, 2014 presented by… Johan Hammerstrom Community IT Innovators Webinar Series Build Your Own BYOD Policy
    2. 2. Webinar Tips • Ask questions Post questions via chat • Interact Respond to polls during webinar • Focus Avoid multitasking. You may just miss the best part of the presentation • Webinar PowerPoint & Recording PowerPoint and recording links will be shared after the webinar
    3. 3. About Community IT Community IT Innovators partners with nonprofits to help them solve their strategic & day-to-day IT challenges. Strategic Proactive approach so you can make IT decisions that support your mission and grow with you Collaborative Team of over 40 staff who empower you to make informed IT choices Invested We are committed to supporting your mission, and take care of your IT network as if it were our own Nonprofit focus Worked with over 900 nonprofits since 1993
    4. 4. About the Presenter Johan Hammerstrom President jhammerstrom@communityit.com @hammerstromj
    5. 5. Agenda I. BYOD…a brief history II. Information Services Model III. Risks v. Benefits IV. Building your own BYOD Policy V. 3 case studies
    6. 6. Bring Your Own Device
    7. 7. Choose Your Own Device
    8. 8. Bring Your Own App
    9. 9. Mobile Device Management
    10. 10. Containers
    11. 11. BYOD, a brief history…
    12. 12. Empowering Users
    13. 13. Balancing Priorities Person al Organizatio n
    14. 14. Model www.stratechery.com, Ben Thompson
    15. 15. Data Services Apps OS Hardware
    16. 16. • Email • Files Data •Exchange Server •File ServerServices • Outlook • Word, Excel, PowerPointApps • WindowsOS • Dell, HP, LenovoHardware
    17. 17. • Email • Files Data •Exchange Server •File ServerServices • Outlook • Word, Excel, PowerPointApps • WindowsOS • Dell, HP, LenovoHardware
    18. 18. • Email • Files Data •Office 365, Google Apps •Box, DropBox, OneDriveServices • Outlook, mobile mail • Word, Excel, PowerPointApps • Windows, OS X, iOSOS • PC, Tablet, MobileHardware
    19. 19. www.stratechery.com, Ben Thompson
    20. 20. Organization BYOD
    21. 21. Organization BYOD Organization
    22. 22. Organization BYOD Mobile First
    23. 23. Organization BYOD Mobile First BYOA
    24. 24. Organization BYOD Mobile First BYOA
    25. 25. Risks • Security • Legal • Financial Benefits • Adoption • Cost • Flexibility
    26. 26. Benefits of BYOD 1. Reduce hardware & support costs 2. Work flexibility 3. Employee availability 4. User adoption and satisfaction
    27. 27. Risks of BYOD 1. Information Security 2. Legal 3. Financial
    28. 28. Risks of BYOD (b) Person al (a) Org
    29. 29. 1. Information Security Risks a) Organization – Data leakage – Vector into the company b) Personal – Onerous security measures – Loss of full control of device
    30. 30. 2. Legal Risks a) Organization – Lack of certainty in case law and legislation b) Personal – Personal device could be confiscated – Personal blurs into the corporate
    31. 31. 3. Financial Risks a) Organization – Stipends can be more expensive than a single corporate plan – IT Support can become entangled – Mobile Device Management (MDM) can be expensive b) Personal – Stipend may not cover full cost…or any at all – Can be responsible for own support
    32. 32. Build your own BYOD 1. Inventory your data • How sensitive is it? • Compliance regulations? 2. Identify work roles • Access to data • Remote work requirements • Flexibility requirements
    33. 33. Build your own BYOD 1. Identify Benefits • Prioritize for your Organization • Establish your strategy 2. Identify Risks • Risk = Impact * Likelihood 3. Summarize • Consider your options • Summarize in a written policy
    34. 34. Program Staff Development Executive Sensitive Data Medical Records Donor Contacts Yes Yes Financial System Yes HR Records Less Sensitive Email Yes Yes Yes Grant Proposals Yes Yes Program Mgmt Yes Yes
    35. 35. Program Staff Development Executive Risks Info Security low moderate high Legal low low high Financial low low moderate
    36. 36. Program Staff Development Executive Benefits Reduce costs Yes Work Flexibility Yes Yes Availability Yes Yes User adoption Yes Risks Info Security low moderate high Legal low low high Financial low low moderate BYOD ltd BYOD CYOD Policy provide small stipend & limited access to information limited access to information from home fully managed access to info
    37. 37. 3 case studies
    38. 38. 1. Goal: 90% of 150,000 workforce 2. Custom Authentication System 3. Reason: Avoid locked-in corporate environment Aggressive BYOD
    39. 39. 1. 20% use their own device 2. Increasing restrictions on personal device use 3. Reason: Security concerns 4. Dropsmack! Conservative BYOD
    40. 40. 1.Identified data sensitivity 2.Created 3 work roles 3.Cost/Benefit analysis 4.Device Policy Flexible BYOD
    41. 41. Upcoming Webinar Thursday July 24 4:00 – 5:00 PM EST SharePoint Taking Another Look Matthew Eshleman & Steve Longenecker
    42. 42. After the webinar • Connect with us • Provide feedback Short survey after you exit the webinar. Be sure to include any questions that were not answered. • Missed anything? Link to slides & recording will be emailed to you.
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×