• Share
  • Email
  • Embed
  • Like
  • Private Content
ISSA Houston – The Consumerization of IT
 

ISSA Houston – The Consumerization of IT

on

  • 1,358 views

Life as a security professional seems to be full of good news and bad news scenarios. For example, today, your budget was just cut again… The good news is that the employees are more than willing ...

Life as a security professional seems to be full of good news and bad news scenarios. For example, today, your budget was just cut again… The good news is that the employees are more than willing to help out by using their own equipment. While on the surface this may sound like a good idea it can be full of issues. This presentation will go over the basics of Consumerization, why it is happening, and what can be done to mitigate the potential issues. It will also touch on some strategies that we might see in the future…

Michael F. Angelo, CRISC, is currently the Chief Security Architect for NetIQ and is the Chair of the ISSA Inter-National webinar committee. He is a technical advisor to the US Department of Commerce and is the chair of the team working on security export controls. You can read his blog at http://community.netiq.com/blogs/security_webb/default.aspx

Statistics

Views

Total Views
1,358
Views on SlideShare
1,358
Embed Views
0

Actions

Likes
0
Downloads
21
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

CC Attribution License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • LoginsPersonal login information on corporate machine Social Networks / Professional AssociationsCorporate login information on personal machineVPN ConfigurationUser IDs and passwords stored in browsersSoftwarePersonal softwareRestricted use licensesCorporate software on home equipmentLegislated PrivacyEU data protection actUSA HIPAA, SOX, GLBACountry, state/province, local (e.g. CA SB 1386)More laws pendingCross contaminationCorporate backup includes personal informationPersonal backup includes corporate information
  • http://www.securityweek.com/consumerization-user-driven-it-security-threat#
  • Various laws protect customer dataEmployee must protect assets whether physical or informational. Protect devices, encrypt HD, remove HD if needed.