SlideShare a Scribd company logo
1 of 22
BYOD
D for Device or D for Disaster?
Fourth in a Series of ITAM Webinars
Craig Boswell
President, HOBI International
SUPPORTING WEBINAR RECORDING AVAILABLE AT:
WWW.APMG-INTERNATIONAL.COM/WEBINARS
Agenda
• Welcome & introduction
– Ronn Faigen, Partner Relations Manager, APMG International
• IT Asset Management Training for ITIL ATOs
– Jenny Schuchert , Content and Development Director – IAITAM
• Guest Speaker
– Craig Boswell, President, HOBI International
• Q&A
• Further information
• Close
Why are we doing this?
• Expand the perception of IT Asset Management by covering a
variety of current topics:
– February 15 - The Why's and What's of IT Asset Management
– March 15 - ITAM and Cyber Security
– April 19 - ITAM and the Internet of Things
– May 17 - BYOD: D for Device or D for Disaster?
– June 14 - Tools Are Not Enough
– July 11 - ITAM and Data Privacy
– August 16 - The business value of ITAM / Aligning IT with the business objectives
through ITAM
– September 20 - ITAM and the benefits to executive management
• Make the case that a default IT Asset Management program is
no longer sufficient
• Point you towards resources that can help you build an
effective ITAM program
Some BYOD Questions
• How to separate work content from personal content
– Rajaee v. Design Tech Homes et al
– Emloyee sued when his phone was wiped upon his resignation,
eliminating all his personal information
• How to separate work time from personal time
– Mohammadi v. Nwabuisi
– Employee sued for overtime for work done on a BYOD device
• How to keep employees from misusing data
– Rouge Valley Hospital in Canada
– $412M lawsuit from breach of privacy when employees sold
patient information
How relevant is this topic?
• One recently highlighted risk of BYOD is moving work emails from a
mobile phone to a home computer for local printing.
BYOD Connections
• Compliance
– HIPAA, Dodd Frank
• Cyber Security
– Out of date applications with security holes
• The Cloud
– Protected information on Dropbox
• Data Privacy
– Restricted information leaving organizational boundaries
Mr. Craig Boswell Founder and President
HOBI International
 Founder and President of HOBI International, a leading
asset management and electronics recycling company
serving Fortune 1000 clients across North America.
Since 1992, HOBI has provided comprehensive
solutions for the remarketing and environmentally
responsible recycling of electronic assets
 Craig holds a B.S. in electrical engineering from the
University of Illinois, an M.B.A. from the University of
Texas at Dallas and is a registered Professional
Engineer in the state of Texas.
 Craig has published and presented numerous papers on
the recycling of electronic products and the keys to
designing more recyclable products..
Scope of Mobile Market
• Mobile is growing rapidly
– 2.45 billion units shipped in 2016
– 207.1 million smartphone users in the U.S.
• Flattening IT market
• Mobile is both the present
and the future
• Today’s
workforce is more
mobile than ever before
Industry Overview
Projected Market Share of Connected Devices for 2017
Smartphone
71%
Tablet
16%
Portable PC
8%
Desktop
PC
5%
Mobile Deployment Across the Enterprise
• BYOD accounts for 80% of devices in
corporations
• BYOD is expected to be a $181 billion industry
by the end of the year
• Nearly 30% of IT departments ignore
unregulated BYOD activities
• Only 32% of companies with
BYOD policies require devices
to be registered with IT departments
Why BYOD Is Good
• Users accustomed to devices
• Employee bears the cost of ownership
• Increased productivity outside the office
• Employees more likely to stay current with
technology
BYOD – Difficult to Manage and Secure
• Increased data security risks
– More than 70% of IT leaders admit risk due to inability to control
devices
– 80% of CIOs plan to increase spending on security in 2017
• Development of enterprise-specific apps for different
devices
• BYOD policy enforcement and adhering to compliance
mandates
– Nearly 30% of IT departments ignore unregulated BYOD
activities
• Balancing employee privacy concerns
Is CYOD the Answer?
• Enterprise responsible for cost of ownership
and support
• Employees choose mobile device from a
preapproved list
• Enhanced security benefits
• Easier to enforce policies,
network settings and compliance
mandates
CYOD Challenges
• Employee dissatisfaction
• More expensive than BYOD
• Longer deployment time
• Device refreshes may not keep pace with latest
technology
Mobile Reimbursement Obligations
• Legal precedence is thin but fast evolving
• Reimbursement for employee-owned devices
– Cochran v. Schwan’s Home Service, Inc.
– California-based employers may be responsible for
reimbursing employees
– Massachusetts has
adopted a similar policy
– Other states may adopt
same policies
– Is this the death of BYOD?
What’s the Solution?
• BYOD or CYOD is dependent on an
organization’s needs. No one size fits all
solution.
• Employ proper access management
• Have the right policies in place – and enforce
them
• Have the right solutions in place to tackle
security challenges and threats
• Minimize risk
Resources
The International Association of
IT Asset Managers (IAITAM)
The professional association for individuals
and organizations involved in any aspect of
IT Asset Management (“ITAM”) IAITAM.org
IT Asset Management Certification Training
• ITAM Foundations
• Hardware Asset Management
• Software Asset Management
• IT Asset Management
• IT Asset Disposition
• Mobile Asset Management
• Asset Management Liaison to
Security
Enhance Your ITAM
Knowledge & Network
Why IAITAM Events?
• Dynamic keynotes
• Focused education
• Interactive workshops
• Targeted networking
• Access to industry providers
What, Where and When?
• ACE - Annual Conference & Exhibition
- Rome Italy | September 13-14, 2017
- Tokyo Japan | October 4, 2017
- Orland, FL USA | May 8-10, 2018
• Road Show Series
- Brussels May 16
- Paris May 23
- London May 18
- Rome May 25
- Atlanta Oct 10
- Houston Oct 12
- Baltimore Oct 17
- Cincinnati Oct 31
- Salt Lake City Oct 31
- Portland Nov 2
ITAM Accredited Training Organizations
Mark your calendars for our next webinar
June 14
Tools are Not Enough
International

More Related Content

What's hot

An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
The human factor
The human factorThe human factor
The human factorKoen Maris
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Ishay Tentser
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013 Troy C. Fulton
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management Kaseya
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD PolicyKaseya
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)Rui Miguel Feio
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Ishay Tentser
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generationIBM Security
 
Security best ways to protect your intellectual capital
Security   best ways to protect your intellectual capitalSecurity   best ways to protect your intellectual capital
Security best ways to protect your intellectual capitalAconex
 
What to expect at the 2015 Information Assurance for Forum
What to expect at the 2015 Information Assurance for ForumWhat to expect at the 2015 Information Assurance for Forum
What to expect at the 2015 Information Assurance for ForumCentraComm
 
Building secure digital services
Building secure digital servicesBuilding secure digital services
Building secure digital servicesNetDef
 

What's hot (20)

Byod
ByodByod
Byod
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
The human factor
The human factorThe human factor
The human factor
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Byod final (2)
Byod   final (2)Byod   final (2)
Byod final (2)
 
Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0Innovative software solutions for industry 4.0
Innovative software solutions for industry 4.0
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management The Three Critical Steps for Effective BYOD Management
The Three Critical Steps for Effective BYOD Management
 
5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy5 Essential Tips for Creating An Effective BYOD Policy
5 Essential Tips for Creating An Effective BYOD Policy
 
IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)Innovative software solutions for industry 4.0 (English+Mandarin)
Innovative software solutions for industry 4.0 (English+Mandarin)
 
Cybersecurity education for the next generation
Cybersecurity education for the next generationCybersecurity education for the next generation
Cybersecurity education for the next generation
 
Security best ways to protect your intellectual capital
Security   best ways to protect your intellectual capitalSecurity   best ways to protect your intellectual capital
Security best ways to protect your intellectual capital
 
What to expect at the 2015 Information Assurance for Forum
What to expect at the 2015 Information Assurance for ForumWhat to expect at the 2015 Information Assurance for Forum
What to expect at the 2015 Information Assurance for Forum
 
Building secure digital services
Building secure digital servicesBuilding secure digital services
Building secure digital services
 

Similar to BYOD: D for Device or D for Disaster?

A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...Judith Beckhard Cardoso
 
Mobile Device Management (MDM) & BYOD
Mobile Device Management (MDM) & BYOD  Mobile Device Management (MDM) & BYOD
Mobile Device Management (MDM) & BYOD juliannacole
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlAIIM International
 
How Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicHow Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicNuxeo
 
IS and the Innovator's Dilemma DCass_Final
IS and the Innovator's Dilemma DCass_FinalIS and the Innovator's Dilemma DCass_Final
IS and the Innovator's Dilemma DCass_FinalDavid Cass
 
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYODIan Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYODGlobal Business Events
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Vinod Kashyap
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Clever Consulting
 
Industrial Internet, Should I be Interested?
Industrial Internet, Should I be Interested?Industrial Internet, Should I be Interested?
Industrial Internet, Should I be Interested?ionSign Oy
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Sal Abramo
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big dataJames Deiotte
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
DataEd Slides: Approaching Data Management Technologies
DataEd Slides:  Approaching Data Management TechnologiesDataEd Slides:  Approaching Data Management Technologies
DataEd Slides: Approaching Data Management TechnologiesDATAVERSITY
 
DataEd Slides: Leveraging Data Management Technologies
DataEd Slides: Leveraging Data Management TechnologiesDataEd Slides: Leveraging Data Management Technologies
DataEd Slides: Leveraging Data Management TechnologiesDATAVERSITY
 

Similar to BYOD: D for Device or D for Disaster? (20)

A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Mobile Device Management (MDM) & BYOD
Mobile Device Management (MDM) & BYOD  Mobile Device Management (MDM) & BYOD
Mobile Device Management (MDM) & BYOD
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
Consumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps controlConsumerization of IT: when productivity trumps control
Consumerization of IT: when productivity trumps control
 
How Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a PandemicHow Insurers Fueled Transformation During a Pandemic
How Insurers Fueled Transformation During a Pandemic
 
IS and the Innovator's Dilemma DCass_Final
IS and the Innovator's Dilemma DCass_FinalIS and the Innovator's Dilemma DCass_Final
IS and the Innovator's Dilemma DCass_Final
 
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYODIan Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
Ian Yates, Director of EMEA at Tangoe - Getting your money's worth from BYOD
 
Software Industry
Software Industry Software Industry
Software Industry
 
Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19Remote Audit: During and Beyond Covid-19
Remote Audit: During and Beyond Covid-19
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
Industrial Internet, Should I be Interested?
Industrial Internet, Should I be Interested?Industrial Internet, Should I be Interested?
Industrial Internet, Should I be Interested?
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
Using Learning Data to Predict and Alter Business Outcomes 
Using Learning Data to Predict and Alter Business Outcomes Using Learning Data to Predict and Alter Business Outcomes 
Using Learning Data to Predict and Alter Business Outcomes 
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 
IMA meeting accounting for big data
IMA meeting accounting for big dataIMA meeting accounting for big data
IMA meeting accounting for big data
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
DataEd Slides: Approaching Data Management Technologies
DataEd Slides:  Approaching Data Management TechnologiesDataEd Slides:  Approaching Data Management Technologies
DataEd Slides: Approaching Data Management Technologies
 
DataEd Slides: Leveraging Data Management Technologies
DataEd Slides: Leveraging Data Management TechnologiesDataEd Slides: Leveraging Data Management Technologies
DataEd Slides: Leveraging Data Management Technologies
 

Recently uploaded

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 

Recently uploaded (20)

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 

BYOD: D for Device or D for Disaster?

  • 1. BYOD D for Device or D for Disaster? Fourth in a Series of ITAM Webinars Craig Boswell President, HOBI International SUPPORTING WEBINAR RECORDING AVAILABLE AT: WWW.APMG-INTERNATIONAL.COM/WEBINARS
  • 2. Agenda • Welcome & introduction – Ronn Faigen, Partner Relations Manager, APMG International • IT Asset Management Training for ITIL ATOs – Jenny Schuchert , Content and Development Director – IAITAM • Guest Speaker – Craig Boswell, President, HOBI International • Q&A • Further information • Close
  • 3. Why are we doing this? • Expand the perception of IT Asset Management by covering a variety of current topics: – February 15 - The Why's and What's of IT Asset Management – March 15 - ITAM and Cyber Security – April 19 - ITAM and the Internet of Things – May 17 - BYOD: D for Device or D for Disaster? – June 14 - Tools Are Not Enough – July 11 - ITAM and Data Privacy – August 16 - The business value of ITAM / Aligning IT with the business objectives through ITAM – September 20 - ITAM and the benefits to executive management • Make the case that a default IT Asset Management program is no longer sufficient • Point you towards resources that can help you build an effective ITAM program
  • 4. Some BYOD Questions • How to separate work content from personal content – Rajaee v. Design Tech Homes et al – Emloyee sued when his phone was wiped upon his resignation, eliminating all his personal information • How to separate work time from personal time – Mohammadi v. Nwabuisi – Employee sued for overtime for work done on a BYOD device • How to keep employees from misusing data – Rouge Valley Hospital in Canada – $412M lawsuit from breach of privacy when employees sold patient information
  • 5. How relevant is this topic? • One recently highlighted risk of BYOD is moving work emails from a mobile phone to a home computer for local printing.
  • 6. BYOD Connections • Compliance – HIPAA, Dodd Frank • Cyber Security – Out of date applications with security holes • The Cloud – Protected information on Dropbox • Data Privacy – Restricted information leaving organizational boundaries
  • 7.
  • 8. Mr. Craig Boswell Founder and President HOBI International  Founder and President of HOBI International, a leading asset management and electronics recycling company serving Fortune 1000 clients across North America. Since 1992, HOBI has provided comprehensive solutions for the remarketing and environmentally responsible recycling of electronic assets  Craig holds a B.S. in electrical engineering from the University of Illinois, an M.B.A. from the University of Texas at Dallas and is a registered Professional Engineer in the state of Texas.  Craig has published and presented numerous papers on the recycling of electronic products and the keys to designing more recyclable products..
  • 9. Scope of Mobile Market • Mobile is growing rapidly – 2.45 billion units shipped in 2016 – 207.1 million smartphone users in the U.S. • Flattening IT market • Mobile is both the present and the future • Today’s workforce is more mobile than ever before
  • 10. Industry Overview Projected Market Share of Connected Devices for 2017 Smartphone 71% Tablet 16% Portable PC 8% Desktop PC 5%
  • 11. Mobile Deployment Across the Enterprise • BYOD accounts for 80% of devices in corporations • BYOD is expected to be a $181 billion industry by the end of the year • Nearly 30% of IT departments ignore unregulated BYOD activities • Only 32% of companies with BYOD policies require devices to be registered with IT departments
  • 12. Why BYOD Is Good • Users accustomed to devices • Employee bears the cost of ownership • Increased productivity outside the office • Employees more likely to stay current with technology
  • 13. BYOD – Difficult to Manage and Secure • Increased data security risks – More than 70% of IT leaders admit risk due to inability to control devices – 80% of CIOs plan to increase spending on security in 2017 • Development of enterprise-specific apps for different devices • BYOD policy enforcement and adhering to compliance mandates – Nearly 30% of IT departments ignore unregulated BYOD activities • Balancing employee privacy concerns
  • 14. Is CYOD the Answer? • Enterprise responsible for cost of ownership and support • Employees choose mobile device from a preapproved list • Enhanced security benefits • Easier to enforce policies, network settings and compliance mandates
  • 15. CYOD Challenges • Employee dissatisfaction • More expensive than BYOD • Longer deployment time • Device refreshes may not keep pace with latest technology
  • 16. Mobile Reimbursement Obligations • Legal precedence is thin but fast evolving • Reimbursement for employee-owned devices – Cochran v. Schwan’s Home Service, Inc. – California-based employers may be responsible for reimbursing employees – Massachusetts has adopted a similar policy – Other states may adopt same policies – Is this the death of BYOD?
  • 17. What’s the Solution? • BYOD or CYOD is dependent on an organization’s needs. No one size fits all solution. • Employ proper access management • Have the right policies in place – and enforce them • Have the right solutions in place to tackle security challenges and threats • Minimize risk
  • 18. Resources The International Association of IT Asset Managers (IAITAM) The professional association for individuals and organizations involved in any aspect of IT Asset Management (“ITAM”) IAITAM.org IT Asset Management Certification Training • ITAM Foundations • Hardware Asset Management • Software Asset Management • IT Asset Management • IT Asset Disposition • Mobile Asset Management • Asset Management Liaison to Security
  • 19. Enhance Your ITAM Knowledge & Network Why IAITAM Events? • Dynamic keynotes • Focused education • Interactive workshops • Targeted networking • Access to industry providers What, Where and When? • ACE - Annual Conference & Exhibition - Rome Italy | September 13-14, 2017 - Tokyo Japan | October 4, 2017 - Orland, FL USA | May 8-10, 2018 • Road Show Series - Brussels May 16 - Paris May 23 - London May 18 - Rome May 25 - Atlanta Oct 10 - Houston Oct 12 - Baltimore Oct 17 - Cincinnati Oct 31 - Salt Lake City Oct 31 - Portland Nov 2
  • 20. ITAM Accredited Training Organizations
  • 21. Mark your calendars for our next webinar June 14 Tools are Not Enough