SlideShare a Scribd company logo
1 of 29
Download to read offline
BYOD:	
  Risks	
  and	
  
Opportunities	
  
Presented	
  by:	
  Olabode	
  Olaoke	
  
Compliance	
  Manager	
  –	
  Rack	
  Centre	
  
Outline	
  
! History	
  of	
  computers	
  
! BYOD	
  Definition	
  
! Risk	
  &	
  Opportunity	
  Definition	
  
! BYOD	
  Trends	
  
! BYOD	
  Risks	
  and	
  Opportunities	
  
! Q&A	
  
Some	
  History…	
  
50’s	
   70’s	
  
90’s	
   20XY	
  
BYOD:Defined	
  
! BYOD	
  is	
  a	
  concept	
  that	
  allows	
  
employees	
  to	
  utilize	
  their	
  personally-­‐
owned	
  technology	
  devices	
  to	
  stay	
  
connected	
  to,	
  access	
  data	
  from,	
  or	
  
complete	
  tasks	
  for	
  their	
  
organizations	
  .	
  	
  
-­‐	
  CIO	
  Council	
  Aug	
  2012	
  
BYOD…	
  Some	
  thoughts	
  
Risks	
  &	
  Opportunities	
  
! Risk	
  –	
  Uncertainty	
  of	
  outcome…	
  
! When	
  negative	
  –	
  Threat	
  
! When	
  positive	
  –	
  Opportunity	
  
Embrace	
  
Resist	
  
Trends	
  Before	
  BYOD	
  
! Standardization	
  
! Perimeterization	
  
! Ownership	
  
! Restrictions	
  
! Access	
  
Divergent	
  needs	
  of	
  IT	
  and	
  User	
  
community	
  
IT	
  Needs	
  
User	
  
Needs	
  
Freedom	
  
Ownership	
  
Mobility	
  
Flexibility	
  
Control	
  
Security	
  
Service	
  &	
  Support	
  
BYOD	
  Devices	
  
Network	
  
Storage	
  
(including	
  
cloud	
  services)	
  
PC’s	
  and	
  Macs	
  
Mobile	
   Applications	
   OS’	
  
Mobile	
  Network	
  Connection	
  
Nigeria	
  
An	
  evolution	
  unnoticed	
  
Source:	
  Trustwave	
  
Mobile	
  Apps	
  
1,000,000+
Apps
50,000+ Apps
600,000+ Apps 190,000+ Apps
Others: ???
Some	
  Statistics…	
  
Source:	
  Trustwave	
  
BYOD	
  Risks:	
  Individual	
  
Privacy	
  
Device/connectivity	
  Cost	
  
Service/Support	
  
BYOD	
  Opportunities:	
  Individual	
  
Productivity Access Excitement
Flexibility Availability
BYOD	
  Risks:	
  Organizations	
  
Access	
   Confidentiality	
   Complexity	
  
Malware	
  
• Updates	
  and	
  Patching	
  
• Jail	
  broken	
  apps?	
  
• Anti-­‐malware?	
  
• Applications?	
  
Legal	
  and	
  Regulatory	
  
Bandwidth	
  
• Capacity	
  
• Licensing?	
  
• Addressing?	
  
Breach	
  of	
  AUP	
  
• Email?	
  
Data	
  storage	
  
• Device	
  
• Cloud	
  
• Network	
  
Authenti
OS	
  (jail	
  b
Applicati
Informa
Informa
Applicati
Legal	
  (so
Content	
  
Compati
Updates	
  an
Jail	
  broken	
  
Anti-­‐malwa
Application
BYOD	
  Opportunities:	
  
Organizations	
  
Productivity	
   Access	
   Excitement	
  
Flexibility	
  
Lower	
  Overheads	
  
(device,	
  support,	
  
licensing,	
  internet	
  
connectivity)	
  
Innovation	
  
Collaboration	
  
Human	
  Resource	
  
benefits	
  
Improved	
  
customer	
  
satisfaction	
  
Cost	
  benefits	
  
Collaboration	
  Opportunities	
  
Better	
  data	
  
oversight	
  
and	
  control	
  
of	
  data	
  flow	
  
Data	
  availability	
  
via	
  cloud	
  
storage	
  
services	
  
Increased	
  
online	
  data	
  
interaction	
  and	
  
data	
  access	
  
Increased	
  Data	
  
accuracy	
  
Data	
  sharing	
  
Human	
  Resource	
  Benefits	
  
Increased	
  employee	
  
motivation	
  
Talent	
  
attraction	
  
and	
  
employee	
  
retention	
  
Employee	
  led	
  
learning	
  and	
  
development	
  
Increased	
  
employee	
  
creativity	
  and	
  
resourcefulness	
  
of	
  employees	
  would	
  choose	
  to	
  
work	
  from	
  home	
  over	
  pay	
  rise	
  
BYOD-­‐er’s	
  report	
  having	
  	
  
What	
  are	
  the	
  REAL	
  Options?	
  
Reject?	
   Ignore?	
   Permit?	
  
Promote?	
  Champion?	
  Liberate	
  
Have	
  a	
  plan	
   Say	
  yes	
   Develop	
  capability	
  
Remember…	
  
Thank	
  
You	
  

More Related Content

What's hot

Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
How to Improve Digital Accessibility While Reducing Legal Risk
How to Improve Digital Accessibility While Reducing Legal RiskHow to Improve Digital Accessibility While Reducing Legal Risk
How to Improve Digital Accessibility While Reducing Legal Risk3Play Media
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and HealthcareNetIQ
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
The what, why, and how of accessibility
The what, why, and how of accessibilityThe what, why, and how of accessibility
The what, why, and how of accessibility3Play Media
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Kim Jensen
 
Mitigating Web 2.0 Threats
Mitigating Web 2.0  ThreatsMitigating Web 2.0  Threats
Mitigating Web 2.0 ThreatsKim Jensen
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAMAbhinaw Kumar
 
Governance of the internet of things
Governance of the internet of thingsGovernance of the internet of things
Governance of the internet of thingsAkib B. Momin
 

What's hot (20)

Digital identity
Digital identityDigital identity
Digital identity
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Bring your own device
Bring your own deviceBring your own device
Bring your own device
 
BYOD
BYODBYOD
BYOD
 
How to Improve Digital Accessibility While Reducing Legal Risk
How to Improve Digital Accessibility While Reducing Legal RiskHow to Improve Digital Accessibility While Reducing Legal Risk
How to Improve Digital Accessibility While Reducing Legal Risk
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and Healthcare
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
The what, why, and how of accessibility
The what, why, and how of accessibilityThe what, why, and how of accessibility
The what, why, and how of accessibility
 
Cloud security Deep Dive 2011
Cloud security Deep Dive 2011Cloud security Deep Dive 2011
Cloud security Deep Dive 2011
 
Byod
ByodByod
Byod
 
IAM Tools
IAM ToolsIAM Tools
IAM Tools
 
Mitigating Web 2.0 Threats
Mitigating Web 2.0  ThreatsMitigating Web 2.0  Threats
Mitigating Web 2.0 Threats
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAM
 
Governance of the internet of things
Governance of the internet of thingsGovernance of the internet of things
Governance of the internet of things
 
Compliance & Identity access management
Compliance & Identity access management Compliance & Identity access management
Compliance & Identity access management
 

Viewers also liked

QSP 6.1 Actions to address risks and opportunities (Preview)
QSP 6.1 Actions to address risks and opportunities (Preview)QSP 6.1 Actions to address risks and opportunities (Preview)
QSP 6.1 Actions to address risks and opportunities (Preview)Centauri Business Group Inc.
 
Implementing Risk Based Thinking in HLS OF ISO 9001:2015 - Praneet Surti
Implementing Risk Based Thinking in HLS OF ISO 9001:2015 - Praneet SurtiImplementing Risk Based Thinking in HLS OF ISO 9001:2015 - Praneet Surti
Implementing Risk Based Thinking in HLS OF ISO 9001:2015 - Praneet SurtiPraneet Surti
 
PECB Webinar: The significance of auditing in maintaining a certified ISO 900...
PECB Webinar: The significance of auditing in maintaining a certified ISO 900...PECB Webinar: The significance of auditing in maintaining a certified ISO 900...
PECB Webinar: The significance of auditing in maintaining a certified ISO 900...PECB
 
Iso9001 2008 Transition Asq Govind
Iso9001 2008 Transition Asq GovindIso9001 2008 Transition Asq Govind
Iso9001 2008 Transition Asq GovindGovind Ramu
 
Measurement System Analysis (MSA)
Measurement System Analysis (MSA)Measurement System Analysis (MSA)
Measurement System Analysis (MSA)Ram Kumar
 
Building Practical Risk Application into your QMS
Building Practical Risk Application into your QMSBuilding Practical Risk Application into your QMS
Building Practical Risk Application into your QMSPECB
 
Major accident-identification-and-risk-assessment-ppt4816
Major accident-identification-and-risk-assessment-ppt4816Major accident-identification-and-risk-assessment-ppt4816
Major accident-identification-and-risk-assessment-ppt4816duy nguyen
 
Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview Greenlight Guru
 
Risk Management Requirements Implementation in ISO 9001:2015 Clauses
Risk Management Requirements Implementation in ISO 9001:2015 ClausesRisk Management Requirements Implementation in ISO 9001:2015 Clauses
Risk Management Requirements Implementation in ISO 9001:2015 ClausesCentauri Business Group Inc.
 
20150403 - TUV ME - ISO 9001 2015 and Risk Management - Linkdin
20150403 - TUV ME - ISO 9001 2015 and Risk Management - Linkdin20150403 - TUV ME - ISO 9001 2015 and Risk Management - Linkdin
20150403 - TUV ME - ISO 9001 2015 and Risk Management - LinkdinShibu Davies
 

Viewers also liked (15)

QSP 6.1 Actions to address risks and opportunities (Preview)
QSP 6.1 Actions to address risks and opportunities (Preview)QSP 6.1 Actions to address risks and opportunities (Preview)
QSP 6.1 Actions to address risks and opportunities (Preview)
 
Implementing Risk Based Thinking in HLS OF ISO 9001:2015 - Praneet Surti
Implementing Risk Based Thinking in HLS OF ISO 9001:2015 - Praneet SurtiImplementing Risk Based Thinking in HLS OF ISO 9001:2015 - Praneet Surti
Implementing Risk Based Thinking in HLS OF ISO 9001:2015 - Praneet Surti
 
aiag-MSA
aiag-MSAaiag-MSA
aiag-MSA
 
PECB Webinar: The significance of auditing in maintaining a certified ISO 900...
PECB Webinar: The significance of auditing in maintaining a certified ISO 900...PECB Webinar: The significance of auditing in maintaining a certified ISO 900...
PECB Webinar: The significance of auditing in maintaining a certified ISO 900...
 
Iso9001 2008 Transition Asq Govind
Iso9001 2008 Transition Asq GovindIso9001 2008 Transition Asq Govind
Iso9001 2008 Transition Asq Govind
 
Risk Management in QMS Processes - examples
Risk Management in QMS Processes - examplesRisk Management in QMS Processes - examples
Risk Management in QMS Processes - examples
 
Measurement System Analysis (MSA)
Measurement System Analysis (MSA)Measurement System Analysis (MSA)
Measurement System Analysis (MSA)
 
Building Practical Risk Application into your QMS
Building Practical Risk Application into your QMSBuilding Practical Risk Application into your QMS
Building Practical Risk Application into your QMS
 
Major accident-identification-and-risk-assessment-ppt4816
Major accident-identification-and-risk-assessment-ppt4816Major accident-identification-and-risk-assessment-ppt4816
Major accident-identification-and-risk-assessment-ppt4816
 
Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview Risk Management for Medical Devices - ISO 14971 Overview
Risk Management for Medical Devices - ISO 14971 Overview
 
Risk Management Requirements Implementation in ISO 9001:2015 Clauses
Risk Management Requirements Implementation in ISO 9001:2015 ClausesRisk Management Requirements Implementation in ISO 9001:2015 Clauses
Risk Management Requirements Implementation in ISO 9001:2015 Clauses
 
20150403 - TUV ME - ISO 9001 2015 and Risk Management - Linkdin
20150403 - TUV ME - ISO 9001 2015 and Risk Management - Linkdin20150403 - TUV ME - ISO 9001 2015 and Risk Management - Linkdin
20150403 - TUV ME - ISO 9001 2015 and Risk Management - Linkdin
 
Risk based thinking
Risk based thinkingRisk based thinking
Risk based thinking
 
Introduction to ISO 9001:2015
Introduction to ISO 9001:2015Introduction to ISO 9001:2015
Introduction to ISO 9001:2015
 
APQP by Tonatiuh Lozada Duarte
APQP by Tonatiuh Lozada DuarteAPQP by Tonatiuh Lozada Duarte
APQP by Tonatiuh Lozada Duarte
 

Similar to BYOD: Risks and Opportunities

Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Sophos
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudCompTIA UK
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and securityMicro Focus
 
Wp byod
Wp byodWp byod
Wp byodJ
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationJay McBain
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trendsSatya Harish
 
Solving access for Hybrid IT
Solving access for Hybrid ITSolving access for Hybrid IT
Solving access for Hybrid ITJeff Green
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44Jisc
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxmariona83
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldKatherine Cola
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and ComplianceBankingdotcom
 

Similar to BYOD: Risks and Opportunities (20)

Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?Is Your Network Ready for BYOD?
Is Your Network Ready for BYOD?
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security
 
Wp byod
Wp byodWp byod
Wp byod
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
BYOD, BYOA and Consumerization
BYOD, BYOA and ConsumerizationBYOD, BYOA and Consumerization
BYOD, BYOA and Consumerization
 
IAM
IAMIAM
IAM
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
CyberSecurity Update Slides
CyberSecurity Update SlidesCyberSecurity Update Slides
CyberSecurity Update Slides
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
G05.2013 gartner top security trends
G05.2013 gartner top security trendsG05.2013 gartner top security trends
G05.2013 gartner top security trends
 
Solving access for Hybrid IT
Solving access for Hybrid ITSolving access for Hybrid IT
Solving access for Hybrid IT
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44Solving access for hybrid it  Axians (introducing pulse secure) - Networkshop44
Solving access for hybrid it Axians (introducing pulse secure) - Networkshop44
 
Directions Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docxDirections Answer each question individual and respond with full .docx
Directions Answer each question individual and respond with full .docx
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 

More from budzeg

Galaxy Backbone
Galaxy BackboneGalaxy Backbone
Galaxy Backbonebudzeg
 
June Ivc E Bus Myths Realities
June Ivc E Bus Myths  RealitiesJune Ivc E Bus Myths  Realities
June Ivc E Bus Myths Realitiesbudzeg
 
IT as an Engine of Global Expansion for African Organisations
IT as an Engine of Global Expansion for African OrganisationsIT as an Engine of Global Expansion for African Organisations
IT as an Engine of Global Expansion for African Organisationsbudzeg
 
Bcm Best Practise & Local Challenges
Bcm Best Practise & Local ChallengesBcm Best Practise & Local Challenges
Bcm Best Practise & Local Challengesbudzeg
 
Benefiting From Bs25999 Lee
Benefiting From Bs25999 LeeBenefiting From Bs25999 Lee
Benefiting From Bs25999 Leebudzeg
 
The It Practioners View Kunle Odebode
The It Practioners View Kunle OdebodeThe It Practioners View Kunle Odebode
The It Practioners View Kunle Odebodebudzeg
 

More from budzeg (6)

Galaxy Backbone
Galaxy BackboneGalaxy Backbone
Galaxy Backbone
 
June Ivc E Bus Myths Realities
June Ivc E Bus Myths  RealitiesJune Ivc E Bus Myths  Realities
June Ivc E Bus Myths Realities
 
IT as an Engine of Global Expansion for African Organisations
IT as an Engine of Global Expansion for African OrganisationsIT as an Engine of Global Expansion for African Organisations
IT as an Engine of Global Expansion for African Organisations
 
Bcm Best Practise & Local Challenges
Bcm Best Practise & Local ChallengesBcm Best Practise & Local Challenges
Bcm Best Practise & Local Challenges
 
Benefiting From Bs25999 Lee
Benefiting From Bs25999 LeeBenefiting From Bs25999 Lee
Benefiting From Bs25999 Lee
 
The It Practioners View Kunle Odebode
The It Practioners View Kunle OdebodeThe It Practioners View Kunle Odebode
The It Practioners View Kunle Odebode
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

BYOD: Risks and Opportunities

  • 1. BYOD:  Risks  and   Opportunities   Presented  by:  Olabode  Olaoke   Compliance  Manager  –  Rack  Centre  
  • 2. Outline   ! History  of  computers   ! BYOD  Definition   ! Risk  &  Opportunity  Definition   ! BYOD  Trends   ! BYOD  Risks  and  Opportunities   ! Q&A  
  • 3. Some  History…   50’s   70’s   90’s   20XY  
  • 4. BYOD:Defined   ! BYOD  is  a  concept  that  allows   employees  to  utilize  their  personally-­‐ owned  technology  devices  to  stay   connected  to,  access  data  from,  or   complete  tasks  for  their   organizations  .     -­‐  CIO  Council  Aug  2012  
  • 6. Risks  &  Opportunities   ! Risk  –  Uncertainty  of  outcome…   ! When  negative  –  Threat   ! When  positive  –  Opportunity   Embrace   Resist  
  • 7. Trends  Before  BYOD   ! Standardization   ! Perimeterization   ! Ownership   ! Restrictions   ! Access  
  • 8. Divergent  needs  of  IT  and  User   community   IT  Needs   User   Needs   Freedom   Ownership   Mobility   Flexibility   Control   Security   Service  &  Support  
  • 9.
  • 10. BYOD  Devices   Network   Storage   (including   cloud  services)   PC’s  and  Macs   Mobile   Applications   OS’  
  • 14. Mobile  Apps   1,000,000+ Apps 50,000+ Apps 600,000+ Apps 190,000+ Apps Others: ???
  • 16. BYOD  Risks:  Individual   Privacy   Device/connectivity  Cost   Service/Support  
  • 17. BYOD  Opportunities:  Individual   Productivity Access Excitement Flexibility Availability
  • 18. BYOD  Risks:  Organizations   Access   Confidentiality   Complexity   Malware   • Updates  and  Patching   • Jail  broken  apps?   • Anti-­‐malware?   • Applications?   Legal  and  Regulatory   Bandwidth   • Capacity   • Licensing?   • Addressing?   Breach  of  AUP   • Email?   Data  storage   • Device   • Cloud   • Network   Authenti OS  (jail  b Applicati Informa Informa Applicati Legal  (so Content   Compati Updates  an Jail  broken   Anti-­‐malwa Application
  • 19. BYOD  Opportunities:   Organizations   Productivity   Access   Excitement   Flexibility   Lower  Overheads   (device,  support,   licensing,  internet   connectivity)   Innovation   Collaboration   Human  Resource   benefits   Improved   customer   satisfaction  
  • 21. Collaboration  Opportunities   Better  data   oversight   and  control   of  data  flow   Data  availability   via  cloud   storage   services   Increased   online  data   interaction  and   data  access   Increased  Data   accuracy   Data  sharing  
  • 22. Human  Resource  Benefits   Increased  employee   motivation   Talent   attraction   and   employee   retention   Employee  led   learning  and   development   Increased   employee   creativity  and   resourcefulness  
  • 23.
  • 24.
  • 25. of  employees  would  choose  to   work  from  home  over  pay  rise  
  • 27. What  are  the  REAL  Options?   Reject?   Ignore?   Permit?   Promote?  Champion?  Liberate   Have  a  plan   Say  yes   Develop  capability