SlideShare a Scribd company logo
BYO: BYO A GOOD THING?…………………………………
Head of Information Security
Company85
Phil Cracknell, FBCS, CISSP, MIRM
DILBERT © (2013) Scott Adams. Used by permission of Universal Uclick. All rights reserved.
BYOD grows like a weed
The ability of
corporations to deal
with it grows like…
petrified wood
BYOD has stirred plenty of controversy
Companies are either embracing it to its fullest extent
or avoiding it like the plague
It is one of the few technology shifts that can ‘creep’
into an organisation from the top down!
Current Adoption
BYOD or BYO seemed to emerge around 2009 as a
questionable solution to rising IT costs
• More functional/sexy technology now available for
personal consumption
• Company or user initiated?
• Is it inevitable?
• How should businesses approach it?
Where did BYO come from?
So why is there a greater apparent fear of BYO than
any other recent technology shift?
– Less control of IT?
– Less ownership?
– Implied greater personal use?
Fear
When employees invest their own money in a device, they
naturally feel
“it’s mine, so I should be able to do what I want with it.”
When the company pays for a device, employees are more
inclined to accept rules and restrictions
The Balancing Act
From the user perspective
“I don’t want to carry my own phone and a company one”
“I don’t want to use my personal phone for work”
“I can’t use my work phone to the degree I require for
personal use”
“I want the latest technology of my choice, not the ones my
company choose”
A good thing
BYOD can potentially save your company money and
help make your employees happier and more
productive
It could drive massive and essential changes to larger
businesses in terms of network zoning, data
segregation and classification (Internal security
defences)
There’s always a ‘however’
BYOD brings along with it a number of risks, from
security to compatibility and everything in between
– Legal
– HR issues
– Device loss/insurance/replacement
– Policy
BYOD Risks
1: Exposed data
2: Passwords in the wild
3: Declining productivity
4: Compatibility issues
5: Bandwidth overuse/wireless bottlenecks
6: Device management
7: Virus infections
People
BYOD presents several technical risks but
ultimately they are linked to people and
behaviour
BYOD brings out the best and worst in people,
and the user types can be easily categorised
The Millennials
I blame them for it all!!!
It's the Millennials pouring into all our workplaces.
They put the pressure on management to allow
them to use their own mobile devices on the
job, not some antiquated corporate-issued
BlackBerry. That's sooo 1998!!
They want to work odd hours and over weekends.
They actually want their business lives and
personal lives to blend.
The Techies
They've found a friend in Android.
With BYOD in place, they are free to poke
fun at the consumerised Apple-users,
compare App stores, support and
functionality – and all in the name of work!
Android offers the flexibility that techies
crave, and also serves up some pretty cool
apps for monitoring systems remotely and
other IT job functions.
The Main Board
CEOs and the like have a hallowed place in
the BYOD world. Whatever they want, they
get.
Like Captain Kirk with an MBA, these
business leaders shout for more power, “all
you can give me and then more!” and the
trusty IT engine room shall provide it.
From Apple devices on the day of launch, to
an IT throwback such as the BlackBerry it’s
pretty clear where the BYOD fire started...
The Older Generation
BYOD isn't for everyone, but that hasn't
stopped some companies from mandating the
policy across the workforce.
Half of employers will require employees to
supply their own device for work purposes by
2017, says a Gartner survey of CIOs.
Pity the worker who doesn't want to put up
the cash for a fancy mobile device, sign over
privacy rights, and then be expected to surf
social networks for support when things go
wrong.
Who loves the iPhone and iPad more than
anyone else? Salespeople, of course!
They like to keep things simple, love to
give dynamic presentations, and hate
typing on keyboards. They also like to
blend their personal and work lives.
The iPad with its bold Retina display was
simply made for salespeople in the
workplace.
The Salespeople
The Clock-watchers
Entry-level and hourly workers have much to
gain from BYOD, many of whom don't qualify for
a corporate-issued device. Now they can tap into
the power of personal mobile technology to do
their jobs.
It's a freedom they've never had before.
Great, right? Well, BYOD also opens the doors to
work outside of defined work hours, in the form
of work-related email and text messages
bombarding hourly workers after they have
punched out.
Expect a slew of lawsuits for unpaid overtime.
The Moaners
Every workforce has moaners. Nothing is ever good
enough, and BYOD is no exception. BYOD was
trumpeted by moaners who wanted to use their own
devices instead of a corporate-issued relic.
They complained about having to carry around two
devices all the time.
Now that BYOD has arrived, they're still complaining.
Expectations of privacy, security controls on personal
devices, and policies chock full of legal jargon.
The moaner makes the remote wipe capability of
MDM a must!
The Social Networkers
Social networking addicts love BYOD. It
makes social networking easier to do at
work.
One of the top concerns with BYOD is that
it will lead to less productive workers.
Some companies even ban or limit the use
of Facebook and others at work.
On a related note, companies also better
not infringe on an employee's right to
social media privacy in a BYOD policy.
The Bad Employees
In the wrong hands, BYOD can be
disastrous. The problem for us is that it
will soon be in every employees
hands!
Most companies have disgruntled
employees. BYOD effectively makes it
easier for a ‘bad’ employee to steal
stuff and hide it somewhere in the
cloud, even claiming ignorance to the
actual location of where the data was
‘moved’ or coped to ;-)
Vendor FUD
Despite the inevitable flood of Fear, Uncertainty and Doubt
spewed from our vendor community – many of the risks with
BYO are INTERNAL and staff-related
Use BYOD to clean up your wild west – embrace it! BYOD will, if
done right, make your world more secure not less
Some essentials for survival of BYO
Get a clear mandate from the board
– What is in scope? BYOD doesn’t have to mean mobiles, tablets and laptops – ask the hard
questions
Data Classification and Zoning
– Ensure you know where your important/confidential data is
– Ensure policies and technology control access to this data
– Control entry to and placement on your network – a BYO DMZ? Hell yes!
Get an MDM (Mobile Device Management) solution
– Remote wipe
– Device barring and exclusion
– Remote enforcement of PIN lock and other features
BYO – A good thing?
Thank you!
Phil Cracknell, FBCS, CISSP, MIRM
Head of Security and Privacy services at
Company85
uk.linkedin.com/in/cracknell
@pcracknell

More Related Content

What's hot

New Assumptions for Designing for the Social Web
New Assumptions for Designing for the Social WebNew Assumptions for Designing for the Social Web
New Assumptions for Designing for the Social WebChris Messina
 
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile FirstAD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile FirstJohn Head
 
Be Prepared For Byod
Be Prepared For ByodBe Prepared For Byod
Be Prepared For Byod
Nováccent
 
Facebook And Apple Are Serious About Augmented Reality
Facebook And Apple Are Serious About Augmented RealityFacebook And Apple Are Serious About Augmented Reality
Facebook And Apple Are Serious About Augmented Reality
Bernard Marr
 
Mobile technology
Mobile technologyMobile technology
Mobile technologyhillarz
 
8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World 8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World
Bernard Marr
 
7 Amazing Everyday Examples Of Nanotechnology In Action
7 Amazing Everyday Examples Of Nanotechnology In Action7 Amazing Everyday Examples Of Nanotechnology In Action
7 Amazing Everyday Examples Of Nanotechnology In Action
Bernard Marr
 
Social mobile usage Don't Leave Social at the Office
 Social mobile usage   Don't Leave Social at the Office Social mobile usage   Don't Leave Social at the Office
Social mobile usage Don't Leave Social at the Office
Heath McCarthy
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtRoopa Nadkarni
 
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
Bernard Marr
 
Mobile writing by the numbers
Mobile writing by the numbersMobile writing by the numbers
Mobile writing by the numbers
Ann Wylie
 
Mobliciti's Mobile & Cloud Technical Showcase
Mobliciti's Mobile & Cloud Technical Showcase Mobliciti's Mobile & Cloud Technical Showcase
Mobliciti's Mobile & Cloud Technical Showcase
Aanya Ali
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends PostTBledsoe
 
Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti
 
The Digital Workplace Revolution
The Digital Workplace RevolutionThe Digital Workplace Revolution
The Digital Workplace Revolution
Atlas Cloud
 
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
Axios Systems
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance
Jesse Wilkins
 
BYOD Trends, Challenges, Pitfalls and Tips
BYODTrends, Challenges, Pitfalls and TipsBYODTrends, Challenges, Pitfalls and Tips
BYOD Trends, Challenges, Pitfalls and Tips
Axios Systems
 
What Will a Future Workforce Look Like?
What Will a Future Workforce Look Like?What Will a Future Workforce Look Like?
What Will a Future Workforce Look Like?
Candarine
 
CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?
John Newton
 

What's hot (20)

New Assumptions for Designing for the Social Web
New Assumptions for Designing for the Social WebNew Assumptions for Designing for the Social Web
New Assumptions for Designing for the Social Web
 
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile FirstAD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
 
Be Prepared For Byod
Be Prepared For ByodBe Prepared For Byod
Be Prepared For Byod
 
Facebook And Apple Are Serious About Augmented Reality
Facebook And Apple Are Serious About Augmented RealityFacebook And Apple Are Serious About Augmented Reality
Facebook And Apple Are Serious About Augmented Reality
 
Mobile technology
Mobile technologyMobile technology
Mobile technology
 
8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World 8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World
 
7 Amazing Everyday Examples Of Nanotechnology In Action
7 Amazing Everyday Examples Of Nanotechnology In Action7 Amazing Everyday Examples Of Nanotechnology In Action
7 Amazing Everyday Examples Of Nanotechnology In Action
 
Social mobile usage Don't Leave Social at the Office
 Social mobile usage   Don't Leave Social at the Office Social mobile usage   Don't Leave Social at the Office
Social mobile usage Don't Leave Social at the Office
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holt
 
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
 
Mobile writing by the numbers
Mobile writing by the numbersMobile writing by the numbers
Mobile writing by the numbers
 
Mobliciti's Mobile & Cloud Technical Showcase
Mobliciti's Mobile & Cloud Technical Showcase Mobliciti's Mobile & Cloud Technical Showcase
Mobliciti's Mobile & Cloud Technical Showcase
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends Post
 
Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016
 
The Digital Workplace Revolution
The Digital Workplace RevolutionThe Digital Workplace Revolution
The Digital Workplace Revolution
 
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance
 
BYOD Trends, Challenges, Pitfalls and Tips
BYODTrends, Challenges, Pitfalls and TipsBYODTrends, Challenges, Pitfalls and Tips
BYOD Trends, Challenges, Pitfalls and Tips
 
What Will a Future Workforce Look Like?
What Will a Future Workforce Look Like?What Will a Future Workforce Look Like?
What Will a Future Workforce Look Like?
 
CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?
 

Viewers also liked

Imad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOImad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIO
Global Business Events
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015
IANS
 
#%! My CISO Says
#%! My CISO Says#%! My CISO Says
#%! My CISO Says
Argyle Executive Forum
 
Building security leaders ISSA Virtual CISO Series
Building security leaders   ISSA Virtual CISO SeriesBuilding security leaders   ISSA Virtual CISO Series
Building security leaders ISSA Virtual CISO Series
Aaron Carpenter
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
Priyanka Aash
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)
Maurice Dawson
 

Viewers also liked (8)

Imad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOImad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIO
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015
 
So you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to SuccessSo you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to Success
 
MESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - UpdatedMESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - Updated
 
#%! My CISO Says
#%! My CISO Says#%! My CISO Says
#%! My CISO Says
 
Building security leaders ISSA Virtual CISO Series
Building security leaders   ISSA Virtual CISO SeriesBuilding security leaders   ISSA Virtual CISO Series
Building security leaders ISSA Virtual CISO Series
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)
 

Similar to Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good thing?

Byod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldByod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional world
Kévin CÉCILE
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
4imprint
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
Ravi namboori
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
Logicalis
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
BYOD
BYODBYOD
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
Barcoding, Inc.
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity CatalystPacket One
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
Osterman Research, Inc.
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
Trefor Smith
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
ssuserf9c51d
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
mattinsonjanel
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
Hexnode
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
NEORIS
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’
John Davis
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYODJim Sutter
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
Rihab Chebbah
 
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
S w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docxS w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docx
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
jeffsrosalyn
 

Similar to Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good thing? (20)

Byod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldByod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional world
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
BYOD
BYODBYOD
BYOD
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
 
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
S w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docxS w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docx
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
 

More from Global Business Events

Cio Event
Cio EventCio Event
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Global Business Events
 
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Global Business Events
 
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Global Business Events
 
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Global Business Events
 
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Global Business Events
 
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationHakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Global Business Events
 
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Global Business Events
 
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Global Business Events
 
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Global Business Events
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
Global Business Events
 
John Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyJohn Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security Anxiety
Global Business Events
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Global Business Events
 
Keith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingKeith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined Everything
Global Business Events
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
Global Business Events
 
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Global Business Events
 
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Global Business Events
 
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Global Business Events
 
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Global Business Events
 
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Global Business Events
 

More from Global Business Events (20)

Cio Event
Cio EventCio Event
Cio Event
 
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
 
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
 
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
 
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
 
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
 
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationHakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
 
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
 
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
 
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
 
John Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyJohn Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security Anxiety
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Keith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingKeith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined Everything
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
 
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
 
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
 
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
 
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
 
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
 

Recently uploaded

Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 

Recently uploaded (13)

Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 

Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good thing?

  • 1. BYO: BYO A GOOD THING?………………………………… Head of Information Security Company85 Phil Cracknell, FBCS, CISSP, MIRM
  • 2. DILBERT © (2013) Scott Adams. Used by permission of Universal Uclick. All rights reserved.
  • 3. BYOD grows like a weed The ability of corporations to deal with it grows like… petrified wood
  • 4. BYOD has stirred plenty of controversy Companies are either embracing it to its fullest extent or avoiding it like the plague It is one of the few technology shifts that can ‘creep’ into an organisation from the top down! Current Adoption
  • 5. BYOD or BYO seemed to emerge around 2009 as a questionable solution to rising IT costs • More functional/sexy technology now available for personal consumption • Company or user initiated? • Is it inevitable? • How should businesses approach it? Where did BYO come from?
  • 6. So why is there a greater apparent fear of BYO than any other recent technology shift? – Less control of IT? – Less ownership? – Implied greater personal use? Fear
  • 7. When employees invest their own money in a device, they naturally feel “it’s mine, so I should be able to do what I want with it.” When the company pays for a device, employees are more inclined to accept rules and restrictions The Balancing Act
  • 8. From the user perspective “I don’t want to carry my own phone and a company one” “I don’t want to use my personal phone for work” “I can’t use my work phone to the degree I require for personal use” “I want the latest technology of my choice, not the ones my company choose”
  • 9. A good thing BYOD can potentially save your company money and help make your employees happier and more productive It could drive massive and essential changes to larger businesses in terms of network zoning, data segregation and classification (Internal security defences)
  • 10. There’s always a ‘however’ BYOD brings along with it a number of risks, from security to compatibility and everything in between – Legal – HR issues – Device loss/insurance/replacement – Policy
  • 11. BYOD Risks 1: Exposed data 2: Passwords in the wild 3: Declining productivity 4: Compatibility issues 5: Bandwidth overuse/wireless bottlenecks 6: Device management 7: Virus infections
  • 12. People BYOD presents several technical risks but ultimately they are linked to people and behaviour BYOD brings out the best and worst in people, and the user types can be easily categorised
  • 13. The Millennials I blame them for it all!!! It's the Millennials pouring into all our workplaces. They put the pressure on management to allow them to use their own mobile devices on the job, not some antiquated corporate-issued BlackBerry. That's sooo 1998!! They want to work odd hours and over weekends. They actually want their business lives and personal lives to blend.
  • 14. The Techies They've found a friend in Android. With BYOD in place, they are free to poke fun at the consumerised Apple-users, compare App stores, support and functionality – and all in the name of work! Android offers the flexibility that techies crave, and also serves up some pretty cool apps for monitoring systems remotely and other IT job functions.
  • 15. The Main Board CEOs and the like have a hallowed place in the BYOD world. Whatever they want, they get. Like Captain Kirk with an MBA, these business leaders shout for more power, “all you can give me and then more!” and the trusty IT engine room shall provide it. From Apple devices on the day of launch, to an IT throwback such as the BlackBerry it’s pretty clear where the BYOD fire started...
  • 16. The Older Generation BYOD isn't for everyone, but that hasn't stopped some companies from mandating the policy across the workforce. Half of employers will require employees to supply their own device for work purposes by 2017, says a Gartner survey of CIOs. Pity the worker who doesn't want to put up the cash for a fancy mobile device, sign over privacy rights, and then be expected to surf social networks for support when things go wrong.
  • 17. Who loves the iPhone and iPad more than anyone else? Salespeople, of course! They like to keep things simple, love to give dynamic presentations, and hate typing on keyboards. They also like to blend their personal and work lives. The iPad with its bold Retina display was simply made for salespeople in the workplace. The Salespeople
  • 18. The Clock-watchers Entry-level and hourly workers have much to gain from BYOD, many of whom don't qualify for a corporate-issued device. Now they can tap into the power of personal mobile technology to do their jobs. It's a freedom they've never had before. Great, right? Well, BYOD also opens the doors to work outside of defined work hours, in the form of work-related email and text messages bombarding hourly workers after they have punched out. Expect a slew of lawsuits for unpaid overtime.
  • 19. The Moaners Every workforce has moaners. Nothing is ever good enough, and BYOD is no exception. BYOD was trumpeted by moaners who wanted to use their own devices instead of a corporate-issued relic. They complained about having to carry around two devices all the time. Now that BYOD has arrived, they're still complaining. Expectations of privacy, security controls on personal devices, and policies chock full of legal jargon. The moaner makes the remote wipe capability of MDM a must!
  • 20. The Social Networkers Social networking addicts love BYOD. It makes social networking easier to do at work. One of the top concerns with BYOD is that it will lead to less productive workers. Some companies even ban or limit the use of Facebook and others at work. On a related note, companies also better not infringe on an employee's right to social media privacy in a BYOD policy.
  • 21. The Bad Employees In the wrong hands, BYOD can be disastrous. The problem for us is that it will soon be in every employees hands! Most companies have disgruntled employees. BYOD effectively makes it easier for a ‘bad’ employee to steal stuff and hide it somewhere in the cloud, even claiming ignorance to the actual location of where the data was ‘moved’ or coped to ;-)
  • 22. Vendor FUD Despite the inevitable flood of Fear, Uncertainty and Doubt spewed from our vendor community – many of the risks with BYO are INTERNAL and staff-related Use BYOD to clean up your wild west – embrace it! BYOD will, if done right, make your world more secure not less
  • 23. Some essentials for survival of BYO Get a clear mandate from the board – What is in scope? BYOD doesn’t have to mean mobiles, tablets and laptops – ask the hard questions Data Classification and Zoning – Ensure you know where your important/confidential data is – Ensure policies and technology control access to this data – Control entry to and placement on your network – a BYO DMZ? Hell yes! Get an MDM (Mobile Device Management) solution – Remote wipe – Device barring and exclusion – Remote enforcement of PIN lock and other features
  • 24.
  • 25. BYO – A good thing? Thank you! Phil Cracknell, FBCS, CISSP, MIRM Head of Security and Privacy services at Company85 uk.linkedin.com/in/cracknell @pcracknell