SlideShare a Scribd company logo
June 26, 2014 presented by…
Johan Hammerstrom
Community IT Innovators
Webinar Series
Build Your Own
BYOD Policy
Webinar Tips
• Ask questions
Post questions via chat
• Interact
Respond to polls during webinar
• Focus
Avoid multitasking. You may just miss the best part of
the presentation
• Webinar PowerPoint & Recording
PowerPoint and recording links will be shared after the
webinar
About Community IT
Community IT Innovators partners with nonprofits to help them solve
their strategic & day-to-day IT challenges.
Strategic
Proactive approach so you can make IT decisions that support your
mission and grow with you
Collaborative
Team of over 40 staff who empower you to make informed IT choices
Invested
We are committed to supporting your mission, and take care of your IT
network as if it were our own
Nonprofit focus
Worked with over 900 nonprofits since 1993
About the Presenter
Johan Hammerstrom
President
jhammerstrom@communityit.com
@hammerstromj
Agenda
I. BYOD…a brief history
II. Information Services Model
III. Risks v. Benefits
IV. Building your own BYOD Policy
V. 3 case studies
Bring
Your
Own
Device
Choose
Your
Own
Device
Bring
Your
Own
App
Mobile
Device
Management
Containers
BYOD, a brief history…
Empowering Users
Balancing Priorities
Person
al
Organizatio
n
Model
www.stratechery.com, Ben Thompson
Data
Services
Apps
OS
Hardware
• Email
• Files
Data
•Exchange Server
•File ServerServices
• Outlook
• Word, Excel, PowerPointApps
• WindowsOS
• Dell, HP, LenovoHardware
• Email
• Files
Data
•Exchange Server
•File ServerServices
• Outlook
• Word, Excel, PowerPointApps
• WindowsOS
• Dell, HP, LenovoHardware
• Email
• Files
Data
•Office 365, Google Apps
•Box, DropBox, OneDriveServices
• Outlook, mobile mail
• Word, Excel, PowerPointApps
• Windows, OS X, iOSOS
• PC, Tablet, MobileHardware
www.stratechery.com, Ben Thompson
Organization
BYOD
Organization
BYOD Organization
Organization
BYOD Mobile First
Organization
BYOD Mobile First
BYOA
Organization
BYOD Mobile First
BYOA
Risks
• Security
• Legal
• Financial
Benefits
• Adoption
• Cost
• Flexibility
Benefits of BYOD
1. Reduce hardware & support costs
2. Work flexibility
3. Employee availability
4. User adoption and satisfaction
Risks of BYOD
1. Information Security
2. Legal
3. Financial
Risks of BYOD
(b)
Person
al
(a)
Org
1. Information Security Risks
a) Organization
– Data leakage
– Vector into the company
b) Personal
– Onerous security measures
– Loss of full control of device
2. Legal Risks
a) Organization
– Lack of certainty in case law and legislation
b) Personal
– Personal device could be confiscated
– Personal blurs into the corporate
3. Financial Risks
a) Organization
– Stipends can be more expensive than a single
corporate plan
– IT Support can become entangled
– Mobile Device Management (MDM) can be expensive
b) Personal
– Stipend may not cover full cost…or any at all
– Can be responsible for own support
Build your own BYOD
1. Inventory your data
• How sensitive is it?
• Compliance regulations?
2. Identify work roles
• Access to data
• Remote work requirements
• Flexibility requirements
Build your own BYOD
1. Identify Benefits
• Prioritize for your Organization
• Establish your strategy
2. Identify Risks
• Risk = Impact * Likelihood
3. Summarize
• Consider your options
• Summarize in a written policy
Program Staff Development Executive
Sensitive Data
Medical Records
Donor Contacts Yes Yes
Financial System Yes
HR Records
Less Sensitive
Email Yes Yes Yes
Grant Proposals Yes Yes
Program Mgmt Yes Yes
Program Staff Development Executive
Risks
Info Security low moderate high
Legal low low high
Financial low low moderate
Program Staff Development Executive
Benefits
Reduce costs Yes
Work Flexibility Yes Yes
Availability Yes Yes
User adoption Yes
Risks
Info Security low moderate high
Legal low low high
Financial low low moderate
BYOD ltd BYOD CYOD
Policy
provide small stipend
& limited access to
information
limited access to
information from
home
fully managed
access to info
3 case studies
1. Goal: 90% of 150,000
workforce
2. Custom Authentication
System
3. Reason: Avoid locked-in
corporate environment
Aggressive BYOD
1. 20% use their own device
2. Increasing restrictions on
personal device use
3. Reason: Security concerns
4. Dropsmack!
Conservative BYOD
1.Identified data sensitivity
2.Created 3 work roles
3.Cost/Benefit analysis
4.Device Policy
Flexible BYOD
Upcoming Webinar
Thursday July 24
4:00 – 5:00 PM EST
SharePoint
Taking Another Look
Matthew Eshleman & Steve Longenecker
After the webinar
• Connect with us
• Provide feedback
Short survey after you exit the webinar. Be sure to
include any questions that were not answered.
• Missed anything?
Link to slides & recording will be emailed to you.

More Related Content

Viewers also liked

Sasha what makes the best insulating material
Sasha what makes the best insulating materialSasha what makes the best insulating material
Sasha what makes the best insulating material
ISF
 
Case study #2 team 5
Case study #2 team 5Case study #2 team 5
Case study #2 team 5
eda610team5
 
Media Presentation
Media PresentationMedia Presentation
Media Presentation
000018188
 
LEC- 2
LEC- 2LEC- 2
LEC- 2
Abo Ali
 
Borges -poema_a_los_amigos_+
Borges  -poema_a_los_amigos_+Borges  -poema_a_los_amigos_+
Borges -poema_a_los_amigos_+Hiraki Yami
 
FINANCIAL FREEDOM OVERVIEW
FINANCIAL FREEDOM OVERVIEWFINANCIAL FREEDOM OVERVIEW
FINANCIAL FREEDOM OVERVIEW
wealthbuilders
 
Elyria building and community departments
Elyria building and community departmentsElyria building and community departments
Elyria building and community departments
mzrsmith
 
Buyers and Sellerts FAQS on Timesharing
Buyers and Sellerts FAQS on TimesharingBuyers and Sellerts FAQS on Timesharing
Buyers and Sellerts FAQS on Timesharing
Mbstyles
 
Gliding Contest Scoring: current and proposal 8.1.4 for the 2016 IGC plenary
Gliding Contest Scoring: current and proposal 8.1.4 for the 2016 IGC plenaryGliding Contest Scoring: current and proposal 8.1.4 for the 2016 IGC plenary
Gliding Contest Scoring: current and proposal 8.1.4 for the 2016 IGC plenary
Reno Filla
 
DoxCycle Introduction (Trilogy Software)
DoxCycle Introduction (Trilogy Software)DoxCycle Introduction (Trilogy Software)
DoxCycle Introduction (Trilogy Software)
Trilogy Software
 
JUSTICE SAMUEL ALITO (Wikipedia Info)
JUSTICE SAMUEL ALITO (Wikipedia Info)JUSTICE SAMUEL ALITO (Wikipedia Info)
JUSTICE SAMUEL ALITO (Wikipedia Info)
VogelDenise
 
08/03/14 ObamaFraudGate - EXPOSING THE PLOT JOHN F KENNEDY MENTIONED THAT APP...
08/03/14 ObamaFraudGate - EXPOSING THE PLOT JOHN F KENNEDY MENTIONED THAT APP...08/03/14 ObamaFraudGate - EXPOSING THE PLOT JOHN F KENNEDY MENTIONED THAT APP...
08/03/14 ObamaFraudGate - EXPOSING THE PLOT JOHN F KENNEDY MENTIONED THAT APP...
VogelDenise
 

Viewers also liked (14)

Sasha what makes the best insulating material
Sasha what makes the best insulating materialSasha what makes the best insulating material
Sasha what makes the best insulating material
 
Case study #2 team 5
Case study #2 team 5Case study #2 team 5
Case study #2 team 5
 
Media Presentation
Media PresentationMedia Presentation
Media Presentation
 
Afrikaans
AfrikaansAfrikaans
Afrikaans
 
LEC- 2
LEC- 2LEC- 2
LEC- 2
 
Borges -poema_a_los_amigos_+
Borges  -poema_a_los_amigos_+Borges  -poema_a_los_amigos_+
Borges -poema_a_los_amigos_+
 
FINANCIAL FREEDOM OVERVIEW
FINANCIAL FREEDOM OVERVIEWFINANCIAL FREEDOM OVERVIEW
FINANCIAL FREEDOM OVERVIEW
 
Elyria building and community departments
Elyria building and community departmentsElyria building and community departments
Elyria building and community departments
 
Buyers and Sellerts FAQS on Timesharing
Buyers and Sellerts FAQS on TimesharingBuyers and Sellerts FAQS on Timesharing
Buyers and Sellerts FAQS on Timesharing
 
Gliding Contest Scoring: current and proposal 8.1.4 for the 2016 IGC plenary
Gliding Contest Scoring: current and proposal 8.1.4 for the 2016 IGC plenaryGliding Contest Scoring: current and proposal 8.1.4 for the 2016 IGC plenary
Gliding Contest Scoring: current and proposal 8.1.4 for the 2016 IGC plenary
 
DoxCycle Introduction (Trilogy Software)
DoxCycle Introduction (Trilogy Software)DoxCycle Introduction (Trilogy Software)
DoxCycle Introduction (Trilogy Software)
 
JUSTICE SAMUEL ALITO (Wikipedia Info)
JUSTICE SAMUEL ALITO (Wikipedia Info)JUSTICE SAMUEL ALITO (Wikipedia Info)
JUSTICE SAMUEL ALITO (Wikipedia Info)
 
08/03/14 ObamaFraudGate - EXPOSING THE PLOT JOHN F KENNEDY MENTIONED THAT APP...
08/03/14 ObamaFraudGate - EXPOSING THE PLOT JOHN F KENNEDY MENTIONED THAT APP...08/03/14 ObamaFraudGate - EXPOSING THE PLOT JOHN F KENNEDY MENTIONED THAT APP...
08/03/14 ObamaFraudGate - EXPOSING THE PLOT JOHN F KENNEDY MENTIONED THAT APP...
 
Slovenian
SlovenianSlovenian
Slovenian
 

Similar to Community IT Webinar - Build your own BYOD Policy

[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
AIIM International
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
hdicapitalarea
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
CGTI
 
Staying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving WorldStaying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving World
brian andrews
 
Community IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators - Best of Nonprofit Tech WebinarCommunity IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
Robert 'Bob' Reyes
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
Evan Francen
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
Net at Work
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
FERMA
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
Murray Security Services
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
Sonny Hashmi
 
UU innovation masters november 2010
UU innovation masters november 2010UU innovation masters november 2010
UU innovation masters november 2010
Tim Willoughby
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
Livingstone Advisory
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
John Rapa
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
Swati Gupta
 
Using events to drive deeper engagement - MemberWise
Using events to drive deeper engagement  - MemberWise Using events to drive deeper engagement  - MemberWise
Using events to drive deeper engagement - MemberWise
Purple Vision
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
Sal Abramo
 
Community IT Innovators - IT Planning & Budgeting 102413
Community IT Innovators - IT Planning & Budgeting 102413Community IT Innovators - IT Planning & Budgeting 102413
Community IT Innovators - IT Planning & Budgeting 102413
Community IT Innovators
 
Is Your Direct Selling Technology Strategy Relevant?
Is Your Direct Selling Technology Strategy Relevant?Is Your Direct Selling Technology Strategy Relevant?
Is Your Direct Selling Technology Strategy Relevant?
Kris Shenk
 

Similar to Community IT Webinar - Build your own BYOD Policy (20)

[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Staying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving WorldStaying Safe In A Quickly Evolving World
Staying Safe In A Quickly Evolving World
 
Community IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators - Best of Nonprofit Tech WebinarCommunity IT Innovators - Best of Nonprofit Tech Webinar
Community IT Innovators - Best of Nonprofit Tech Webinar
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Meeting the cyber risk challenge
Meeting the cyber risk challengeMeeting the cyber risk challenge
Meeting the cyber risk challenge
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
UU innovation masters november 2010
UU innovation masters november 2010UU innovation masters november 2010
UU innovation masters november 2010
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
Cybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial ServicesCybersecurity Best Practices in Financial Services
Cybersecurity Best Practices in Financial Services
 
Fissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-trainingFissea09 mgupta-day3-panel process-program-build-effective-training
Fissea09 mgupta-day3-panel process-program-build-effective-training
 
Using events to drive deeper engagement - MemberWise
Using events to drive deeper engagement  - MemberWise Using events to drive deeper engagement  - MemberWise
Using events to drive deeper engagement - MemberWise
 
Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1Marketing Program Overview_Sal A _2012 v2.1
Marketing Program Overview_Sal A _2012 v2.1
 
Community IT Innovators - IT Planning & Budgeting 102413
Community IT Innovators - IT Planning & Budgeting 102413Community IT Innovators - IT Planning & Budgeting 102413
Community IT Innovators - IT Planning & Budgeting 102413
 
Is Your Direct Selling Technology Strategy Relevant?
Is Your Direct Selling Technology Strategy Relevant?Is Your Direct Selling Technology Strategy Relevant?
Is Your Direct Selling Technology Strategy Relevant?
 

More from Community IT Innovators

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Community IT Innovators
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
Community IT Innovators
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
Community IT Innovators
 
SharePoint Online for Nonprofits
SharePoint Online for NonprofitsSharePoint Online for Nonprofits
SharePoint Online for Nonprofits
Community IT Innovators
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Community IT Innovators
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
Community IT Innovators
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?
Community IT Innovators
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable
Community IT Innovators
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
Community IT Innovators
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
Community IT Innovators
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Community IT Innovators
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
Community IT Innovators
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Community IT Innovators
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
Community IT Innovators
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Innovators
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
Community IT Innovators
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Community IT Innovators
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
Community IT Innovators
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
Community IT Innovators
 

More from Community IT Innovators (20)

Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
Slack, Microsoft Teams, Zoom: What Works Best for Nonprofits?
 
2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report2021 Nonprofit Cybersecurity Incident Report
2021 Nonprofit Cybersecurity Incident Report
 
Cybersecurity Training for Nonprofits
Cybersecurity Training for NonprofitsCybersecurity Training for Nonprofits
Cybersecurity Training for Nonprofits
 
SharePoint Online for Nonprofits
SharePoint Online for NonprofitsSharePoint Online for Nonprofits
SharePoint Online for Nonprofits
 
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
Microsoft Dynamics and Salesforce: What You Need To Know Before Choosing a Pl...
 
Nonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment BasicsNonprofit Cybersecurity Risk Assessment Basics
Nonprofit Cybersecurity Risk Assessment Basics
 
Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?Does Your Organization Need a Better Technology Roadmap?
Does Your Organization Need a Better Technology Roadmap?
 
2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable2020 Nonprofit Technology Trends Roundtable
2020 Nonprofit Technology Trends Roundtable
 
5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More5 Security Tips to Protect Your Login Credentials and More
5 Security Tips to Protect Your Login Credentials and More
 
How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019How Data Quality Defines Your Organization Webinar November 2019
How Data Quality Defines Your Organization Webinar November 2019
 
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators WebinarNonprofit Cybersecurity Readiness - Community IT Innovators Webinar
Nonprofit Cybersecurity Readiness - Community IT Innovators Webinar
 
5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization5 Steps to Create an Information Strategy for Your Organization
5 Steps to Create an Information Strategy for Your Organization
 
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to KnowServer 2008 and Windows 7 End of Life: 3 Things You Need to Know
Server 2008 and Windows 7 End of Life: 3 Things You Need to Know
 
What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?What Makes Nonprofit Tech Projects Succeed?
What Makes Nonprofit Tech Projects Succeed?
 
Community IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT ManagerCommunity IT Webinar: Working with an Outsourced IT Manager
Community IT Webinar: Working with an Outsourced IT Manager
 
Nonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident ReportNonprofit Cybersecurity Incident Report
Nonprofit Cybersecurity Incident Report
 
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
Improving Nonprofit CRM Data Management in 2019 - Build Consulting and Commun...
 
Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019Community IT Innovators Technology Trends Round Table 2019
Community IT Innovators Technology Trends Round Table 2019
 
Selecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes LastSelecting Nonprofit Software: Technology Comes Last
Selecting Nonprofit Software: Technology Comes Last
 
IT Security Incident Response for Nonprofits
IT Security Incident Response for NonprofitsIT Security Incident Response for Nonprofits
IT Security Incident Response for Nonprofits
 

Recently uploaded

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 

Recently uploaded (20)

5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 

Community IT Webinar - Build your own BYOD Policy

Editor's Notes

  1. Poll: For mobile devices, what does your organization provide? Poll: For laptops and desktops, what does your organization provide?