From mobile devices to BYOD
Andrew Cormack,Chief regulatory adviser
@Janet_LegReg
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 3
We like mobile computing
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 4
We like mobile computing
» Research and education aren’t
just office hours
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 5
We like mobile computing
» Research and education aren’t
just office hours
» Work wherever/whenever
inspiration strikes
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 6
We like mobile computing
» Research and education aren’t
just office hours
» Work wherever/whenever
inspiration strikes
» Increased productivity
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 7
We like mobile computing
» Research and education aren’t
just office hours
» Work wherever/whenever
inspiration strikes
» Increased productivity
» Happier users
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 8
We like mobile computing
» Research and education aren’t
just office hours
» Work wherever/whenever
inspiration strikes
» Increased productivity
» Happier users
» Could your organisation cope
without it?
Policies
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 9
How we secure it
» De jure: the things we write down
Policies
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 10
How we secure it
» De jure: the things we write down
» De facto: the things we do
› This sets policy: “email on any device”
So how do we secure mobile computing?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 11
AccessServer Device User
So how do we secure mobile computing?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 12
IMAP or
web or
VTTY or
none
AccessServer Device User
So how do we secure mobile computing?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 13
authentication
encryption
IMAP or
web or
VTTY or
none
AccessServer Device User
So how do we secure mobile computing?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 14
authentication
encryption
profiles
management
IMAP or
web or
VTTY or
none
AccessServer Device User
So how do we secure mobile computing?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 15
authentication
encryption
policies
guidance
support
profiles
management
IMAP or
web or
VTTY or
none
AccessServer Device User
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 16
What do you do?
Discuss around table for 10 mins
Fill in the columns
What’s the difference with BYOD?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 17
authentication
encryption
policies
guidance
support
profiles
management
IMAP or
web or
VTTY or
none
AccessServer Device User
What’s the difference with BYOD?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 18
authentication
encryption
policies
guidance
support
profiles
management
IMAP or
web or
VTTY or
none
AccessServer Device User
 
What’s the difference with BYOD?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 19
authentication
encryption
policies
guidance
support
profiles
management
IMAP or
web or
VTTY or
none
AccessServer Device User
 
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 20
What controls do you enforce on mobile devices?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 21
» Passphrase, patches, anti-virus, firewall
» Encryption, remote wipe
» Safe downloading, account/directory
separation
» Thinking about where you are
What we’d like…
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 22
» Passphrase, patches, anti-virus, firewall
» Encryption, remote wipe
» Safe downloading, account/directory
separation
» Thinking about where you are
Feels like basic good practice…
What we’d like…
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 23
» Passphrase, patches, anti-virus, firewall
» Encryption, remote wipe
» Safe downloading, account/directory
separation
» Thinking about where you are
Feels like basic good practice…
Actually, it’s the ICO’s recommendations
for BYOD!
» Warns against MDM/tracking of
non-owned devices
What we’d like…
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 24
How to be safe without device management?
Already rely on users for some controls
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 25
How to be safe without device management?
Already rely on users for some controls
» Their behaviour may already be
biggest risk
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 26
How to be safe without device management?
Already rely on users for some controls
» Their behaviour may already be
biggest risk
» Especially if they have admin rights!
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 27
How to be safe without device management?
Already rely on users for some controls
Possibly move some controls to
server-side
» But tightening de facto policies on
existing services is a hard sell
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 28
How to be safe without device management?
Already rely on users for some controls
Possibly move some controls to
server-side
» But tightening de facto policies on
existing services is a hard sell
Or, encourage users to implement them
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 29
How to be safe without device management?
Already rely on users for some controls
Possibly move some controls to
server-side
» But tightening de facto policies on
existing services is a hard sell
Or, encourage users to implement them
» What do you lose with corporate
mobile?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 30
How to be safe without device management?
Already rely on users for some controls
Possibly move some controls to
server-side
» But tightening de facto policies on
existing services is a hard sell
Or, encourage users to implement them
» What do you lose with corporate
mobile?
» What do you lose with BYOD?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 31
Self-interest
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 32
Self-interest
81% employees don’t care about mobile security
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 33
Self-interest
81% employees don’t care about mobile security
Surely more care about their own devices?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 34
Self-interest
81% employees don’t care about mobile security
Surely more care about their own devices?
Their BYOD security interests are same as ours
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 35
Self-interest
81% employees don’t care about mobile security
Surely more care about their own devices?
Their BYOD security interests are same as ours
» If they know why/how to do the right thing
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 36
Self-interest
81% employees don’t care about mobile security
Surely more care about their own devices?
Their BYOD security interests are same as ours
» If they know why/how to do the right thing
» Might BYOD even be more secure?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 37
How might we help?
Discuss around tables for 10 mins:
» How to motivate
» How to support
And report back good ideas…
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 38
Good questions...
“What should I do if I lose it?”
“What should I do when I pass it on?”
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 39
Good questions...
“What should I do if I lose it?”
“What should I do when I pass it on?”
“How should I back up my device?”
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 40
Good questions...
“What should I do if I lose it?”
“What should I do when I pass it on?”
“How should I back up my device?”
“How do I share files with others?”
“How do I get new apps?”
…
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 41
BYOD plan
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 42
BYOD plan
1. Review existing measures for
mobile devices
› Already accepted risk: don’t demand
more of BYOD
› If risk now unacceptable, change mobile
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 43
BYOD plan
1. Review existing measures for
mobile devices
› Already accepted risk: don’t demand
more of BYOD
› If risk now unacceptable, change mobile
2. Prepare to support device owners
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 44
BYOD plan
1. Review existing measures for
mobile devices
› Already accepted risk: don’t demand
more of BYOD
› If risk now unacceptable, change mobile
2. Prepare to support device owners
3. Motivate device owners
› Should improve mobile security too
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 45
BYOD future
Design systems to be BYO-by-Default?
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 46
BYOD future
Design systems to be BYO-by-Default?
» Presume it is the norm
» Identify / configure systems and data
that aren’t suitable for it
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 47
BYOD future
Design systems to be BYO-by-Default?
» Presume it is the norm
» Identify / configure systems and data
that aren’t suitable for it
BYOD will happen anyway
Much better to design for it than ignore it
Questions?
Or, come and discuss this afternoon…
BT paper
» btplc.com/News/Articles/ShowArticle.cfm?ArticleID=F5E90F45-
966A-4872-8CF6-C2C32F608541
ICO on BYOD
» ico.org.uk/for_organisations/data_protection/topic_guides/online/byod
CESG
» gov.uk/government/collections/bring-your-own-device-guidance
Me
» community.ja.net/blogs/regulatory-developments/article/mobile-
device-policy-byod
» community.ja.net/blogs/regulatory-developments/tags/BYOD
References
09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 49

From mobile device policy to bring your own device (BYOD)

  • 2.
    From mobile devicesto BYOD Andrew Cormack,Chief regulatory adviser @Janet_LegReg
  • 3.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 3 We like mobile computing
  • 4.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 4 We like mobile computing » Research and education aren’t just office hours
  • 5.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 5 We like mobile computing » Research and education aren’t just office hours » Work wherever/whenever inspiration strikes
  • 6.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 6 We like mobile computing » Research and education aren’t just office hours » Work wherever/whenever inspiration strikes » Increased productivity
  • 7.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 7 We like mobile computing » Research and education aren’t just office hours » Work wherever/whenever inspiration strikes » Increased productivity » Happier users
  • 8.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 8 We like mobile computing » Research and education aren’t just office hours » Work wherever/whenever inspiration strikes » Increased productivity » Happier users » Could your organisation cope without it?
  • 9.
    Policies 09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 9 How we secure it » De jure: the things we write down
  • 10.
    Policies 09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 10 How we secure it » De jure: the things we write down » De facto: the things we do › This sets policy: “email on any device”
  • 11.
    So how dowe secure mobile computing? 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 11 AccessServer Device User
  • 12.
    So how dowe secure mobile computing? 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 12 IMAP or web or VTTY or none AccessServer Device User
  • 13.
    So how dowe secure mobile computing? 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 13 authentication encryption IMAP or web or VTTY or none AccessServer Device User
  • 14.
    So how dowe secure mobile computing? 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 14 authentication encryption profiles management IMAP or web or VTTY or none AccessServer Device User
  • 15.
    So how dowe secure mobile computing? 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 15 authentication encryption policies guidance support profiles management IMAP or web or VTTY or none AccessServer Device User
  • 16.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 16 What do you do? Discuss around table for 10 mins Fill in the columns
  • 17.
    What’s the differencewith BYOD? 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 17 authentication encryption policies guidance support profiles management IMAP or web or VTTY or none AccessServer Device User
  • 18.
    What’s the differencewith BYOD? 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 18 authentication encryption policies guidance support profiles management IMAP or web or VTTY or none AccessServer Device User  
  • 19.
    What’s the differencewith BYOD? 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 19 authentication encryption policies guidance support profiles management IMAP or web or VTTY or none AccessServer Device User  
  • 20.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 20 What controls do you enforce on mobile devices?
  • 21.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 21 » Passphrase, patches, anti-virus, firewall » Encryption, remote wipe » Safe downloading, account/directory separation » Thinking about where you are What we’d like…
  • 22.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 22 » Passphrase, patches, anti-virus, firewall » Encryption, remote wipe » Safe downloading, account/directory separation » Thinking about where you are Feels like basic good practice… What we’d like…
  • 23.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 23 » Passphrase, patches, anti-virus, firewall » Encryption, remote wipe » Safe downloading, account/directory separation » Thinking about where you are Feels like basic good practice… Actually, it’s the ICO’s recommendations for BYOD! » Warns against MDM/tracking of non-owned devices What we’d like…
  • 24.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 24 How to be safe without device management? Already rely on users for some controls
  • 25.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 25 How to be safe without device management? Already rely on users for some controls » Their behaviour may already be biggest risk
  • 26.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 26 How to be safe without device management? Already rely on users for some controls » Their behaviour may already be biggest risk » Especially if they have admin rights!
  • 27.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 27 How to be safe without device management? Already rely on users for some controls Possibly move some controls to server-side » But tightening de facto policies on existing services is a hard sell
  • 28.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 28 How to be safe without device management? Already rely on users for some controls Possibly move some controls to server-side » But tightening de facto policies on existing services is a hard sell Or, encourage users to implement them
  • 29.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 29 How to be safe without device management? Already rely on users for some controls Possibly move some controls to server-side » But tightening de facto policies on existing services is a hard sell Or, encourage users to implement them » What do you lose with corporate mobile?
  • 30.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 30 How to be safe without device management? Already rely on users for some controls Possibly move some controls to server-side » But tightening de facto policies on existing services is a hard sell Or, encourage users to implement them » What do you lose with corporate mobile? » What do you lose with BYOD?
  • 31.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 31 Self-interest
  • 32.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 32 Self-interest 81% employees don’t care about mobile security
  • 33.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 33 Self-interest 81% employees don’t care about mobile security Surely more care about their own devices?
  • 34.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 34 Self-interest 81% employees don’t care about mobile security Surely more care about their own devices? Their BYOD security interests are same as ours
  • 35.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 35 Self-interest 81% employees don’t care about mobile security Surely more care about their own devices? Their BYOD security interests are same as ours » If they know why/how to do the right thing
  • 36.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 36 Self-interest 81% employees don’t care about mobile security Surely more care about their own devices? Their BYOD security interests are same as ours » If they know why/how to do the right thing » Might BYOD even be more secure?
  • 37.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 37 How might we help? Discuss around tables for 10 mins: » How to motivate » How to support And report back good ideas…
  • 38.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 38 Good questions... “What should I do if I lose it?” “What should I do when I pass it on?”
  • 39.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 39 Good questions... “What should I do if I lose it?” “What should I do when I pass it on?” “How should I back up my device?”
  • 40.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 40 Good questions... “What should I do if I lose it?” “What should I do when I pass it on?” “How should I back up my device?” “How do I share files with others?” “How do I get new apps?” …
  • 41.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 41 BYOD plan
  • 42.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 42 BYOD plan 1. Review existing measures for mobile devices › Already accepted risk: don’t demand more of BYOD › If risk now unacceptable, change mobile
  • 43.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 43 BYOD plan 1. Review existing measures for mobile devices › Already accepted risk: don’t demand more of BYOD › If risk now unacceptable, change mobile 2. Prepare to support device owners
  • 44.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 44 BYOD plan 1. Review existing measures for mobile devices › Already accepted risk: don’t demand more of BYOD › If risk now unacceptable, change mobile 2. Prepare to support device owners 3. Motivate device owners › Should improve mobile security too
  • 45.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 45 BYOD future Design systems to be BYO-by-Default?
  • 46.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 46 BYOD future Design systems to be BYO-by-Default? » Presume it is the norm » Identify / configure systems and data that aren’t suitable for it
  • 47.
    09/03/2015 Jisc DigitalFestival, 9-10 March 2015, ICC Birmingham 47 BYOD future Design systems to be BYO-by-Default? » Presume it is the norm » Identify / configure systems and data that aren’t suitable for it BYOD will happen anyway Much better to design for it than ignore it
  • 48.
    Questions? Or, come anddiscuss this afternoon…
  • 49.
    BT paper » btplc.com/News/Articles/ShowArticle.cfm?ArticleID=F5E90F45- 966A-4872-8CF6-C2C32F608541 ICOon BYOD » ico.org.uk/for_organisations/data_protection/topic_guides/online/byod CESG » gov.uk/government/collections/bring-your-own-device-guidance Me » community.ja.net/blogs/regulatory-developments/article/mobile- device-policy-byod » community.ja.net/blogs/regulatory-developments/tags/BYOD References 09/03/2015 Jisc Digital Festival, 9-10 March 2015, ICC Birmingham 49

Editor's Notes

  • #2  +++++ COVER: OPTION 1 ++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #3  +++++ SECTION BREAK SLIDE ++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #4  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #5  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #6  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #7  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #8  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #9  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #10  +++++ TWO COLUMN LAYOUT WITH HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #11  +++++ TWO COLUMN LAYOUT WITH HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #12  +++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #13  +++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #14  +++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #15  +++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #16  +++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #17  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #18  +++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #19  +++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #20  +++++ SINGLE COLUMN WITH TWO LINE HEADER – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #21 OK, so with BYOD you’ve lost those. How much less safe does that actually make you?
  • #22  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #23  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #24  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #25  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #26  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #27  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #28 # insert motivational demo: What do I lose if someone steals my corporate smartphone? Vs What do you lose if someone steals your personal BYOD?]
  • #29 # insert motivational demo: What do I lose if someone steals my corporate smartphone? Vs What do you lose if someone steals your personal BYOD?]
  • #30 # insert motivational demo: What do I lose if someone steals my corporate smartphone? Vs What do you lose if someone steals your personal BYOD?]
  • #31 # insert motivational demo: What do I lose if someone steals my corporate smartphone? Vs What do you lose if someone steals your personal BYOD?]
  • #32  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #33  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #34  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #35  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #36  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #37  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #38  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #39  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #40  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #41  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #42  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #43  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #44  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #45  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #46  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #47  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #48  +++++ TWO COLUMN LAYOUT – NO HEADERS – FOR EITHER BODY COPY, BULLETS, GRAPHICS, IMAGES, TABLES OR VIDEO – PLEASE NOTE ANY VIDEOS SUPPLIED WILL NEED THE VIDEO SUPPLIED ALONG SIDE THE PRESENTATION +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #49  +++++ SINGLE COLUMN LAYOUT – FOR USE WITH IMAGES - CAPTIONS AND ATTRIBUTION BELOW +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++
  • #50  +++++ BLANK SLIDE WITH TITLE +++++++ +++++ PLEASE FEEL FREE TO DELETE THESE NOTES WHILST CREATING YOUR PRESENTATION +++++++