IT Examiner School, Providence, RI

What is a good BYOD Strategy?  People – security awareness training, constant education, instill in the culture  Process – monitoring, enrollment/de-provisioning, quarantine, application lifecycle  Policy – acceptable use policy, e-mail security, access control, password policy, patch management, incident response, business continuity  Technology – NAC, MDM, MAM, firewalls, IDS/IPS, A/V How many of you have A/V on your Mobiles?

BYOD Conclusion

 Mobile devices keep us informed and productive. They also have transformed into full-blown computers.  As enterprises and employees begin to store critical data on mobile devices, security is vital and fundamental to our overall IT security posture.  BYOD does not have to mean “Bring Your Own Disaster/Danger.”

Made with FlippingBook Annual report