BYOD Security Risks Presentation by Ravi Namboori Visit

Slides:



Advertisements
Similar presentations
1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
Advertisements

City of Boroondara Mobile Device Management
BYOD: The Corporate Dilemma Seeking an Approach Virtuous Insights Consulting Services Aug 2012 Virtuous Insights © Virtuous Insights Consulting.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
BYOD Security Maintaining a Secure Infrastructure Friday 15 th March 2013.
Mobility in Government Consolidation & Wrap-up Lee Naik3 Oct 2013.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Smoke-free Swinburne Team briefing 1. Swinburne Agenda  Background  Implementation  Benefits  Support  Further information  Questions? 2.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
BBB Technology and Computers Connection Group Presented by: Cary M. Root Root-InfoTech.com.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
Information Security considerations for Outsourced ICT Services
Team G-Force: Jason, Veronica, Doug and Socrates Multiple Device Authentication for the Cloud MSIT
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
Information Assurance Policy: Course Summary. 2 A Multifaceted Activity Policy needs, goals, construction, enforcement, evolution Governance, legislation,
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
Felicia Flippen Crystal Thompson Kevin Hulsey. Outline What is BYOD Trends of BYOD Advantages of BYOD Disadvantages of BYOD Summary.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Application Management
How Mobile Transforms the Enterprise
HIPAA Security Final Rule Overview for HIPAA Summit West June 5, 2003Karen Trudel.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Mobile Device Management ZEST4. Features of Zest4 MDM  Security  Device Management  Control  Support.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Mobile Technology and Insurance Employee Benefit Programs By Scott Warner.
Moving to BYOD Gary Audin 1.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
- Company Confidential - Corporate Overview March 2015.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Project implemented with financial support provided by the European Social Fund within the Community Initiative EQUAL Krzysztof Żmijewski Program Content.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Balancing Security and Costs in a Mobile World International Legal Technology Association Communication Technologies Peer Group Webinar.
For more course tutorials visit
CMGT 400 GUIDE Real Success CMGT 400 Entire Course FOR MORE CLASSES VISIT CMGT 400 Week 1 Individual Assignment Risky Situation CMGT.
For More Best A+ Tutorials CMGT 400 Entire Courses (UOP Course) CMGT 400 Week 1 DQ 1 (UOP Course)  CMGT 400 Week 1 Individual Assignments.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
KasPer Pro HRMS with Self Service Brings a Fully Featured Human Resources Management Solution to the Office 365/SharePoint Online Environment OFFICE 365.
Bus. Mgt Understand communication skills, strategic management, emotional  intelligence, and professional development 1.01 Read to acquire meaning.
Transforming business
Are Your Employees Sabotaging You on Social Media?
External Verification Report 2014/15
MGT 434 CART Motivating Students to Learn/mgt434cart.com
MGT 434 CART Successful Learning /mgt434cart.com
Impact of IT Consumerisation on Enterprise Security
Security managed from the cloud.
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
Award Winning Android App Development Company
CIS 333 RANK Education for Service-- cis333rank.com.
CMGT 400 Education for Service-- tutorialrank.com
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Emerging Technology: Bring Your Own Device
Governance Assistant for Office365
NAME : MOSTAFA AHMED SALEH
Introduction to BYOD EIT, Author Gay Robertson, 2017.
Sustainable Gaming – Saving the sector from itself
Introduction to Health Privacy
Personal Mobile Device Acceptable Use Policy Training Slideshow
Presentation transcript:

BYOD Security Risks Presentation by Ravi Namboori Visit

BYOD – Bring Your Own Device  Like all developments in technology, BYOD has its fair share of pitfalls.  There is a possibility of staff exploiting the BYOD environment by going for upgraded phones or signing up for maximum data plans. After all, these expenses have to be borne by the employers.

BYOD - Threats Adopting BYOD can lead to many problems further down the road if you’re not aware of it properly. Learn Few Risks: The threats are forcing security teams to introduce new policies to reduce the risk. Enforcing them without impacting productivity is a balancing act. Experts say the first step is to understand the perceived risks and weigh them against the company's security posture.

Continued... When BYOD was in its nascent stages, companies would erase data remotely if a smartphone was lost. But people misplace their phones at times, so it could lead to problems if critical data is wiped off.

Developing BYOD Policy.. While developing BYOD policy, enterprises need to consider the following: Segmentation of users and decide on what depth of access should be given to each specific segment. What type of devices need to be permitted to access corporate data  Device specific security policies  Need of well-defined service policies  Defining use polices The legal team has to ensure that managers are properly trained on the BYOD user policy. No details can be afforded to be given a miss.

To Avoid Risks:  A BYOD workplace is being embraced by companies with an effort to make staff more comfortable, leading to higher productivity. It would also give them flexibility of working from any location at any time and on any device of their choice.  Some companies, however, see some employees misusing their devices to play games or to access sites not related to their work. Consequently, some apps have had to be added to the BYOD blacklist.

Conclusion Finally we can say instead of banning BYOD enable it securely  Create a clear policy on BYOD rights and information security rules.  Train employees to protect work information accessed on personal devices.

Thanks Presentation by Ravi Namboori Visit