Surveys now show that an organization's technology is being driven by the staff and IT has to try to accommodate and attempt to manage. Two notable examples are file synchronization software (OneDrive, Drop Box), and smartphones.
As organizations allow staff to use their own computers and smart phones for work, or to take company laptops and devices out of the office for tele-work, personal work mixes with organizational work, and it becomes important to have an IT strategy and policies that specify the responsibilities employees have for maintaining and securing their computers and cell phones, AND the company's rights over its own data.
Objectives of the Presentation
Why Should you Attend
- Why are organizations adapting Bring Your Own Device programs?
- What benefits are they realizing?
- How to assess the risk of approving a BYOD policy
- What are the essential elements of a Bring Your Own Device policy?
- What are the implications for management tools, security, and cost?
As consumer technology introduced into the work environment, organizations are faced with - in many cases - radically modifying their device ownership policies. Bring Your Own Device (BYOD) is an alternative strategy that enables employees, business partners and others to use a personally selected and purchased client device to conduct the company's business by using the company's enterprise applications and data. The scope can include basic phones, smart phones, tablets, and even PCs. This webinar explores the lessons learned from BYOD programs in enterprise and government. This webinar will outline some of the practical issues surrounding BYOD to gain insight into how employers can protect themselves and meet Board due-diligence guidelines with an effective BYOD policy.
Who will Benefit
- What is BYOD and why you need a policy in place
- BYOD - A brief History
- The pros and cons of personal devices on the network
- What kinds of devices you should allow
- How BYOD cuts real costs
- Configuring devices before letting them on the network
- How to protect corporate data and establishing appropriate risk controls
- Risks vs. Benefits
- What you need to put in your policies and procedures
- Building your own BYOD Policy
- Portable Storage Devices
- Case Studies
This program will benefit attorneys and other compliance professionals in organizations where employees regularly use mobile electronic devices. This would include representatives from the HR department and the IT department as well as policy committee members and senior management. Given the degree to which BYOD-related issues and programs touch on a wide variety of divisions within an organization, this program would benefit almost anyone with responsibility in this area, whether their organization has a BYOD program or is in need of one. Realistically, ALL organizations - public, private, profit or non-profit, large or small - will confront BYOD in the very near future. It also would be useful to individuals who want to learn more about the repercussions of their own use of personal devices for work purposes.
This webinar will provide valuable assistance to all personnel in:
- Internal Auditors
- Risk Officers
- Director of Security
- Compliance Officers
- Compliance Professionals
- Audit Committee Members
- Operational Risk Managers
- Information Security
- Information Technology
- Cyber Incident Response Managers
- Disaster Recovery Managers
While BYOD offers many benefits - cost savings, greater efficiency and improved employee morale - it has its pitfalls. Attend this webinar to get a better understanding of how BYOD can threaten the security of employer data and networks. For example, an employee with unencrypted patient confidential information on a smart phone - unknown to the employer - could trigger a major HIPAA breach and expose the organization to HIPAA penalties up to $1.5 million per device. As a result, employers need to become aware of and install preventive measures as safeguards, such as monitoring, accessing and ultimately wiping an employee's device, without creating employee privacy issues.