(BYOD) Bring Your Own Device Program: Best Practices

Duration: 90 Minutes
This is a practical webinar for managers and employees (technical or otherwise) who are interested in developing an effective Bring Your Own Device (BYOD) strategy for their organization. There is no one-size-fits-all approach to BYOD, and each attendee will walk away with a starting point and guidance for building their own strategy and policy guidelines.There's no way around it. To stay competitive, enterprises need to embrace BYOD. But how do you reap the rewards while avoiding the risks?
BYOD Policies
Instructor: Stephen E. Reade
Product ID: 508055
Surveys now show that an organization's technology is being driven by the staff and IT has to try to accommodate and attempt to manage. Two notable examples are file synchronization software (OneDrive, Drop Box), and smartphones.

As organizations allow staff to use their own computers and smart phones for work, or to take company laptops and devices out of the office for tele-work, personal work mixes with organizational work, and it becomes important to have an IT strategy and policies that specify the responsibilities employees have for maintaining and securing their computers and cell phones, AND the company's rights over its own data.

Objectives of the Presentation
  • Why are organizations adapting Bring Your Own Device programs?
  • What benefits are they realizing?
  • How to assess the risk of approving a BYOD policy
  • What are the essential elements of a Bring Your Own Device policy?
  • What are the implications for management tools, security, and cost?
Why Should you Attend
As consumer technology introduced into the work environment, organizations are faced with - in many cases - radically modifying their device ownership policies. Bring Your Own Device (BYOD) is an alternative strategy that enables employees, business partners and others to use a personally selected and purchased client device to conduct the company's business by using the company's enterprise applications and data. The scope can include basic phones, smart phones, tablets, and even PCs. This webinar explores the lessons learned from BYOD programs in enterprise and government. This webinar will outline some of the practical issues surrounding BYOD to gain insight into how employers can protect themselves and meet Board due-diligence guidelines with an effective BYOD policy.

Areas Covered
  • What is BYOD and why you need a policy in place
  • BYOD - A brief History
  • The pros and cons of personal devices on the network
  • What kinds of devices you should allow
  • How BYOD cuts real costs
  • Configuring devices before letting them on the network
  • How to protect corporate data and establishing appropriate risk controls
  • Risks vs. Benefits
  • What you need to put in your policies and procedures
  • Building your own BYOD Policy
  • Portable Storage Devices
  • Case Studies
Who will Benefit
This program will benefit attorneys and other compliance professionals in organizations where employees regularly use mobile electronic devices. This would include representatives from the HR department and the IT department as well as policy committee members and senior management. Given the degree to which BYOD-related issues and programs touch on a wide variety of divisions within an organization, this program would benefit almost anyone with responsibility in this area, whether their organization has a BYOD program or is in need of one. Realistically, ALL organizations - public, private, profit or non-profit, large or small - will confront BYOD in the very near future. It also would be useful to individuals who want to learn more about the repercussions of their own use of personal devices for work purposes.

This webinar will provide valuable assistance to all personnel in:
  • Internal Auditors
  • Risk Officers
  • Director of Security
  • Compliance Officers
  • Compliance Professionals
  • Audit Committee Members
  • Operational Risk Managers
  • Information Security
  • Information Technology
  • Cyber Incident Response Managers
  • Disaster Recovery Managers
Topic Background
While BYOD offers many benefits - cost savings, greater efficiency and improved employee morale - it has its pitfalls. Attend this webinar to get a better understanding of how BYOD can threaten the security of employer data and networks. For example, an employee with unencrypted patient confidential information on a smart phone - unknown to the employer - could trigger a major HIPAA breach and expose the organization to HIPAA penalties up to $1.5 million per device. As a result, employers need to become aware of and install preventive measures as safeguards, such as monitoring, accessing and ultimately wiping an employee's device, without creating employee privacy issues.
$300
Recorded Session for one participant
Get life time access with download option!
Book this course
Pay Now
  $450.00 Training CD
Free shipment within 4 Working Days of placing the order. Get life time access for unlimited participants.
  $550.00 Training USB Flash Drive
Free shipment within 4 Working Days of placing the order. Get life time access for unlimited participants.
For multiple location please contact our customer care team +1-510-857-5896.
How it works
Live Session - How it works
  • Login to onlinecompliancepanel with your registered username and password https://www.onlinecompliancepanel.com/login
  • The webinar joining link, username and password for joining the webinar will be updated on your OCP Account 24 hours prior to the webinar
  • Presentation handouts in Downloadable PDF format will be updated on your OCP Account 24 hours prior to the live session
  • Login to the audio conference on the scheduled date and time
  • Get answers to your queries through interactive Q&A sessions via chat at the end of the session
  • Download the Certificate of Attendance and Purchase Invoice from your OCP Account 24 hours after the completion of the session
  • Please let us know your thoughts and views at the end of the webinar, your valuable feedback will help us improve
Recorded Session - How it works
  • Login to onlinecompliancepanel with your registered username and password https://www.onlinecompliancepanel.com/login
  • Upon purchase of the recorded session a link will be updated on your OCP Account within 24 hours
  • Please click on the link to access the Recorded Session
  • Presentation handouts in downloadable PDF format will be updated on your OCP Account within 24 hours of the purchase of the product
  • Download the Certificate of Attendance and Purchase Invoice from your OCP Account after 48 hours of the product Purchase
  • Please share your valuable Feedback at the end of the session
Instructor Profile:
Mr. Reade has spent over 25 years in IT sales & marketing, working for well-known organizations such as Motorola, AT&T, Schneider Electric and Power Analytics. Mr. Reade currently works with Managed Compliance Solutions, a division of Outsource My I.T., Fairfield, NJ. Managed Compliance Solutions is focused solely on helping organizations get and stay HIPAA compliant and offers a cloud-based, easy to use and affordable service for all healthcare organizations, and Business Associates that must maintain HIPAA compliance in order to continue to work with healthcare providers.

Mr. Reade previously developed a highly secure outsourced IT service for Outsource My I.T. that enables small-to-medium businesses to get Fortune 500 quality IT services for an affordable monthly fee. The growth of hacking and malware has become a major concern for Mr. Reade, who has investigated many IT strategies to avoid or mitigate the impact of a malware attack. Mr. Reade strongly believes that - in its ability to bring a profitable, growing business to a complete halt - ransomware is the single biggest threat to small-to-medium businesses. Mr. Reade is currently writing a book on getting and staying HIPAA compliant that includes extensive coverage of the malware threat to healthcare providers.

Mr. Reade's academic background includes degrees in Physics, Information Management and Public Health, as well as extensive training and research in TQM (Total Quality Management), Lean, Six Sigma, Constraint Management and TRIZ. Among his outside interests, Mr. Reade does weight training, struggles with golf and has recently returned to competitive chess.
View More