Risk Management in the Era of BYOD
|
|
|
- Mervyn Thornton
- 9 years ago
- Views:
Transcription
1 Risk Management in the Era of BYOD - The Quartet of Technology, Controls, Liabilities and User Perception T. Andrew Yang University of Houston-Clear Lake 2700 Bay Area Blvd Houston, Texas 77058, USA [email protected] Alan T. Yang University of Texas 1 University Station Austin, TX 78712, USA [email protected] ABSTRACT Whether willingly or reluctantly, companies and organizations have jumped on board the BYOD wagon, by allowing employees (as well as partners and contractors) to use their own devices to access company assets, including networks, databases, s, etc. In this paper we propose the risk management quartet, i.e., technology, control, liabilities, and user perception, and examine the relationships among the four members of the quartet. Categories and Subject Descriptors C.2.3 [Network Operations]: Network management General Terms Security Keywords Risk management, BYOD, User perception, Liabilities. 1. INTRODUCTION Increasing number of companies and organizations have allowed employees (and sometimes business partners and contractors) to bring their own devices to work, resulting in the phenomena of BYOD (Bring Your Own Devices). Instead of using only devices issued by the employer, an employee may use his or her own laptop or smart phone to connect to company assets, including the corporate network, databases, intranet servers, servers, etc. Employees' own devices like laptops, smart phones, tablets, and PDAs are typically perceived as less secure than devices issued by the employer, mainly because of two reasons: 1) Because the device is owned by the employee, the company may not be able to exercise as much control over the device as it may have over a company-issued device. The controls encompass not only the types of security applications (like authentication, encryption, etc.) but also the choice of platforms and device manufacturers [4]. 2) The employee tends to use the device for both workrelated and private activities, resulting in both corporate and private data accessed and stored on that same device [5]. Therefore, employee's own devices may pose greater threats against the corporate assets; they are perceived as more vulnerable and easier to become compromised than devices issued and controlled by the company [6]. (Note: Whether this perception is Copyright is held by the author/owner. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee. Symposium on Usable Privacy and Security (SOUPS) 2013, July 24 26, 2013, Newcastle, UK. 1 valid or not is yet to be examined). Varying degree of security controls have been practiced for securing employee devices and limiting their impact upon the corporate assets if the device would become compromised. Some companies, in particular those in the defense or intelligence industries, do not allow the employee to use any device that is not issued by the employer [9]. Some companies only allow the employee to use his/her own device to access the Internet but not the corporate networks or servers, while some other companies allow the employee to use his/her own device in the same way as he would use a company-issued device, including connecting to and accessing corporate networks, databases, and servers. 2. The Risk Management Quartet When developing and enforcing the BYOD policy, several issues must be contemplated: a) What legal and liability issues should be considered and stated in the BYOD policy [7]? b) What control mechanisms should be employed to enforce the BYOD policy? c) What psychological impact the BYOD policy would have upon user perception and acceptance of the policy? d) What impact would the controls have over user perception and acceptance [8]? e) How should the employee s device be dealt with (e.g., turned over to the company s control) if a security breach is caused by that device? To help to answer the above and other questions in managing risks associated with BYOD, we propose the risk management quartet as illustrated in Figure 1. Figure 1. The quartet of risk management The quartet is composed of four members: technology (like BYOD, authentication, etc.), controls (like authentication, encryption, remote wipe, etc.), liabilities (e.g., financial loss, termination of employment, etc.), and user perception and acceptance). The risk management quartet as depicted in Figure 1 attempts to model the interactions among the four members.
2 Each arrow represents an effect and may be interpreted as 'causes' or 'triggers'. For example, arrow #1 means that the decision to adopt a technology (like BYOD) would trigger the adoption of control mechanisms (like device or user authentication, encryption of data on the device, remote wipe in the case of device loss, etc.), in order to mitigate or reduce the risks introduced by that technology. Only major relationships are depicted in Figure 1. For instance, the effect user perception may have upon controls is not represented in the model; nor is the effect of user perception upon the adopted technology. Arrow #2: An adopted technology may impose liabilities on the adopters, including the employer and the employee in the case of BYOD. When an incident occur, for example, would the employee be held responsible for the incident? The answer usually depends on what are stipulated in the policy. Arrow #3: Controls employed to enforce the policy, in response to the adoption of the given technology, may cause liabilities, particularly on the part of the employers. The employer must ensure that the enforced controls do not violate relevant regulations or mandates. Arrow #4: The adopted technology will trigger certain user perception. For example, allowing employees to bring their own devices to work may cause the employees to perceive the company as "a flexible and attractive employer" [1]. Arrow #5: Liabilities, especially those applicable to the employees, will have an impact upon user perception and acceptance of the adopted technology [2]. For instance, if a user is to be held responsible for security incidents caused by his/her device, the user will be less likely to bring his/her own device to work. Arrow #6: Control mechanisms used to enforce a policy will affect the user's perception and acceptance of the adopted technology. For example, if the employer requires any user who uses his/her own device to access the company database to implement data encryption or VPN, some users may decide not to use their own devices, mainly because of the burden or the inconvenience caused by the required controls [3]. Arrow #7: In order to enforce a security policy, new technologies may be introduced into the information system, for example, as part of the controls. A newly introduced technology (for example, data encryption in the case of BYOD) will have its own relationships with the relevant controls, liabilities, and user perception, therefore forming its own risk management quartet. Relationship #7 makes the model iterative, meaning that, given an adopted technology like BYOD, a sequence of technologies may be introduced, and each of them will have its own risk management quartet. 3. SUMMARY AND FUTURE WORK In this paper we propose the risk management quartet model. The model is composed of four members and their respective relationships. Future work may involve refinement of the model by adding more relationships (for example, the impact user perception may have upon controls). The model may be used as the foundation of empirical research projects, which, for example, investigate the weight each of the components may have upon the other components. A research question related to BYOD is about the different ways laptops and mobile device are treated by employers. A company may allow their employees to bring their own laptops to work (as long as proper authentication and other security mechanisms like VPN are in place). That same company may prohibit employees from bringing their own smart phones or tablets to work. Is a smart phone more vulnerable than a laptop when being used as an end device to connect to company assets? Would the risk management model as depicted in Figure 1 help to answer questions such as this? Would differentiated treatment like this help to refine the model? 4. REFERENCES [1] Wikipedia: accessed on May 29, [2] Bowman, M., Debray, S. K., and Peterson, L. L Reasoning about naming systems. ACM Trans. Program. Lang. Syst. 15, 5 (Nov. 1993), DOI= [3] Fröhlich, B. and Plate, J The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (The Hague, The Netherlands, April 01-06, 2000). CHI '00. ACM Press, New York, NY, DOI= [4] Navetta, David Bring Your Own Device Security and Privacy Legal Risks. Information Law Group. ISACA Denver, RMISC Conference. denver.org/conferences/rmisc/presentations/301- Legal_Implications_of_BYOD.pdf [5] Markelj, Blaz and Bernik, Igor Mobile Devices and Corporate Data Security. In International Journal of Education and Information Technologies. Issue 1, Volume 6. ationinformation/ pdf [6] Mayer Milligan, P. (2007). Business Risk and Security Assessment for Mobile Device. 8th WSEAS Int. Conf on Mathematics and Computers in Business and Economics: Conference Proceedings, Stevens Point, Wisconsin: WSEAS. [7] Wheeler, Evan Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. Syngress Publishing. Waltham, MA [8] Hayden, Lance IT Security Metrics: A Practical Framework for Measuring Security & Protecting Data. McGraw-Hill Osborne Media. New York, NY [9] Young, Carl Metrics and Methods for Security Risk Management. Syngress Publishing. Waltham, MA. 2
3 Risk Management in the ERA of BYOD Andrew Yang Alan Yang Collaborators: Radu Vlas & Cristina Vlas
4 Overview Companies are increasingly adopting BYOD to enable employees to use their own devices at the workplace. BYOD has its benefits but also inherent risks associated with its adoption. We try to build a model for technology adoption, with respect to several factors: control, liabilities, user perception, and user behavior. A project in progress 2
5 The Quartet of Risk Management Relationship #7 makes the model iterative. New development 3
6 The Risk Management Quintet Relationship Types Control-independent: 1, 2, 4, 8 Control-Dependent: 3, 5, 6 Feedback Relationships: 7, 9, 10, 11 4
7 The Risk Management Quintet - instantiated with BYOD as the technology adoption 5
8 Sample Control Methods for BYOD Data Encryption VPN Access Control (e.g., IEEE 802.1x) Remote Access and Remote Wipe Confiscation and Control Device Enrollment and Certification Network Access/Admission Control End Device Virtualization 6
9 The Risk Management Quintet - instantiated with Data encryption as the technology adoption 7
10 Future Work Qualitative validation of the model Interviews of IT managers Survey of IT workers Longer term: Quantitative research to refine the model 8
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Ponemon Institute Research Report
Bring Your Own Device (BYOD) and Mobile Device Management. tekniqueit.com
Bring Your Own Device (BYOD) and Mobile Device Management tekniqueit.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
Bring Your Own Device (BYOD) and Mobile Device Management. www.cognoscape.com
Bring Your Own Device (BYOD) and Mobile Device Management www.cognoscape.com Bring Your Own Device (BYOD) and Mobile Device Management People are starting to expect the ability to connect to public networks
BYOD BEST PRACTICES GUIDE
BYOD BEST PRACTICES GUIDE 866.926.8746 1 www.xantrion.com TABLE OF CONTENTS 1 Changing Expectations about BYOD... 3 2 Mitigating the Risks... 4 2.1 Establish Clear Policies and Expectations... 4 2.2 Create
BYOD Policies: A Litigation Perspective
General Counsel Panel Reveals the Real Deal BYOD Policies: A Litigation Perspective By Andrew Hinkes Reprinted with Permission BYOD Policies: A Litigation Perspective By Andrew Hinkes Bring-your-own-device
Bring Your Own Device (BYOD) and Mobile Device Management
Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT
BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect
BYOD : Managing Mobility within the Oil & Gas Industry
Challenges Our Solution Features Why BYOD? CYOD BYOD : Managing Mobility within the Oil & Gas Industry Changing the way your workforce functions. We provide the perfect BYOD solution that allows your employees
Chapter 6: Fundamental Cloud Security
Chapter 6: Fundamental Cloud Security Nora Almezeini MIS Department, CBA, KSU From Cloud Computing by Thomas Erl, Zaigham Mahmood, and Ricardo Puttini(ISBN: 0133387526) Copyright 2013 Arcitura Education,
North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP
Mobile Device Management Risky Business in Healthcare North Carolina Health Information Management Association February 20, 2013 Chris Apgar, CISSP Agenda HIPAA/HITECH & Mobile Devices Breaches Federal
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD
SECURING ENTERPRISE NETWORK 3 LAYER APPROACH FOR BYOD www.wipro.com Table of Contents Executive Summary 03 Introduction 03 Challanges 04 Solution 05 Three Layered Approach to secure BYOD 06 Conclusion
Information Security @ Blue Valley Schools FEBRUARY 2015
Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that
trends and audit considerations
Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS
SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
Don t Let A Security Breach Put You Out of Business
Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:
Workarounds in Healthcare, a Risky Trend. Produced by. media
Workarounds in Healthcare, a Risky Trend. Produced by media When healthcare workers bring their own laptop computers, tablets and smartphone devices to work, and use them to perform workarounds a way to
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the
Security Software Engineering: Do it the right way
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 19 Security Software Engineering: Do it the right way Ahmad
INFORMATION AND APPLICATION
School of Human Sciences & Humanities INFORMATION AND APPLICATION General Psychology Master of Art s Program Applied Cognitive Psychology Concentration And Human Factors/Ergonomics Certificate Fall Application
Choose Your Own Device (CYOD) and Mobile Device Management. gsolutionz.com
Choose Your Own Device (CYOD) and Mobile Device Management gsolutionz.com Choose Your Own Device (CYOD) and Mobile Device Management 2 gsolutionz.com People are starting to expect the ability to connect
BYOD. Bring Your Own Device - Mobile Device Management. www.prooncall.com
BYOD Bring Your Own Device - Mobile Device Management www.prooncall.com Bring Your Own Device (BYOD) Mobile Device Management People are starting to expect the ability to connect to public networks and
Security and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next
YOUR DATA UNDER SIEGE. PROTECTION IN THE AGE OF BYODS. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next Your Data Under Siege. Protection in the Age of BYODs 1.0 As the workplace
Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 )
Sample Employee Agreement for Business Use of Employee-Owned Personal Computing Devices (Including Wearables 1 ) Overview: The Bring Your Own Device (BYOD) program allows employees to use their own computing
Bring Your Own Device Mobile Security
Abstract Energized by the capability of consumer mobile devices employees demanded them in the workplace. Information technology organizations had neither the time nor budget to satisfy employee demands.
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
CA Enterprise Mobility Management MSO
SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.
BYOD. opos WHAT IS YOUR POLICY? SUMMARY
BYOD WHAT IS YOUR POLICY? opos SUMMARY The organization s employees and contractors frequently perform employment-related tasks which require connecting to the organization s networks, systems, and/or
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
How VDI Reduces the Risks of BYOD
How VDI Reduces the Risks of BYOD Technology leaders face a new challenge with consumerization of IT, as everyone from desktop workers to executives brings personal mobile devices into the workplace, expecting
Remote Access Securing Your Employees Out of the Office
Remote Access Securing Your Employees Out of the Office HSTE-NB0011-RV 1.0 Hypersecu Information Systems, Inc. #200-6191 Westminster Hwy Richmond BC V7C 4V4 Canada 1 (855) 497-3700 www.hypersecu.com Introduction
How To Implement Data Loss Prevention
Data Loss Prevention Implementation Initiatives THE HITACHI WAY White Paper By HitachiSoft America Security Solutions Group September, 2009 HITACHI SOFTWARE ENGINEERING AMERICA, LTD. Executive Summary
Information Security Risk Assessment Methodology
Information Security Risk Assessment Methodology An Information security risk assessment should take into account system-level risk (inclusive of applications and systems) and process-level risk (inclusive
Niagara County Community College
Niagara County Community College NCCCnet Computer Usage Policy Document: NCCCnet Computer Usage Policy Owner: Chief Information Officer Version: 2.0 NCCCnet Policy Page 1 of 7 NCCCnet Use Policy Introduction:
When HHS Calls, Will Your Plan Be HIPAA Compliant?
When HHS Calls, Will Your Plan Be HIPAA Compliant? Petula Workman, J.D., CEBS Division Vice President Compliance Counsel Gallagher Benefit Services, Inc., Sugar Land, Texas The opinions expressed in this
Email Encryption. Discovering Reasons Behind its Lack of Acceptance
Email Encryption Discovering Reasons Behind its Lack of Acceptance Kendal Stephens LaFleur Department of Computer Science Sam Houston State University Huntsville, TX, United States [email protected] Abstract
COMBINING ISMS WITH STRATEGIC MANAGEMENT: THE CASE OF BYOD
8th IADIS International Conference Information Systems 2015 COMBINING ISMS WITH STRATEGIC MANAGEMENT: THE CASE OF BYOD Martin Brodin University of Skövde Box 408, S-541 28 Skövde, Sweden ABSTRACT Bring
The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T
The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices
Everything You Need to Know About Effective Mobile Device Management. mastering the mobile workplace
Everything You Need to Know About Effective Mobile Device Management mastering the mobile workplace Table of Contents Introduction... 3 1. What exactly is Mobility Management Anyway?... 4 Impenetrable
Enterprise Security Architecture
Enterprise Architecture -driven security April 2012 Agenda Facilities and safety information Introduction Overview of the problem Introducing security architecture The SABSA approach A worked example architecture
6/17/2013 PRESENTED BY: Updates on HIPAA, Data, IT and Security Technology. June 25, 2013
Updates on HIPAA, Data, IT and Security Technology June 25, 2013 1 The material appearing in this presentation is for informational purposes only and should not be construed as advice of any kind, including,
Mobile Device Security and Audit
Mobile Device Security and Audit ISACA Chapter Meeting February 2012 Alex Stamps Manager Security & Privacy Services Deloitte & Touche LLP [email protected] Session Objectives Define mobile devices
Information and Communication Technology. Firewall Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
{ipad Security} for K-12. Understanding & Mitigating Risk. plantemoran.com
{ipad Security} plantemoran.com for K-12 Understanding & Mitigating Risk Plante Moran The ipad is in K-12. Since its debut in April 2010, the ipad has quickly become the most popular tablet, outselling
Anthony J. Albanese, Acting Superintendent of Financial Services. Financial and Banking Information Infrastructure Committee (FBIIC) Members:
Andrew M. Cuomo Governor Anthony J. Albanese Acting Superintendent FROM: TO: Anthony J. Albanese, Acting Superintendent of Financial Services Financial and Banking Information Infrastructure Committee
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
Quincy Public Schools Information Technology. Acceptable Use Policy for Staff, Students, and Guests
Quincy Public Schools Information Technology Acceptable Use Policy for Staff, Students, and Guests Revised May 6, 2013 Introduction This Acceptable Use Policy is enacted as of May 2013 by the Quincy School
Addressing BYOD Challenges with ForeScout and Motorola Solutions
Solution Brief Addressing BYOD Challenges with ForeScout and Motorola Solutions Highlights Automated onboarding Full automation for discovering, profiling, and onboarding devices onto both wired and wireless
Secure Mobile Solutions
Secure Mobile Solutions Manage workloads securely on the move [email protected] 01347 812100 www.softbox.co.uk Contents Secure Mobile Solutions Key Features and Benefits Integration and Management
HIPAA 100 Training Manual Table of Contents. V. A Word About Business Associate Agreements 10
HIPAA 100 Training Manual Table of Contents I. Introduction 1 II. Definitions 2 III. Privacy Rule 5 IV. Security Rule 8 V. A Word About Business Associate Agreements 10 CHICAGO DEPARTMENT OF PUBIC HEALTH
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Developing a Policy for Bring Your Own Device. Report to the Joint Legislative Oversight Committee on Information Technology
Developing a Policy for Bring Your Own Device Report to the Joint Legislative Oversight Committee on Information Technology Chris Estes State Chief Information Officer Office of Information Technology
DUUS Information Technology (IT) Acceptable Use Policy
DUUS Information Technology (IT) Acceptable Use Policy Issue Date: October 1, 2013 Effective Date: October 1, 2013 Revised Date: Number: DHHS-2013-002 1.0 Purpose and Objectives The purpose of this policy
The Challenge of Securing and Managing Data While Meeting Compliance
ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
How To Make Bring Your Own Device A Plus, Not A Risk
FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE
BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere
Six Steps Healthcare Organizations Can Take to Secure PHI on Mobile Devices
Six Steps Healthcare Organizations Can Take to Secure PHI on Mobile Devices As an IT professional for a covered entity in the heavily regulated health care field, you no doubt worked hard building a secure
