SlideShare une entreprise Scribd logo
1  sur  25
BYO: BYO A GOOD THING?…………………………………
Head of Information Security
Company85
Phil Cracknell, FBCS, CISSP, MIRM
DILBERT © (2013) Scott Adams. Used by permission of Universal Uclick. All rights reserved.
BYOD grows like a weed
The ability of
corporations to deal
with it grows like…
petrified wood
BYOD has stirred plenty of controversy
Companies are either embracing it to its fullest extent
or avoiding it like the plague
It is one of the few technology shifts that can ‘creep’
into an organisation from the top down!
Current Adoption
BYOD or BYO seemed to emerge around 2009 as a
questionable solution to rising IT costs
• More functional/sexy technology now available for
personal consumption
• Company or user initiated?
• Is it inevitable?
• How should businesses approach it?
Where did BYO come from?
So why is there a greater apparent fear of BYO than
any other recent technology shift?
– Less control of IT?
– Less ownership?
– Implied greater personal use?
Fear
When employees invest their own money in a device, they
naturally feel
“it’s mine, so I should be able to do what I want with it.”
When the company pays for a device, employees are more
inclined to accept rules and restrictions
The Balancing Act
From the user perspective
“I don’t want to carry my own phone and a company one”
“I don’t want to use my personal phone for work”
“I can’t use my work phone to the degree I require for
personal use”
“I want the latest technology of my choice, not the ones my
company choose”
A good thing
BYOD can potentially save your company money and
help make your employees happier and more
productive
It could drive massive and essential changes to larger
businesses in terms of network zoning, data
segregation and classification (Internal security
defences)
There’s always a ‘however’
BYOD brings along with it a number of risks, from
security to compatibility and everything in between
– Legal
– HR issues
– Device loss/insurance/replacement
– Policy
BYOD Risks
1: Exposed data
2: Passwords in the wild
3: Declining productivity
4: Compatibility issues
5: Bandwidth overuse/wireless bottlenecks
6: Device management
7: Virus infections
People
BYOD presents several technical risks but
ultimately they are linked to people and
behaviour
BYOD brings out the best and worst in people,
and the user types can be easily categorised
The Millennials
I blame them for it all!!!
It's the Millennials pouring into all our workplaces.
They put the pressure on management to allow
them to use their own mobile devices on the
job, not some antiquated corporate-issued
BlackBerry. That's sooo 1998!!
They want to work odd hours and over weekends.
They actually want their business lives and
personal lives to blend.
The Techies
They've found a friend in Android.
With BYOD in place, they are free to poke
fun at the consumerised Apple-users,
compare App stores, support and
functionality – and all in the name of work!
Android offers the flexibility that techies
crave, and also serves up some pretty cool
apps for monitoring systems remotely and
other IT job functions.
The Main Board
CEOs and the like have a hallowed place in
the BYOD world. Whatever they want, they
get.
Like Captain Kirk with an MBA, these
business leaders shout for more power, “all
you can give me and then more!” and the
trusty IT engine room shall provide it.
From Apple devices on the day of launch, to
an IT throwback such as the BlackBerry it’s
pretty clear where the BYOD fire started...
The Older Generation
BYOD isn't for everyone, but that hasn't
stopped some companies from mandating the
policy across the workforce.
Half of employers will require employees to
supply their own device for work purposes by
2017, says a Gartner survey of CIOs.
Pity the worker who doesn't want to put up
the cash for a fancy mobile device, sign over
privacy rights, and then be expected to surf
social networks for support when things go
wrong.
Who loves the iPhone and iPad more than
anyone else? Salespeople, of course!
They like to keep things simple, love to
give dynamic presentations, and hate
typing on keyboards. They also like to
blend their personal and work lives.
The iPad with its bold Retina display was
simply made for salespeople in the
workplace.
The Salespeople
The Clock-watchers
Entry-level and hourly workers have much to
gain from BYOD, many of whom don't qualify for
a corporate-issued device. Now they can tap into
the power of personal mobile technology to do
their jobs.
It's a freedom they've never had before.
Great, right? Well, BYOD also opens the doors to
work outside of defined work hours, in the form
of work-related email and text messages
bombarding hourly workers after they have
punched out.
Expect a slew of lawsuits for unpaid overtime.
The Moaners
Every workforce has moaners. Nothing is ever good
enough, and BYOD is no exception. BYOD was
trumpeted by moaners who wanted to use their own
devices instead of a corporate-issued relic.
They complained about having to carry around two
devices all the time.
Now that BYOD has arrived, they're still complaining.
Expectations of privacy, security controls on personal
devices, and policies chock full of legal jargon.
The moaner makes the remote wipe capability of
MDM a must!
The Social Networkers
Social networking addicts love BYOD. It
makes social networking easier to do at
work.
One of the top concerns with BYOD is that
it will lead to less productive workers.
Some companies even ban or limit the use
of Facebook and others at work.
On a related note, companies also better
not infringe on an employee's right to
social media privacy in a BYOD policy.
The Bad Employees
In the wrong hands, BYOD can be
disastrous. The problem for us is that it
will soon be in every employees
hands!
Most companies have disgruntled
employees. BYOD effectively makes it
easier for a ‘bad’ employee to steal
stuff and hide it somewhere in the
cloud, even claiming ignorance to the
actual location of where the data was
‘moved’ or coped to ;-)
Vendor FUD
Despite the inevitable flood of Fear, Uncertainty and Doubt
spewed from our vendor community – many of the risks with
BYO are INTERNAL and staff-related
Use BYOD to clean up your wild west – embrace it! BYOD will, if
done right, make your world more secure not less
Some essentials for survival of BYO
Get a clear mandate from the board
– What is in scope? BYOD doesn’t have to mean mobiles, tablets and laptops – ask the hard
questions
Data Classification and Zoning
– Ensure you know where your important/confidential data is
– Ensure policies and technology control access to this data
– Control entry to and placement on your network – a BYO DMZ? Hell yes!
Get an MDM (Mobile Device Management) solution
– Remote wipe
– Device barring and exclusion
– Remote enforcement of PIN lock and other features
BYO – A good thing?
Thank you!
Phil Cracknell, FBCS, CISSP, MIRM
Head of Security and Privacy services at
Company85
uk.linkedin.com/in/cracknell
@pcracknell

Contenu connexe

Tendances

New Assumptions for Designing for the Social Web
New Assumptions for Designing for the Social WebNew Assumptions for Designing for the Social Web
New Assumptions for Designing for the Social Web
Chris Messina
 
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile FirstAD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
John Head
 
Mobile technology
Mobile technologyMobile technology
Mobile technology
hillarz
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holt
Roopa Nadkarni
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends Post
TBledsoe
 

Tendances (20)

New Assumptions for Designing for the Social Web
New Assumptions for Designing for the Social WebNew Assumptions for Designing for the Social Web
New Assumptions for Designing for the Social Web
 
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile FirstAD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
AD502: The Mobile Disruption: Why XPages Development is Targeting Mobile First
 
Be Prepared For Byod
Be Prepared For ByodBe Prepared For Byod
Be Prepared For Byod
 
Facebook And Apple Are Serious About Augmented Reality
Facebook And Apple Are Serious About Augmented RealityFacebook And Apple Are Serious About Augmented Reality
Facebook And Apple Are Serious About Augmented Reality
 
Mobile technology
Mobile technologyMobile technology
Mobile technology
 
8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World 8 Job Skills To Succeed In A Post-Coronavirus World
8 Job Skills To Succeed In A Post-Coronavirus World
 
7 Amazing Everyday Examples Of Nanotechnology In Action
7 Amazing Everyday Examples Of Nanotechnology In Action7 Amazing Everyday Examples Of Nanotechnology In Action
7 Amazing Everyday Examples Of Nanotechnology In Action
 
Social mobile usage Don't Leave Social at the Office
 Social mobile usage   Don't Leave Social at the Office Social mobile usage   Don't Leave Social at the Office
Social mobile usage Don't Leave Social at the Office
 
Solving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holtSolving the enterprise security challenge - Derek holt
Solving the enterprise security challenge - Derek holt
 
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
Artificial Intelligence Can Now Copy Your Voice: What Does That Mean For Humans?
 
Mobile writing by the numbers
Mobile writing by the numbersMobile writing by the numbers
Mobile writing by the numbers
 
Mobliciti's Mobile & Cloud Technical Showcase
Mobliciti's Mobile & Cloud Technical Showcase Mobliciti's Mobile & Cloud Technical Showcase
Mobliciti's Mobile & Cloud Technical Showcase
 
2008 Personnel Trends Post
2008 Personnel Trends Post2008 Personnel Trends Post
2008 Personnel Trends Post
 
Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016 Mobliciti's Mobile and Cloud Technical Showcase 2016
Mobliciti's Mobile and Cloud Technical Showcase 2016
 
The Digital Workplace Revolution
The Digital Workplace RevolutionThe Digital Workplace Revolution
The Digital Workplace Revolution
 
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
PINK Webcast Summer Series: The Phenomenon of Social Media—How will it Impact...
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance
 
BYOD Trends, Challenges, Pitfalls and Tips
BYODTrends, Challenges, Pitfalls and TipsBYODTrends, Challenges, Pitfalls and Tips
BYOD Trends, Challenges, Pitfalls and Tips
 
What Will a Future Workforce Look Like?
What Will a Future Workforce Look Like?What Will a Future Workforce Look Like?
What Will a Future Workforce Look Like?
 
CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?
 

En vedette

#%! My CISO Says
#%! My CISO Says#%! My CISO Says
#%! My CISO Says
Argyle Executive Forum
 

En vedette (8)

Imad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIOImad Choucair, CIO at Tecom - The evolving role of CIO
Imad Choucair, CIO at Tecom - The evolving role of CIO
 
The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015The 7 Factors of CISO Impact at RSA 2015
The 7 Factors of CISO Impact at RSA 2015
 
So you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to SuccessSo you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to Success
 
MESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - UpdatedMESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - Updated
 
#%! My CISO Says
#%! My CISO Says#%! My CISO Says
#%! My CISO Says
 
Building security leaders ISSA Virtual CISO Series
Building security leaders   ISSA Virtual CISO SeriesBuilding security leaders   ISSA Virtual CISO Series
Building security leaders ISSA Virtual CISO Series
 
Super CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your JobSuper CISO 2020: How to Keep Your Job
Super CISO 2020: How to Keep Your Job
 
Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)Emerging Need of a Chief Information Security Officer (CISO)
Emerging Need of a Chief Information Security Officer (CISO)
 

Similaire à Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good thing?

7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
Caston Thomas
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
Packet One
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
ssuserf9c51d
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
mattinsonjanel
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
Jim Sutter
 
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
S w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docxS w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docx
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
jeffsrosalyn
 

Similaire à Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good thing? (20)

Byod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional worldByod (Bring your own device) in the professional world
Byod (Bring your own device) in the professional world
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
BYOD
BYODBYOD
BYOD
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
BYOD- A Productivity Catalyst
BYOD- A Productivity CatalystBYOD- A Productivity Catalyst
BYOD- A Productivity Catalyst
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
 
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
TEC H   10042013 @ 615PM  15,497 viewsCell phone.docxTEC H   10042013 @ 615PM  15,497 viewsCell phone.docx
TEC H 10042013 @ 615PM 15,497 viewsCell phone.docx
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
BYOD Security
BYOD SecurityBYOD Security
BYOD Security
 
BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"BYOD - Highlights of "Consumerization"
BYOD - Highlights of "Consumerization"
 
Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’Choose Your Own Device ‘To Replace Bring Your Own Device’
Choose Your Own Device ‘To Replace Bring Your Own Device’
 
OC CIO Roundtable BYOD
OC CIO Roundtable BYODOC CIO Roundtable BYOD
OC CIO Roundtable BYOD
 
OC CIO BYOD
OC CIO BYODOC CIO BYOD
OC CIO BYOD
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
 
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
S w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docxS w  W13035     INTEL CORP. – BRING YOUR OWN DEV.docx
S w W13035 INTEL CORP. – BRING YOUR OWN DEV.docx
 

Plus de Global Business Events

Plus de Global Business Events (20)

Cio Event
Cio EventCio Event
Cio Event
 
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
Ludo Van den Kerckhove , Managing Partner at A-cross Health - The Network Alw...
 
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
Tim Mann, CIO at NFU Mutual - Digital Transformation Case Studies: how NFUM i...
 
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
Neil Ward-Dutton, Founder & Research Director at MWD Advisors - Innovating di...
 
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
Mark Jacot, Assistant Director – IT Service Deliveryat The Open University - ...
 
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
Gerard O'Hara, Head of IT EMEA at Facebook - How the Facebook IT department i...
 
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT ModernisationHakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
Hakan Yaren, Managing Director IT at FedEx Express EMEA - IT Modernisation
 
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
Sam De Silva, Partner - Head of IT and Outsourcing Group at Penningtons Manch...
 
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
Hugo Smith, CTO at Broadbandchoices - Improving the Agility of your Business ...
 
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
Mark Aikman, IT Director at The North Group - Leading a Complex Bespoke Syste...
 
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
David Clarke, CITSO at Digital Arena - Security Benchmarking, best practise a...
 
John Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security AnxietyJohn Prowse, vCISO at BT - Security Anxiety
John Prowse, vCISO at BT - Security Anxiety
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Keith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined EverythingKeith Inight, CTO at Atos - Software Defined Everything
Keith Inight, CTO at Atos - Software Defined Everything
 
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss CheeseDavid Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
David Clarke, CITSO at Vciso - Security, Standards and Swiss Cheese
 
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
Dave Jones, CIO at Cape Plc - Transition of Autonomous regional IT to Providi...
 
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
Wolfgang Kuhl, CIO at Pharmaserv - Data Centre Planning and Execution - A Sur...
 
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
Mark Aikman, CIO at The North Group - Leading a Complex Bespoke System Transf...
 
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
Neil Ward-Dutton, Co-founder and Research Director at MWD Advisors - Digital ...
 
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
Gordon Tredgold, SVP Global IT at Henkel - Fast Leadership - Accelerating Pro...
 

Dernier

If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 

Dernier (20)

If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
Aesthetic Colaba Mumbai Cst Call girls 📞 7738631006 Grant road Call Girls ❤️-...
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verifiedSector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
Sector 62, Noida Call girls :8448380779 Noida Escorts | 100% verified
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
Busty Desi⚡Call Girls in Sector 51 Noida Escorts >༒8448380779 Escort Service-...
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 

Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good thing?

  • 1. BYO: BYO A GOOD THING?………………………………… Head of Information Security Company85 Phil Cracknell, FBCS, CISSP, MIRM
  • 2. DILBERT © (2013) Scott Adams. Used by permission of Universal Uclick. All rights reserved.
  • 3. BYOD grows like a weed The ability of corporations to deal with it grows like… petrified wood
  • 4. BYOD has stirred plenty of controversy Companies are either embracing it to its fullest extent or avoiding it like the plague It is one of the few technology shifts that can ‘creep’ into an organisation from the top down! Current Adoption
  • 5. BYOD or BYO seemed to emerge around 2009 as a questionable solution to rising IT costs • More functional/sexy technology now available for personal consumption • Company or user initiated? • Is it inevitable? • How should businesses approach it? Where did BYO come from?
  • 6. So why is there a greater apparent fear of BYO than any other recent technology shift? – Less control of IT? – Less ownership? – Implied greater personal use? Fear
  • 7. When employees invest their own money in a device, they naturally feel “it’s mine, so I should be able to do what I want with it.” When the company pays for a device, employees are more inclined to accept rules and restrictions The Balancing Act
  • 8. From the user perspective “I don’t want to carry my own phone and a company one” “I don’t want to use my personal phone for work” “I can’t use my work phone to the degree I require for personal use” “I want the latest technology of my choice, not the ones my company choose”
  • 9. A good thing BYOD can potentially save your company money and help make your employees happier and more productive It could drive massive and essential changes to larger businesses in terms of network zoning, data segregation and classification (Internal security defences)
  • 10. There’s always a ‘however’ BYOD brings along with it a number of risks, from security to compatibility and everything in between – Legal – HR issues – Device loss/insurance/replacement – Policy
  • 11. BYOD Risks 1: Exposed data 2: Passwords in the wild 3: Declining productivity 4: Compatibility issues 5: Bandwidth overuse/wireless bottlenecks 6: Device management 7: Virus infections
  • 12. People BYOD presents several technical risks but ultimately they are linked to people and behaviour BYOD brings out the best and worst in people, and the user types can be easily categorised
  • 13. The Millennials I blame them for it all!!! It's the Millennials pouring into all our workplaces. They put the pressure on management to allow them to use their own mobile devices on the job, not some antiquated corporate-issued BlackBerry. That's sooo 1998!! They want to work odd hours and over weekends. They actually want their business lives and personal lives to blend.
  • 14. The Techies They've found a friend in Android. With BYOD in place, they are free to poke fun at the consumerised Apple-users, compare App stores, support and functionality – and all in the name of work! Android offers the flexibility that techies crave, and also serves up some pretty cool apps for monitoring systems remotely and other IT job functions.
  • 15. The Main Board CEOs and the like have a hallowed place in the BYOD world. Whatever they want, they get. Like Captain Kirk with an MBA, these business leaders shout for more power, “all you can give me and then more!” and the trusty IT engine room shall provide it. From Apple devices on the day of launch, to an IT throwback such as the BlackBerry it’s pretty clear where the BYOD fire started...
  • 16. The Older Generation BYOD isn't for everyone, but that hasn't stopped some companies from mandating the policy across the workforce. Half of employers will require employees to supply their own device for work purposes by 2017, says a Gartner survey of CIOs. Pity the worker who doesn't want to put up the cash for a fancy mobile device, sign over privacy rights, and then be expected to surf social networks for support when things go wrong.
  • 17. Who loves the iPhone and iPad more than anyone else? Salespeople, of course! They like to keep things simple, love to give dynamic presentations, and hate typing on keyboards. They also like to blend their personal and work lives. The iPad with its bold Retina display was simply made for salespeople in the workplace. The Salespeople
  • 18. The Clock-watchers Entry-level and hourly workers have much to gain from BYOD, many of whom don't qualify for a corporate-issued device. Now they can tap into the power of personal mobile technology to do their jobs. It's a freedom they've never had before. Great, right? Well, BYOD also opens the doors to work outside of defined work hours, in the form of work-related email and text messages bombarding hourly workers after they have punched out. Expect a slew of lawsuits for unpaid overtime.
  • 19. The Moaners Every workforce has moaners. Nothing is ever good enough, and BYOD is no exception. BYOD was trumpeted by moaners who wanted to use their own devices instead of a corporate-issued relic. They complained about having to carry around two devices all the time. Now that BYOD has arrived, they're still complaining. Expectations of privacy, security controls on personal devices, and policies chock full of legal jargon. The moaner makes the remote wipe capability of MDM a must!
  • 20. The Social Networkers Social networking addicts love BYOD. It makes social networking easier to do at work. One of the top concerns with BYOD is that it will lead to less productive workers. Some companies even ban or limit the use of Facebook and others at work. On a related note, companies also better not infringe on an employee's right to social media privacy in a BYOD policy.
  • 21. The Bad Employees In the wrong hands, BYOD can be disastrous. The problem for us is that it will soon be in every employees hands! Most companies have disgruntled employees. BYOD effectively makes it easier for a ‘bad’ employee to steal stuff and hide it somewhere in the cloud, even claiming ignorance to the actual location of where the data was ‘moved’ or coped to ;-)
  • 22. Vendor FUD Despite the inevitable flood of Fear, Uncertainty and Doubt spewed from our vendor community – many of the risks with BYO are INTERNAL and staff-related Use BYOD to clean up your wild west – embrace it! BYOD will, if done right, make your world more secure not less
  • 23. Some essentials for survival of BYO Get a clear mandate from the board – What is in scope? BYOD doesn’t have to mean mobiles, tablets and laptops – ask the hard questions Data Classification and Zoning – Ensure you know where your important/confidential data is – Ensure policies and technology control access to this data – Control entry to and placement on your network – a BYO DMZ? Hell yes! Get an MDM (Mobile Device Management) solution – Remote wipe – Device barring and exclusion – Remote enforcement of PIN lock and other features
  • 24.
  • 25. BYO – A good thing? Thank you! Phil Cracknell, FBCS, CISSP, MIRM Head of Security and Privacy services at Company85 uk.linkedin.com/in/cracknell @pcracknell