The rise in popularity of personal smart devices is making it's mark on the workplace of today. Users want an environment that is flexible and easy to access from any location and is no longer confined by either physical or perceived boundaries. For most users, Bring Your Own Device' (BYOD) is simply about allowing them to use their own devices to connect to the corporate network, but the challenge for the organisation and the IT department is, as always, a little more complex.
BYOD significantly impacts the traditional security model of protecting the perimeter of the IT organization by blurring the definition of that perimeter, both in terms of physical location and in asset ownership. With personal devices now being used to access corporate email, calendars, applications and data; many organizations are struggling with how to fully define the impact to their security posture and establish acceptable procedures and support models that balance both their employees' needs and their security concerns.
Bring Your Own Device (BYOD) has emerged as a cost-effective solution allowing organisations to adopt a mobile learning approach without having to provide the devices.
This course is designed to
- Create a better understanding of the risks and vulnerabilities with personal device usage
- Show how the vulnerabilities differ - for the employer, employee and your data
- Arm you with the knowledge and know how to protect yourself and your staff from Identified threats and vulnerabilities
- Provide you with an understanding of the necessary policies, procedures and training
- Highlight how best to balance productivity and profit with BOYD implementation.
Within the areas of:
- Network Security
- Risk Management
- Project Management
- Corporate Strategy
For more information about this conference visit http://www.researchandmarkets.com/research/cxd542/bring_your_own