The Risk Factors that Accompany the use of BYOD in an Organization
Bring Your Own Device (BYOD) is a significant technology disruption. It's part of the consumerization of information technology and is driving changes in how society functions from both a business and personal perspective. Our approaches to information security must adapt as BYOD moves into our organizations, just as they adjusted when e-mail and the World Wide Web influenced business environments. Our traditional perimeter security approach is inadequate. The current model of defense-in-depth must evolve. As well, security controls, security awareness, and security compliance must adapt.
In this webinar, you will explore risk factors that accompany the use of BYOD in an organization from an information security professional’s perspective. The webinar will cover the following to determine how these factors affect the risk to which the enterprise is exposed:
- Context of use
- Security controls
- Security awareness, and
- Security compliance
These risks are explored through a novel application of Importance-Performance Analysis – which results in the presentation of risk in a quadrant graph. The quadrant graph provides a familiar presentation of the likelihood and impact of a selected group of attributes that represent the threats that accompany the use of BYOD. The results represent the overall risk to the organization, and guide where investment should be made to reduce the risk to acceptable levels.
The presenter is Dr. Lawrence Dobranski, CISSP-ISSAP, ISSMP, CCSLP, CISM, CISO, and P.Eng certifications. He has more than 25 years experience in information security. He is currently the Director of ICT Security at the University of Saskatchewan, one of Canada's top 15 research universities. Dr. Dobranski is currently leading information security programs in:
- Mobile device management
- Cloud security
- Incident management
- Electronic authorization
- Threat and risk management
- Application security
- Continuous compliance
Dr. Dobranski holds a Doctorate of Science in Information Assurance from the University of Fairfax, and an MBA in Information Security from Jones International University. He received his Bachelor's and Master's Degrees in Engineering-Physics from Dalhousie and Queen's University respectively.
Come join us on Tuesday October 21, 2014 2-4 pm EST to gain a deeper understanding of these challenges and the accompanying changes in risk to anyone in the business world.
Join the Cybersecurity Elite
U of F Cybersecurity Education Path
» Download PDF or register for a