The Risk Factors that Accompany the use of BYOD in an Organization

The Risk Factors that Accompany the use of BYOD in an Organization


Bring Your Own Device (BYOD) is a significant technology disruption. It's part of the consumerization of information technology and is driving changes in how society functions from both a business and personal perspective.  Our approaches to information security must adapt as BYOD moves into our organizations, just as they adjusted when e-mail and the World Wide Web influenced business environments.  Our traditional perimeter security approach is inadequate.  The current model of defense-in-depth must evolve. As well, security controls, security awareness, and security compliance must adapt.


In this webinar, you will explore risk factors that accompany the use of BYOD in an organization from an information security professional’s perspective.  The webinar will cover the following to determine how these factors affect the risk to which the enterprise is exposed:


  • De-perimeterisation
  • Context of use
  • Security controls
  • Security awareness, and
  • Security compliance

These risks are explored through a novel application of Importance-Performance Analysis – which results in the presentation of risk in a quadrant graph.  The quadrant graph provides a familiar presentation of the likelihood and impact of a selected group of attributes that represent the threats that accompany the use of BYOD.  The results  represent the overall risk to the organization, and guide where investment should be made to reduce the risk to acceptable levels. 


The presenter is  Dr. Lawrence Dobranski, CISSP-ISSAP, ISSMP, CCSLP, CISM, CISO, and P.Eng certifications. He has more than 25 years experience in information security. He is currently the Director of ICT Security at the University of Saskatchewan, one of Canada's top 15 research universities.  Dr. Dobranski is currently leading information security programs in:


  • Mobile device management
  • BYOD
  • Cloud security
  • Incident management
  • Electronic authorization
  • Threat and risk management
  • Application security
  • Continuous compliance

Dr. Dobranski holds a Doctorate of Science in Information Assurance from the University of Fairfax, and an MBA in Information Security from Jones International University.  He received his Bachelor's and Master's Degrees in Engineering-Physics from Dalhousie and Queen's University respectively. 


Come join us on Tuesday October 21, 2014  2-4 pm EST to gain a deeper understanding of these challenges and the accompanying changes in risk to anyone in the business world.


» Register Now

Remember to send this link to friends and colleagues who can also benefit from this information.

*The University of Fairfax is accredited by the Accrediting Commission of the Distance Education and Training Council (DETC). The Accrediting Commission of DETC is listed by the U.S. Department of Education as a nationally recognized accrediting agency and is a recognized member of the Council for Higher Education Accreditation (CHEA). The University of Fairfax has been certified by the State Council of Higher Education in Virginia (SCHEV) to operate for Virginia. 

Veterans and eligible persons who qualify for educational benefits under the Post 911/GI Bill and other GI Bill Chapters may be eligible for educational benefits while enrolled in educational programs offered by the University of Fairfax. University of Fairfax is a proud participant in the Yellow Ribbon Program.

**On demand access will be available to webinar registrants shortly after the webinar has aired.






Join the Cybersecurity Elite
U of F Cybersecurity Education Path

Education Path
Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.
» Download PDF or register for a