Mobile Security

Steps to Secure BYOD

Steps to Secure BYOD

BYOD has wide appeal for employees who value the convenience and ease of using their own devices. Businesses recognize that by allowing BYOD, their employees are able to be as productive as possible. However, the variety and number of personal devices being brought into the enterprise network is a potential security threat and a huge headache for IT departments. What can any company do to securely and flexibly transition to BYOD? Being a road less travelled, what have been the lessons learnt and the strategies tried, that have helped in achieving this goal?

Contributors

Download Podcast

Apple Podcast, Google Podcast, Spotify, Pandora, iHeartRadio, SoundCloud, TuneIn, and Stitcher. Find other syndication channels here or search CIO Talk Network podcast on any other app.

Explore More

Contributors

Michael P. Wilson

Michael P. Wilson, Vice President, Chief Information Security Officer, McKesson

Michael joined McKesson in 2007, and leads the security and IT risk management functions for the company. Michael’s career is focused predominantly in IT and risk management, and he has experience working in several geographies and indus... More   View all posts
Chris Marsh

Chris Marsh, Principal Analyst, Yankee Group

Chris Marsh is a principal analyst with Yankee Group's Enterprise Research group. Marsh focuses on analyzing opportunities for enterprises around mobile applications, unified communications and 3G and 4G wireless services. Of particular int... More   View all posts
Keith Fricke

Keith Fricke, CISO, Catholic Health Partners

Keith Fricke is the Chief Information Security Officer for Catholic Health Partners, the largest not-for-profit hospital system in Ohio. Keith has 27 years of IT experience, the last 13 of which focused on Information Security. He frequentl... More   View all posts
Add Comment
Click here to post a comment

Advertisement

Citrix DaaS MPU 300X250
Michael P. Wilson

Login


Not Member Yet?
Register

Register

  • Name

  • Contact Info

  • About Yourself

  • Minimum length of 8 characters
  • Upload
  • Location

  • Professional Background

  • Other Social Profiles

  • Areas of Interest