Mobile Security

Steps to Secure BYOD

steps-to-secure-byod

steps-to-secure-byod

BYOD has wide appeal for employees who value the convenience and ease of using their own devices. Businesses recognize that by allowing BYOD, their employess are able to be as productive as possible. However, the variety and number of personal devices being brought into the enterprise network is a potential security threat and a huge headache for IT departments. What can any company do to securely and flexibly transition to BYOD? Being a road less travelled, what have been the lessons learnt and the strategies tried, that have helped in achieving this goal?

Contributors

Michael P. Wilson

Michael P. Wilson, Vice President, Chief Information Security Officer, McKesson

Michael joined McKesson in 2007, and leads the security and IT risk management functions for the company. Michael’s career is focused predominantly in IT and risk management, and he has experience working in several geographies and indus... More   View all posts

Chris Marsh

Chris Marsh, Principal Analyst, Yankee Group

Chris Marsh is a principal analyst with Yankee Group's Enterprise Research group. Marsh focuses on analyzing opportunities for enterprises around mobile applications, unified communications and 3G and 4G wireless services. Of particular int... More   View all posts

Keith Fricke

Keith Fricke, CISO, Catholic Health Partners

Keith Fricke is the Chief Information Security Officer for Catholic Health Partners, the largest not-for-profit hospital system in Ohio. Keith has 27 years of IT experience, the last 13 of which focused on Information Security. He frequentl... More   View all posts

Add Comment

Click here to post a comment

Advertisement

BB_Multi_300x250_MPU_2

Newsletter

CIO Talk Network

Login


Not Member Yet? Register

Register

  • Minimum length of 8 characters