Bring Your Own Device (BYOD) to Work: Trend Report
By Bob Hayes and Kathleen Kotwica
()
About this ebook
Bring Your Own Device (BYOD) to Work examines the emerging BYOD (Bring Your Own Device to work) trend in corporate IT. BYOD is the practice of employees bringing personally-owned mobile devices (e.g., smartphones, tablets, laptops) to the workplace, and using those devices to access company resources such as email, file servers, and databases.
BYOD presents unique challenges in data privacy, confidentiality, security, productivity, and acceptable use that must be met proactively by information security professionals. This report provides solid background on the practice, original research on its pros and cons, and actionable recommendations for implementing a BYOD program. Successful programs are cross-functional efforts including information technology, human resources, finance, legal, security, and business operating teams. This report is a valuable resource to any security professional considering a BYOD program.
Bring Your Own Device (BYOD) to Work is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
- Presents research data associated with BYOD and productivity in the workplace
- Describes BYOD challenges, risks, and liabilities
- Makes recommendations for the components a clearly communicated BYOD program should contain
Bob Hayes
Bob Hayes has more than 25 years of experience developing security programs and providing security services for corporations, including eight years as the CSO at Georgia Pacific and nine years as security operations manager at 3M. His security experience spans the manufacturing, distribution, research and development, and consumer products industries as well as national critical infrastructure organizations. Additionally, he has more than 10 years of successful law enforcement and training experience in Florida and Michigan. Bob is a recognized innovator in the security field and was named as one of the “25 Most Influential People in the Security Industry in 2007 by Security magazine. He is a frequent speaker at key industry events. He is a leading expert on security issues and has been quoted by such major media outlets as the Wall Street Journal and Forbes. Bob is currently the managing director of the Security Executive Council.
Read more from Bob Hayes
Business Continuity: Playbook Rating: 0 out of 5 stars0 ratingsNine Practices of the Successful Security Leader: Research Report Rating: 0 out of 5 stars0 ratingsCorporate Security Organizational Structure, Cost of Services and Staffing Benchmark: Research Report Rating: 0 out of 5 stars0 ratingsCrisis Management at the Speed of the Internet: Trend Report Rating: 0 out of 5 stars0 ratingsInternational Security Programs Benchmark Report: Research Report Rating: 3 out of 5 stars3/5Smart Partners: Building Successful Relationships in Business and Life Rating: 4 out of 5 stars4/5Wolves of the Yukon Rating: 3 out of 5 stars3/5Blood Bath Casino Rating: 0 out of 5 stars0 ratings
Related to Bring Your Own Device (BYOD) to Work
Related ebooks
Application Security in the ISO27001 Environment Rating: 0 out of 5 stars0 ratingsInfosec Management Fundamentals Rating: 5 out of 5 stars5/5Nine Steps to Success: An ISO27001:2013 Implementation Overview Rating: 1 out of 5 stars1/5Disaster Recovery and Business Continuity: A quick guide for organisations and business managers Rating: 0 out of 5 stars0 ratingsInformation Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratingsWorkplace Security Playbook: The New Manager's Guide to Security Risk Rating: 0 out of 5 stars0 ratingsInformation Security Auditor: Careers in information security Rating: 0 out of 5 stars0 ratingsThe Cybersecurity Maturity Model Certification (CMMC) – A pocket guide Rating: 0 out of 5 stars0 ratingsBuilding an Effective Cybersecurity Program, 2nd Edition Rating: 0 out of 5 stars0 ratingsDesigning and Building Security Operations Center Rating: 3 out of 5 stars3/5The Case for ISO27001:2013 Rating: 1 out of 5 stars1/5A Practitioner's Guide to Adapting the NIST Cybersecurity Framework Rating: 0 out of 5 stars0 ratingsData Breach Preparation and Response: Breaches are Certain, Impact is Not Rating: 0 out of 5 stars0 ratingsBuilding Effective Cybersecurity Programs: A Security Manager’s Handbook Rating: 4 out of 5 stars4/5Information Protection Playbook Rating: 0 out of 5 stars0 ratingsWe Need To Talk: 52 Weeks To Better Cyber-Security Rating: 0 out of 5 stars0 ratingsSecurity Technology Convergence Insights Rating: 0 out of 5 stars0 ratingsInformation Security Policy A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsISO IEC 27002 A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsSecurity Operations A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsSecurity And Risk Management Tools A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsSecurity And Risk Management A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents Rating: 0 out of 5 stars0 ratingsIncident Response Plan A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsThe Chartered Risk Manager Professional Rating: 5 out of 5 stars5/5ISO 22301 A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsIT Governance A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsCloud Security Compliance A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsQualified Security Assessor Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsIT GRC A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Hacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5CompTIA CySA+ Practice Tests: Exam CS0-002 Rating: 0 out of 5 stars0 ratingsEthical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHacking : Guide to Computer Hacking and Penetration Testing Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratings
Reviews for Bring Your Own Device (BYOD) to Work
0 ratings0 reviews