Community IT Webinar - Build your own BYOD Policy

Post on 12-May-2015

295 views 0 download

Tags:

description

As part of our continuing webinar series we explore the phenomenon of BYOD and discuss various approaches for creating an effective BYOD policy for your organization.

Transcript of Community IT Webinar - Build your own BYOD Policy

June 26, 2014presented by… Johan Hammerstrom

Community IT Innovators Webinar Series

Build Your OwnBYOD Policy

Webinar Tips

• Ask questionsPost questions via chat

• InteractRespond to polls during webinar

• Focus Avoid multitasking. You may just miss the best part of the presentation

• Webinar PowerPoint & RecordingPowerPoint and recording links will be shared after the webinar

About Community IT

Community IT Innovators partners with nonprofits to help them solve their strategic & day-to-day IT challenges.

Strategic Proactive approach so you can make IT decisions that support your mission and grow with you

Collaborative Team of over 40 staff who empower you to make informed IT choices

Invested We are committed to supporting your mission, and take care of your IT network as if it were our own

Nonprofit focus Worked with over 900 nonprofits since 1993

About the Presenter

Johan Hammerstrom

President

jhammerstrom@communityit.com

@hammerstromj

Agenda

I. BYOD…a brief history

II. Information Services Model

III. Risks v. Benefits

IV. Building your own BYOD

Policy

V. 3 case studies

BringYourOwnDevice

ChooseYourOwnDevice

BringYourOwnApp

MobileDeviceManagement

Containers

BYOD, a brief history…

Empowering Users

Balancing Priorities

Personal

Organization

Modelwww.stratechery.com, Ben Thompson

Data

Services

Apps

OS

Hardware

• Email• FilesData

• Exchange Server• File ServerServices• Outlook• Word, Excel,

PowerPointApps

• WindowsOS

• Dell, HP, LenovoHardware

• Email• FilesData

• Exchange Server• File ServerServices• Outlook• Word, Excel,

PowerPointApps

• WindowsOS

• Dell, HP, LenovoHardware

• Email• FilesData• Office 365, Google

Apps• Box, DropBox,

OneDriveServices

• Outlook, mobile mail• Word, Excel,

PowerPointApps

• Windows, OS X, iOSOS

• PC, Tablet, MobileHardware

www.stratechery.com, Ben Thompson

Organization

BYOD

Organization

BYOD Organization

Organization

BYOD Mobile First

Organization

BYOD Mobile First

BYOA

Organization

BYOD Mobile First

BYOA

Risks• Security• Legal• Financial

Benefits• Adoption• Cost• Flexibility

Benefits of BYOD

1. Reduce hardware & support

costs

2. Work flexibility

3. Employee availability

4. User adoption and satisfaction

Risks of BYOD

1. Information

Security

2. Legal

3. Financial

Risks of BYOD

(b)Person

al

(a)Org

1. Information Security Risks

a) Organization

– Data leakage

– Vector into the company

b) Personal

– Onerous security measures

– Loss of full control of device

2. Legal Risks

a) Organization

– Lack of certainty in case law and

legislation

b) Personal

– Personal device could be confiscated

– Personal blurs into the corporate

3. Financial Risksa) Organization

– Stipends can be more expensive than a single

corporate plan

– IT Support can become entangled

– Mobile Device Management (MDM) can be

expensive

b) Personal

– Stipend may not cover full cost…or any at all

– Can be responsible for own support

Build your own BYOD

1. Inventory your data

• How sensitive is it?

• Compliance regulations?

2. Identify work roles

• Access to data

• Remote work requirements

• Flexibility requirements

Build your own BYOD

1. Identify Benefits

• Prioritize for your Organization

• Establish your strategy

2. Identify Risks

• Risk = Impact * Likelihood

3. Summarize

• Consider your options

• Summarize in a written policy

  Program Staff Development ExecutiveSensitive Data      Medical Records    Donor Contacts   Yes YesFinancial System   YesHR Records    

Less Sensitive      Email Yes Yes Yes

Grant Proposals Yes YesProgram Mgmt Yes Yes

     

  Program Staff Development ExecutiveRisks      

Info Security low moderate highLegal low low high

Financial low low moderate      

  Program Staff Development ExecutiveBenefits      

Reduce costs Yes    Work Flexibility   Yes YesAvailability Yes   Yes

User adoption     YesRisks      

Info Security low moderate highLegal low low high

Financial low low moderate  BYOD  ltd BYOD  CYOD

Policy provide small stipend & limited access to 

information

limited access to information from 

home

fully managed access to info

3 case studies

1. Goal: 90% of 150,000 workforce

2. Custom Authentication System

3. Reason: Avoid locked-in corporate environment

Aggressive BYOD

1. 20% use their own device

2. Increasing restrictions on personal device use

3. Reason: Security concerns

4. Dropsmack!

Conservative BYOD

1.Identified data

sensitivity

2.Created 3 work roles

3.Cost/Benefit analysis

4.Device Policy

Flexible BYOD

Upcoming Webinar

Thursday July 24 4:00 – 5:00 PM EST

SharePointTaking Another Look

Matthew Eshleman & Steve Longenecker

After the webinar

• Connect with us

• Provide feedback

Short survey after you exit the webinar. Be

sure to include any questions that were not

answered.

• Missed anything?

Link to slides & recording will be emailed to you.