Community IT Webinar - Build your own BYOD Policy

45
June 26, 2014 presented by… Johan Hammerstrom Community IT Innovators Webinar Series Build Your Own BYOD Policy

description

As part of our continuing webinar series we explore the phenomenon of BYOD and discuss various approaches for creating an effective BYOD policy for your organization.

Transcript of Community IT Webinar - Build your own BYOD Policy

Page 1: Community IT Webinar - Build your own BYOD Policy

June 26, 2014presented by… Johan Hammerstrom

Community IT Innovators Webinar Series

Build Your OwnBYOD Policy

Page 2: Community IT Webinar - Build your own BYOD Policy

Webinar Tips

• Ask questionsPost questions via chat

• InteractRespond to polls during webinar

• Focus Avoid multitasking. You may just miss the best part of the presentation

• Webinar PowerPoint & RecordingPowerPoint and recording links will be shared after the webinar

Page 3: Community IT Webinar - Build your own BYOD Policy

About Community IT

Community IT Innovators partners with nonprofits to help them solve their strategic & day-to-day IT challenges.

Strategic Proactive approach so you can make IT decisions that support your mission and grow with you

Collaborative Team of over 40 staff who empower you to make informed IT choices

Invested We are committed to supporting your mission, and take care of your IT network as if it were our own

Nonprofit focus Worked with over 900 nonprofits since 1993

Page 4: Community IT Webinar - Build your own BYOD Policy

About the Presenter

Johan Hammerstrom

President

[email protected]

@hammerstromj

Page 5: Community IT Webinar - Build your own BYOD Policy

Agenda

I. BYOD…a brief history

II. Information Services Model

III. Risks v. Benefits

IV. Building your own BYOD

Policy

V. 3 case studies

Page 6: Community IT Webinar - Build your own BYOD Policy

BringYourOwnDevice

Page 7: Community IT Webinar - Build your own BYOD Policy

ChooseYourOwnDevice

Page 8: Community IT Webinar - Build your own BYOD Policy

BringYourOwnApp

Page 9: Community IT Webinar - Build your own BYOD Policy

MobileDeviceManagement

Page 10: Community IT Webinar - Build your own BYOD Policy

Containers

Page 11: Community IT Webinar - Build your own BYOD Policy

BYOD, a brief history…

Page 12: Community IT Webinar - Build your own BYOD Policy
Page 13: Community IT Webinar - Build your own BYOD Policy
Page 14: Community IT Webinar - Build your own BYOD Policy

Empowering Users

Page 15: Community IT Webinar - Build your own BYOD Policy

Balancing Priorities

Personal

Organization

Page 16: Community IT Webinar - Build your own BYOD Policy

Modelwww.stratechery.com, Ben Thompson

Page 17: Community IT Webinar - Build your own BYOD Policy

Data

Services

Apps

OS

Hardware

Page 18: Community IT Webinar - Build your own BYOD Policy
Page 19: Community IT Webinar - Build your own BYOD Policy

• Email• FilesData

• Exchange Server• File ServerServices• Outlook• Word, Excel,

PowerPointApps

• WindowsOS

• Dell, HP, LenovoHardware

Page 20: Community IT Webinar - Build your own BYOD Policy

• Email• FilesData

• Exchange Server• File ServerServices• Outlook• Word, Excel,

PowerPointApps

• WindowsOS

• Dell, HP, LenovoHardware

Page 21: Community IT Webinar - Build your own BYOD Policy

• Email• FilesData• Office 365, Google

Apps• Box, DropBox,

OneDriveServices

• Outlook, mobile mail• Word, Excel,

PowerPointApps

• Windows, OS X, iOSOS

• PC, Tablet, MobileHardware

Page 22: Community IT Webinar - Build your own BYOD Policy

www.stratechery.com, Ben Thompson

Page 23: Community IT Webinar - Build your own BYOD Policy

Organization

BYOD

Page 24: Community IT Webinar - Build your own BYOD Policy

Organization

BYOD Organization

Page 25: Community IT Webinar - Build your own BYOD Policy

Organization

BYOD Mobile First

Page 26: Community IT Webinar - Build your own BYOD Policy

Organization

BYOD Mobile First

BYOA

Page 27: Community IT Webinar - Build your own BYOD Policy

Organization

BYOD Mobile First

BYOA

Page 28: Community IT Webinar - Build your own BYOD Policy

Risks• Security• Legal• Financial

Benefits• Adoption• Cost• Flexibility

Page 29: Community IT Webinar - Build your own BYOD Policy

Benefits of BYOD

1. Reduce hardware & support

costs

2. Work flexibility

3. Employee availability

4. User adoption and satisfaction

Page 30: Community IT Webinar - Build your own BYOD Policy

Risks of BYOD

1. Information

Security

2. Legal

3. Financial

Page 31: Community IT Webinar - Build your own BYOD Policy

Risks of BYOD

(b)Person

al

(a)Org

Page 32: Community IT Webinar - Build your own BYOD Policy

1. Information Security Risks

a) Organization

– Data leakage

– Vector into the company

b) Personal

– Onerous security measures

– Loss of full control of device

Page 33: Community IT Webinar - Build your own BYOD Policy

2. Legal Risks

a) Organization

– Lack of certainty in case law and

legislation

b) Personal

– Personal device could be confiscated

– Personal blurs into the corporate

Page 34: Community IT Webinar - Build your own BYOD Policy

3. Financial Risksa) Organization

– Stipends can be more expensive than a single

corporate plan

– IT Support can become entangled

– Mobile Device Management (MDM) can be

expensive

b) Personal

– Stipend may not cover full cost…or any at all

– Can be responsible for own support

Page 35: Community IT Webinar - Build your own BYOD Policy

Build your own BYOD

1. Inventory your data

• How sensitive is it?

• Compliance regulations?

2. Identify work roles

• Access to data

• Remote work requirements

• Flexibility requirements

Page 36: Community IT Webinar - Build your own BYOD Policy

Build your own BYOD

1. Identify Benefits

• Prioritize for your Organization

• Establish your strategy

2. Identify Risks

• Risk = Impact * Likelihood

3. Summarize

• Consider your options

• Summarize in a written policy

Page 37: Community IT Webinar - Build your own BYOD Policy

  Program Staff Development ExecutiveSensitive Data      Medical Records    Donor Contacts   Yes YesFinancial System   YesHR Records    

Less Sensitive      Email Yes Yes Yes

Grant Proposals Yes YesProgram Mgmt Yes Yes

     

Page 38: Community IT Webinar - Build your own BYOD Policy

  Program Staff Development ExecutiveRisks      

Info Security low moderate highLegal low low high

Financial low low moderate      

Page 39: Community IT Webinar - Build your own BYOD Policy

  Program Staff Development ExecutiveBenefits      

Reduce costs Yes    Work Flexibility   Yes YesAvailability Yes   Yes

User adoption     YesRisks      

Info Security low moderate highLegal low low high

Financial low low moderate  BYOD  ltd BYOD  CYOD

Policy provide small stipend & limited access to 

information

limited access to information from 

home

fully managed access to info

Page 40: Community IT Webinar - Build your own BYOD Policy

3 case studies

Page 41: Community IT Webinar - Build your own BYOD Policy

1. Goal: 90% of 150,000 workforce

2. Custom Authentication System

3. Reason: Avoid locked-in corporate environment

Aggressive BYOD

Page 42: Community IT Webinar - Build your own BYOD Policy

1. 20% use their own device

2. Increasing restrictions on personal device use

3. Reason: Security concerns

4. Dropsmack!

Conservative BYOD

Page 43: Community IT Webinar - Build your own BYOD Policy

1.Identified data

sensitivity

2.Created 3 work roles

3.Cost/Benefit analysis

4.Device Policy

Flexible BYOD

Page 44: Community IT Webinar - Build your own BYOD Policy

Upcoming Webinar

Thursday July 24 4:00 – 5:00 PM EST

SharePointTaking Another Look

Matthew Eshleman & Steve Longenecker

Page 45: Community IT Webinar - Build your own BYOD Policy

After the webinar

• Connect with us

• Provide feedback

Short survey after you exit the webinar. Be

sure to include any questions that were not

answered.

• Missed anything?

Link to slides & recording will be emailed to you.