Community IT Webinar - Build your own BYOD Policy
-
Upload
community-it-innovators -
Category
Technology
-
view
295 -
download
0
description
Transcript of Community IT Webinar - Build your own BYOD Policy
June 26, 2014presented by… Johan Hammerstrom
Community IT Innovators Webinar Series
Build Your OwnBYOD Policy
Webinar Tips
• Ask questionsPost questions via chat
• InteractRespond to polls during webinar
• Focus Avoid multitasking. You may just miss the best part of the presentation
• Webinar PowerPoint & RecordingPowerPoint and recording links will be shared after the webinar
About Community IT
Community IT Innovators partners with nonprofits to help them solve their strategic & day-to-day IT challenges.
Strategic Proactive approach so you can make IT decisions that support your mission and grow with you
Collaborative Team of over 40 staff who empower you to make informed IT choices
Invested We are committed to supporting your mission, and take care of your IT network as if it were our own
Nonprofit focus Worked with over 900 nonprofits since 1993
About the Presenter
Johan Hammerstrom
President
@hammerstromj
Agenda
I. BYOD…a brief history
II. Information Services Model
III. Risks v. Benefits
IV. Building your own BYOD
Policy
V. 3 case studies
BringYourOwnDevice
ChooseYourOwnDevice
BringYourOwnApp
MobileDeviceManagement
Containers
BYOD, a brief history…
Empowering Users
Balancing Priorities
Personal
Organization
Modelwww.stratechery.com, Ben Thompson
Data
Services
Apps
OS
Hardware
• Email• FilesData
• Exchange Server• File ServerServices• Outlook• Word, Excel,
PowerPointApps
• WindowsOS
• Dell, HP, LenovoHardware
• Email• FilesData
• Exchange Server• File ServerServices• Outlook• Word, Excel,
PowerPointApps
• WindowsOS
• Dell, HP, LenovoHardware
• Email• FilesData• Office 365, Google
Apps• Box, DropBox,
OneDriveServices
• Outlook, mobile mail• Word, Excel,
PowerPointApps
• Windows, OS X, iOSOS
• PC, Tablet, MobileHardware
www.stratechery.com, Ben Thompson
Organization
BYOD
Organization
BYOD Organization
Organization
BYOD Mobile First
Organization
BYOD Mobile First
BYOA
Organization
BYOD Mobile First
BYOA
Risks• Security• Legal• Financial
Benefits• Adoption• Cost• Flexibility
Benefits of BYOD
1. Reduce hardware & support
costs
2. Work flexibility
3. Employee availability
4. User adoption and satisfaction
Risks of BYOD
1. Information
Security
2. Legal
3. Financial
Risks of BYOD
(b)Person
al
(a)Org
1. Information Security Risks
a) Organization
– Data leakage
– Vector into the company
b) Personal
– Onerous security measures
– Loss of full control of device
2. Legal Risks
a) Organization
– Lack of certainty in case law and
legislation
b) Personal
– Personal device could be confiscated
– Personal blurs into the corporate
3. Financial Risksa) Organization
– Stipends can be more expensive than a single
corporate plan
– IT Support can become entangled
– Mobile Device Management (MDM) can be
expensive
b) Personal
– Stipend may not cover full cost…or any at all
– Can be responsible for own support
Build your own BYOD
1. Inventory your data
• How sensitive is it?
• Compliance regulations?
2. Identify work roles
• Access to data
• Remote work requirements
• Flexibility requirements
Build your own BYOD
1. Identify Benefits
• Prioritize for your Organization
• Establish your strategy
2. Identify Risks
• Risk = Impact * Likelihood
3. Summarize
• Consider your options
• Summarize in a written policy
Program Staff Development ExecutiveSensitive Data Medical Records Donor Contacts Yes YesFinancial System YesHR Records
Less Sensitive Email Yes Yes Yes
Grant Proposals Yes YesProgram Mgmt Yes Yes
Program Staff Development ExecutiveRisks
Info Security low moderate highLegal low low high
Financial low low moderate
Program Staff Development ExecutiveBenefits
Reduce costs Yes Work Flexibility Yes YesAvailability Yes Yes
User adoption YesRisks
Info Security low moderate highLegal low low high
Financial low low moderate BYOD ltd BYOD CYOD
Policy provide small stipend & limited access to
information
limited access to information from
home
fully managed access to info
3 case studies
1. Goal: 90% of 150,000 workforce
2. Custom Authentication System
3. Reason: Avoid locked-in corporate environment
Aggressive BYOD
1. 20% use their own device
2. Increasing restrictions on personal device use
3. Reason: Security concerns
4. Dropsmack!
Conservative BYOD
1.Identified data
sensitivity
2.Created 3 work roles
3.Cost/Benefit analysis
4.Device Policy
Flexible BYOD
Upcoming Webinar
Thursday July 24 4:00 – 5:00 PM EST
SharePointTaking Another Look
Matthew Eshleman & Steve Longenecker
After the webinar
• Connect with us
• Provide feedback
Short survey after you exit the webinar. Be
sure to include any questions that were not
answered.
• Missed anything?
Link to slides & recording will be emailed to you.