SlideShare a Scribd company logo
1 of 25
Download to read offline
BYOD: Security 
Together 
Andrew Cormack 
Chief Regulatory Adviser, Janet 
#Janet_LegReg
A Cautionary Tale
A Cautionary Tale 
• Is this about BYOD? 
– User owned device 
– Uncertain configuration 
– Unsafe results for data 
• Just less shiny!
A Cautionary Tale 
• Is this about BYOD? 
– User owned device 
– Uncertain configuration 
– Unsafe results for data 
• Just less shiny! 
• And (we’re on audio): could it happen to you?
Opportunity: Your Device, Our Data 
• Same risks to both of us 
– Personal risk may even be greater than professional!
Opportunity: Your Device, Our Data 
• Same risks to both of us 
– Personal risk may even be greater than professional! 
• Same behaviour required to reduce those risks 
– Work out together what that is
Opportunity: Your Device, Our Data 
• Same risks to both of us 
– Personal risk may even be greater than professional! 
• Same behaviour required to reduce those risks 
– Work out together what that is 
• What that means 
– Policy compliance => Self interest 
– Safe at work/risky at home => Safer everywhere
Let’s discuss how to do... 
• Information separation 
• Remote wiping 
• Device location 
• Device security 
• Information backup
Information Separation
Information Separation 
Storage 
Policies 
Technology 
Behaviour
Information Separation 
Separate 
Storage 
Policies 
Technology 
Behaviour
Remote Wiping 
Separate 
Storage 
Policies 
Technology 
Behaviour 
When? 
Who? 
How? 
What?
Remote Wiping 
Wipe 
When? 
Who? 
How? 
What? 
Separate 
Storage 
Policies 
Technology 
Behaviour
Device Location 
Wipe 
When? 
Who? 
How? 
What? 
Who? 
When? 
How? 
Separate 
Storage 
Policies 
Technology 
Behaviour
Device Location 
Locate 
Who? 
When? 
How? 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Wipe 
When? 
Who? 
How? 
What?
Device Security 
Locate 
Who? 
When? 
How? 
Protect 
Monitor 
Download 
Configure 
Inspect 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Wipe 
When? 
Who? 
How? 
What?
Device Security 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Wipe 
When? 
Who? 
How? 
What? 
Locate 
Who? 
When? 
How?
Information Backup 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
How? 
Where? 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Wipe 
When? 
Who? 
How? 
What? 
Locate 
Who? 
When? 
How?
BYOD Policy? 
Backup 
How? 
Where? 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Wipe 
When? 
Who? 
How? 
What? 
Locate 
Who? 
When? 
How? 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect
Who Sets Policy? 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
Backup 
How? 
Where? 
Locate 
Who? 
When? 
How? 
Wipe 
When? 
Who? 
How? 
What?
Discuss/Agree 
Balance Policy and Access 
Who Sets Policy? 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
Backup 
How? 
Where? 
Locate 
Who? 
When? 
How? 
Wipe 
When? 
Who? 
How? 
What?
Discuss/Agree 
Balance Policy and Access 
Who Sets Policy? 
Organisation 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
Backup 
How? 
Where? 
Locate 
Who? 
When? 
How? 
Wipe 
When? 
Who? 
How? 
What?
Who Sets Policy? Device Owner 
Discuss/Agree 
Balance Policy and Access 
Organisation 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
Backup 
How? 
Where? 
Locate 
Who? 
When? 
How? 
Wipe 
When? 
Who? 
How? 
What?
Who Sets Policy? Device Owner 
Discuss/Agree 
Balance Policy and Access 
Organisation 
Separate 
Storage 
Policies 
Technology 
Behaviour 
Secure 
Protect 
Monitor 
Download 
Configure 
Inspect 
Backup 
How? 
Where? 
Locate 
Who? 
When? 
How? 
Wipe 
When? 
Who? 
How? 
What?
Questions? 
Janet, Lumen House 
Library Avenue, Harwell Oxford 
Didcot, Oxfordshire 
t: +44 (0) 1235 822200 
f: +44 (0) 1235 822399 
e: Andrew.Cormack@ja.net 
b: https://community.ja.net/blogs/regulatory-developments

More Related Content

Viewers also liked

Preparing for internet safety day and beyond
Preparing for internet safety day and beyondPreparing for internet safety day and beyond
Preparing for internet safety day and beyondJisc
 
Hertford Regional College: staying safe online
Hertford Regional College: staying safe onlineHertford Regional College: staying safe online
Hertford Regional College: staying safe onlineJisc
 
Jisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learnersJisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learnersJisc
 
Jisc legal hot e-safety topics
Jisc legal hot e-safety topics Jisc legal hot e-safety topics
Jisc legal hot e-safety topics Jisc
 
Epping forest college interactive exhibition
Epping forest college interactive exhibitionEpping forest college interactive exhibition
Epping forest college interactive exhibitionJisc
 
Using CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resourcesUsing CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resourcesJisc
 
St Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorialSt Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorialJisc
 
MidKent College: internet safety day
MidKent College: internet safety dayMidKent College: internet safety day
MidKent College: internet safety dayJisc
 
South West College e-safety awareness
South West College e-safety awarenessSouth West College e-safety awareness
South West College e-safety awarenessJisc
 
Weston college: approaching e-safety
Weston college: approaching e-safetyWeston college: approaching e-safety
Weston college: approaching e-safetyJisc
 

Viewers also liked (10)

Preparing for internet safety day and beyond
Preparing for internet safety day and beyondPreparing for internet safety day and beyond
Preparing for internet safety day and beyond
 
Hertford Regional College: staying safe online
Hertford Regional College: staying safe onlineHertford Regional College: staying safe online
Hertford Regional College: staying safe online
 
Jisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learnersJisc TechDis: supporting vulnerable learners
Jisc TechDis: supporting vulnerable learners
 
Jisc legal hot e-safety topics
Jisc legal hot e-safety topics Jisc legal hot e-safety topics
Jisc legal hot e-safety topics
 
Epping forest college interactive exhibition
Epping forest college interactive exhibitionEpping forest college interactive exhibition
Epping forest college interactive exhibition
 
Using CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resourcesUsing CEOP and ThinkUKnow resources
Using CEOP and ThinkUKnow resources
 
St Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorialSt Helen's College: internet safety/privacy tutorial
St Helen's College: internet safety/privacy tutorial
 
MidKent College: internet safety day
MidKent College: internet safety dayMidKent College: internet safety day
MidKent College: internet safety day
 
South West College e-safety awareness
South West College e-safety awarenessSouth West College e-safety awareness
South West College e-safety awareness
 
Weston college: approaching e-safety
Weston college: approaching e-safetyWeston college: approaching e-safety
Weston college: approaching e-safety
 

Similar to BYOD Security Risks and Best Practices

A Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for NonprofitsA Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for NonprofitsTechSoup
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environmentEvan Francen
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
Windows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to beWindows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to beMichael Gough
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousnessCiarán Mc Mahon
 
WordPress Security: Beyond The Plugin
WordPress Security:  Beyond The PluginWordPress Security:  Beyond The Plugin
WordPress Security: Beyond The PluginStacy Clements
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0Amazon Web Services
 
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Steve Werby
 
Craft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionCraft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionAaron Rinehart
 
Ops Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WayOps Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WaySeniorStoryteller
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityErnest Staats
 
Running with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needsRunning with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needsMichael Scheidell
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In LibrariesBlake Carver
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?Jose L. Quiñones-Borrero
 
Monitorama 2017 - Who Watches the Watchers?
Monitorama 2017 - Who Watches the Watchers?Monitorama 2017 - Who Watches the Watchers?
Monitorama 2017 - Who Watches the Watchers?brantstrand
 

Similar to BYOD Security Risks and Best Practices (20)

A Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for NonprofitsA Little Privacy, Please… Diving into Data Privacy for Nonprofits
A Little Privacy, Please… Diving into Data Privacy for Nonprofits
 
Information security challenges in today’s banking environment
Information security challenges in today’s banking environmentInformation security challenges in today’s banking environment
Information security challenges in today’s banking environment
 
Data security
Data securityData security
Data security
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
Windows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to beWindows Incident Response is hard, but doesn't have to be
Windows Incident Response is hard, but doesn't have to be
 
Sexy defense
Sexy defenseSexy defense
Sexy defense
 
Information security consciousness
Information security consciousnessInformation security consciousness
Information security consciousness
 
WordPress Security: Beyond The Plugin
WordPress Security:  Beyond The PluginWordPress Security:  Beyond The Plugin
WordPress Security: Beyond The Plugin
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
Janitor vs cleaner
Janitor vs cleanerJanitor vs cleaner
Janitor vs cleaner
 
Truth and Consequences
Truth and ConsequencesTruth and Consequences
Truth and Consequences
 
sanfranAIG3
sanfranAIG3sanfranAIG3
sanfranAIG3
 
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
Bad Advice Unintended Consequences and Broken Paradigms - Think && Act Differ...
 
Craft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security PrecognitionCraft 2019 - Security Chaos Engineering - Security Precognition
Craft 2019 - Security Chaos Engineering - Security Precognition
 
Ops Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the WayOps Happen: Improve Security Without Getting in the Way
Ops Happen: Improve Security Without Getting in the Way
 
A guide to Sustainable Cyber Security
A guide to Sustainable Cyber SecurityA guide to Sustainable Cyber Security
A guide to Sustainable Cyber Security
 
Running with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needsRunning with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needs
 
An Introduction To IT Security And Privacy In Libraries
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
 
Application Security: What do we need to know?
Application Security: What do we need to know?Application Security: What do we need to know?
Application Security: What do we need to know?
 
Monitorama 2017 - Who Watches the Watchers?
Monitorama 2017 - Who Watches the Watchers?Monitorama 2017 - Who Watches the Watchers?
Monitorama 2017 - Who Watches the Watchers?
 

More from Jisc

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptxJisc
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptxJisc
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxJisc
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptxJisc
 

More from Jisc (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
 

Recently uploaded

Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptxJonalynLegaspi2
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 

Recently uploaded (20)

Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
week 1 cookery 8 fourth - quarter .pptx
week 1 cookery 8  fourth  -  quarter .pptxweek 1 cookery 8  fourth  -  quarter .pptx
week 1 cookery 8 fourth - quarter .pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 

BYOD Security Risks and Best Practices

  • 1. BYOD: Security Together Andrew Cormack Chief Regulatory Adviser, Janet #Janet_LegReg
  • 3. A Cautionary Tale • Is this about BYOD? – User owned device – Uncertain configuration – Unsafe results for data • Just less shiny!
  • 4. A Cautionary Tale • Is this about BYOD? – User owned device – Uncertain configuration – Unsafe results for data • Just less shiny! • And (we’re on audio): could it happen to you?
  • 5. Opportunity: Your Device, Our Data • Same risks to both of us – Personal risk may even be greater than professional!
  • 6. Opportunity: Your Device, Our Data • Same risks to both of us – Personal risk may even be greater than professional! • Same behaviour required to reduce those risks – Work out together what that is
  • 7. Opportunity: Your Device, Our Data • Same risks to both of us – Personal risk may even be greater than professional! • Same behaviour required to reduce those risks – Work out together what that is • What that means – Policy compliance => Self interest – Safe at work/risky at home => Safer everywhere
  • 8. Let’s discuss how to do... • Information separation • Remote wiping • Device location • Device security • Information backup
  • 10. Information Separation Storage Policies Technology Behaviour
  • 11. Information Separation Separate Storage Policies Technology Behaviour
  • 12. Remote Wiping Separate Storage Policies Technology Behaviour When? Who? How? What?
  • 13. Remote Wiping Wipe When? Who? How? What? Separate Storage Policies Technology Behaviour
  • 14. Device Location Wipe When? Who? How? What? Who? When? How? Separate Storage Policies Technology Behaviour
  • 15. Device Location Locate Who? When? How? Separate Storage Policies Technology Behaviour Wipe When? Who? How? What?
  • 16. Device Security Locate Who? When? How? Protect Monitor Download Configure Inspect Separate Storage Policies Technology Behaviour Wipe When? Who? How? What?
  • 17. Device Security Secure Protect Monitor Download Configure Inspect Separate Storage Policies Technology Behaviour Wipe When? Who? How? What? Locate Who? When? How?
  • 18. Information Backup Secure Protect Monitor Download Configure Inspect How? Where? Separate Storage Policies Technology Behaviour Wipe When? Who? How? What? Locate Who? When? How?
  • 19. BYOD Policy? Backup How? Where? Separate Storage Policies Technology Behaviour Wipe When? Who? How? What? Locate Who? When? How? Secure Protect Monitor Download Configure Inspect
  • 20. Who Sets Policy? Separate Storage Policies Technology Behaviour Secure Protect Monitor Download Configure Inspect Backup How? Where? Locate Who? When? How? Wipe When? Who? How? What?
  • 21. Discuss/Agree Balance Policy and Access Who Sets Policy? Separate Storage Policies Technology Behaviour Secure Protect Monitor Download Configure Inspect Backup How? Where? Locate Who? When? How? Wipe When? Who? How? What?
  • 22. Discuss/Agree Balance Policy and Access Who Sets Policy? Organisation Separate Storage Policies Technology Behaviour Secure Protect Monitor Download Configure Inspect Backup How? Where? Locate Who? When? How? Wipe When? Who? How? What?
  • 23. Who Sets Policy? Device Owner Discuss/Agree Balance Policy and Access Organisation Separate Storage Policies Technology Behaviour Secure Protect Monitor Download Configure Inspect Backup How? Where? Locate Who? When? How? Wipe When? Who? How? What?
  • 24. Who Sets Policy? Device Owner Discuss/Agree Balance Policy and Access Organisation Separate Storage Policies Technology Behaviour Secure Protect Monitor Download Configure Inspect Backup How? Where? Locate Who? When? How? Wipe When? Who? How? What?
  • 25. Questions? Janet, Lumen House Library Avenue, Harwell Oxford Didcot, Oxfordshire t: +44 (0) 1235 822200 f: +44 (0) 1235 822399 e: Andrew.Cormack@ja.net b: https://community.ja.net/blogs/regulatory-developments