60 min listen
Steps to Secure BYOD
ratings:
Length:
56 minutes
Released:
Oct 31, 2013
Format:
Podcast episode
Description
BYOD has wide appeal for employees who value the convenience and ease of using their own devices. Businesses recognize that by allowing BYOD, their employess are able to be as productive as possible. However, the variety and number of personal devices being brought into the enterprise network is a potential security threat and a huge headache for IT departments. What can any company do to securely and flexibly transition to BYOD? Being a road less travelled, what have been the lessons learnt and the strategies tried, that have helped in achieving this goal?
Released:
Oct 31, 2013
Format:
Podcast episode
Titles in the series (100)
IT Audits: Do we Need Them?: We have mature IT Management Processes and Controls in place. IT Audits are not for us. Is this true? Lets listen to Richard to learn about why Audits should be part of IT Strategy and what makes them a useful tool for managing IT better. by CIO Talk Network Podcast