Bring Your Own Device and Whatever Security Controls You Want - One Approach to Re
Offered By: YouTube
Course Description
Overview
Explore a conference talk from the Central Ohio InfoSec Summit 2016 that delves into the challenges and risks associated with Bring Your Own Device (BYOD) policies in information security. Learn about the potential hidden carriers of sensitive data, the importance of backups, and the risks involved with personal devices in a professional setting. Discover solutions and strategies for managing BYOD policies, including data collection methods and project status updates. Gain insights into protecting tax information and other sensitive data in a BYOD environment. This informative session, featuring references to Chuck Norris and Western Governors University, provides valuable knowledge for IT professionals and security experts looking to implement or improve BYOD policies in their organizations.
Syllabus
Intro
Chuck Norris
Information Security
Western Governors University
Project
Risks
Laptops
Hidden Carrier
Solution
List
Backups
Data Collection
Tax Information
Project Status
Conclusion
Related Courses
Advanced Topics and Techniques in Agile Software DevelopmentUniversity of California, Berkeley via edX Entrepreneurship
Taylor's University via OpenLearning Project Management Basics
Florida International University via Open Education by Blackboard Principles of Project Management
Polytechnic West via Open2Study Project Management for Business Professionals
Shaping Tomorrow via Canvas Network