YoVDO

Bring Your Own Device and Whatever Security Controls You Want - One Approach to Re

Offered By: YouTube

Tags

Conference Talks Courses Project Management Courses Data Collection Courses Risk Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk from the Central Ohio InfoSec Summit 2016 that delves into the challenges and risks associated with Bring Your Own Device (BYOD) policies in information security. Learn about the potential hidden carriers of sensitive data, the importance of backups, and the risks involved with personal devices in a professional setting. Discover solutions and strategies for managing BYOD policies, including data collection methods and project status updates. Gain insights into protecting tax information and other sensitive data in a BYOD environment. This informative session, featuring references to Chuck Norris and Western Governors University, provides valuable knowledge for IT professionals and security experts looking to implement or improve BYOD policies in their organizations.

Syllabus

Intro
Chuck Norris
Information Security
Western Governors University
Project
Risks
Laptops
Hidden Carrier
Solution
List
Backups
Data Collection
Tax Information
Project Status
Conclusion


Related Courses

Advanced Topics and Techniques in Agile Software Development
University of California, Berkeley via edX
Entrepreneurship
Taylor's University via OpenLearning
Project Management Basics
Florida International University via Open Education by Blackboard
Principles of Project Management
Polytechnic West via Open2Study
Project Management for Business Professionals
Shaping Tomorrow via Canvas Network