byod-presentation ict summit 05-06-2014, version 7
TRANSCRIPT
-
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
1/17
BRING YOUR OWN DEVICE
THREATH OR OPPORTUNITY?
Ton Pijpers , Rydall Pregers, IMIT
ICT-Summ it Paramaribo , Sur iname, 05-06-2014
http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=hF2c_l6YbZ0qpM&tbnid=ns-2NUj5YV8AXM:&ved=0CAUQjRw&url=http://www.securedgenetworks.com/secure-edge-networks-blog/bid/91045/Top-10-Benefits-of-BYOD-in-School-Wireless-Networks&ei=5v2AU9iKOvHesAT1loDgAw&bvm=bv.67720277,d.b2U&psig=AFQjCNFQSnbFPPvlnrIwdiYBLFJDhIfJHw&ust=1401048868449909http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=hF2c_l6YbZ0qpM&tbnid=ns-2NUj5YV8AXM:&ved=0CAUQjRw&url=http://www.securedgenetworks.com/secure-edge-networks-blog/bid/91045/Top-10-Benefits-of-BYOD-in-School-Wireless-Networks&ei=5v2AU9iKOvHesAT1loDgAw&bvm=bv.67720277,d.b2U&psig=AFQjCNFQSnbFPPvlnrIwdiYBLFJDhIfJHw&ust=1401048868449909 -
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
2/17
2 IT Leadership PerspectivesIT Strategy
Institute of Management & Information Technology
Join the discussion:www.imit.progressict.com
1. Go to www.imit.progressict.com
2. Log in directly with user: guest password: guest
3. Start participating!
http://www.imit.progressict.com/http://www.imit.progressict.com/ -
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
3/17
3 IT Leadership PerspectivesIT Strategy
Institute of Management & Information Technology
BYOD: CONNECT, EXPLORE & DEVELOP
http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=UfRBtmZSUoolmM&tbnid=SQe0tBKR5kgIaM:&ved=0CAUQjRw&url=http://ltlatnd.wordpress.com/2012/10/11/what-is-byod-and-why-should-i-care/&ei=IAiBU_bGCsvesAS544KwAQ&bvm=bv.67720277,d.b2U&psig=AFQjCNETWotavsye8uke2EnW73_bd_v_qA&ust=1401049836734778 -
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
4/17
4 IT Leadership PerspectivesIT Strategy
Institute of Management & Information Technology
TREND 1: Consumerization of IT
Defense & Government Company Consumer
Defense & Government Company Consumer
http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=p22lkYmdrk0kLM&tbnid=l7ll8TNbboOukM:&ved=0CAUQjRw&url=http://www.ittechnewsdaily.com/246-consumerization.html&ei=wLCIU46RPOXF8AGPzoHACA&bvm=bv.67720277,d.b2U&psig=AFQjCNHn2jqxYsw70_Xu9aXcRQ-4rm6tzw&ust=1401552820482487 -
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
5/17
5 IT Leadership PerspectivesIT Strategy
Institute of Management & Information Technology
TREND 2: The explosion of devices
ROBUSTNESS
MOBILITY
http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=0iPlIy_7JSs80M&tbnid=nSC_gQZwBfkgKM:&ved=0CAUQjRw&url=http://www.2old2play.com/news/hardware-reviews/surfacing-microsoft-surface-review&ei=x7-LU731L6jq8QGz6ICoBQ&bvm=bv.67720277,d.b2U&psig=AFQjCNGzVdY_80JTVQKPWwN7HcjH8AKhGw&ust=1401753850957648http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=aKrmTnS2nH5nLM&tbnid=6c1T1yV33T1DUM:&ved=0CAUQjRw&url=http://www.youtech.nl/nieuwe-hd-webcams/desktop-pc2_s600x600/&ei=saiIU8viFMHd8AG62oGgBg&psig=AFQjCNFZvon02SkhT5XzyU1kkJL0uztU5w&ust=1401551382340116http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=Q17z47WL26zfmM&tbnid=1gF5FlIfc4uPgM:&ved=0CAUQjRw&url=http://www.microsoft.com/zh-cn/windows/business/retiring-xp.aspx&ei=PqiIU7C9D4TQ8AGpr4HwCA&psig=AFQjCNGEBLYRnZZfFopWlTjM20a8n5PMHw&ust=1401551267654928http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=d2RVmxCs11bkBM&tbnid=jXiYz-8-aiuRoM:&ved=0CAUQjRw&url=http://www.fastcodesign.com/1673067/beyond-excel-grid-is-a-spreadsheet-built-for-tablet-life&ei=D6eIU93FPImh8QHflIH4Dw&bvm=bv.67720277,d.b2U&psig=AFQjCNGIY3Oy-7hrd4fitATAnKPU62UtcA&ust=1401550853839743http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=VUaPONh21m3VZM&tbnid=fx9GsLzY7Kpo3M:&ved=0CAUQjRw&url=http://www.bankinnovation.net/2012/12/direct-mail-still-preferred-over-email-social-and-mobile-marketing/&ei=VKaIU6mmE6-t8gHP_4DQCg&bvm=bv.67720277,d.b2U&psig=AFQjCNEosIgLmpJuJjy65hilAbjOlg25ZA&ust=1401550739616989 -
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
6/17
6 IT Leadership PerspectivesIT Strategy
Institute of Management & Information Technology
TREND 3: The Flexible Workplace
http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=kno3Ko6vUqN4XM&tbnid=B7LHwyjNSiyjkM:&ved=0CAUQjRw&url=http://www.blogging4jobs.com/hr/build-a-culture-of-workplace-flexibility/&ei=sSGBU7jEK8rnsASNmIKQCA&bvm=bv.67720277,d.b2U&psig=AFQjCNF-AXGP_IFNBQ7z2IXP0PhmEhkFug&ust=1401057015417143http://hhstaffingservices.com/wp-content/uploads/2014/04/Dollarphotoclub_57288125.jpg -
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
7/177 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology
BYOD Challenges
http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=gVvemwB2F1VJ4M&tbnid=ABkE4pF2iioepM:&ved=0CAUQjRw&url=http://blogs.technet.com/b/server-cloud/archive/2013/11/15/what-to-do-about-consumerization-or-it-is-not-just-about-devices.aspx&ei=cBKBU5QUyMqwBI6zgNAO&bvm=bv.67720277,d.b2U&psig=AFQjCNEKybNFeviEgSjmjRJuhI1rHHE5pQ&ust=1401053590638052 -
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
8/178 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology
BYOD Challenges
http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=gVvemwB2F1VJ4M&tbnid=ABkE4pF2iioepM:&ved=0CAUQjRw&url=http://blogs.technet.com/b/server-cloud/archive/2013/11/15/what-to-do-about-consumerization-or-it-is-not-just-about-devices.aspx&ei=cBKBU5QUyMqwBI6zgNAO&bvm=bv.67720277,d.b2U&psig=AFQjCNEKybNFeviEgSjmjRJuhI1rHHE5pQ&ust=1401053590638052 -
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
9/179 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology
BYOD Challenges
http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=gVvemwB2F1VJ4M&tbnid=ABkE4pF2iioepM:&ved=0CAUQjRw&url=http://blogs.technet.com/b/server-cloud/archive/2013/11/15/what-to-do-about-consumerization-or-it-is-not-just-about-devices.aspx&ei=cBKBU5QUyMqwBI6zgNAO&bvm=bv.67720277,d.b2U&psig=AFQjCNEKybNFeviEgSjmjRJuhI1rHHE5pQ&ust=1401053590638052 -
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
10/1710 IT Leadership PerspectivesIT Strategy
BYOD Challenges
http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=gVvemwB2F1VJ4M&tbnid=ABkE4pF2iioepM:&ved=0CAUQjRw&url=http://blogs.technet.com/b/server-cloud/archive/2013/11/15/what-to-do-about-consumerization-or-it-is-not-just-about-devices.aspx&ei=cBKBU5QUyMqwBI6zgNAO&bvm=bv.67720277,d.b2U&psig=AFQjCNEKybNFeviEgSjmjRJuhI1rHHE5pQ&ust=1401053590638052 -
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
11/1711 IT Leadership PerspectivesIT Strategy
Adoption Policy Restrict, Limit, Allow, Embrace
Device Ownership Corporate, Employee, Mix, Guests
Support Model IT managed, IT assisted, Self-supported
Support Level Production, Guest+, Guest, Best Effort
Different BYOD Strategies
COPE: Corp orate Owned
Personal ly Enabled
Ful l BYOD
-
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
12/1712 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology
HOW TO APPROACH A BYOD PROGRAM
Step 1: Determine your BYOD Strategy
What do you want with mobile?
Which employees can access enterprise data?
Through company device or own device?
What impact does privacy laws/regulations have?
Which procedures have to be in place concerning hiring & firing?
Who pays for the device, maintenance, support?
What type of devices and operating systems will you support?
How should you handle jail-broken or rooted devices?
How should personal devices be secured?
What do you do with a lost device?
How should you make apps available to users?
What kind of applications should you deploy to personal devices?
-
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
13/1713 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology
HOW TO APPROACH A BYOD PROGRAM
Step 2: Develop an acceptable use policy
Acceptable business use
Forbidden use (illicit materials, harassment, etc.)
Supported devices & operating systems
Provisioning and configuration of new devices
Password policy
User profiles for access to company owned resources & data
Wiping policy
Risks/Liabilities/Disclaimers
User Acknowledgment and Agreement
-
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
14/1714 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology
HOW TO APPROACH A BYOD PROGRAM
Step 3: Deploy a secure BYOD Framework
-
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
15/1715 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology
HOW TO APPROACH A BYOD PROGRAM
Step 3: Deploy a secure BYOD framework
-
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
16/1716 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology
Conclusion
Business: Highest benefits by redesigning business processes
Business: No one-size-fits-all approach
HR: Communicate rights & obligations for employees accessing network
with their EOD
ICT: Arrange secure access to the (wireless) network while guaranteeing
the flexibility and productivity of the end user
ICT: New skills and/or capacity to manage BYOD-issues
Best strategy is to start in a controlled way: allow some people to use
some devices to access some company resources/data (for exampla
project team with external resources)
-
8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7
17/1717 IT L d hi P ti IT St t Institute of Management & Information Technology
Questions?