byod-presentation ict summit 05-06-2014, version 7

Upload: imitsuriname-mit

Post on 03-Jun-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    1/17

    BRING YOUR OWN DEVICE

    THREATH OR OPPORTUNITY?

    Ton Pijpers , Rydall Pregers, IMIT

    ICT-Summ it Paramaribo , Sur iname, 05-06-2014

    http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=hF2c_l6YbZ0qpM&tbnid=ns-2NUj5YV8AXM:&ved=0CAUQjRw&url=http://www.securedgenetworks.com/secure-edge-networks-blog/bid/91045/Top-10-Benefits-of-BYOD-in-School-Wireless-Networks&ei=5v2AU9iKOvHesAT1loDgAw&bvm=bv.67720277,d.b2U&psig=AFQjCNFQSnbFPPvlnrIwdiYBLFJDhIfJHw&ust=1401048868449909http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=hF2c_l6YbZ0qpM&tbnid=ns-2NUj5YV8AXM:&ved=0CAUQjRw&url=http://www.securedgenetworks.com/secure-edge-networks-blog/bid/91045/Top-10-Benefits-of-BYOD-in-School-Wireless-Networks&ei=5v2AU9iKOvHesAT1loDgAw&bvm=bv.67720277,d.b2U&psig=AFQjCNFQSnbFPPvlnrIwdiYBLFJDhIfJHw&ust=1401048868449909
  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    2/17

    2 IT Leadership PerspectivesIT Strategy

    Institute of Management & Information Technology

    Join the discussion:www.imit.progressict.com

    1. Go to www.imit.progressict.com

    2. Log in directly with user: guest password: guest

    3. Start participating!

    http://www.imit.progressict.com/http://www.imit.progressict.com/
  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    3/17

    3 IT Leadership PerspectivesIT Strategy

    Institute of Management & Information Technology

    BYOD: CONNECT, EXPLORE & DEVELOP

    http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=UfRBtmZSUoolmM&tbnid=SQe0tBKR5kgIaM:&ved=0CAUQjRw&url=http://ltlatnd.wordpress.com/2012/10/11/what-is-byod-and-why-should-i-care/&ei=IAiBU_bGCsvesAS544KwAQ&bvm=bv.67720277,d.b2U&psig=AFQjCNETWotavsye8uke2EnW73_bd_v_qA&ust=1401049836734778
  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    4/17

    4 IT Leadership PerspectivesIT Strategy

    Institute of Management & Information Technology

    TREND 1: Consumerization of IT

    Defense & Government Company Consumer

    Defense & Government Company Consumer

    http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=p22lkYmdrk0kLM&tbnid=l7ll8TNbboOukM:&ved=0CAUQjRw&url=http://www.ittechnewsdaily.com/246-consumerization.html&ei=wLCIU46RPOXF8AGPzoHACA&bvm=bv.67720277,d.b2U&psig=AFQjCNHn2jqxYsw70_Xu9aXcRQ-4rm6tzw&ust=1401552820482487
  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    5/17

    5 IT Leadership PerspectivesIT Strategy

    Institute of Management & Information Technology

    TREND 2: The explosion of devices

    ROBUSTNESS

    MOBILITY

    http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=0iPlIy_7JSs80M&tbnid=nSC_gQZwBfkgKM:&ved=0CAUQjRw&url=http://www.2old2play.com/news/hardware-reviews/surfacing-microsoft-surface-review&ei=x7-LU731L6jq8QGz6ICoBQ&bvm=bv.67720277,d.b2U&psig=AFQjCNGzVdY_80JTVQKPWwN7HcjH8AKhGw&ust=1401753850957648http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=aKrmTnS2nH5nLM&tbnid=6c1T1yV33T1DUM:&ved=0CAUQjRw&url=http://www.youtech.nl/nieuwe-hd-webcams/desktop-pc2_s600x600/&ei=saiIU8viFMHd8AG62oGgBg&psig=AFQjCNFZvon02SkhT5XzyU1kkJL0uztU5w&ust=1401551382340116http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=Q17z47WL26zfmM&tbnid=1gF5FlIfc4uPgM:&ved=0CAUQjRw&url=http://www.microsoft.com/zh-cn/windows/business/retiring-xp.aspx&ei=PqiIU7C9D4TQ8AGpr4HwCA&psig=AFQjCNGEBLYRnZZfFopWlTjM20a8n5PMHw&ust=1401551267654928http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=d2RVmxCs11bkBM&tbnid=jXiYz-8-aiuRoM:&ved=0CAUQjRw&url=http://www.fastcodesign.com/1673067/beyond-excel-grid-is-a-spreadsheet-built-for-tablet-life&ei=D6eIU93FPImh8QHflIH4Dw&bvm=bv.67720277,d.b2U&psig=AFQjCNGIY3Oy-7hrd4fitATAnKPU62UtcA&ust=1401550853839743http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=VUaPONh21m3VZM&tbnid=fx9GsLzY7Kpo3M:&ved=0CAUQjRw&url=http://www.bankinnovation.net/2012/12/direct-mail-still-preferred-over-email-social-and-mobile-marketing/&ei=VKaIU6mmE6-t8gHP_4DQCg&bvm=bv.67720277,d.b2U&psig=AFQjCNEosIgLmpJuJjy65hilAbjOlg25ZA&ust=1401550739616989
  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    6/17

    6 IT Leadership PerspectivesIT Strategy

    Institute of Management & Information Technology

    TREND 3: The Flexible Workplace

    http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=kno3Ko6vUqN4XM&tbnid=B7LHwyjNSiyjkM:&ved=0CAUQjRw&url=http://www.blogging4jobs.com/hr/build-a-culture-of-workplace-flexibility/&ei=sSGBU7jEK8rnsASNmIKQCA&bvm=bv.67720277,d.b2U&psig=AFQjCNF-AXGP_IFNBQ7z2IXP0PhmEhkFug&ust=1401057015417143http://hhstaffingservices.com/wp-content/uploads/2014/04/Dollarphotoclub_57288125.jpg
  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    7/177 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology

    BYOD Challenges

    http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=gVvemwB2F1VJ4M&tbnid=ABkE4pF2iioepM:&ved=0CAUQjRw&url=http://blogs.technet.com/b/server-cloud/archive/2013/11/15/what-to-do-about-consumerization-or-it-is-not-just-about-devices.aspx&ei=cBKBU5QUyMqwBI6zgNAO&bvm=bv.67720277,d.b2U&psig=AFQjCNEKybNFeviEgSjmjRJuhI1rHHE5pQ&ust=1401053590638052
  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    8/178 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology

    BYOD Challenges

    http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=gVvemwB2F1VJ4M&tbnid=ABkE4pF2iioepM:&ved=0CAUQjRw&url=http://blogs.technet.com/b/server-cloud/archive/2013/11/15/what-to-do-about-consumerization-or-it-is-not-just-about-devices.aspx&ei=cBKBU5QUyMqwBI6zgNAO&bvm=bv.67720277,d.b2U&psig=AFQjCNEKybNFeviEgSjmjRJuhI1rHHE5pQ&ust=1401053590638052
  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    9/179 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology

    BYOD Challenges

    http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=gVvemwB2F1VJ4M&tbnid=ABkE4pF2iioepM:&ved=0CAUQjRw&url=http://blogs.technet.com/b/server-cloud/archive/2013/11/15/what-to-do-about-consumerization-or-it-is-not-just-about-devices.aspx&ei=cBKBU5QUyMqwBI6zgNAO&bvm=bv.67720277,d.b2U&psig=AFQjCNEKybNFeviEgSjmjRJuhI1rHHE5pQ&ust=1401053590638052
  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    10/1710 IT Leadership PerspectivesIT Strategy

    BYOD Challenges

    http://www.google.nl/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&docid=gVvemwB2F1VJ4M&tbnid=ABkE4pF2iioepM:&ved=0CAUQjRw&url=http://blogs.technet.com/b/server-cloud/archive/2013/11/15/what-to-do-about-consumerization-or-it-is-not-just-about-devices.aspx&ei=cBKBU5QUyMqwBI6zgNAO&bvm=bv.67720277,d.b2U&psig=AFQjCNEKybNFeviEgSjmjRJuhI1rHHE5pQ&ust=1401053590638052
  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    11/1711 IT Leadership PerspectivesIT Strategy

    Adoption Policy Restrict, Limit, Allow, Embrace

    Device Ownership Corporate, Employee, Mix, Guests

    Support Model IT managed, IT assisted, Self-supported

    Support Level Production, Guest+, Guest, Best Effort

    Different BYOD Strategies

    COPE: Corp orate Owned

    Personal ly Enabled

    Ful l BYOD

  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    12/1712 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology

    HOW TO APPROACH A BYOD PROGRAM

    Step 1: Determine your BYOD Strategy

    What do you want with mobile?

    Which employees can access enterprise data?

    Through company device or own device?

    What impact does privacy laws/regulations have?

    Which procedures have to be in place concerning hiring & firing?

    Who pays for the device, maintenance, support?

    What type of devices and operating systems will you support?

    How should you handle jail-broken or rooted devices?

    How should personal devices be secured?

    What do you do with a lost device?

    How should you make apps available to users?

    What kind of applications should you deploy to personal devices?

  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    13/1713 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology

    HOW TO APPROACH A BYOD PROGRAM

    Step 2: Develop an acceptable use policy

    Acceptable business use

    Forbidden use (illicit materials, harassment, etc.)

    Supported devices & operating systems

    Provisioning and configuration of new devices

    Password policy

    User profiles for access to company owned resources & data

    Wiping policy

    Risks/Liabilities/Disclaimers

    User Acknowledgment and Agreement

  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    14/1714 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology

    HOW TO APPROACH A BYOD PROGRAM

    Step 3: Deploy a secure BYOD Framework

  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    15/1715 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology

    HOW TO APPROACH A BYOD PROGRAM

    Step 3: Deploy a secure BYOD framework

  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    16/1716 IT Leadership PerspectivesIT Strategy Institute of Management & Information Technology

    Conclusion

    Business: Highest benefits by redesigning business processes

    Business: No one-size-fits-all approach

    HR: Communicate rights & obligations for employees accessing network

    with their EOD

    ICT: Arrange secure access to the (wireless) network while guaranteeing

    the flexibility and productivity of the end user

    ICT: New skills and/or capacity to manage BYOD-issues

    Best strategy is to start in a controlled way: allow some people to use

    some devices to access some company resources/data (for exampla

    project team with external resources)

  • 8/12/2019 BYOD-presentation ICT Summit 05-06-2014, Version 7

    17/1717 IT L d hi P ti IT St t Institute of Management & Information Technology

    Questions?