This website uses cookies primarily for visitor analytics. Certain pages will ask you to fill in contact details to receive additional information. On these pages you have the option of having the site log your details for future visits. Indicating you want the site to remember your details will place a cookie on your device. To view our full cookie policy, please click here. You can also view it at any time by going to our Contact Us page.

Secure look at BYOD

29 August 2012

The rising trend of BYOD (bring your own device) was highlighted in ISACA’s latest survey which found that 39% of the 850-plus interviewees had employers that allow them to use work-supplied mobile devices for personal purposes–while on the other side of the coin, 32% encourage the use of personal devices for business purposes.

Coupled with a clear third (34%) of employers allowing the use of work email addresses for personal communications, researchers found that 50% of respondents have concluded that the risk of using personal mobile devices for work activities outweighs the benefits.

And, with just 21% of employers providing guidance on the secure use of geolocation-enabled smartphones and portable devices, it is clear that the security industry has a number of BYOD-related problems that needs discussing - and resolving.

These key issues - and many others - will be debated at the European Computer Audit, Control and Security/Information Security and Risk Management (EuroCACS/ISRM) conference, 10–12 September 2012. The hot topic at the conference in Munich will be the secure use of mobile devices and BYOD in the workplace.

Over the length of the three-day Munich event, Ramsés Gallego, CISM, CGEIT, International Vice President of ISACA, and a security strategist and evangelist with Quest Software, will look at the topic of securing today’s mobile computing devices, against the backdrop of the user computing environment having changed considerably over the last few years. In his workshop, Gallego will focus on the need to recognise the importance of policy and the types of provisions that need to be included in a mobile computing security policy. He will also look at BYOA (Bring your own application) and IBMD (I’m bringing my device) which are all evolving trends from BYOD.

Steven Ackx, a director of Ascure, a subsidiary of PwC Advisory Services, will cover mobile security - where we are today and where we will be in the future. His workshop will look at solving BYOD anxieties and the need to handle concerns with personal and business data, and how ISACA’s COBIT 5 governance framework can assist in securing mobile devices

According to Gallego, the need to identify the many, disparate types of mobile devices being used, along with their vulnerabilities and risk, is central to developing effective forensics procedures and considerations, when it comes to capturing and preserving evidence obtained from mobile devices. He believes that there is a definite need to better understand the growing market for mobile security and effectively map the available solutions to the existing security problems more.

"To effectively solve BYOD anxieties, enterprises need to address the risk associated with mixing personal and business data on the same device. ISACA's COBIT 5 governance framework goes a long way to assisting professionals in this regard," he added.

Contact Details and Archive...

Print this page | E-mail this page