Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Bring Your Own Device and Whatever Security Controls You Want - One Approach to Re

via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a conference talk from the Central Ohio InfoSec Summit 2016 that delves into the challenges and risks associated with Bring Your Own Device (BYOD) policies in information security. Learn about the potential hidden carriers of sensitive data, the importance of backups, and the risks involved with personal devices in a professional setting. Discover solutions and strategies for managing BYOD policies, including data collection methods and project status updates. Gain insights into protecting tax information and other sensitive data in a BYOD environment. This informative session, featuring references to Chuck Norris and Western Governors University, provides valuable knowledge for IT professionals and security experts looking to implement or improve BYOD policies in their organizations.

Syllabus

Intro
Chuck Norris
Information Security
Western Governors University
Project
Risks
Laptops
Hidden Carrier
Solution
List
Backups
Data Collection
Tax Information
Project Status
Conclusion

Reviews

Start your review of Bring Your Own Device and Whatever Security Controls You Want - One Approach to Re

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.