BRING YOUR OWN DEVICE:

How Can Your Company Enable BYOD While Managing the Risk

Luncheon Event

As the speed of technology increases, IT departments are left playing catch-up.Users are already using their private devices in the corporate environment to improve their user experience and increase their personal productivity, in some cases bypassing controls meant for existing corporate devices. In these cases, BYOD stands for Brought Your Own Device.

The capabilities of current consumer devices are creating new challenges for CIOs, security managers and IT departments. BYOD is more than just an IT issue; it requires policies and procedures to maintain a secure IT environment.

This lunch presentation will assist security managers, IT managers, privacy managers, risk managers and internal auditors to:

  • Understandthe basics of BYOD
  • Understandhow BYOD can create benefits to an organization, while simultaneously creating new risks to security, privacy and data exposure
  • Learn how the risks and benefits of BYOD can impact your organization
  • Consider what controls and policiesneed to be implemented to manage the risk to protect the organization
  • Review some of the technical considerations, organizational considerations, and best practices for implementing a BYOD program

REGISTER NOW – Click Here

About the Speaker

Jeff is a Manager inKPMG’s Information Technology Advisory practice. He has over ten years of IT security and controls experience, and has performed security reviews and provided security advice for clients in British Columbia to Ontario. The client sectors Jeff has served has ranged from Crown Corporations and Treasury Board Crowns to clients in mining, internet commerce, lotteries, educational institutions, telecommunications companies and private entities. He has also performed SOC reporting engagements for clients in Western Canada and Phoenix, Arizona.

Previously, Jeff has worked as the IT security resource for a Saskatchewan Crown Corporation and an IT security auditor for a national telecommunications company.

Jeff holds multiple certifications in IT Security and IT Audit, including:

  • CISSP (Certified Information Systems Security Professional)
  • CISSP-ISSAP (Certified Information Systems Security Professional-Information Systems Security Architecture Professional)
  • CISA (Certified Information System Auditor)
  • CISM (Certified Information Security Manager)
  • CEH (Certified Ethical Hacker)
  • MCSE:Security
  • G7799, GSNA
  • CWSP (Certified Wireless Security Professional)