Portable devices have blurred the line between technology used for business and technology used for personal matters. End users must learn to apply the same protections to their personal devices in order to help defend and secure the organizations that they work for.
Topic: Bring Your Own Device (BYOD)
Using a representative example from something as simple as calendar synchronization, the unintended consequences of moving too quickly into the Bring Your Own Device realm are highlighted, with some commentary on strategies that can help. In a January 2013 blog post from Microsoft TechNet regarding excessive iOS6.1 logging on a Microsoft Exchange Server1,
Presentation by Zbigniew Kalbarczyk on BYOD/Cloud and the Insider Threat
The Insider Threat Workshop is a one-day review of current trends in Insider Threat tactics and remediation steps of interest to managers and Cyber Security professionals. The workshop provides an overview of the current state of understanding of who the “insiders” are, how they operate, what motivates them and what threats they pose to information systems. T