This resource is no longer available
Five Steps To A Successful BYOD Security Strategy
The BYOD paradigm has many quantifiable benefits, but introduces new challenges in securing enterprise networks and sensitive data.
How can an organization ensure only approved devices are allowed on the network? Which processes can best manage where sensitive data resides? What tactics work when educating employees?
In this podcast, Craig Mathias countdowns to the top five steps in ensuring a successful BYOD security strategy. The discussion focuses on policies, procedures, and employee education.
SpeakerCraig Mathias Principal, Farpoint Group
Craig Mathias is principal with Farpoint Group, an Ashland, MA-based advisory firm specializing in wireless and mobile technologies, products, services, and systems. Mathias is an internationally-recognized expert on wireless communications and mobile computing, and has published numerous technical and overview articles on a wide variety of topics. He is a well-known and often-quoted industry analyst and frequent speaker at industry conferences and events, as well as in webcasts, webinars, podcasts, and videos.