Steps to Secure BYOD

BYOD has wide appeal for employees who value the convenience and ease of using their own devices. Businesses recognize that by allowing BYOD, their employess are able to be as productive as possible. However, the variety and number of personal devices being brought into the enterprise network is a potential security threat and a huge headache for IT departments. What can any company do to securely and flexibly transition to BYOD? Being a road less travelled, what have been the lessons learnt and the strategies tried, that have helped in achieving this goal? Guest 1: Michael P. Wilson, Vice President, Chief Information Security Officer, McKesson Guest Bio: https://www.ciotalknetwork.com/contributor/michael-wilson/ Guest 2: Chris Marsh, Principal Analyst, Yankee Group Guest Bio: https://www.ciotalknetwork.com/contributor/chris-marsh/ Guest 3: Keith Fricke, CISO, Catholic Health Partners Guest Bio: https://www.ciotalknetwork.com/contributor/keith-fricke/ More on this Episode: https://www.ciotalknetwork.com/steps-to-secure-byod/ More on Security: https://www.ciotalknetwork.com/topics/security/ Visit CIO Talk Network Website: https://www.ciotalknetwork.com/ Subscribe to our Newsletter: https://www.ciotalknetwork.com/subscribe/ Nominate Guests or Sponsor: https://www.ciotalknetwork.com/contact/

Om Podcasten

Today, Enterprise Technology is both Strategy and Global. On CIO Talk Network (CTN), Business IT Thought Leaders from around the globe share their experience and discuss how they are partnering with business to innovate and help grow the top line revenue, better care of customers, and improve the corporate bottom line. If you want to keep up with changes in technology and how it can be leveraged to maximize business potential, listen to CTN: CIO Talk Network