Governance, Risk and Consumerisation (Edinburgh University)
Understanding and addressing the security and legal risks of using personal devices
02 November 2011, Networking Seminar
Download the presentations
Employees using personal devices to access corporate data is a trend that is not going to go away. With one in three of us now using a smartphone, employee expectations for corporate connectivity are set rise and quickly.
For organisations, the benefits of consumerisation are numerous: greater flexibility, more effective remote working, improved productivity and enhanced business continuity. Yet, along with the flexibility comes increased security risk and new legal implications. Some organisations are confused, whilst others are ignoring the trend, or simply not allowing staff to connect their own devices, however, those who take control of the trend now can avoid many of the escalating security risks of employees clandestinely accessing the corporate network.
Attend this National Computing Centre seminar to:
- Discover how other organisations are addressing consumerisation
- Find out about the legal implications of consumerisation and remote working, and how to address them:
- Data Management, including privacy and data protection
- investigation and auditing
- Learn how to devise a personal device policy that meets your organisations information security requirements.
- Discover how to put policies into practice and take control of consumerisation, before it takes control of you
Venue: St Leonard's Hall, Edinburgh University, Edinburgh
18 Holyrood Park Rd, Edinburgh EH16 5AY
|16.30||Introduction – Consumerisation, a trend you can’t stop..?|
|Michael Dean, National Computing Centre |
A look at the growth of consumerisation and how organisations are tackling the trend.
|16.55||Consumerisation – the legal implications and what you need to know|
|Will Roebuck, Legal Counsel and NCC Associate Consultant |
Will explores the legal implications of employees using their own devices in a corporate environment that includes ring-fencing business data to protect against liability, enable eDiscovery and allow for audit and investigation where necessary.
|17.30||Creating a security policy for the use of mobile devices|
|Dr Daniel Dresner, Head of Information Assurance Practice, National Computing Centre |
Technology is rapidly emerging and maturing to enable connectivity and interoperability of a panoply of devices, The right investment relies on addressing workable, realistic policies first. Daniel will use case study examples to build a pragmatic iPolicy.
|18.30||Buffet & networking|