Explore a conference talk from the Central Ohio InfoSec Summit 2016 that delves into the challenges and risks associated with Bring Your Own Device (BYOD) policies in information security. Learn about the potential hidden carriers of sensitive data, the importance of backups, and the risks involved with personal devices in a professional setting. Discover solutions and strategies for managing BYOD policies, including data collection methods and project status updates. Gain insights into protecting tax information and other sensitive data in a BYOD environment. This informative session, featuring references to Chuck Norris and Western Governors University, provides valuable knowledge for IT professionals and security experts looking to implement or improve BYOD policies in their organizations.
Overview
Syllabus
Intro
Chuck Norris
Information Security
Western Governors University
Project
Risks
Laptops
Hidden Carrier
Solution
List
Backups
Data Collection
Tax Information
Project Status
Conclusion