Skip to content

Consumerism and IT

One of the great challenges we will all face moving forward is the concept of ‘consumerization’ and IT; the bring your favorite device to work day has got an injection of steroids and claims to be here to stay.

Now there are some technologies out there that claim to aid with the security of maintaining the data, but lets face facts its just not that simple.

You begin to let people have whatever data they want on personal devices and hope to control the risk with technology you are going to have problems; can you say Compliance?

I knew you could. How do you begin to audit these devices? Just wait until the privacy people get a hold of this one…I see problems on the track up a head but the train keeps going. Now you can’t stop the train, I get that, and screaming fire in the movie theatre doesn’t work either, but let’s get back to basics at least: policy, data classification, and user awareness just got critical. If you’re going to allow all data on these devices….

Well you have trouble. But if you can classify data, train users to understand what it looks like, and set good policy you might have a decent chance. The argument hasn’t changed, just the imperative.

Posted in

Dave Tyson

Dave Tyson is the Managing Partner of CISO Insights Cyber Security Risk Advisory. Tyson has served as CISO and security leader at organizations including SC Johnson, Nike, PG&E, eBay, and as chairman and president of ASIS. Contact: Dave@cisoinsights.com, (408) 464-5310.

Leave a Comment





Ready to Get Started?

Click on the button below to take the first step towards securing your organization against cyber security threats.

Does the new Chinese Cybersecurity law Increase Your Manufacturing or Supply Chain Risk?

That is the question business leaders are asking themselves across the world in light of the new version of China’s ...
Read More
Marketing Meeting

The Top 3 Cyber Security Risks Every Chief Marketing Officer Should Care About

The Chief Marketing Officer (CMO in many organizations) is on the front lines of two of the largest battle fronts ...
Read More
Castle

Digital Comes of Age

For the past millennia or so, the traditional approach to securing assets has been the utilization of a castle mentality. ...
Read More
Paradigm Shift

A True Paradigm Shift in Security Management

"Cyber Security 1.0" was vulnerability based, and has what I would argue limited and decreasing levels of success as public breaches ...
Read More
Geek Shall Inherit the Earth

The Geek Shall Inherit the Earth………..

At least according to Microsoft a few years ago, and if that’s true then the earth will be led by ...
Read More
IT Security for Physical Security Pro

IT Security for the Physical Security Professional

One of the greatest challenges for a CISO is helping traditional security professionals believe they can learn information security fundamentals ...
Read More
Scroll To Top