Listen "Steps to Secure BYOD"
Episode Synopsis
Guest 1: Michael P. Wilson
Title: Vice President, Chief Information Security Officer, McKesson
Guest 2: Keith Fricke
Title: CISO, Catholic Health Partners
Guest 3: Chris Marsh
Title: Principal Analyst, Yankee Group
BYOD has wide appeal for employees who value the convenience and ease of using their own devices. Businesses recognize that by allowing BYOD, their employess are able to be as productive as possible. However, the variety and number of personal devices being brought into the enterprise network is a potential security threat and a huge headache for IT departments. What can any company do to securely and flexibly transition to BYOD? Being a road less travelled, what have been the lessons learnt and the strategies tried, that have helped in achieving this goal?
Title: Vice President, Chief Information Security Officer, McKesson
Guest 2: Keith Fricke
Title: CISO, Catholic Health Partners
Guest 3: Chris Marsh
Title: Principal Analyst, Yankee Group
BYOD has wide appeal for employees who value the convenience and ease of using their own devices. Businesses recognize that by allowing BYOD, their employess are able to be as productive as possible. However, the variety and number of personal devices being brought into the enterprise network is a potential security threat and a huge headache for IT departments. What can any company do to securely and flexibly transition to BYOD? Being a road less travelled, what have been the lessons learnt and the strategies tried, that have helped in achieving this goal?
More episodes of the podcast CIO Talk Network
The CIO as the Conscience of AI
01/12/2025
Marrying Legacy Systems to Modern Marvels
09/11/2025
How Risk Aware Leaders Build Lasts?
09/11/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.