- Presents research data associated with BYOD and productivity in the workplace
- Describes BYOD challenges, risks, and liabilities
- Makes recommendations for the components a clearly communicated BYOD program should contain
Mid- to upper-level security managers; chief security officers; chief information officers; college-level educators, specifically in programs that cover security and risk management; security and information technology practitioners
Table of Contents
What is a Trend Report?
1.2 Pros and Cons
1.5 Risks and Liabilities
About the Authors
About Elsevier’s Security Executive Council Risk Management Portfolio
- No. of pages: 20
- Language: English
- Copyright: © Elsevier 2013
- Published: March 25, 2013
- Imprint: Elsevier
- eBook ISBN: 9780124116108
About the Authors
Additionally, he has more than 10 years of successful law enforcement and training experience in Florida and Michigan. Bob is a recognized innovator in the security field and was named as one of the “25 Most Influential People in the Security Industry” in 2007 by Security magazine. He is a frequent speaker at key industry events. He is a leading expert on security issues and has been quoted by such major media outlets as the Wall Street Journal and Forbes. Bob is currently the managing director of the Security Executive Council.
Affiliations and Expertise
She has authored and edited security industry trade and business articles and has spoken at security-related conferences including CSO Perspectives, SecureWorld Expo, ASIS, and CSCMP. In her current role as EVP and chief knowledge strategist at the Security Executive Council she leads the development and production of Council tools, solutions, and publications. She additionally conducts industry research and analysis to improve security and risk management practices.