CIO Strategy for BYOD Policy 

 CloudMobile SecurityPrivacy ComplianceBYOD Infrastructure Evolution


Who has access to your data?

  • How do you balance value, risk and resources?
  • Who has access to your data?

Technology proliferation is widespread and continues to grow throughout most enterprises. The Bring Your Own Device (BYOD) movement, aka consumerization of IT,  has changed the landscape of business. All of a sudden, everyone wants to choose their devices and most of these devices are mobile. That means users are floating out in the world using a myriad of devices, many of which are not supported or secure. This is a growing concern for enterprises in an age where a significant part of the workforce is geographically dispersed. While an increase in productivity is a positive attribute for any enterprise, the risks associated with mobile devices can be significant.

Deploying mobile devices cannot be addressed solely as a technical activity. It affects the daily operations of the employees; the organizational information flow; and, as a result, the business processes of the enterprise from many perspectives. Mobile policies must include security software, type of device supported/allowed, corporate data integrity, and consequences, and must be supported by all levels of management.

The use of a framework enables effective consideration and balancing of multiple stakeholders needs related to introducing devices, including value, risk and resourcing aspects. COBIT 5 and product family provides guidance to help enterprise leaders ensure that information systems include appropriate risk responses.


    Did you know? 97%: 
    the number of security breaches avoidable through simple or intermediate controls.

    White Papers

    Data Leak Prevention
    Securing Mobile Devices


    Online Holiday Shopping and BYOD Security
    IT Risk/Reward Barometer
    Top Business/Technology Issues


    Online Holiday Shopping and BYOD Security
    IT Risk/Reward Barometer
    Top Business/Technology Issues


    Online Shopping

    Journal Articles

    Members Only

    Protect Laptops and the Sensitive Data They Contain

    Additional COBIT Resources

    Return to CIO Home Page   |   COBIT Focus eNewsletter   |   Recognition   |   FAQ   |   News   |   Governance of Enterprise IT (GEIT)   |   COBIT 5 Home Page