top of page

Bring Your Own Device (BYOD)    

The rise in popularity of personal smart devices is making its mark on the workplace of today. Users want an environment that is flexible and easy to access from any location and is no longer confined by either physical or perceived boundaries. For most users, ‘Bring Your Own Device’ (BYOD) is simply about allowing them to use their own devices to connect to the corporate network, but the challenge for the organisation and the IT department is, as always, a little more complex.


BYOD significantly impacts the traditional security model of protecting the perimeter of the IT organization by blurring the definition of that perimeter, both in terms of physical location and in asset ownership. With personal devices now being used to access corporate email, calendars, applications and data; many organizations are struggling with how to fully define the impact to their security posture and establish acceptable procedures and support models that balance both their employees’ needs and their security concerns.


This highly practical and informative course will explain the main risks of BYOD when considering your mobile device program, and will propose potential steps to address these risks based on your organization’s current and most urgent challenges. Real life case studies will be discussed throughout the duration of this course.

Course Objectives​

  • Create a better understanding of the risks and vulnerabilities with personal device usage

  • Show how the vulnerabilities differ - for the employer, employee and your data

  • Arm you with the knowledge and know how to protect yourself and your staff from Identified threats and vulnerabilities

  • Provide you with an understanding of the necessary policies, procedures and training

  • Highlight how best to balance productivity and profit with BOYD implementation

Who should attend?

This course has been developed to help meet the needs of policy and technology users in all types of organizations. It’s essential for anyone in a leadership or technical role in IT who must respond as their community of users adopts new technologies and brings them to the organization.

  • Safety

  • Network Security

  • IT

  • Risk Management

  • Project Management

  • Corporate Strategy

Early Fee: USD 995

Standard Fee: USD 1395

bottom of page