A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Subscribestar or Patreon

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


The Maru Architecture Design: A proposed BYOD architecture for an evolving threat landscape - Michael Smith Notacon 10 (Hacking Illustrated Series InfoSec Tutorial Videos)

The Maru Architecture Design: A proposed BYOD architecture for an evolving threat landscape
Michael Smith
Notacon 10

Synopsis

Bring Your Own Device (BYOD) is one of the fastest growing trends in information technology. As organizations explore accepting this paradigm shift, IT faces a future reality where devices are no longer under their complete control. Combined with a rapidly evolving security landscape focused on attacking the user, IT is kept awake at night with the fear that a breach will soon make headlines.

Despite these fears and objections, the growing thought among industry experts is that BYOD acceptance is inevitable for most organizations. A shift in strategic thinking towards accepting BYOD in the enterprise and mitigating its potential risks is needed. This talk focuses on a proposed architecture blueprint for BYOD enterprises. The goal of this design, when part of a proper BYOD program, will be to help reduce many of the risks associated with BYOD, while allowing users and organizations to enjoy the many benefits.

Bio
Michael Smith is a consultant for ePlus Security. A ten-year veteran of the industry, he has a diverse IT background, although his true passion remains security. Michael is currently a Doctoral candidate at Capital College, researching attack prediction and discovery using predictive analytics. He holds several certifications including his CISSP, OSCP, and GPEN. When not testing or securing the enterprise, Michael enjoys spending time with his family, pursuing his many geeky interests, and traveling… especially to see the Mouse.

 

Back to Notacon 10 video list

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast