This article is part of an Essential Guide, our editor-selected collection of our best articles, videos and other content on this topic. Explore more in this guide:
3. - Videos: Read more in this section
- 'Everyone is God on his own device'
- Mobile threats to be aware of
- Choose realistic rules to improve your policy
Explore other sections in this guide:
The challenges of mobile device security policy enforcementDate: Oct 02, 2012
In this video interview, conducted at the 2012 (ISC)2 Security Congress, David Melnick, CISSP, CIPP, CISA, principal, security & privacy services with the audit & enterprise risk services practice at Deloitte & Touche LLP, discusses the challenges enterprises face with mobile device security policy enforcement. Melnick says that while it is possible, it ultimately becomes a question of will for enterprise decision makers.
Melnick discusses whether third-party mobile security technology is essential to making devices secure in a BYOD environment or whether onboard controls are enough. He also talks about the implications of regulated data accessible to mobile devices and the security ramifications of the coming wave of low-cost Android tablets in the enterprise.