PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
From ABCs to BYOD

This article is part of the Information Security magazine issue of December 2013 Vol. 15 / No. 10
As chief technology officer of Las Virgenes Unified School District (LVUSD) in Los Angeles County, I keep up on IT trends across industries. Over the past year, I've seen many articles debating the benefits and risks of enabling bring your own device (BYOD) in the enterprise. It may come as a surprise, but for my school district this debate is old news. Today the district provides wireless connectivity across our 17 public schools, enabling every student and teacher, from kindergarten up, to use personal devices in the classroom. (This BYOD program is distinct from the Apple iPad rollout in the Los Angeles Unified School District.) By welcoming these devices, we've been able to adopt a technology-rich curriculum aimed at giving our students the skills to succeed in today's world and beyond. Along the way, we addressed the same security concerns that plague organizations across all industries, as well as some that are specific to education. CIOs contemplating BYOD programs can identify with many of the challenges we faced, ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Beyond the Page: Breach detection systems
In the December 2013 Beyond the Page, John Pirc explains why breach detection systems are an essential security tool in a malware-infested world.
-
Wi-Fi connectivity puts pressure on medical device security
Health system's certification program mitigates the risks associated with wireless medical devices.
-
A full-service model for SIEM
The industry needs to recognize the value that full service "SIEM in the cloud" would bring to organizations.
-
Analytics and the insider threat: Privileged users and patterns of deception
Security professionals should analyze metrics to learn baseline behavioral patterns of their employees and identify anomalous behaviors.
-
Secure all the (Internet of) Things
Despite the promise of the Internet of Things, history will repeat itself unless we take action.
-
Get back to basics for improved network security
If your post-mortem meetings are anything like mine, forget the bells and whistles and revisit security best practices.
Columns in this issue
-
Congratulating the 2013 Security 7 Award winners
We honor leading information security professionals in seven vertical industries and applaud their achievements in our annual awards issue.
-
Return on security investment: The risky business of probability
You are better off with real numbers when it comes to measuring probability and the elements of security risk, even if they are wrong.