APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Field Service
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    E-commerce and the Data behind it

    Klemen Drole, CIO, Lazada Group

    The Bi-Model Approach to Customer Engagement

    Sumit Puri, CIO, Max Healthcare

    PropTech: the Future of Real Estate

    Aidan Coleman, CIO & CTO, Charter Hall

    mobileOne Technology: Real-Time Solutions to CPGs

    CEO

    myFLO: Streamlining Business Processes through Comprehensive Field Solutions

    Founder

    Field Force Automation: Where We Are, and Where We Need to Go

    Kelvin Hubbard, COO & CIO, Visual Mobile Technologies, Inc.

    Field Service Management Lifecycle

    Dean Lane, Executive or CIO Consultant, The Office of the CIO & Mayumi Okada, Executive or CIO Consultant, The Office of the CIO

    Technology is No Longer a Support Function

    Mark Wilmshurst,

    right

    BYOD is the New WiFi: We Must Learn from History to Enable Mobile Data Security

    Dan Lohrmann, Chief Strategist & Chief Security Officer, Security Mentor

    Tweet
    content-image

    Dan Lohrmann, Chief Strategist & Chief Security Officer, Security Mentor

    Back in 2004 timeframe, when I was the Chief Information Security Officer (CISO) in Michigan government, I was against WiFi.

    Why? It was not secure, in my view. I had plenty of war driving stories, scary magazine breach headlines and an abundance of Washington D.C. three-letter agency white papers to back up my “WiFi is a bad idea” arguments.

    Until one day, I almost got fired when I insisted that we could not put WiFi in our government conference rooms. I said, “We just can’t do it. Not secure. Bad idea. I’m vetoing the project!”

    My boss and State CIO at the time was Teri Takai. Teri later went on to become the CIO in California Government and CIO at the Department of Defense (DoD). Teri said, “Dan, if that’s your answer, you can’t be the CISO in Michigan.”

    Teri went on, “I’ve been to Dow, Ford, Chrysler and GM, and they all have WiFi in their conference rooms. So you need to figure out what they know that you don’t know and then come back and tell me how we’re going to implement WiFi securely. And I’m giving you one week.”

    That meeting started a transformation in my security career. I began to rethink my role, my team’s mission and how we were being perceived. I refocused my tactical and strategic initiatives to become an enabler of innovation – with the ‘right’ level of security. We went on to win awards for secure WiFi deployments in government a few years later.

    “Whether you are a BYOD naysayer or WYOD earlier adopter, you have to think about enabling secure solutions to equip your business to be innovative and grow”

    And there was larger lesson for me from this experience. I now constantly ask myself: I am bringing the organization problems or workable solutions?

    As I look back at my early years as a CISO, I see so many blind spots. Yes - I cared passionately about information security. We launched numerous projects like deploying encryption on laptops and marketed better ways to protect the enterprise. I also had the necessary technical skills to do my job.

    But I was putting up unnecessary roadblocks. I was a hindrance to management and not offering the business a range of technology solutions with different risk levels.

    I had forgotten, or never truly learned up to that point, the real reason for the security team’s existence. The security leader (and team) must be trusted advisors offering the business secure technology solutions. Or in other words, security doesn’t exist if the business fails.

    Fast Forward to Today

    I told you this story, since I believe that history keep repeating itself in regards to technology and security. No doubt, the specific hardware, software, operating systems, frameworks, issues, vulnerability, and threats change daily. But whether we are talking about WiFi, cloud computing, Bring Your Own Device (BYOD) to work or even Wear Your Own Device (WYOD), the same fundamental challenge remains for technology and security professionals. That is: Are you bringing problems or solutions?

    No, I am not diminishing the very real security problems that BYOD programs bring to enterprises. Nor do I underestimate the genuine risks to sensitive data being lost, stolen or misused.

    The implementation of BYOD programs is complex, just like WiFi and cloud programs before BYOD. There is the likelihood that new policies, procedures, training and perhaps even culture change is needed.

    Nevertheless, just in WiFi, the BYOD boat has left the dock. Are you on the boat – or waving at the boat with both hands from the shore?

    Greg Smith, Chief Information Officer at the Missouri University of Science and Technology, recently spoke at a Merit Networks symposium on BYOD. Greg said: “BYOD is here now. It’s happening all around us. It is the status quo, especially on university campuses.”

    Greg emphasized that the real questions are around what is coming next, and the answer to that is WYOD. It will be huge and coming soon. For example, pay attention to the new Apple watch launch. We need to prepare now.

    Greg’s main points were around our urgent need to prepare infrastructure, security and mindsets for the new normal which is already trickling into our environments now – with a flood of new devices coming soon.

    Where to Begin?

    Many organizations are likely well down the BYOD road. Others who have been holding off may wonder where to begin.

    I think the first key is an honest assessment of your enterprise networks. Answer these questions:

    1) Who is really using mobile technology? (Don't just include staff that is formally authorized.)

    2) How are they truly using mobile devices? (Include both company and personally-owned equipment in your fact-finding mission.)

    3) What data is being accessed on what devices? (Personal and company)

    4) What policies are in place, and are they being followed?

    5) What controls and protections are in place for sensitive data?

    6) What helpful, relevant, engaging training is provided (and taken)?

    7) What’s coming next? Are you prepared for next-generation people, process and technology?

    In conclusion, there are many great vendors with free mobile data security case studies and examples that can help you in your BYOD journey. But whether you are a BYOD naysayer or WYOD earlier adopter, I strongly encourage you to think again about enabling secure solutions to equip your business to be innovative and grow.

    Become a trusted advisor, whom leaders can turn to for answers regarding securing BYOD.

    tag

    Information Security

    Data Security

    Cloud Computing

    Weekly Brief

    loading
    Top 10 Field Services Companies - 2020
    ON THE DECK

    Field Service 2020

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Listening Beyond Hearing

    Listening Beyond Hearing

    Salvatore Incardona, Head of IT, Amplifon Australia
    Modernizing Lending Through Innovative, Secure and Scalable Technology

    Modernizing Lending Through Innovative, Secure and Scalable Technology

    Steven Meek, Chief Information Officer, Pepper Money
    Advancing the Chemical Industry through Digital Transformation

    Advancing the Chemical Industry through Digital Transformation

    Jan Mandrup Olesen, Global Head of Digital Business, Indorama Ventures
    Cultivating a Sustainable Future through Collaboration

    Cultivating a Sustainable Future through Collaboration

    Jiunn Shih, Chief Marketing, Innovation & Sustainability Officer, Zespri International
    Mastering Digital Marketing Strategies

    Mastering Digital Marketing Strategies

    Tasya Aulia, Director of Marketing and Communications, Meliá Hotels International
    Building a Strong Collaborative Framework for Artificial Intelligence

    Building a Strong Collaborative Framework for Artificial Intelligence

    Boon Siew Han, Regional Head of Humanoid Component Business & R&D (Apac & Greater China), Schaeffler
    From Legacy to Agility Through Digital Transformation

    From Legacy to Agility Through Digital Transformation

    Athikom Kanchanavibhu, EVP, Digital & Technology Transformation, Mitr Phol Group
    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Change Management for Clinical Ancillary Teams: Aligning Practice with Policy and Progress

    Ts. Dr. James Chong, Chief Executive Officer, Columbia Asia Hospital – Tebrau
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://field-service.apacciooutlook.com/cxoinsights/byod-is-the-new-wifi-we-must-learn-from-history-to-enable-mobile-data-security-nwid-1720.html