A round table discussion over the security, privacy and management issues of Bring Your Own Device, including attack vectors for a BYOD enterprise strategy” As more and more companies seek to lessen their cost of doing business, they latch onto ideas that often have repercussions far and wide beyond the initial business idea – security being no exception. Currently, much of this activity involves using personal assets (i.e. smart-phones or laptops) that employees own to perform company business (known as BYOD Bring Your Own Device). On the face of it, it sounds like a cost savings for most businesses, however, problematic for information security, but is it? The BYOD issue is much more complex than simply saving money, and supporting such a program is far from easy. This panel will explore the various thorny issues from what it takes to keep your employees happy, attack and defense of BYOD, and even some legal issues. Presentation Outline (reviewers only – detailed): BYOD Today Why are we doing this? (business allure) Attack & Defense (software, hardware, IDS, etc) Logical Security Issues Legal issues (social media, forensics, etc) Espionage Problems (IP Loss via easy access to mail and networks etc)