Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid
-
Upload
johan-jacobs -
Category
Technology
-
view
1.155 -
download
1
description
Transcript of Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid
![Page 1: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/1.jpg)
![Page 2: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/2.jpg)
> 135 experts verspreid over 7 sites in de 3 regios
![Page 3: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/3.jpg)
![Page 4: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/4.jpg)
![Page 5: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/5.jpg)
![Page 6: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/6.jpg)
Enquête bij 335 respondenten uit het bezoekersbestand van de 2012-editie van Infosecurity.be, Storage Expo en Tooling Event Belgium
![Page 7: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/7.jpg)
Enquête bij 335 respondenten uit het bezoekersbestand van de 2012-editie van Infosecurity.be, Storage Expo en Tooling Event Belgium
![Page 8: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/8.jpg)
Enquête bij 335 respondenten uit het bezoekersbestand van de 2012-editie van Infosecurity.be, Storage Expo en Tooling Event Belgium
![Page 9: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/9.jpg)
•
•
•
Enquête bij 335 respondenten uit het bezoekersbestand van de 2012-editie van Infosecurity.be, Storage Expo en Tooling Event Belgium
![Page 10: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/10.jpg)
![Page 11: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/11.jpg)
Een studie van het Interactive Advertising Bureau Belgium (IAB) en InSites Consulting peilde bij 7.827 sociale mediagebruikers uit 19 landen (waaronder 315 Belgen)
naar de tijdstippen waarop ze Facebook, Twitter, LinkedIn of Netlog raadplegen.
![Page 12: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/12.jpg)
70%
![Page 13: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/13.jpg)
![Page 14: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/14.jpg)
“Here´s your Own” Hardware, specs defined
and managed by company, strict policies
and rules
“Choose your Own”
Whitelist of allowed hardware, managed possibly less tight policies and rules
“Bring your Own”
Freedom of choice for hardware, relatively unmanaged, loose policies and rules
“Own your Own”
Freedom of choice for hardware, unmanaged, barely policies and rules
![Page 15: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/15.jpg)
•
• ´
•
•
•
•
•
•
•
Source: Gartner Survey Show BYOD is Top Concern for Enterprise Mobile Security, June 14, 2012
![Page 16: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/16.jpg)
![Page 17: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/17.jpg)
![Page 18: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/18.jpg)
![Page 19: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/19.jpg)
![Page 20: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/20.jpg)
![Page 21: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/21.jpg)
•
•
•
•
•
•
![Page 22: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/22.jpg)
•
•
•
•
•
•
•
•
•
![Page 23: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/23.jpg)
![Page 24: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/24.jpg)
•
•
•
•
•
![Page 25: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/25.jpg)
![Page 26: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/26.jpg)
![Page 27: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/27.jpg)
![Page 28: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/28.jpg)
![Page 29: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/29.jpg)
![Page 30: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/30.jpg)
![Page 31: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/31.jpg)
•
•
•
•
•
•
•
•
•
![Page 32: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/32.jpg)
![Page 33: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/33.jpg)
![Page 34: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/34.jpg)
![Page 35: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/35.jpg)
•
•
•
•
•
•
•
•
![Page 36: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/36.jpg)
•
•
•
•
•
•
![Page 37: Infosecurity 2013- Social it-balanceren tussen vrijheid en veiligheid](https://reader035.fdocuments.in/reader035/viewer/2022070323/5599d8791a28aba9068b4801/html5/thumbnails/37.jpg)