BYOD: Getting Started

Many organizations are having difficulty with handling the “Bring Your Own Device” wave. Others have not yet even started thinking about it.

Along with Kris Vann of Actiance, we’ll be exploring the risks and challenges of BYOD — and providing some practical advice along the way. Part One of our series is here.

Jim Shook

About the Author: Jim Shook

Jim combines his computer science degree and technical experience with over a decade as a litigator and general counsel, helping customers to better understand cybersecurity best practices and related regulatory and legal concerns. Today he focuses on combating the impact of ransomware and destructive attacks with cyber resilience capabilities and technologies. Jim started and continues to lead Dell's relationship with Sheltered Harbor and serves on its Joint Steering Committee. He is also a member of the Joint Steering Committee for the Sedona Conference working group on cybersecurity and privacy.