The visual approach prepares everyone for constructive communication.
3. Engage in communication, not just messaging
Messaging is one-way. And worse, messaging doesn't always work (for a variety of reasons). Yet many teams still work to produce the "perfect" message only to succumb to the perfect message fallacy (read about it here).
Relying on messaging to address the security challenges and legal liability concerns only increases the friction in communication that jeopardizes the effort.
Instead, of relying on messaging, hastily written emails, and other forms of "communication" that hamper conversation, get face-to-face and engage in dialog. Do this when possible. Make it possible frequently.
Refer back to the visual mapping. Ask questions - without knowing the answer. Let others process the question and consider the range of impacts. Support the process by providing anecdotal and measured evidence.
Use the visual approach and conversation to figure out where the liabilities are, and what needs to be protected. By engaging people in the process, they gain an understanding of why and everyone benefits.
Reframing the opportunity of BYOD
Many in security regard the changes brought by BYOD as a threat to security. That frequently leads to the instatement of draconian controls, often with the smug admission of "my way or the highway" -- as they pound their fists on the table.
That approach simply doesn't work.
Here's the reality: BYOD is a massive opportunity to both increase security and provide value to the company. The key is doing it right.
BYOD improves the way people do their jobs. The key is to get people together, bring visibility to the challenge, process, and solution, then engage in active, constructive conversation, not just messaging and directives.
Find and unite the right people around a common story. That reveals the pathway and allows the legal team to help navigate the liability while security focuses on protecting what is important.
As a result, your job gets a bit easier and the organization is better protected from a legal and security perspective.
Sign up for CIO Asia eNewsletters.