Subscribe to CIO Magazine »

NAB trialling BYOD

Technology for bring-your-own-device program is ready but organisational policies still tricky, says NAB IT transformation boss Adam Bennett
NAB's Adam Bennett

NAB's Adam Bennett

The National Australia Bank is trialling a bring-your-own-device (BYOD) program for its top 200 executives, according to Adam Bennett, NAB executive manager of enterprise transformation.

“It is something we’ve been looking at,” Bennett said in a keynote today at a event run by the Committee for Economic Development of Australia (CEDA). Capability to do BYOD is included in NAB contracts with Telstra and IBM, he said.

“We’re already trialling some things now and we’ll continue to trial and experiment with them as we go forward.”

NAB’s top 200 executives can access data including confidential papers on iPads and other devices using encrypted passwords, Bennett said after his keynote speech.

“It’s very secure,” he said. If a device is compromised, the BYOD software “will basically burn that iPad forever ... If they forget their password, they’ve got to start again.”

BYOD 101: What are BYOD and the consumerization of IT?
How to create a BYOD policy
Problems with BYOD and avoiding BYOD pitfalls
Creating a BYOD user agreement

During his keynote, Bennett said he believes companies will ultimately embrace BYOD.

“The issue is not in my mind a technical issue, because the reality is we can make pretty much anything work on our networks and from a security perspective.”

What companies around the world “are grappling with is not so much the technology but it’s all the organisational conventions and protocols around [BYOD].”

“Does that mean you can bring anything? Does that mean you get an allowance from the company to buy a laptop that you then bring in? And then if something goes wrong with that laptop, does that mean you ring Apple or do you ring the help desk?”

If an employee opts to “struggle along with [his or her] 10-year-old trusty laptop, what does that mean for the person’s productivity and things like that?”

Bennett provided an update on NAB’s 10-year business “transformation” initiative meant to modernise NAB’s IT. The bank is three years into the project, he said.

A key part of the change is an increase in outsourcing to other companies, Bennett said.

“Ultimately, our function needs to become a true orchestrator of services, recognising that we cannot in-house invest to the same degree as the industry can, and there are partners out there who can do some of these things better than we can,” he said.

Two NAB partners, IBM and Oracle, spend a combined $10 billion annually on research and development, he said. “We simply cannot match that kind of investment in R&D.”

That shift to infrastructure on demand “may also change the skillset of the people that we need in an IT function,” Bennett said.

NAB may have “less development work going on but more orchestration work going on and more commercial management, working with our partners,” he said.

Follow Adam Bender on Twitter: @WatchAdam

Follow CIO Australia on Twitter and Like us on Facebook… Twitter: @CIO_Australia, Facebook: CIO Australia, or take part in the CIO conversation on LinkedIn: CIO Australia

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

More about: Apple, Facebook, IBM, NAB, National Australia Bank, Oracle, Telstra
References show all
Comments are now closed.
Related Coverage
Related Whitepapers
Latest Stories
Community Comments
Tags: infrastructure, IT, Cloud, Adam Bennett, Financial Services, bring your own device, bank, NAB, BYOD
Latest Blog Posts
  • How to Successfully Select an ERP System
    An Enterprise Resource Planning (ERP) system is a series of software applications that collect and compiles data from different departments to enhance collaboration and co-ordination within the business. If you’re looking to implement your first ERP system, or to upgrade from an existing system, this whitepaper offers eight simple steps for selection that will lead to long-term strategic success.
    Learn more »
  • Top 10 reasons to strengthen information security with desktop virtualization
    This paper discusses: • The growing challenge of maintaining information security in today’s evolving enterprise environment • Key advantages of desktop virtualization as an inherently more secure computing architecture • The top ten benefits of using desktop virtualization to strengthen information security • And how you can regain control and reduce risk without sacrificing business productivity and growth
    Learn more »
  • Cloud for Business Managers in Midsize Organisations: the Good, the Bad & the Ugly
    Read this independent research report to learn how business managers around the world are using Cloud applications. Discover the top motivations for adopting the Cloud, the most common problems and recurring pitfalls; common barriers to Cloud application integration and the consequences of security breaches and compliance issues.
    Learn more »
All whitepapers
rhs_login_lockGet exclusive access to Invitation only events CIO, reports & analysis.
Latest Jobs
Salary Calculator

Supplied by

View the full Peoplebank ICT Salary & Employment Index

Recent comments