R37 — Mobile / BYOD Data Exposure

Stress-test Mobile / BYOD Data Exposure in the Standard run scenario Mid-size SaaS company. Balanced challenge.
Start playing →
R37 Data Severity 6 · Moderate Residual offset +5

Lost or stolen phones, sideloaded apps, jailbroken devices, nation-state mobile spyware and unmanaged BYOD endpoints exfiltrating corporate data. MDM/MAM with conditional access is the dominant control; identity (per-device trust, attestation) limits blast radius. Residual is small but never zero because personal devices resist full control.

What is Mobile / BYOD Data Exposure?

Lost or stolen phones, sideloaded apps, jailbroken devices, nation-state mobile spyware and unmanaged BYOD endpoints exfiltrating corporate data. MDM/MAM with conditional access is the dominant control; identity (per-device trust, attestation) limits blast radius. Residual is small but never zero because personal devices resist full control. CISO Game tracks this as R37 in the live risk register, severity 6 (Moderate), category Data.

How does CISO Game model Mobile / BYOD Data Exposure?

Exposure for R37 runs from 0 to 100, recomputed live as you buy, cancel, or reassign products. How the exposure model works →

Real-world parallel

Mobile / BYOD data exposure is the risk that corporate data exfiltrates through personal devices outside MDM oversight. The control gradient runs from MAM (managed apps only) to MDM (full device control) to corporate-issued devices; the right choice is workforce-dependent and culture-dependent.

How do security teams mitigate Mobile / BYOD Data Exposure?

The dominant subscore levers for this risk are:

Residual offset: +5 exposure points are structural — no product fully removes them. Real-world parallels: zero-day windows, vendor monoculture, regulator unpredictability.

Which investments mitigate Mobile / BYOD Data Exposure?

Products in CISO Game that reduce exposure to R37:

Which related risks should you also watch?

Risks with similar dominant subscores or shared category — addressing one often helps the others:

Why does Mobile / BYOD Data Exposure matter to a CISO?

Data risk is what shows up in the news and the regulator's letter. Mobile / BYOD Data Exposure compounds with disclosure timing, customer-trust impact, and downstream litigation.

How can you test your mitigation strategy?

Click Play CISO Game free to see R37 appear live in your risk register and watch each purchase move the exposure number in real time. No signup required.

Stress-test Mobile / BYOD Data Exposure in the Standard run scenario →