To deal with this plethora of tools and technologies, Nardoni says you must ensure that your security teams are trained in their use before they need to deploy them.
"The CISOs and CIOs and directors of security should be focused on talking with their teams and getting them trained on the various tools out there and what evidence can be retrieved from these devices," he says. "Try to standardize on a certain set of devices. Make sure your teams have adequate tools and training to investigate these devices. Even more importantly, make sure you have the proper policies in place from legal to allow them to investigate these devices."
Thor Olavsrud covers IT Security, Big Data, Open Source, Microsoft Tools and Servers for CIO.com. Follow Thor on Twitter @ThorOlavsrud. Follow everything from CIO.com on Twitter @CIOonline and on Facebook. Email Thor at firstname.lastname@example.org
Read more about mobile security in CIO's Mobile security Drilldown.