This report evaluates the scenario of Southern Cross University where the role of the security consultant will be to design the security-based program that addresses the emerging issues as well as the risks to the organization after the implementation of the BYOD policy. The report discusses BYOD risk assessment, critical information assets for Southern Cross University, potential threats to the critical assets after implementation of BYOD policy, certificate-based authentication, mechanism of certificate-based authentication, anti-phishing guidelines, and conclusion.