Which of the following is a MAIN security challenge when conducting a post-incident review related to bring your own device (BYOD) in a mature, diverse organization?
A. Ability to obtain possession of devices
B. Lack of mobile forensics expertise
C. Diversity of operating systems
D. Ability to access devices remotely