SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
BYOD:
Device Control in the
 Wild, Wild, West



      September 25th, 2012
About the Speaker
• Chief Security Officer, Q2ebanking

• Former CIO for multi-billion financial institution

• 13 years industry exp. in Information Technology & Security

• CISSP® (Certified Information Systems Security Professional)

• Published & quoted in American Banker, ABA Banking
  Journal, BankInfoSecurity.com, CIO Magazine,
  ComputerWorld, Credit Union Times

• Speaker/evangelist - InfoSec World, Innotech, ComputerWorld
  SNW, BAI PaymentsConnect, regional banking conferences
Agenda
• Changing mobile landscape
• Drivers behind BYOD(evice)
• Considering threat agents
• Implementing a BYOD program
 • policies, technologies, privacy
• Summary & QA
Mobile Tidal Wave
• 300,000        apps developed in 3 years

• 1.2 billion    mobile web users

• 8 trillion     SMS messages sent last year

• 35 billion     value of apps downloaded

• 86.1 billion   mobile payments made in 2011

• 1.1 billion    mobile banking customers (2015)
BYOD:
    Bring Your Own Device
formally advocates use of personal or non-company
issued equipment to accessing corporate resources
& data

obligates IT to ensure jobs can be performed with an
accept- able level of security
Business Benefits
•   Cut operating costs by eliminating support

       -   Operating system support

       -   Application support

       -   Access support

•   Reduce device hardware costs & procurement

•   Remove productivity barriers (flexible work styles)

•   Extend applications to offsite/traveling employees

•   Increase employee satisfaction through programs

•   On-demand, whenever, wherever, multiple channels
BYOR(isk)
• Understand the risks
  being introduced

• Industry is coming to
  terms with security
  concerns that exist
  around unsecured mobile
  devices/smartphones

• Conduct a risk
  assessment to identify
  address the different
  threat agents
Protect   What?

     From   whom? or what?

    and   How?
BYOD presents a NEW
    problem...

  ...well, not really
The “Human” Problem
• Increased use of social media, coupled with the ubiquity of
  ecommerce, has fueled growth in socially engineered schemes
  waged for financial gain

• According to the Anti-Phishing Working Group, there are
  presently about 30,000 to 35,000 unique phishing campaigns
  every month, each targeting hundreds of thousands to millions
  of email users

• Anytime a user is asked to make a voluntary decision, phishing
  schemes will work, because humans are easy to manipulate

               ➡ this a social problem, not a technical problem.
Do you really believe
that you control your
     endpoints?
Device Control
•   How many of you have local admin rights on
    your computer?

•   How many of you are able to take your
    computer and browse the Internet freely
    away from the network?

•   How many of you disallow PST files - do
    prevent users from taking data?

•   How many of you are doing mobile device
    management?
How do you manage a device
  that you don’t control?
Get out in Front
Reactive approaches result in ad hoc programs

 Are you prepared to answer
 this question from your CEO:

 “what security did we have on
 the device when he lost it?”
Understand your Data
What are you protecting?
• How sensitive is your data?
• How is your sensitive data used?
• What compliance and/or regulations
  exist?
Focus Group:
Computer Security
Jailbreaking Devices
•   Why? for functionality or to
    get paid apps for free

•   “Jailbreaking” or “rooting
    destroys the security model

•   Jailbreaking techniques leave
    the device with a standard
    root password that may grant
    admin-level access to an
    app...(and attacker or
    malware)

•   Convenience at the sake of
    security
Mobile Malware
Mobile Malware
•   Researchers identify
    first instance of mobile
    malware in 2004

•   More than 80 infected     ex. Gozi
    apps have been
    removed from Google
    Play since 2011

•   Android malware has
    infected more than
    250,000 users
QR Codes
• QR codes surfacing
  containing malicious links

• First case confirmed by
  Kaspersky Labs last year -
  mobile malware used to         http://siliconangle.com/blog/

  send premium SMS
                               2011/10/21/infected-qr-malware-
                               surfaces-on-smartphones-apps/
  messages
Which one is evil?
Not the Device
• Over focused on the     • Data in motion
  endpoint and device       (network)

• ...it’s the data stupid! • Data presentation
                            (application)

                          • Data at rest
                            (data stores/shares)
Establish Policies
•   Will a formal agreement between the institution and the
    BYOD user (EULA) specify allowed activities and the
    consequences for breaking the agreement?
•   Create policies before procuring devices
•   Do your BYOD policies address?
       • the use of consumer apps
       • services such as cloud storage
         > Box.net, Dropbox, SpiderOak, Evernote, SkyDrive, iCloud

•   Communicate the privacy policy to employees and make
    it clear what data you can & cannot collect from their
    mobile devices
MDM Solutions
•   What are you trying to protect
•   Address four key areas:
      1) standardization of service, not device
         • consistent set of security controls across different
             platforms while providing the same level of service
      2) common delivery methods
      3) intelligent access controls - role, group, etc.
      4) data containment
         • encryption
         • partitioning
         • sandboxing
Questions to Consider
•   Which devices will be supported?

•   What is the risk profile of the employee/group using the devices?

•   Does the institution have the ability to require and install
    applications to the device(s), such as remote wipe and/or virus/
    malware software?

•   Can the institution require a “business only secure partition” on
    the mobile device? 

•   Mandatory or will the organization bend for certain users?

•   What happens if the device is compromised?  Will your
    institution be able to perform any forensics?

•   When should we say no?
Balancing User Privacy
•   Is ‘sandboxing’ or ‘partitioning’ sufficient
    to maintain separate personas?

•   Is there a reasonable expectation of
    privacy?

     ✓should the organization be able to
        read messages?

     ✓should the organization be able to
        perform a full wipe of the device?

•   State specific privacy laws (ex CA/MA)
    may prevent corporations from even
    viewing non-corporate data
Policy + Technology
•   Policies alone not sufficient - Technology ensures enforcement

•   Many solutions, but requirements should include:

     ✓simple self-enrollment --> complexity increases non-
        compliance

     ✓over-the-air updating
     ✓ability to selectively wipe data on the device
         •   corporate apps, email, and documents must be protected
             by IT if the employee decides to leave the organization

     ✓management of the OS patch/update process
     ✓reporting & alerting --> devices that are non-compliant
COMPLIANCE
Legal Issues
• Big question surrounds legal issues -- agreements
  between employees and employer -- and placing a
  company-owned agent on an employee’s handset

• It’s the start of whole new relationship between
  mobile device users, in dual roles as individual
  consumer and employee, and the company for
  which they work.

• Unresolved questions?

        • e-discovery, Culpability, Liability

        • ex: combined mailboxes
Summary
•   Understand the mobile landscape of your device
    population
•   Policies and procedures should reflect the allowable usage
    and the breadth and depth of security and control settings

•   Consider how BYOD policies can be tested and validated
    to ensure that security and controls have been
    successfully implemented

•   Threat landscape is continuously changing

•   Risk assessments should be performed regularly to identify
    threats and vulnerabilities
Thank You
if    “?” >=

     then

response_variable = ‘answer‘

     else

response_variable = ‘thankyou’

end if;

Más contenido relacionado

La actualidad más candente

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iotCaston Thomas
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsWaterstons Ltd
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioIvanti
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODCaston Thomas
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputationNikec Solutions
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation SlidesIvanti
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionEnclaveSecurity
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 

La actualidad más candente (20)

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti Porfolio
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 

Destacado

Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi namboori
 
White Paper: Aligning application security and compliance
White Paper: Aligning application security and complianceWhite Paper: Aligning application security and compliance
White Paper: Aligning application security and complianceSecurity Innovation
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBloxx
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksMichael Davis
 
The challenges of BYOD for campus network by Leonard Raphael
The challenges of BYOD for campus network by Leonard RaphaelThe challenges of BYOD for campus network by Leonard Raphael
The challenges of BYOD for campus network by Leonard RaphaelBeamos Technologies
 
BYOD: Risks and Opportunities
BYOD: Risks and OpportunitiesBYOD: Risks and Opportunities
BYOD: Risks and Opportunitiesbudzeg
 
10 idées recues sur le Bring Your Own Device
10 idées recues sur le Bring Your Own Device10 idées recues sur le Bring Your Own Device
10 idées recues sur le Bring Your Own Devicecyrilpicat
 
Enterprise Mobility: Challenges and Choices
Enterprise Mobility: Challenges and ChoicesEnterprise Mobility: Challenges and Choices
Enterprise Mobility: Challenges and ChoicesSevenTablets, Inc.
 
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar CommitteeJonathan Ezor
 
Le BYOD : entre perspectives et réalités pédagogiques
Le BYOD : entre perspectives et réalités pédagogiquesLe BYOD : entre perspectives et réalités pédagogiques
Le BYOD : entre perspectives et réalités pédagogiquesAurélien Fiévez
 
Mobile Enterprise Application Platform: A solution to myriad challenges in en...
Mobile Enterprise Application Platform: A solution to myriad challenges in en...Mobile Enterprise Application Platform: A solution to myriad challenges in en...
Mobile Enterprise Application Platform: A solution to myriad challenges in en...[x]cube LABS
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationCisco Services
 
AEROW DIGITAL - BYOD / Enterprise Mobility Management
AEROW DIGITAL - BYOD / Enterprise Mobility ManagementAEROW DIGITAL - BYOD / Enterprise Mobility Management
AEROW DIGITAL - BYOD / Enterprise Mobility ManagementVincent Paulet
 
Mobiquant - Enterprise Mobility Facts 2015 Infographics - Société
Mobiquant - Enterprise Mobility Facts 2015 Infographics - SociétéMobiquant - Enterprise Mobility Facts 2015 Infographics - Société
Mobiquant - Enterprise Mobility Facts 2015 Infographics - SociétéMOBIQUANT TECHNOLOGIES
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...centralohioissa
 

Destacado (20)

BYOD Security Risks for Business
BYOD Security Risks for BusinessBYOD Security Risks for Business
BYOD Security Risks for Business
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
White Paper: Aligning application security and compliance
White Paper: Aligning application security and complianceWhite Paper: Aligning application security and compliance
White Paper: Aligning application security and compliance
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
The challenges of BYOD for campus network by Leonard Raphael
The challenges of BYOD for campus network by Leonard RaphaelThe challenges of BYOD for campus network by Leonard Raphael
The challenges of BYOD for campus network by Leonard Raphael
 
BYOD: Risks and Opportunities
BYOD: Risks and OpportunitiesBYOD: Risks and Opportunities
BYOD: Risks and Opportunities
 
Turn BYOD into a Business Asset
Turn BYOD into a Business AssetTurn BYOD into a Business Asset
Turn BYOD into a Business Asset
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
10 idées recues sur le Bring Your Own Device
10 idées recues sur le Bring Your Own Device10 idées recues sur le Bring Your Own Device
10 idées recues sur le Bring Your Own Device
 
Enterprise Mobility: Challenges and Choices
Enterprise Mobility: Challenges and ChoicesEnterprise Mobility: Challenges and Choices
Enterprise Mobility: Challenges and Choices
 
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
 
Le BYOD : entre perspectives et réalités pédagogiques
Le BYOD : entre perspectives et réalités pédagogiquesLe BYOD : entre perspectives et réalités pédagogiques
Le BYOD : entre perspectives et réalités pédagogiques
 
Mobile Enterprise Application Platform: A solution to myriad challenges in en...
Mobile Enterprise Application Platform: A solution to myriad challenges in en...Mobile Enterprise Application Platform: A solution to myriad challenges in en...
Mobile Enterprise Application Platform: A solution to myriad challenges in en...
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full Presentation
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
AEROW DIGITAL - BYOD / Enterprise Mobility Management
AEROW DIGITAL - BYOD / Enterprise Mobility ManagementAEROW DIGITAL - BYOD / Enterprise Mobility Management
AEROW DIGITAL - BYOD / Enterprise Mobility Management
 
Mobiquant - Enterprise Mobility Facts 2015 Infographics - Société
Mobiquant - Enterprise Mobility Facts 2015 Infographics - SociétéMobiquant - Enterprise Mobility Facts 2015 Infographics - Société
Mobiquant - Enterprise Mobility Facts 2015 Infographics - Société
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 

Similar a BYOD: Device Control in the Wild, Wild, West

Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020tmbainjr131
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model tmbainjr131
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safewoodsy01
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
BYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi MaruBYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi MaruMichele Chubirka
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Steve Markey
 
Chapter 13
Chapter 13Chapter 13
Chapter 13bodo-con
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 

Similar a BYOD: Device Control in the Wild, Wild, West (20)

Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
U nit 4
U nit 4U nit 4
U nit 4
 
BYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi MaruBYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi Maru
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 

Más de Jay McLaughlin

Evaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentEvaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentJay McLaughlin
 
Securing the Virtual Branch
Securing the Virtual BranchSecuring the Virtual Branch
Securing the Virtual BranchJay McLaughlin
 
Exploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsExploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsJay McLaughlin
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingJay McLaughlin
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information InfrastructureJay McLaughlin
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseJay McLaughlin
 

Más de Jay McLaughlin (6)

Evaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentEvaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC Assessment
 
Securing the Virtual Branch
Securing the Virtual BranchSecuring the Virtual Branch
Securing the Virtual Branch
 
Exploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsExploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial Institutions
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information Infrastructure
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The Enterprise
 

Último

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

BYOD: Device Control in the Wild, Wild, West

  • 1. BYOD: Device Control in the Wild, Wild, West September 25th, 2012
  • 2. About the Speaker • Chief Security Officer, Q2ebanking • Former CIO for multi-billion financial institution • 13 years industry exp. in Information Technology & Security • CISSP® (Certified Information Systems Security Professional) • Published & quoted in American Banker, ABA Banking Journal, BankInfoSecurity.com, CIO Magazine, ComputerWorld, Credit Union Times • Speaker/evangelist - InfoSec World, Innotech, ComputerWorld SNW, BAI PaymentsConnect, regional banking conferences
  • 3. Agenda • Changing mobile landscape • Drivers behind BYOD(evice) • Considering threat agents • Implementing a BYOD program • policies, technologies, privacy • Summary & QA
  • 4. Mobile Tidal Wave • 300,000 apps developed in 3 years • 1.2 billion mobile web users • 8 trillion SMS messages sent last year • 35 billion value of apps downloaded • 86.1 billion mobile payments made in 2011 • 1.1 billion mobile banking customers (2015)
  • 5. BYOD: Bring Your Own Device formally advocates use of personal or non-company issued equipment to accessing corporate resources & data obligates IT to ensure jobs can be performed with an accept- able level of security
  • 6. Business Benefits • Cut operating costs by eliminating support - Operating system support - Application support - Access support • Reduce device hardware costs & procurement • Remove productivity barriers (flexible work styles) • Extend applications to offsite/traveling employees • Increase employee satisfaction through programs • On-demand, whenever, wherever, multiple channels
  • 7.
  • 8. BYOR(isk) • Understand the risks being introduced • Industry is coming to terms with security concerns that exist around unsecured mobile devices/smartphones • Conduct a risk assessment to identify address the different threat agents
  • 9. Protect What? From whom? or what? and How?
  • 10. BYOD presents a NEW problem... ...well, not really
  • 11. The “Human” Problem • Increased use of social media, coupled with the ubiquity of ecommerce, has fueled growth in socially engineered schemes waged for financial gain • According to the Anti-Phishing Working Group, there are presently about 30,000 to 35,000 unique phishing campaigns every month, each targeting hundreds of thousands to millions of email users • Anytime a user is asked to make a voluntary decision, phishing schemes will work, because humans are easy to manipulate ➡ this a social problem, not a technical problem.
  • 12. Do you really believe that you control your endpoints?
  • 13. Device Control • How many of you have local admin rights on your computer? • How many of you are able to take your computer and browse the Internet freely away from the network? • How many of you disallow PST files - do prevent users from taking data? • How many of you are doing mobile device management?
  • 14. How do you manage a device that you don’t control?
  • 15. Get out in Front Reactive approaches result in ad hoc programs Are you prepared to answer this question from your CEO: “what security did we have on the device when he lost it?”
  • 16. Understand your Data What are you protecting? • How sensitive is your data? • How is your sensitive data used? • What compliance and/or regulations exist?
  • 18. Jailbreaking Devices • Why? for functionality or to get paid apps for free • “Jailbreaking” or “rooting destroys the security model • Jailbreaking techniques leave the device with a standard root password that may grant admin-level access to an app...(and attacker or malware) • Convenience at the sake of security
  • 20. Mobile Malware • Researchers identify first instance of mobile malware in 2004 • More than 80 infected ex. Gozi apps have been removed from Google Play since 2011 • Android malware has infected more than 250,000 users
  • 21. QR Codes • QR codes surfacing containing malicious links • First case confirmed by Kaspersky Labs last year - mobile malware used to http://siliconangle.com/blog/ send premium SMS 2011/10/21/infected-qr-malware- surfaces-on-smartphones-apps/ messages
  • 22. Which one is evil?
  • 23.
  • 24. Not the Device • Over focused on the • Data in motion endpoint and device (network) • ...it’s the data stupid! • Data presentation (application) • Data at rest (data stores/shares)
  • 25. Establish Policies • Will a formal agreement between the institution and the BYOD user (EULA) specify allowed activities and the consequences for breaking the agreement? • Create policies before procuring devices • Do your BYOD policies address? • the use of consumer apps • services such as cloud storage > Box.net, Dropbox, SpiderOak, Evernote, SkyDrive, iCloud • Communicate the privacy policy to employees and make it clear what data you can & cannot collect from their mobile devices
  • 26. MDM Solutions • What are you trying to protect • Address four key areas: 1) standardization of service, not device • consistent set of security controls across different platforms while providing the same level of service 2) common delivery methods 3) intelligent access controls - role, group, etc. 4) data containment • encryption • partitioning • sandboxing
  • 27. Questions to Consider • Which devices will be supported? • What is the risk profile of the employee/group using the devices? • Does the institution have the ability to require and install applications to the device(s), such as remote wipe and/or virus/ malware software? • Can the institution require a “business only secure partition” on the mobile device?  • Mandatory or will the organization bend for certain users? • What happens if the device is compromised?  Will your institution be able to perform any forensics? • When should we say no?
  • 28. Balancing User Privacy • Is ‘sandboxing’ or ‘partitioning’ sufficient to maintain separate personas? • Is there a reasonable expectation of privacy? ✓should the organization be able to read messages? ✓should the organization be able to perform a full wipe of the device? • State specific privacy laws (ex CA/MA) may prevent corporations from even viewing non-corporate data
  • 29. Policy + Technology • Policies alone not sufficient - Technology ensures enforcement • Many solutions, but requirements should include: ✓simple self-enrollment --> complexity increases non- compliance ✓over-the-air updating ✓ability to selectively wipe data on the device • corporate apps, email, and documents must be protected by IT if the employee decides to leave the organization ✓management of the OS patch/update process ✓reporting & alerting --> devices that are non-compliant
  • 31. Legal Issues • Big question surrounds legal issues -- agreements between employees and employer -- and placing a company-owned agent on an employee’s handset • It’s the start of whole new relationship between mobile device users, in dual roles as individual consumer and employee, and the company for which they work. • Unresolved questions? • e-discovery, Culpability, Liability • ex: combined mailboxes
  • 32. Summary • Understand the mobile landscape of your device population • Policies and procedures should reflect the allowable usage and the breadth and depth of security and control settings • Consider how BYOD policies can be tested and validated to ensure that security and controls have been successfully implemented • Threat landscape is continuously changing • Risk assessments should be performed regularly to identify threats and vulnerabilities
  • 33. Thank You if “?” >= then response_variable = ‘answer‘ else response_variable = ‘thankyou’ end if;