SlideShare una empresa de Scribd logo
1 de 23
Descargar para leer sin conexión
& Pri vacy
     le Sec urity
M obi
                                  !
                          or That
                  An App F
        There’s
Smart Phones
Gadgets
Functionality…
!   Multimedia          !   Email

!   Voice & Video       !   Calendar

!   Photography         !   Web Surfing

!   Social Media        !   Work

!   Shopping            !   Reading

!   Apps… Apps… Apps!   !   Games
….and more apps!!
…not your Dad’s PC
…or his mobile phone
…the future’s so bright
Technology for Humanity
Historical Perspective




…technology can come with unexpected consequences
…and of course
Wireless & Cellular
!   Wi-Fi       !   Wi-Max

!   Hotspots    !   4G

!   Bluetooth   !   LTE
Big Brother
Does Privacy Exist?
!   Personal information & photos on Facebook?

!   Hackers trying to steal your data

!   Corporations collecting and selling your info

!   The government watching what you do

!   Sensors in many of our consumer goods
    (cars, appliances, phones, clothing?)
Threats on the Move
!   Botnets                    !   Spyware

  !   Mobile Zombie Networks     !   Apps or malware that
                                     steal info/GPS
!   Bad Apples
                               !   Bluetooth Hijacking
  !   Malware in App Stores
!   Social Networks            !   Wi-Fi Attacks

  !   A vector for malware     !   Spoofs and Phishing

                                 !   Spear Phishing
Mobile Threat Evolution
Securing your Mobile Device
!   Tracking lost phones

!   Antivirus, malware, spyware

!   Encryption

!   Where do you store/back up your data?

!   Apps that use geo-location and access your info

!   We often trade privacy for functionality/convenience
Consumer Solutions
!   Lookout Mobile Security
  ! MyLookout.com
!   McAfee Mobile Security
  ! McAfee.com
!   Do you have any suggestions to share??
Enterprise MDM & Point
Solutions
!   McAfee Enterprise Mobility Management
!   Enterproid – http://www.enterproid.com
!   Touchdown for Android - http://www.nitrodesk.com/
!   Symantec Mobile Security
!   Good MDM

!   Mobile Active Defense (like BlackBerry)
!   RIM
Conclusion
!   The bad guys can get what’s on your phone, even if you encrypt it
    and use a password

!   The casual thief is who you want to protect against

!   Don’t keep really sensitive stuff on your mobile device

!   Use a tool that allows you to wipe your device if it is stolen (via a web
    page)

!   Apply security policies that make sense:
    (encryption, PIN, locking, timeout, remote wipe…)

!   Leverage good point solutions, even in the enterprise
Q&A
!   Do your best and don’t lose sleep over it!




!   Now you can go back to playing Angry Birds!!

Más contenido relacionado

La actualidad más candente

Teacher awareness talk slides
Teacher awareness talk slidesTeacher awareness talk slides
Teacher awareness talk slidesPhilip Ling
 
Tech trends 2011
Tech trends 2011Tech trends 2011
Tech trends 2011sputnik5
 
Copy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintCopy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintJames Webb
 
Emerging Web Trends & Career Opportunities in IT 2013
Emerging Web Trends & Career Opportunities in IT 2013Emerging Web Trends & Career Opportunities in IT 2013
Emerging Web Trends & Career Opportunities in IT 2013Vernon Fernandes
 
Lo1 405 moochies_presentation
Lo1 405 moochies_presentationLo1 405 moochies_presentation
Lo1 405 moochies_presentationkauepgarcia
 
Mobile Changing the Face of Business
Mobile Changing the Face of BusinessMobile Changing the Face of Business
Mobile Changing the Face of BusinessKim Hughes
 
Internet of Things to make a sale
Internet of Things to make a saleInternet of Things to make a sale
Internet of Things to make a saleAshish Jhalani
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)itgsabc
 
How Social Do You Want Your PR? Six Tips For 2013
How Social Do You Want Your PR? Six Tips For 2013How Social Do You Want Your PR? Six Tips For 2013
How Social Do You Want Your PR? Six Tips For 2013twofourseven
 
Should you get the come backing nokia banana phone
Should you get the come backing nokia banana phoneShould you get the come backing nokia banana phone
Should you get the come backing nokia banana phoneGina Benderson
 
Mr and Mrs Presenter
Mr and Mrs PresenterMr and Mrs Presenter
Mr and Mrs PresenterGovinda raj
 
Content management for cross device final
Content management for cross device finalContent management for cross device final
Content management for cross device finalGeorges-Alexandre Hanin
 

La actualidad más candente (19)

Teacher awareness talk slides
Teacher awareness talk slidesTeacher awareness talk slides
Teacher awareness talk slides
 
Tech trends 2011
Tech trends 2011Tech trends 2011
Tech trends 2011
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
 
Copy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintCopy of Managing Your Digital Footprint
Copy of Managing Your Digital Footprint
 
Emerging Web Trends & Career Opportunities in IT 2013
Emerging Web Trends & Career Opportunities in IT 2013Emerging Web Trends & Career Opportunities in IT 2013
Emerging Web Trends & Career Opportunities in IT 2013
 
Lo1 405 moochies_presentation
Lo1 405 moochies_presentationLo1 405 moochies_presentation
Lo1 405 moochies_presentation
 
Mobile Changing the Face of Business
Mobile Changing the Face of BusinessMobile Changing the Face of Business
Mobile Changing the Face of Business
 
Internet of Things to make a sale
Internet of Things to make a saleInternet of Things to make a sale
Internet of Things to make a sale
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cscs (4)
Cscs (4)Cscs (4)
Cscs (4)
 
Role of mobile phone in life
Role of mobile phone in lifeRole of mobile phone in life
Role of mobile phone in life
 
Cool Tools
Cool ToolsCool Tools
Cool Tools
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
 
Technology: It's Not Just for Work, You Know
Technology: It's Not Just for Work, You KnowTechnology: It's Not Just for Work, You Know
Technology: It's Not Just for Work, You Know
 
How Social Do You Want Your PR? Six Tips For 2013
How Social Do You Want Your PR? Six Tips For 2013How Social Do You Want Your PR? Six Tips For 2013
How Social Do You Want Your PR? Six Tips For 2013
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Should you get the come backing nokia banana phone
Should you get the come backing nokia banana phoneShould you get the come backing nokia banana phone
Should you get the come backing nokia banana phone
 
Mr and Mrs Presenter
Mr and Mrs PresenterMr and Mrs Presenter
Mr and Mrs Presenter
 
Content management for cross device final
Content management for cross device finalContent management for cross device final
Content management for cross device final
 

Similar a AITP Presentation on Mobile Security

Mobile Connects the Future
Mobile Connects the FutureMobile Connects the Future
Mobile Connects the FutureBrandEmotivity
 
Mobile changes everything, no one is safe
Mobile changes everything, no one is safeMobile changes everything, no one is safe
Mobile changes everything, no one is safeJorge Sebastiao
 
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...edSocialMedia
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Allan Isfan
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
The Mobile Future
The Mobile FutureThe Mobile Future
The Mobile FutureMintTwist
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommBarbara Ludwig
 
Going Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always ConnectedGoing Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always ConnectedBusinessOnline
 
Going Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always ConnectedGoing Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always ConnectedBusinessOnline
 
Tom Purves: Designing for An Augmented Reality World
Tom Purves: Designing for An Augmented Reality WorldTom Purves: Designing for An Augmented Reality World
Tom Purves: Designing for An Augmented Reality WorldRefresh Events
 
Designing for an Augmented Reality world
Designing for an Augmented Reality worldDesigning for an Augmented Reality world
Designing for an Augmented Reality worldthomas.purves
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensicsi4box Anon
 
Who needs a smarter phone?
Who needs a smarter phone?Who needs a smarter phone?
Who needs a smarter phone?Niky Sotiroff
 
Heavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online SecurityHeavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online SecurityHeavy Chef
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceRihab Chebbah
 

Similar a AITP Presentation on Mobile Security (20)

Mobile Connects the Future
Mobile Connects the FutureMobile Connects the Future
Mobile Connects the Future
 
Mobile changes everything, no one is safe
Mobile changes everything, no one is safeMobile changes everything, no one is safe
Mobile changes everything, no one is safe
 
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015
 
Mobile 101
Mobile 101 Mobile 101
Mobile 101
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
The Mobile Future
The Mobile FutureThe Mobile Future
The Mobile Future
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
 
Going Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always ConnectedGoing Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always Connected
 
Going Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always ConnectedGoing Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always Connected
 
Mobile security
Mobile securityMobile security
Mobile security
 
Tom Purves: Designing for An Augmented Reality World
Tom Purves: Designing for An Augmented Reality WorldTom Purves: Designing for An Augmented Reality World
Tom Purves: Designing for An Augmented Reality World
 
Designing for an Augmented Reality world
Designing for an Augmented Reality worldDesigning for an Augmented Reality world
Designing for an Augmented Reality world
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Who needs a smarter phone?
Who needs a smarter phone?Who needs a smarter phone?
Who needs a smarter phone?
 
Heavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online SecurityHeavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online Security
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
 

Más de John D. Johnson

Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologyJohn D. Johnson
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Fundamentals of Light and Matter
Fundamentals of Light and MatterFundamentals of Light and Matter
Fundamentals of Light and MatterJohn D. Johnson
 
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050John D. Johnson
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?John D. Johnson
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamJohn D. Johnson
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?John D. Johnson
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtJohn D. Johnson
 
Cyber Education ISACA 25 April 2017
Cyber Education ISACA 25 April 2017Cyber Education ISACA 25 April 2017
Cyber Education ISACA 25 April 2017John D. Johnson
 
Discovering a Universe Beyond the Cosmic Shore
Discovering a Universe Beyond the Cosmic ShoreDiscovering a Universe Beyond the Cosmic Shore
Discovering a Universe Beyond the Cosmic ShoreJohn D. Johnson
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingJohn D. Johnson
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat KeynoteJohn D. Johnson
 

Más de John D. Johnson (14)

Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Fundamentals of Light and Matter
Fundamentals of Light and MatterFundamentals of Light and Matter
Fundamentals of Light and Matter
 
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive Team
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Cyber Education ISACA 25 April 2017
Cyber Education ISACA 25 April 2017Cyber Education ISACA 25 April 2017
Cyber Education ISACA 25 April 2017
 
Discovering a Universe Beyond the Cosmic Shore
Discovering a Universe Beyond the Cosmic ShoreDiscovering a Universe Beyond the Cosmic Shore
Discovering a Universe Beyond the Cosmic Shore
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
 
Mars Talk for IEEE
Mars Talk for IEEEMars Talk for IEEE
Mars Talk for IEEE
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote
 

AITP Presentation on Mobile Security

  • 1. & Pri vacy le Sec urity M obi ! or That An App F There’s
  • 4. Functionality… !   Multimedia !   Email !   Voice & Video !   Calendar !   Photography !   Web Surfing !   Social Media !   Work !   Shopping !   Reading !   Apps… Apps… Apps! !   Games
  • 6.
  • 10.
  • 12. Historical Perspective …technology can come with unexpected consequences
  • 14. Wireless & Cellular !   Wi-Fi !   Wi-Max !   Hotspots !   4G !   Bluetooth !   LTE
  • 16. Does Privacy Exist? !   Personal information & photos on Facebook? !   Hackers trying to steal your data !   Corporations collecting and selling your info !   The government watching what you do !   Sensors in many of our consumer goods (cars, appliances, phones, clothing?)
  • 17. Threats on the Move !   Botnets !   Spyware !   Mobile Zombie Networks !   Apps or malware that steal info/GPS !   Bad Apples !   Bluetooth Hijacking !   Malware in App Stores !   Social Networks !   Wi-Fi Attacks !   A vector for malware !   Spoofs and Phishing !   Spear Phishing
  • 19. Securing your Mobile Device !   Tracking lost phones !   Antivirus, malware, spyware !   Encryption !   Where do you store/back up your data? !   Apps that use geo-location and access your info !   We often trade privacy for functionality/convenience
  • 20. Consumer Solutions !   Lookout Mobile Security ! MyLookout.com !   McAfee Mobile Security ! McAfee.com !   Do you have any suggestions to share??
  • 21. Enterprise MDM & Point Solutions !   McAfee Enterprise Mobility Management ! Enterproid – http://www.enterproid.com !   Touchdown for Android - http://www.nitrodesk.com/ !   Symantec Mobile Security !   Good MDM !   Mobile Active Defense (like BlackBerry) !   RIM
  • 22. Conclusion !   The bad guys can get what’s on your phone, even if you encrypt it and use a password !   The casual thief is who you want to protect against !   Don’t keep really sensitive stuff on your mobile device !   Use a tool that allows you to wipe your device if it is stolen (via a web page) !   Apply security policies that make sense: (encryption, PIN, locking, timeout, remote wipe…) !   Leverage good point solutions, even in the enterprise
  • 23. Q&A !   Do your best and don’t lose sleep over it! !   Now you can go back to playing Angry Birds!!