SlideShare una empresa de Scribd logo
1 de 18
Mobile Security: Is there an opportunity? Omar Khawaja March 30th, 2011
Future of Enterprise IT Infrastructure 2
What is “mobile”?Smarter, faster… 3 …and blurrier
Everything is converging… 4 …to make security more challenging?
The new world… 5 …doesn’t exist without mobile and cloud
What makes mobile riskier? Convergence Mobile misuse can cost Small physical footprint  Increasing processing power Multiple communication channels Increasing bandwidth Ownership Storage Fragmentation Applications Data
How do you secure mobile? Security Technology Elements 7 Security ProgramElements
Multiple Approaches 8 Security Programs Security Technology Sets
Security leaders care most about… 9 Breach Prevention ,[object Object],Compliance ,[object Object],Costs… ,[object Object]
of maintaining compliance
of enabling business in the information ageThe Business Cares About Data!
Treating Data 10
ignoramus et ignorabimus? 11 Source: Verizon DBIR Minimize data and access to it!
What about apps? 33% on NA Smartphone owners download apps Multiple versions Location based apps / social networking will increase Games continue to dominate among apps Users continue to demand greater usability 10 billion app downloads from Apple's App Store in 2010 Signed Apps = Secure Apps? 12 Can’t impede app proliferation, but how do you know which to trust?
What about everything else? Force encryption of data at rest on mobile devices Force secure connectivity on unsecured public networks  Ensure unauthorized mobile devices do not have access to corporate LAN* Ensuring mobile user spending is in line with the mobile policy and additional costs can be recovered Over-the-air decommissioning (remote brick’ing) Authentication: set the device to auto-lock; set clipping level Keep device out of sight when not worn Handheld devices should be enterprise property Before an employee departs, obtain device and remove corporate data Have a clear policy on remote data deletion and do not hesitate to execute it Classify data according to the sensitivity of the data they carry Only permit digitally signed applications Be agile – quickly and flexibly adapt to changing mobile landscape
An approach… Inventory data (technical and consultative) Destroy any unnecessary data Associate data access w/ users, roles Ensure only users that need access to data have access to it (access governance) Assign sensitivity level to data types (tier by quantity) - based on business impact Assign control requirements for each data set Determine feasible controls  for each environment (mobile, cloud, etc.)  Identify how (vendor, etc.) to implement controls across each platform For each platform, define what access level (to each of the data sets) is allowed based on residual risk 14
Slight shift in focus 15
Finally… Follow the data Consistent security controls Start w/ the business (data), not the controls Simplify security program Closely align mobile and cloud security 16 Doing Things Right  Doing the Right Things

Más contenido relacionado

La actualidad más candente

Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Michael Noel
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 

La actualidad más candente (20)

SD-WAN - comSpark 2019
SD-WAN - comSpark 2019SD-WAN - comSpark 2019
SD-WAN - comSpark 2019
 
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...Network Access Control Market Trends, Technological Analysis and Forecast Rep...
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 
Preventing Data Breaches
Preventing Data BreachesPreventing Data Breaches
Preventing Data Breaches
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
 

Similar a Two Peas in a Pod: Cloud Security and Mobile Security

Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
cuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
JAYANT RAJURKAR
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
jpmccormack
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
rtodd599
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
jeffsrosalyn
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
amitkhanna2070
 

Similar a Two Peas in a Pod: Cloud Security and Mobile Security (20)

Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Byod
ByodByod
Byod
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Websense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile securityWebsense: A 3-step plan for mobile security
Websense: A 3-step plan for mobile security
 
Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)Stratégies de croissance via la mobilité (ems)
Stratégies de croissance via la mobilité (ems)
 
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
Sample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docxSample Discussion 1Security is one of the most important fun.docx
Sample Discussion 1Security is one of the most important fun.docx
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 

Último

Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 

Último (20)

Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTSDurg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
Durg CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN durg ESCORTS
 

Two Peas in a Pod: Cloud Security and Mobile Security

  • 1. Mobile Security: Is there an opportunity? Omar Khawaja March 30th, 2011
  • 2. Future of Enterprise IT Infrastructure 2
  • 3. What is “mobile”?Smarter, faster… 3 …and blurrier
  • 4. Everything is converging… 4 …to make security more challenging?
  • 5. The new world… 5 …doesn’t exist without mobile and cloud
  • 6. What makes mobile riskier? Convergence Mobile misuse can cost Small physical footprint Increasing processing power Multiple communication channels Increasing bandwidth Ownership Storage Fragmentation Applications Data
  • 7. How do you secure mobile? Security Technology Elements 7 Security ProgramElements
  • 8. Multiple Approaches 8 Security Programs Security Technology Sets
  • 9.
  • 11. of enabling business in the information ageThe Business Cares About Data!
  • 13. ignoramus et ignorabimus? 11 Source: Verizon DBIR Minimize data and access to it!
  • 14. What about apps? 33% on NA Smartphone owners download apps Multiple versions Location based apps / social networking will increase Games continue to dominate among apps Users continue to demand greater usability 10 billion app downloads from Apple's App Store in 2010 Signed Apps = Secure Apps? 12 Can’t impede app proliferation, but how do you know which to trust?
  • 15. What about everything else? Force encryption of data at rest on mobile devices Force secure connectivity on unsecured public networks Ensure unauthorized mobile devices do not have access to corporate LAN* Ensuring mobile user spending is in line with the mobile policy and additional costs can be recovered Over-the-air decommissioning (remote brick’ing) Authentication: set the device to auto-lock; set clipping level Keep device out of sight when not worn Handheld devices should be enterprise property Before an employee departs, obtain device and remove corporate data Have a clear policy on remote data deletion and do not hesitate to execute it Classify data according to the sensitivity of the data they carry Only permit digitally signed applications Be agile – quickly and flexibly adapt to changing mobile landscape
  • 16. An approach… Inventory data (technical and consultative) Destroy any unnecessary data Associate data access w/ users, roles Ensure only users that need access to data have access to it (access governance) Assign sensitivity level to data types (tier by quantity) - based on business impact Assign control requirements for each data set Determine feasible controls  for each environment (mobile, cloud, etc.) Identify how (vendor, etc.) to implement controls across each platform For each platform, define what access level (to each of the data sets) is allowed based on residual risk 14
  • 17. Slight shift in focus 15
  • 18. Finally… Follow the data Consistent security controls Start w/ the business (data), not the controls Simplify security program Closely align mobile and cloud security 16 Doing Things Right  Doing the Right Things

Notas del editor

  1. Will there be non-mobile end-user devices in 10 years? In 15 Years? Can you have a separate security program for just mobile?
  2. homeshoring
  3. Data anywhere is good, data everywhere is badMobile ↔ Cloud: 2 sides of the same coin: User / Client / Consumerization of IT – Provider / Server / Democratization of IT
  4. Fragmentation (hardware, OSs, applications, operators) Market is currently too fragmented for targeted attacks to be lucrative Security testing requires access to many resources Physical security is almost non-existent Physical access is easierPhysicalwhen cell phones are lost or stolen, people immediately notice that they're gone, and have thendeactivated, reducing the potential risks associated with active cell phones.Limited physical control: physical access is easier (increased theft, loss, breach) Mobile handsets are ultra-portable; therefore, physical security is almost non-existent.CommunicationIncreasing processing power: Treat mobile devices with the same care and caution as full workstations. Multiple communication mechanisms: bluetooth, wi-fi, IR, cellular, USBDual Mode devices (Wi-Fi) Limited bandwidth creates unique obstacles that a developer must cope with by implementing bandwidth consumption reduction techniques such as caching of data;.DDoS is easierCertificate and signing:Symbian Signed Program: digitally sign applications so developers are traceableThe three Symbian Signed test houses are mPhasis, NSTL and SogetiAppDevelopers are still learning best practices Mobile apps function more like native apps or thick clients rather than utilizing a standard browser.Mobile apps are not restricted to using standard HTTP/HTTPS as their communication protocol.DevicesLocal storage: More info is stored locally (caching) since you may not always have connectivity Local data storage techniques vary by manufacturer, so multiple variations of handsets must be considered during testing.Many operating systems (Symbian, J2ME, BREW, iPhone)Multiple OS variants are used throughout the mobile phone industry causing several variations of a single application to be developed for each platform.  Each environment has its own idiosyncrasies that must be dealt with during development.Devices have varying levels of support for various technologies, so implementing secure authentication, secure data storage, secure communications across all devices becomes difficult with a single mechanism. CostSpam costs the user (SMS, data, Voice)Must be flexible:"Unlike the PC market, there will continue to be a lot of churn in the mobile device market. Companies are going to have to deal with consumer devices because they can't do an adequate job of picking corporate standard devices," he says. "If you create a standard device list but don't readdress it for three years, that's six generations of mobile products. Your users are never going to have the best mobile devicesMust be quick:"We're getting five to seven requests a day for the iPhone, but I can't centrally manage, inventory or encrypt it today," he says. "By the time that I can, those doctors will have already replaced it with another latest and greatest. I'm in a loop where I can't respond until a device is a generation old." ConvergenceMarket is too fragmented for targeted attacks to be lucrative: hardware, OSs, applications, operatorsFixed-Mobile (wi-fi - Cellular)Voice + DataPC + PhoneDead Spot -> Hot Spot (Femto Cells)
  5. ISO 27002 Control Areas
  6. "ignoramus et ignorabimus" = "we do not know and will not know”
  7. Energizer Duo Battery ChargerTrojan may have been in the software since it was first offered three years agoSoftware that can be downloaded for use with the Energizer Duo USB battery charger contains a backdoor that could allow an attacker to remotely take control of a Windows-based PC, Energizer and US-CERT is warning.Read more: http://news.cnet.com/8301-27080_3-10465429-245.html#ixzz1I1Wa6YyO
  8. *This is starting to become unacceptable to the businessForcing encryption of data at rest on mobile devices. Forcing secure connectivity on unsecured public networks. Ensuring unauthorized mobile devices do not have access to the corporate network or company data. Ensuring mobile user spending is in line with the mobile policy and additional costs can be recovered.BB is more enterprise friendly:over-the-air provisioning, authentication, data encryption, monitoring and decommissioning. (remote bricking)Set the device to auto-lock. After each usage session, the device should automatically lock and require re-authentication. Auto-lock does not affect the phone function, and allows the phone to be answered promptly without entering the password. Keep the device out of sight when not worn. It is risky to leave handheld data devices unguarded – even in the household. They are often targeted in break-ins because they are very easy to conceal and they usually carry important information. Instead of leaving them in plain sight, keep them in a drawer or somewhere within reach. Handheld devices should be enterprise property. While it may be more convenient from an asset management point-of-view to allow employees to purchase their own handheld data devices, it is problematic in terms of data management. It is much easier to provide the devices for employees, and require them to be returned to the enterprise at the conclusion of employment. Before an employee departs, obtain the device and remove corporate data. This policy should apply to any personal devices. A condition for allowing staff to connect their devices to the enterprise network should state that the enterprise may examine the device and delete corporate data at the enterprise's initiative. Keep an updated list of who owns a handheld data device, and make sure the device is examined before an employee leaves. Ensure that all pertinent information including address books and e-mails are deleted. Have a clear policy on remote data deletion and do not hesitate to execute it. Devices should be classified according to the sensitivity of the data they carry. For devices carrying highly sensitive data, the time to deletion should be almost immediate. For devices containing less sensitive data, more time should be permitted for the recovery attempt before the deletion is executed.\\Must be flexible:"Unlike the PC market, there will continue to be a lot of churn in the mobile device market. Companies are going to have to deal with consumer devices because they can't do an adequate job of picking corporate standard devices," he says. "If you create a standard device list but don't readdress it for three years, that's six generations of mobile products. Your users are never going to have the best mobile devicesMust be quick:"We're getting five to seven requests a day for the iPhone, but I can't centrally manage, inventory or encrypt it today," he says. "By the time that I can, those doctors will have already replaced it with another latest and greatest. I'm in a loop where I can't respond until a device is a generation old."
  9. (encourage vendors to support multiple platforms consistently)storageapplications (internally and externally delivered)in transit (internal, external and partners)
  10. "If the primary aim of a captain were to preserve his ship, he would keep it in port forever." [Thomas Aquinas]
  11. For the latest version, please contact Omar KhawajaActively participate in 30+ standards / certification bodies, professional organizations and vertical specific consortiaVerizon Business manages 260,000-plus security, network and hosting devices across more than 4,200 customer networks in 142 countries and territories.Privacy Rights has tracked only 263 million breached records from Jan ‘05 to July ’09 (http://www.privacyrights.org/ar/ChronDataBreaches.htm#Total)Threat & Vulnerability IntelTrack and analyze new software vulnerabilities and related attacksUnderground Intel Watch discussions, code sharing, planning,... Historically BBS, then Usenet, now more IRC and Cons... ICSA Labs IntelSecurity product testing and security consortia operations. 400+ products Forensics IntelData and Intel from forensics investigations (200+ cases per year). MSS IntelData from IDS, FW, IPS, Applications… Management & Monitoring SOC operations Net IntelData from backbone. Sensors on more than 1 Million VzB addresses. Netflow Honey nets, Honey Pots…Studies & Surveys VZB Studies, surveys (10+/yr), Others published data to drive Risk Models, equations & methodology