SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
The enemy in your pocket
 Securing smartphones in the enterprise



 Vicente Diaz, Senior Security Analyst, GReAT
 Gartner Symposium/ITxpo 2012, Barcelona




PAGE 1 |
BYOD will come regardless you have a
                  policy or not

      Human behavior has shifted, BYOD is a
               response to that

           My CEO heard we can save money
                   through BYOD

PAGE 2 |
PAGE 3 |
1. The problem




PAGE 4 |
BYOD reanalyzed

                     Where?
                  What devices?

PAGE 5 |   1 2
What´s the problem?
                 Problem 1: Infection




PAGE 6 |   1 2
Can this happen?




PAGE 7 |   1 2
What are we really afraid of?




PAGE 8 |   1 2
Bad PR is worse than bad IT




PAGE 9 |   1 2
What´s new then?




PAGE 10 |   1 2
Are they vulnerable?
   !   Highlights from 2012:


   !   NFC Vulnerability by Charlie Miller


   !   iPhone 4S and Samsung Galaxy S3 owned




PAGE 11 |   1 2
Do you like chocolates?




PAGE 12 |   1 2
Who else wants to spy on you?




PAGE 13 |   1 2
FinSpy




PAGE 14 |   1 2
Protection
   Sure, I have swipe gesture password




PAGE 15 |   1 2
PAGE 16 |   1 2
BYOD ≠ Data Leak




PAGE 17 |   1 2
2. Perspective




PAGE 18 |   1 2
Perspective




PAGE 19 |   1 2
Perspective




PAGE 20 |   1 2
PAGE 21 |   1 2
Perspective




PAGE 22 |   1 2
Abusing Consumerization - Mobile devices
 Are they dangerous?




                                  It depends on what you do with it!
                                               Facebook
                                                Twitter
                                                Gmail
                                          Corporate e-mail
                                   Reading corporate documents
                                   Writing confidential e-mails?



PAGE 23 |   1 2
Where is the data?




PAGE 24 |   1 2
Demo



PAGE 25 |   1 2
Using the cloud




PAGE 26 |   1 2
Some tools




PAGE 27 |   1 2
3. What now?




PAGE 28 |   1 2
Kim Stevenson




PAGE 29 |   1 2
Reality for most companies is different




PAGE 30 |   1 2
Reality for most companies is different




PAGE 31 |   1 2
Conclusions

  !   BYOD: Myth vs Reality
  !   Policies are necessary, but they are not enough
  !   Is the problem in the device or in educating users?
  !   Who is responsible for the security of the device?
  !   We all love chocolates!




PAGE 32 |   1 2
Thank You

  Questions?


 Vicente Diaz, Senior Security Researcher, Global Research and Analysis Team
 @trompi
 vicente.diaz@kaspersky.com



PAGE 33 |

Más contenido relacionado

Similar a The enemy in your pocket

Sapura sherman
Sapura shermanSapura sherman
Sapura sherman
GRIDMMS
 

Similar a The enemy in your pocket (20)

Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
Phil Cracknell, Head of Security & Privacy Services at Company85 - BYO A good...
 
Insurance and Mobile Media
Insurance and Mobile MediaInsurance and Mobile Media
Insurance and Mobile Media
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
Chris elmitt
Chris elmittChris elmitt
Chris elmitt
 
Harnessing Potential of iPads for Business Content
Harnessing Potential of iPads for Business ContentHarnessing Potential of iPads for Business Content
Harnessing Potential of iPads for Business Content
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
The Role of Product Managers in Securing the Internet of Things by Daniel Eli...
The Role of Product Managers in Securing the Internet of Things by Daniel Eli...The Role of Product Managers in Securing the Internet of Things by Daniel Eli...
The Role of Product Managers in Securing the Internet of Things by Daniel Eli...
 
BYOD Trends, Challenges, Pitfalls and Tips
BYODTrends, Challenges, Pitfalls and TipsBYODTrends, Challenges, Pitfalls and Tips
BYOD Trends, Challenges, Pitfalls and Tips
 
Sapura sherman
Sapura shermanSapura sherman
Sapura sherman
 
Tablet effect on media consumption
Tablet effect on media consumption Tablet effect on media consumption
Tablet effect on media consumption
 
The computing age
The computing ageThe computing age
The computing age
 
doc2app - the case for migration
doc2app - the case for migrationdoc2app - the case for migration
doc2app - the case for migration
 
Social Media Mashup | Conor Lynch | SocialMedia.ie
Social Media Mashup | Conor Lynch | SocialMedia.ieSocial Media Mashup | Conor Lynch | SocialMedia.ie
Social Media Mashup | Conor Lynch | SocialMedia.ie
 
120822 mobile learning (uhi)
120822 mobile learning (uhi)120822 mobile learning (uhi)
120822 mobile learning (uhi)
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
 
Digital Insights for SDG oriented Development organizations - Debrief from We...
Digital Insights for SDG oriented Development organizations - Debrief from We...Digital Insights for SDG oriented Development organizations - Debrief from We...
Digital Insights for SDG oriented Development organizations - Debrief from We...
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance
 
IoT13: Xively showcase
IoT13: Xively showcaseIoT13: Xively showcase
IoT13: Xively showcase
 
Pro global symposium
Pro global symposiumPro global symposium
Pro global symposium
 
Mobile Unified Communications - Mitel
Mobile Unified Communications - MitelMobile Unified Communications - Mitel
Mobile Unified Communications - Mitel
 

The enemy in your pocket