SlideShare une entreprise Scribd logo
1  sur  132
WELCOME TO SECURE360 2013
 Don’t forget to pick up your Certificate of
Attendance at the end of each day.
 Please complete the Session Survey front
and back, and leave it on your seat.
 Are you tweeting? #Sec360
WELCOME TO SECURE360 2013
 Come see my talks on Wed!
 The Accidental Insider – Wed. 1:15P
 3 Factors of Fail! – Wed. 2:35P
http://about.me/barrycaplin
securityandcoffee.blogspot.com
Housekeeping
 We’re here all morning! 
 There will be breaks (but make your own if you need one)
 Questions – ask ‘em if you got ‘em
 IT Consumer devices – on of course! (but
vibrate or silent would be polite)
Agenda
Admire the problem
Solve the problem
(kind of)
Please Share
This is not a “solved problem”
(I don’t know what is!)
We all learn from each others’
experiences
Agenda 1
Admire the problem
Framing the Issue
Solve the problem (kind of)
 Etrade baby video
 Baby trying to scroll magazine like ipad video
Why are we here?
1. Have a program
2. Considering a program
3. Just discovered iPads in the office
4. Wanted out of the office for the
morning
What is IT Consumerization?
 More than just devices.
 2 Parts:
 Consumer devices
 Consumer software tools
 Using these in the workplace in addition to,
or instead of, company provided
Why are we talking about this?
But really, all
connected!
History – 1980’s
 Early home PCs
 Could augment work with
home learning/practice
 First Mac
Mac
$2500
Commodore 64
$600
History – 1980’s
 “luggables”
IBM “Portable” 5155
$4225
30 lbs
4.77MHz 8088
History – 1990’s
Home machines
get smaller
Laptops
PDAs
History – 2000’s
Laptops get lighter
PDAs go mainstream
(then disappear!)
Blackberry
iPhone/Android
History – Now
Apr. 3, 2010
300K ipads
1M apps
250K ebooks
… day 1!
Apple ‘12
2011 – tablet/
smartphone
sales exceeded
PCs
The real reason we need tablets
Don't Touch!
Pharmaceutical
coating
• 17% have > 1 in their household
• 37% - their partner uses it
• 14% bought cause their kid has one
• 19% considering purchasing another
http://today.yougov.co.uk/sites/today.yougov.co.uk/files/Tablet_ownersh
ip_in_households.pdf
Of iPad owners...
Business Driver?
What about…
Ineffective
Controls
 Forrester 2011 study – 37% using consumer
tech without permission
 IDC survey
 2010 30% BYOPC / 2011 40%
 2010 69% company device / 2011 59%
 Use of social doubled
 Most important tool – 49% laptop, 9%
tablet, 6% smartphone
Self Sufficient?
 PwC white paper:
“companies that have allowed Macintosh
computers… into their workplaces… find
those users support themselves and each
other. The same is true of iOS and Android
mobile users, users of software as a service
[SaaS] and other cloud services, and social
networking users.”
Empowered Employees
Forrester report, “How
Consumerization Drives Innovation,”
“a business’s best friend”
 Empowerment Drives Innovation
 Empowered employees improve processes
and productivity
Empowered Employees
Self-taught experts know:
 how to use smartphones, tablets, Web
apps like Google Docs and Dropbox
 what they’re good for
 how they can help the business
 willing to do just that
Benefits
Forrester lists four
1. Communications – internal use speeds
communication
2. Social – use of tools to be in touch with
customers and shape message/attitude
3. HR – allow personal devices and you attract
young workers
4. Productivity – much consumer tech is self-
supported
Our Story Begins...
PEDs
Computers
Device Convergence
Example
• The “PED” policy
• Personal Electronic Device
• Acceptable use
• Connections
• Data storage
1 Day
5 Stages of Tablet Grief
• Surprise
• Fear
• Concern
• Understanding
• Evangelism
Considerations
Scaled-down
device v
multi-
purpose
computer
Want v Need
Reduced
attack
surface v
eggs in one
basket
Need for
mobility v
mobile
issues
Does remote
access apply?
What needs to change for “local”
remote access?
BYO
BYO
BYOC or BYOD
Agenda 2
Admire the problem
Framing the Issue
Security Concerns
Solve the problem (kind of)
Security Concerns
Considerations
Physical*
Access control*
Logical
Data*
Communications
Validation (config control)
Haven’t been around that long
Users are the administrators
Data Leakage
Unauthorized Access
“Authorized” Access
Risk v Hype
Legal
IANAL
Privacy – mixing staff/company data
Discovery – on POE
Separation – what going out the door?
Legal
Collection – when staff leave
How do you?:
 Get data from a personal device?
 Keep personal data off company networks?
Phones and texting
Phone?
Exposing personal phone number
Voicemail
Text history and storage
Siri, Google Now, etc.
Consumer Software
We have enough problems with
commercial and internally developed
software!
Privacy policies
Leakage
Discovery
Consumer Software
Ownership
Data Disposition – if they go under
Competitive Intelligence
Trade Secrets
Mixing personal and professional
(twitter)
The Business Side
The Business Side
It is critical that we
Think as
Are seen as
A strategic partner with the business
This doesn’t happen enough
A
 Doctor
 Lawyer
 Salesperson
 Systems Administrator
Walk into a bar…
Use Cases
What do you need?
What do you want?
Security Response
Consider the business request
What works?
What doesn’t?
What compromise can be made?
Agenda 3
Admire the problem
Framing the Issue
Security Concerns
Solve the problem (kind of)
BYOD
What is IT Consumerization?
 More than just devices.
 2 Parts:
 Consumer devices
 Consumer software tools
 Using these in the workplace in addition to,
or instead of, company provided
Three Main Issues
Technology
Policy
Financial
How can we do BYOD?
Capacity
Not necessarily a security issue
With greater use:
Access Points (issue with any
portables)
Upstream bandwidth
3G/4G repeaters
Benefits
Costs
Productivity
Innovation
Speed to Market
Often better home device – more
frequent upgrade
Benefits
Deputized IT rather than Shadow IT
Users help each other
Always-On =? Always-Available
(hourly issues)
This takes time
2 Key Financial Decisions
Provisioning
Purchase
Plan
Usage
Who Pays
More Decisions
Usage
Terms
Software
Wipe (remote detonation)
Lock (aut0-detonation?)
Encryption
Monitoring
Management
2012 Trend Micro study
Pros and cons that emerged from the analysis:
 12%+ productivity
 15%- device replacement costs
 8%- reimbursement for employee data expense
 5%- training/education costs
 3%+ bottom line revenues
 8%+ help desk calls
 7%+ MDM costs
 3%+ corporate liable data costs
 3%+ server costs
 2%+ regulatory compliance expenses
Classic Security Balance
Control
Usability
Security Challenges
Exposure of data
Leakage of data – sold, donated, tossed,
repaired drives
Malware
But don’t we have all this now???
Can’t be both…
Trend Micro survey
91% of employees would not grant
employer control over personal device
80% of enterprises stated they would
have to install management
mechanisms on mobile devices.
Impasse?
Resolution is in approach
Strategic
Cross-organization
Business and IT together
HR, Security, Privacy, Legal, Audit
Impasse?
Define approach
Create clear policy/procedures
IT tools
Self-help documentation
MDM
~60 vendor tools… and more coming
Basic types:
 Pure MDM
 Containerization/MAM
 Hybrid
 VDI (not really MDM but can be used)
MDM
Selection criteria:
 Device diversity
 Policy enforcement
 Security/
compliance
 Containerization
 Inventory
management
 Software
distribution
 Administration
 Reporting; more?
Method 1 - Sync
• Direct, Net Connect or OTA
Issues:
• Need Controls – a/v, app install
control, filtering, encryption, remote
detonation
• Authentication – 2-factor?
• Leakage!
• Support
Method 2 – VDI
• Citrix or similar
Pros:
• Leakage – no remnants; disable screen
scrape, local save, print
• Reduced support needed
• Web filtering covered
Issues:
• Unauthorized access still an issue; User
experience; Support
Method 3 – Containerization
• Encrypted sandbox
• Separate work and home
• Many products
Pros:
• Better user experience
• Central management/policy
• Many products – local/cloud
• Leakage – config separation, encryption
Issues: access ; support; cloud issues
Method 4 – Direct Connection
• Directly connect devices to
network
• Or PC via usb
• Don’t do this! - Included for
completeness
Pros:
• Easy
Issues: no controls; no management;
no enforcement; leakage; remants; etc.
Apps
“non-standard” software a challenge
Updates, patches
Malware detection – can’t enumerate
badness
Business – how to transfer knowledge if
everyone uses different tools?
Case Study
Kraft
 Deployed iPhones 2008 – by 2009 to half
of mobile users
 Wanted to instill innovation
 “opens employees’ minds to what is
possible”
 Internal success led to successful
consumer apps – recipes, cooking videos,
shopping lists, store locator
Cost Example
 Hypothetical
 1000 blackberrys
 Unlimited data + calling = ~$50 -
$70/user/month ($60K/m)
 BES – ~$35K
 Hardware – $20K/3y
 Helpdesk – 1 FTE $50K/y
 Server Ops – 1 FTE $100K/y
 Total = >$900K/y
Cost Example
 Hypothetical
 1000 BYODs
 Stipend = $25/user/month ($25K/m)
 MDM – ~$50K/y
 Hardware – $20K/3y
 Helpdesk – none!
 Server Ops – 1 FTE $100K/y
 Total = ~$450K/y
Other HR benefits
Employee satisfaction
Recruiting young workers
“Hip” factor
Phones and texting
Phone?
Exposing personal phone number
Voicemail
Text history and storage
DHS view - POE
• Policy
• Supervisor
approval
• Citrix only
• No Gov't records
on POE
(unencrypted)
• 3G or wired
• Guest wireless
• FAQs for
users/sups
• Metrics
DHS view – State-owned
• Policy
• Supervisor
approval
• MDM
• 3G or wired
• Apple-only
• Core wireless
• 802.1x
• FAQs for
users/sups
• Metrics
Other Issues
• Notes or manually entered data
• Enterprise email/OWA
• Discovery
• Voicemail/video
The Future
• More tablets/phones/small devices
• More “slim” OS's – chrome, android,
ios, etc
• Cost savings/stipend?
• Cloud
• User Experience –Divide, Good,
Fixmo, VMware Horizon, Citrix XEN
• BES Fusion, Microsoft ???
MDM Capabilities to Consider
• Device encryption
• Transport encryption
• Complex PWs/policy
• VPN support
• Disable camera
• Restrict/block apps
• Anti-malware
 InfoWorld Feb 2013 MDM Deep Dive
• Restrict/block
networks
• Remote lockout
• Remote/selected
wipe
• Policy enforcement
• OTA management
• 2-factor/OTP
Agenda 4
Admire the problem
Framing the Issue
Security Concerns
Solve the problem (kind of)
BYOD
Software
What is IT Consumerization?
 More than just devices.
 2 Parts:
 Consumer devices
 Consumer software tools
 Using these in the workplace in addition to,
or instead of, company provided
Use of Consumer Tools
Skype – key for communications in
some countries
Facebook/Twitter for interacting with
customers
Twelpforce
Twelpforce video
Examples
 Google docs or Dropbox for public info
(make sure the data is public)
 Youtube, Vimeo for training videos (avoid
social engineering blueprints)
 Facebook fan page
 Twitter, LinkedIn, G+ for press releases,
outreach, customer support (just remember
who you are!)
Customer Expectations
Access to you is:
Mobile capable
Available online and on social
Through no wrong door
Twitter and Facebook
The places to be
What are people
saying about your
company?
Great Ideas
 Ford – gave Fiestas to 100 social media
influencers, sent on “missions”, documented
on channels. Rcvd 50K inquires and sold 10K
cars in 6 days.
 Pepsi – used social network outreach for
ideas for new Dew flavors
 Levi Strauss – early use of location-specific
deals.
Social
Is there a strategy?
Or doing it to be hip? (and without a
clue?)
Social
Connecting with customers
Internal collaboration
Internal connections –
communities of interest
Innovation
Doesn’t happen in a vacuum
Phishing
Phishing on Social Networks
Scams seem real when they come from
a “friend”
Malicious links/apps
Spread quickly when posted or “liked”
“Just say no” to apps
Installs app
Grabs info
Posts on your wall
Click-fraud
Expectations
What Should We Do?
Proactive
Policy
Management Support
Support/Helpdesk Implications
Policy
Examine existing – augment
New, but only if needed
(shouldn’t use of social be part of
your AUP? Who needs a social
media policy?)
Software/Apps
“non-standard” software is a challenge
Updates, patches
Malware detection – can’t enumerate
badness
Business – how to transfer knowledge if
everyone uses different tools?
Non-Standard Software - YMMV
Inventory
Watch
changes
X-ref v.
CVE/malware
Watch
rights
Auto-
patch
Handle
exceptions
Cloud
Ask:
Whose data is it?
Where is it going?
3rd party agreements?
Know your data (classification)
PIE – pre-Internet encryption
BYOPlan
Summary
What are people doing?
Establish business need
BYOD, Consumer apps, or both?
Cross-domain planning (security,
IT, legal, audit, privacy, HR,
business)
Document requirements
Summary
Policy, Technical, Financial
aspects
Watch the data
Make easy for users
Education/Awareness
Reap the benefits!
Discussion…
Slides at http://slideshare.net/bcaplin
barry.caplin@state.mn.us
bc@bjb.org, @bcaplin, +barry caplin
http://securityandcoffee.blogspot.com/

Contenu connexe

Tendances

CoITus {TASK.to September 2012}
CoITus {TASK.to September 2012}CoITus {TASK.to September 2012}
CoITus {TASK.to September 2012}Tadd Axon
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymondspencerharry
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)Michael W. Chitwa
 
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...Jason Hong
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper4imprint
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsOsterman Research, Inc.
 
2013 06 ima_mobility&digital_disruption_slideshare
2013 06 ima_mobility&digital_disruption_slideshare2013 06 ima_mobility&digital_disruption_slideshare
2013 06 ima_mobility&digital_disruption_slideshareInvenio Advisors, LLC
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachGraham Acres
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
Technology Concerns In a Mobile/Digital World
Technology Concerns In a Mobile/Digital WorldTechnology Concerns In a Mobile/Digital World
Technology Concerns In a Mobile/Digital WorldInvoke Solutions, Inc
 
Tfi ipad for business_063010
Tfi ipad for business_063010Tfi ipad for business_063010
Tfi ipad for business_063010Don Tomoff
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesHarsh Kishore Mishra
 

Tendances (19)

CoITus {TASK.to September 2012}
CoITus {TASK.to September 2012}CoITus {TASK.to September 2012}
CoITus {TASK.to September 2012}
 
Security that works
Security that worksSecurity that works
Security that works
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymond
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
BYOD
BYODBYOD
BYOD
 
BYOD Blue Paper
BYOD Blue PaperBYOD Blue Paper
BYOD Blue Paper
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
2013 06 ima_mobility&digital_disruption_slideshare
2013 06 ima_mobility&digital_disruption_slideshare2013 06 ima_mobility&digital_disruption_slideshare
2013 06 ima_mobility&digital_disruption_slideshare
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile Approach
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
Technology Concerns In a Mobile/Digital World
Technology Concerns In a Mobile/Digital WorldTechnology Concerns In a Mobile/Digital World
Technology Concerns In a Mobile/Digital World
 
Tfi ipad for business_063010
Tfi ipad for business_063010Tfi ipad for business_063010
Tfi ipad for business_063010
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 

En vedette

CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusBarry Caplin
 
Costume and prop ideas media as
Costume and prop ideas media asCostume and prop ideas media as
Costume and prop ideas media asisobelbay
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental InsiderBarry Caplin
 
Valley United Soccer Club new coach training
Valley United Soccer Club new coach trainingValley United Soccer Club new coach training
Valley United Soccer Club new coach trainingBarry Caplin
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16Barry Caplin
 

En vedette (7)

Silent Sideline Week
Silent Sideline WeekSilent Sideline Week
Silent Sideline Week
 
CISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from VenusCISOs are from Mars, CIOs are from Venus
CISOs are from Mars, CIOs are from Venus
 
Costume and prop ideas media as
Costume and prop ideas media asCostume and prop ideas media as
Costume and prop ideas media as
 
Accidental Insider
Accidental InsiderAccidental Insider
Accidental Insider
 
Valley United Soccer Club new coach training
Valley United Soccer Club new coach trainingValley United Soccer Club new coach training
Valley United Soccer Club new coach training
 
Nor'West Soccer LTPD 101
Nor'West Soccer LTPD 101Nor'West Soccer LTPD 101
Nor'West Soccer LTPD 101
 
Dreaded Embedded sec360 5-17-16
Dreaded Embedded   sec360 5-17-16Dreaded Embedded   sec360 5-17-16
Dreaded Embedded sec360 5-17-16
 

Similaire à Secure360 2013 Conference Welcome and BYOD Security Overview

7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security PitfallsDaniel Rivas
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...Diego Alberto Tamayo
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility managementTim Youm
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Conference_by_EVRY
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing InvestmentsCaston Thomas
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
Consumerization & Predictive Analytics
Consumerization & Predictive AnalyticsConsumerization & Predictive Analytics
Consumerization & Predictive AnalyticsSoftware Park Thailand
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessJoel Cardella
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityBarry Caplin
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsTrefor Smith
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 

Similaire à Secure360 2013 Conference Welcome and BYOD Security Overview (20)

7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
7 Highly Risky Habits of Small to Medium-Sized Nonprofits: IT Security Pitfalls
 
Team black
Team blackTeam black
Team black
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...11 best practices for #mobile device management ( #mdm )  https /www-01.ibm.c...
11 best practices for #mobile device management ( #mdm ) https /www-01.ibm.c...
 
11 best practices for mobility management
11 best practices for mobility management11 best practices for mobility management
11 best practices for mobility management
 
Byod
ByodByod
Byod
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments7.5 steps to overlaying BYoD & IoT on Existing Investments
7.5 steps to overlaying BYoD & IoT on Existing Investments
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
Consumerization & Predictive Analytics
Consumerization & Predictive AnalyticsConsumerization & Predictive Analytics
Consumerization & Predictive Analytics
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
BSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing businessBSIDES DETROIT 2015: Data breaches cost of doing business
BSIDES DETROIT 2015: Data breaches cost of doing business
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
What 2014 holds for Internal Communications
What 2014 holds for Internal CommunicationsWhat 2014 holds for Internal Communications
What 2014 holds for Internal Communications
 
How to Do BYOD Right
How to Do BYOD RightHow to Do BYOD Right
How to Do BYOD Right
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 

Plus de Barry Caplin

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare securityBarry Caplin
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503Barry Caplin
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503Barry Caplin
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Barry Caplin
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - PasswordsBarry Caplin
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?Barry Caplin
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and CyberbullyingBarry Caplin
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13Barry Caplin
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Barry Caplin
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self DefenseBarry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso saysBarry Caplin
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11Barry Caplin
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksBarry Caplin
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsBarry Caplin
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsBarry Caplin
 
How to be a Tech-Smart Parent
How to be a Tech-Smart ParentHow to be a Tech-Smart Parent
How to be a Tech-Smart ParentBarry Caplin
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and ChildrenBarry Caplin
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle ManagementBarry Caplin
 

Plus de Barry Caplin (20)

Healing healthcare security
Healing healthcare securityHealing healthcare security
Healing healthcare security
 
It’s not If but When 20160503
It’s not If but When 20160503It’s not If but When 20160503
It’s not If but When 20160503
 
It’s not if but when 20160503
It’s not if but when 20160503It’s not if but when 20160503
It’s not if but when 20160503
 
Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!Wearing Your Heart On Your Sleeve - Literally!
Wearing Your Heart On Your Sleeve - Literally!
 
Online Self Defense - Passwords
Online Self Defense - PasswordsOnline Self Defense - Passwords
Online Self Defense - Passwords
 
The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?The CISO Guide – How Do You Spell CISO?
The CISO Guide – How Do You Spell CISO?
 
Bullying and Cyberbullying
Bullying and CyberbullyingBullying and Cyberbullying
Bullying and Cyberbullying
 
3 factors of fail sec360 5-15-13
3 factors of fail   sec360 5-15-133 factors of fail   sec360 5-15-13
3 factors of fail sec360 5-15-13
 
Tech smart preschool parent 2 13
Tech smart preschool parent 2 13Tech smart preschool parent 2 13
Tech smart preschool parent 2 13
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Stuff my ciso says
Stuff my ciso saysStuff my ciso says
Stuff my ciso says
 
Toys in the office 11
Toys in the office 11Toys in the office 11
Toys in the office 11
 
Teens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social NetworksTeens 2.0 - Teens and Social Networks
Teens 2.0 - Teens and Social Networks
 
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refsLaws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game For Valley United Soccer Club travel soccer refs
 
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refsLaws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
 
How to be a Tech-Smart Parent
How to be a Tech-Smart ParentHow to be a Tech-Smart Parent
How to be a Tech-Smart Parent
 
Internet Safety for Families and Children
Internet Safety for Families and ChildrenInternet Safety for Families and Children
Internet Safety for Families and Children
 
Security Lifecycle Management
Security Lifecycle ManagementSecurity Lifecycle Management
Security Lifecycle Management
 

Dernier

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Secure360 2013 Conference Welcome and BYOD Security Overview

Notes de l'éditeur

  1. Check out my about.me, with links to twitter feed and Security and Coffee blog.
  2. I used one of these for remote access at my first job!
  3. First IBM thinkpad; Apple PowerBook; Apple Newton; Palm Pilot
  4. Spring Break 2011 in Chicago. There was a line each morning across from our hotel.We saw similar lines 2012 in NYC.
  5. Mall of America – Apple and Msoft stores are situated opposite each other. The Apple store is always packed, Msoft always empty.
  6. This is important because of potential for 2-factor auth adoption
  7. Tablets pulling ahead of phones, but PC’s still rule… for now
  8. The devices are hot and driving the space, but it’s really about the ability to have mobility – to bring the product or service to the consumer/customer.Not just “flavor of the week”.
  9. Just say no is not a viable IT or Security strategy or response.We must partner with the business/user to provide what is needed.Just say no is an…
  10. If your organization is saying “just say no” to consumer devices and apps, then they are already in your environmentTake opportunity to partner, lead and add value.
  11. There is even a BYOD strategy out of the White House for federal agencies
  12. Another example of risk v hype in the system/server world. This is from the 2012 Verizon DBIR and shows that most attacks are simple and can be avoided using basic methods
  13. Lumension 2013 BYOD and Mobile Security report
  14. Split into 4 groups, 1 group for each of Dr., lawyer, salesperson, sys admin. Be that business consumer and consider the use cases. Describe your business need/want. Create requirements + wish list. Describe your desired user experience. Choose a spokesperson. Share.
  15. Now we will trade among groups. Given the use cases… now you are the CISO… respond to meet the business case AND protect the organization!
  16. Datalossdb.org and Accidental Insider. 10% of 2nd-hand drives bought had company/private data. StarTrib malware.