SlideShare une entreprise Scribd logo
1  sur  52
Télécharger pour lire hors ligne
Security and Risk in a Mobile World
Who am I? 
@bmkatz 
Day job - Director at Sanofi, Head of End-User 
Experience and Innovation 
Just a nutter with a blog – http://ascrewsloose.com 
Host: @themobilecast podcast
3 
BYOD is an ownership 
issue. Nothing more, 
nothing less.
4 
BYOD is dead! 
It's all just mobile!
Enterprise Security vs Employee Flexibility 
5
6 
What it really looks like
7
8
9
10
11
12
13
What do all these have in Common? 
14
It’s 10am, Do you know where your data is? 
15
16
17
18
19 
How do we get 
started?
Let go of Legacy 
Thinking
21 
Security has to learn to 
partner with the business 
and the users
22 
#FUN Principle 
Focus on the User 
Needs!
23
24
25
26
27
Who Crafts the Policy? 
• Security 
• Legal 
• IT 
• Business 
•Users
New Approach to 
End User Computing 
29
30
31
32 
Data 
Apps 
Device 
Network 
IAM
33
34 
“Life…finds a way.” 
“Users…find a way.”
Educate yourselves 
35
36
Offer Better alternatives 
37
38 
Educate Everyone
39 
Everyone is responsible for 
security…
40
41 
Mobile phone users are at least 3x more 
likely to become victims of phishing 
attacks than desktop users
There are more than 500 3rd party 
app stores containing malicious apps 
42
43 
Dos and Don’ts
44 
M.D.M.
45
Best Practices 
• When setting up Data wipe policies, lock phone 
first, then wipe (reporting skyrockets) 
• Invest in IAM and mobile SSO 
• Use your tools to figure out what your users are 
using… 
• Involve your users 
…….
Best Practices 
• Shrink the Perimeter 
• Avoid VPN 
• Allow app ratings 
• Embrace Shadow Innovation
BYOD 
• It’s an ownership issue 
• Still needs to be addressed in policy 
• Who owns the data (international?) 
• e-discovery 
• People leave… 
…….
49 
The goal of any technology 
program is to enable your 
users to get work done to 
achieve business goals
50 
Enablement
51 
Enablement
Security and risk in a mobile world

Contenu connexe

Tendances

IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
Potato
 

Tendances (20)

Empowering The Nation Through IoT
Empowering The Nation Through IoTEmpowering The Nation Through IoT
Empowering The Nation Through IoT
 
BYOD
BYODBYOD
BYOD
 
IOT Security - ICCT College of Engineering
IOT Security - ICCT College of EngineeringIOT Security - ICCT College of Engineering
IOT Security - ICCT College of Engineering
 
IOT presentation
IOT presentationIOT presentation
IOT presentation
 
Any Time, Anywhere, Any Device (ISASA)
Any Time, Anywhere, Any Device  (ISASA)Any Time, Anywhere, Any Device  (ISASA)
Any Time, Anywhere, Any Device (ISASA)
 
Vulnerabilities in Mobile Devices
Vulnerabilities in Mobile DevicesVulnerabilities in Mobile Devices
Vulnerabilities in Mobile Devices
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot security
 
Security and Privacy Challenges for IoT
Security and Privacy Challenges for IoTSecurity and Privacy Challenges for IoT
Security and Privacy Challenges for IoT
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
The Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT SecurityThe Shift from Social Network Security to the Social IOT Security
The Shift from Social Network Security to the Social IOT Security
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
Intro to mobile technology
Intro to mobile technologyIntro to mobile technology
Intro to mobile technology
 
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
Sensorflare at Open Coffee Athens LXX - IoT (Feb 27, 2015)
 
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of ThingsHow We Will Fail in Privacy and Ethics for the Emerging Internet of Things
How We Will Fail in Privacy and Ethics for the Emerging Internet of Things
 
A brief history of how internet of things become a thing - onmywaytoiot
A brief history of how internet of things become a thing - onmywaytoiotA brief history of how internet of things become a thing - onmywaytoiot
A brief history of how internet of things become a thing - onmywaytoiot
 
The ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyersThe ethics of cloud and mobile computing for lawyers
The ethics of cloud and mobile computing for lawyers
 
Internet safty
Internet saftyInternet safty
Internet safty
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 

Similaire à Security and risk in a mobile world

Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 
Security that works
Security that worksSecurity that works
Security that works
James1280
 

Similaire à Security and risk in a mobile world (20)

BYOD: ieder zijn eigen mobiel kantoor
BYOD: ieder zijn eigen mobiel kantoorBYOD: ieder zijn eigen mobiel kantoor
BYOD: ieder zijn eigen mobiel kantoor
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
Towards a Responsible Internet of Things
Towards a Responsible Internet of ThingsTowards a Responsible Internet of Things
Towards a Responsible Internet of Things
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Security that works
Security that worksSecurity that works
Security that works
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Mobile Workplace Risks
Mobile Workplace RisksMobile Workplace Risks
Mobile Workplace Risks
 
Team black
Team blackTeam black
Team black
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...TrustUX: balancing personalisation and privacy to create understanding and tr...
TrustUX: balancing personalisation and privacy to create understanding and tr...
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Internet
InternetInternet
Internet
 
Ten Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things SecurityTen Expert Tips on Internet of Things Security
Ten Expert Tips on Internet of Things Security
 

Security and risk in a mobile world