SlideShare a Scribd company logo
1 of 24
Bring Your Own Device And Whatever Security Controls
You Want
Steven Keil
Aaron & Hur, Inc.
skeil@aaronhur.com
March 19, 2016
© 2016 Aaron & Hur, Inc.
Introduction
 Started in Information Technology in 1982 with
Big Blue
 Network and Security Consulting since 1994
 Certifications include: CISSP, CEH, CCNA.
Retired certifications include MCSE (and Master
CNE if anyone cares. Life was so simple with
Netware 3.12)
 Currently employed as a Security & Data Privacy
Lead for a government agency right around the
corner
 Happily married father of three children and four
grandchildren (soon to be five!)
We all know this is true…..
(No offense to Chuck Norris fans!)
Project History
 We knew we had a problem.
 This became my project for my Masters
Degree in Information Security from
Western Governors University.
 See next slide 
 Now working on implementing.
Graduated in February
at Disney World
Project Overview
 BYOD was instituted to save the cost of
supplying the contractors with laptops
 Basic security controls were inconsistent and
varied widely depending on the vendor, user,
and the device
 The result was BYODAWSCYW
 My project was to define minimum controls,
policies, and procedures to apply to devices
not controlled by the organization
Some of the risks
 If a device was not patched in a timely manner,
malware or a virus could attack a device on the
internal LAN
Risks continued
 A lost or stolen device could have the
organization’s data on it and not be encrypted
Risks continued
 A device could spread malware through the
internal network or grant access to the
organization data without the users knowledge
How To Reduce Risk?
 By providing
1. A list of minimum security controls
2. A “Bring Your Own Device” policy draft
incorporating these controls for adoption
3. Written procedures to maintain the policy and
controls for:
○ Android smartphones and tablets
○ Apple Personal Computers, smartphones and
tablets
○ Windows Personal Computers, smartphones and
tablets
Areas Researched
 NIST Series for Computer Security (800-
124 R1)
 SANS Critical Controls
 CIS Benchmarks
 Interview with staff vendors to determine
current controls implemented
Areas Researched cont.
 Appropriate Federal regulations
 IRS
 HIPAA (Health Insurance Portability and
Accountability Act of 1996)
 Current Organizations policies
 Internet, E-mail, and other IT Resources
 Encryption
 IT Security Awareness and Training
 Mobile Computing
 And others
Solution
 One of our success factors was to
recognize that the organization’s security
team does not supply or have direct control
over the computers (primarily laptops) and
other devices.
 We made the controls “standards based.”
This means that as long as a security
control is implemented in a reasonable
fashion or an approved countermeasure is
implemented, it may be deemed
acceptable.
Solution continued
 For example different devices have different
encryption methods. As long as encryption is
enabled this control is met.
 Apple iPhones and iPads Data Protection
 Android tablets and phone dm-cryp
 Windows computers Bitlocker
 Apple computers FileVault
 Only grant access to internal LAN after
verification of fifteen controls
The Security Control List
1) Personal Devices (Laptop/Tablet/Smartphone) shall be
registered by providing the following information to
designated staff when joining the project:
a. Serial Number
b. MAC addresses for Wi-Fi and Ethernet (if
applicable)
c. IMEI for cellular connections (if applicable)
2) A Supported Operating System shall be installed and
running on the device. (Laptop/Tablet/Smartphone)
3) Current operating system patches shall be installed
within 30 days of latest release unless an exception is
granted. (Laptop/Tablet/Smartphone)
4) Application updates shall be installed within 30 days of
latest release unless an exception is granted. (Examples:
Java, Office, etc.) (Laptop/Tablet/ Smartphone)
5) Antivirus and antimalware shall be installed and
configured with current signatures and configured
to scan for malicious software not less than weekly
(Laptop)
6) Storage must be encrypted per the Encryption
Policy IT-14. External storage shall also be
encrypted (Examples include SD cards, “Thumb”
Drives etc.) (Laptop/Tablet/Smartphone)
7) A local firewall shall be enabled (Laptop)
8) A strong password or Personal Identification
Number (PIN) consisting of a minimum of 8
characters shall be used on the device. Refer to
policy for additional guidance.
(Laptop/Tablet/Smartphone)
9) A timer shall be configured to lock the
screen after 15 minutes or less of inactivity
(Laptop/Tablet/Smartphone)
10) Jailbreaking or use of rooted devices
shall not be permitted (Tablet/Smartphone)
11) A device wipe will be initiated after 10
consecutive attempts to access the device
or alternately a remote wipe shall be
enabled (Tablet/Smartphone)
12) “Find my Phone” or device locating
similar service enabled (Tablet/
Smartphone)
13) Backups must be encrypted (Examples:
iPhone/iPad on iTunes, laptop on an external
hard drive, or an employer provided remote
backup, Android on local PC, etc.)
(Laptop/Tablet/Smartphone)
14) No device sharing shall be permitted.
(Examples: Apps accessing email on
smartphones and tablets do not require
authentication. Data stored on a laptop hard
drive could be accessed by non staff
personnel.) (Laptop/Tablet/Smartphone)
15) Access to Federal Tax information from
mobile devices is prohibited. (Tablet/
Smartphone)
Status to date:
 Received approval from Leadership
for draft controls list
 Policy drafts are in review
 Proof of Concept completed.
 Using the POC to validate the job
aids, checklists, and overall process
How Potential Obstacles Were
Overcome
 Involving leadership, POC Volunteers, and
staff with assessing the job aids, controls
list, and policy draft to get early feedback
 Making the job aids available to all staff for
guidance and to make their devices safer
 Checklists for use in the review process for
rapid assessment
 “Preapproval” process where controls were
already met by a reputable vendor.
 Trust but verify approach
What I Learned
 Use of existing regulations was key
 The majority of the controls list was derived from
portions of eight organizational policies and three
federal regulations (including HIPAA)
 Now all in one place for staff to understand and
to meet audit requirements
 Most staff want to comply
 The staff want to operate safely and see the
benefit to protecting their own data and devices
 Lacking understanding of what their device
settings can provide
 Security Team can lead and educate
instead of always being the “hammer” and
demanding compliance
What was learned
continued
 This is a project that is in the process of
being implemented.
 It has been an excellent opportunity to work with
non security staff and leadership.
 It will take time to get approval from the
organization for the policy and to finish the
implementation
○ Patience, flexibility, and willingness to compromise
are important to getting consensus to move
forward
 Overall Systems security will be enhanced
when this is fully implemented by securing
the endpoints
Summary
 The business side wants to adopt BYOD
to save cost and increase productivity
 Security must be able to provide
alternatives to reduce risk to the
organization when this is implemented
References
 Johnson, D (2012). BYOD - a short list
of resources. C. Norris meme.
Retrieved from: http://doug-
johnson.squarespace.com/blue-skunk-
blog/2012/11/7/byod-a-short-list-of-
resources.html
 http://pcvirusesremoval.blogspot.com/2014/
02/trojan-horse-generic32cbws-virus.html
 http://www.imdb.com/title/tt0400903/
 http://debaffle.net/tech-primer-online-
services-and-encryption-part-1/

More Related Content

What's hot

Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the Warcentralohioissa
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Resilient Systems
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Lancope, Inc.
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaborationcentralohioissa
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowRoger Hagedorn
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNorth Texas Chapter of the ISSA
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNorth Texas Chapter of the ISSA
 
Security initiatives here and down under
Security initiatives here and down underSecurity initiatives here and down under
Security initiatives here and down underRoger Hagedorn
 
Deral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail LaterDeral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail Latercentralohioissa
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasTripwire
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?centralohioissa
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec WaySymantec
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber DefenseEnergySec
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyEnergySec
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec
 

What's hot (20)

Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Security initiatives here and down under
Security initiatives here and down underSecurity initiatives here and down under
Security initiatives here and down under
 
Deral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail LaterDeral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail Later
 
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and IdeasBlack Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
Black Hat USA 2015: A Visual Snapshot of Security Threats, Trends and Ideas
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
 
Source Code Security the Symantec Way
Source Code Security the Symantec WaySource Code Security the Symantec Way
Source Code Security the Symantec Way
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
 
Jack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, AnecdotallyJack Whitsitt - Yours, Anecdotally
Jack Whitsitt - Yours, Anecdotally
 
Symantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to MaturitySymantec Data Loss Prevention- From Adoption to Maturity
Symantec Data Loss Prevention- From Adoption to Maturity
 

Viewers also liked

Trabajo práctico modelo 1 a 1 (2)
Trabajo práctico modelo 1 a 1 (2)Trabajo práctico modelo 1 a 1 (2)
Trabajo práctico modelo 1 a 1 (2)Marcela Farias
 
Economía y politicas alimentarias
Economía y politicas alimentariasEconomía y politicas alimentarias
Economía y politicas alimentariasLuceroCavazos97
 
Papel de parede
Papel de paredePapel de parede
Papel de paredebichodos0l
 
Pecas mapa
Pecas mapaPecas mapa
Pecas mapaxebax231
 
2. Macro Economics..demand & supply
2.  Macro Economics..demand & supply2.  Macro Economics..demand & supply
2. Macro Economics..demand & supplyVIKAS SHARMA
 
Redes sociales profesionales
Redes sociales profesionalesRedes sociales profesionales
Redes sociales profesionalesflakita-8910
 
Rica Belna _ Art for interior design: Colortrail - Part A
Rica Belna _ Art for interior design: Colortrail - Part ARica Belna _ Art for interior design: Colortrail - Part A
Rica Belna _ Art for interior design: Colortrail - Part ARica Belna
 
Slobodanka Cvetković, Etički kodeks arhivista - poznavanje, problemi, primena
Slobodanka Cvetković, Etički kodeks arhivista - poznavanje, problemi, primenaSlobodanka Cvetković, Etički kodeks arhivista - poznavanje, problemi, primena
Slobodanka Cvetković, Etički kodeks arhivista - poznavanje, problemi, primenaArhivistika
 
Vacamarela Teacher Belén
Vacamarela Teacher BelénVacamarela Teacher Belén
Vacamarela Teacher Belénmelarodriguez
 

Viewers also liked (19)

BYOD Parent Presentation
BYOD Parent PresentationBYOD Parent Presentation
BYOD Parent Presentation
 
Trabajo práctico modelo 1 a 1 (2)
Trabajo práctico modelo 1 a 1 (2)Trabajo práctico modelo 1 a 1 (2)
Trabajo práctico modelo 1 a 1 (2)
 
Economía y politicas alimentarias
Economía y politicas alimentariasEconomía y politicas alimentarias
Economía y politicas alimentarias
 
shadabresume
shadabresumeshadabresume
shadabresume
 
Papel de parede
Papel de paredePapel de parede
Papel de parede
 
Pecas mapa
Pecas mapaPecas mapa
Pecas mapa
 
2. Macro Economics..demand & supply
2.  Macro Economics..demand & supply2.  Macro Economics..demand & supply
2. Macro Economics..demand & supply
 
Redes sociales profesionales
Redes sociales profesionalesRedes sociales profesionales
Redes sociales profesionales
 
Pradeep
PradeepPradeep
Pradeep
 
Rica Belna _ Art for interior design: Colortrail - Part A
Rica Belna _ Art for interior design: Colortrail - Part ARica Belna _ Art for interior design: Colortrail - Part A
Rica Belna _ Art for interior design: Colortrail - Part A
 
daiyan resume
daiyan resumedaiyan resume
daiyan resume
 
Tarea diodos
Tarea diodosTarea diodos
Tarea diodos
 
Se7en timeline
Se7en timelineSe7en timeline
Se7en timeline
 
Espacios privados
Espacios privadosEspacios privados
Espacios privados
 
Slobodanka Cvetković, Etički kodeks arhivista - poznavanje, problemi, primena
Slobodanka Cvetković, Etički kodeks arhivista - poznavanje, problemi, primenaSlobodanka Cvetković, Etički kodeks arhivista - poznavanje, problemi, primena
Slobodanka Cvetković, Etički kodeks arhivista - poznavanje, problemi, primena
 
Seguridad para Vehículos Industriales
Seguridad para Vehículos IndustrialesSeguridad para Vehículos Industriales
Seguridad para Vehículos Industriales
 
Estructuras urbanas antiguas
Estructuras urbanas antiguasEstructuras urbanas antiguas
Estructuras urbanas antiguas
 
Vacamarela Teacher Belén
Vacamarela Teacher BelénVacamarela Teacher Belén
Vacamarela Teacher Belén
 
Flujo de información
Flujo de informaciónFlujo de información
Flujo de información
 

Similar to Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Controls You Want) One approach to reduce risk

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security madunix
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESIJNSA Journal
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesIJNSA Journal
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devicessunnay
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfEnov8
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standardsautomatskicorporation
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdfSurendhar57
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)stevemeltzer
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with securityStephen Cobb
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 

Similar to Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Controls You Want) One approach to reduce risk (20)

PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
Automatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security StandardsAutomatski - The Internet of Things - Security Standards
Automatski - The Internet of Things - Security Standards
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)The New Massachusetts Privacy Rules (February 2, 2010)
The New Massachusetts Privacy Rules (February 2, 2010)
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
08 pdf show-239
08   pdf show-23908   pdf show-239
08 pdf show-239
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 

More from centralohioissa

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systemscentralohioissa
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospitalcentralohioissa
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...centralohioissa
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chaincentralohioissa
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metricscentralohioissa
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...centralohioissa
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligencecentralohioissa
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Casescentralohioissa
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50centralohioissa
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictionscentralohioissa
 
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...centralohioissa
 
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No ShoesCarolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoescentralohioissa
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprisecentralohioissa
 
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...centralohioissa
 
Jon Gorenflo - Burp Collaborator
Jon Gorenflo - Burp CollaboratorJon Gorenflo - Burp Collaborator
Jon Gorenflo - Burp Collaboratorcentralohioissa
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...centralohioissa
 

More from centralohioissa (20)

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
 
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No ShoesCarolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
 
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
 
Jon Gorenflo - Burp Collaborator
Jon Gorenflo - Burp CollaboratorJon Gorenflo - Burp Collaborator
Jon Gorenflo - Burp Collaborator
 
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
Ken Czekaj & Robert Wright - Leveraging APM NPM Solutions to Compliment Cyber...
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dashnarutouzumaki53779
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Visualising and forecasting stocks using Dash
Visualising and forecasting stocks using DashVisualising and forecasting stocks using Dash
Visualising and forecasting stocks using Dash
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 

Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Controls You Want) One approach to reduce risk

  • 1. Bring Your Own Device And Whatever Security Controls You Want Steven Keil Aaron & Hur, Inc. skeil@aaronhur.com March 19, 2016 © 2016 Aaron & Hur, Inc.
  • 2. Introduction  Started in Information Technology in 1982 with Big Blue  Network and Security Consulting since 1994  Certifications include: CISSP, CEH, CCNA. Retired certifications include MCSE (and Master CNE if anyone cares. Life was so simple with Netware 3.12)  Currently employed as a Security & Data Privacy Lead for a government agency right around the corner  Happily married father of three children and four grandchildren (soon to be five!)
  • 3. We all know this is true….. (No offense to Chuck Norris fans!)
  • 4. Project History  We knew we had a problem.  This became my project for my Masters Degree in Information Security from Western Governors University.  See next slide   Now working on implementing.
  • 6. Project Overview  BYOD was instituted to save the cost of supplying the contractors with laptops  Basic security controls were inconsistent and varied widely depending on the vendor, user, and the device  The result was BYODAWSCYW  My project was to define minimum controls, policies, and procedures to apply to devices not controlled by the organization
  • 7. Some of the risks  If a device was not patched in a timely manner, malware or a virus could attack a device on the internal LAN
  • 8. Risks continued  A lost or stolen device could have the organization’s data on it and not be encrypted
  • 9. Risks continued  A device could spread malware through the internal network or grant access to the organization data without the users knowledge
  • 10. How To Reduce Risk?  By providing 1. A list of minimum security controls 2. A “Bring Your Own Device” policy draft incorporating these controls for adoption 3. Written procedures to maintain the policy and controls for: ○ Android smartphones and tablets ○ Apple Personal Computers, smartphones and tablets ○ Windows Personal Computers, smartphones and tablets
  • 11. Areas Researched  NIST Series for Computer Security (800- 124 R1)  SANS Critical Controls  CIS Benchmarks  Interview with staff vendors to determine current controls implemented
  • 12. Areas Researched cont.  Appropriate Federal regulations  IRS  HIPAA (Health Insurance Portability and Accountability Act of 1996)  Current Organizations policies  Internet, E-mail, and other IT Resources  Encryption  IT Security Awareness and Training  Mobile Computing  And others
  • 13. Solution  One of our success factors was to recognize that the organization’s security team does not supply or have direct control over the computers (primarily laptops) and other devices.  We made the controls “standards based.” This means that as long as a security control is implemented in a reasonable fashion or an approved countermeasure is implemented, it may be deemed acceptable.
  • 14. Solution continued  For example different devices have different encryption methods. As long as encryption is enabled this control is met.  Apple iPhones and iPads Data Protection  Android tablets and phone dm-cryp  Windows computers Bitlocker  Apple computers FileVault  Only grant access to internal LAN after verification of fifteen controls
  • 15. The Security Control List 1) Personal Devices (Laptop/Tablet/Smartphone) shall be registered by providing the following information to designated staff when joining the project: a. Serial Number b. MAC addresses for Wi-Fi and Ethernet (if applicable) c. IMEI for cellular connections (if applicable) 2) A Supported Operating System shall be installed and running on the device. (Laptop/Tablet/Smartphone) 3) Current operating system patches shall be installed within 30 days of latest release unless an exception is granted. (Laptop/Tablet/Smartphone) 4) Application updates shall be installed within 30 days of latest release unless an exception is granted. (Examples: Java, Office, etc.) (Laptop/Tablet/ Smartphone)
  • 16. 5) Antivirus and antimalware shall be installed and configured with current signatures and configured to scan for malicious software not less than weekly (Laptop) 6) Storage must be encrypted per the Encryption Policy IT-14. External storage shall also be encrypted (Examples include SD cards, “Thumb” Drives etc.) (Laptop/Tablet/Smartphone) 7) A local firewall shall be enabled (Laptop) 8) A strong password or Personal Identification Number (PIN) consisting of a minimum of 8 characters shall be used on the device. Refer to policy for additional guidance. (Laptop/Tablet/Smartphone)
  • 17. 9) A timer shall be configured to lock the screen after 15 minutes or less of inactivity (Laptop/Tablet/Smartphone) 10) Jailbreaking or use of rooted devices shall not be permitted (Tablet/Smartphone) 11) A device wipe will be initiated after 10 consecutive attempts to access the device or alternately a remote wipe shall be enabled (Tablet/Smartphone) 12) “Find my Phone” or device locating similar service enabled (Tablet/ Smartphone)
  • 18. 13) Backups must be encrypted (Examples: iPhone/iPad on iTunes, laptop on an external hard drive, or an employer provided remote backup, Android on local PC, etc.) (Laptop/Tablet/Smartphone) 14) No device sharing shall be permitted. (Examples: Apps accessing email on smartphones and tablets do not require authentication. Data stored on a laptop hard drive could be accessed by non staff personnel.) (Laptop/Tablet/Smartphone) 15) Access to Federal Tax information from mobile devices is prohibited. (Tablet/ Smartphone)
  • 19. Status to date:  Received approval from Leadership for draft controls list  Policy drafts are in review  Proof of Concept completed.  Using the POC to validate the job aids, checklists, and overall process
  • 20. How Potential Obstacles Were Overcome  Involving leadership, POC Volunteers, and staff with assessing the job aids, controls list, and policy draft to get early feedback  Making the job aids available to all staff for guidance and to make their devices safer  Checklists for use in the review process for rapid assessment  “Preapproval” process where controls were already met by a reputable vendor.  Trust but verify approach
  • 21. What I Learned  Use of existing regulations was key  The majority of the controls list was derived from portions of eight organizational policies and three federal regulations (including HIPAA)  Now all in one place for staff to understand and to meet audit requirements  Most staff want to comply  The staff want to operate safely and see the benefit to protecting their own data and devices  Lacking understanding of what their device settings can provide  Security Team can lead and educate instead of always being the “hammer” and demanding compliance
  • 22. What was learned continued  This is a project that is in the process of being implemented.  It has been an excellent opportunity to work with non security staff and leadership.  It will take time to get approval from the organization for the policy and to finish the implementation ○ Patience, flexibility, and willingness to compromise are important to getting consensus to move forward  Overall Systems security will be enhanced when this is fully implemented by securing the endpoints
  • 23. Summary  The business side wants to adopt BYOD to save cost and increase productivity  Security must be able to provide alternatives to reduce risk to the organization when this is implemented
  • 24. References  Johnson, D (2012). BYOD - a short list of resources. C. Norris meme. Retrieved from: http://doug- johnson.squarespace.com/blue-skunk- blog/2012/11/7/byod-a-short-list-of- resources.html  http://pcvirusesremoval.blogspot.com/2014/ 02/trojan-horse-generic32cbws-virus.html  http://www.imdb.com/title/tt0400903/  http://debaffle.net/tech-primer-online- services-and-encryption-part-1/

Editor's Notes

  1. © 2016 Aaron & Hur, Inc.
  2. © 2016 Aaron & Hur, Inc.
  3. © 2016 Aaron & Hur, Inc.
  4. © 2016 Aaron & Hur, Inc.
  5. © 2016 Aaron & Hur, Inc.
  6. © 2016 Aaron & Hur, Inc.
  7. © 2016 Aaron & Hur, Inc.
  8. © 2016 Aaron & Hur, Inc.
  9. © 2016 Aaron & Hur, Inc.
  10. © 2016 Aaron & Hur, Inc. http://www.apple.com/ http://www.microsoft.com/en-us/ http://www.cnet.com/android-update/
  11. © 2016 Aaron & Hur, Inc.
  12. © 2016 Aaron & Hur, Inc.
  13. © 2016 Aaron & Hur, Inc.
  14. © 2016 Aaron & Hur, Inc.
  15. © 2016 Aaron & Hur, Inc.
  16. © 2016 Aaron & Hur, Inc.
  17. © 2016 Aaron & Hur, Inc.
  18. © 2016 Aaron & Hur, Inc.
  19. © 2016 Aaron & Hur, Inc.
  20. © 2016 Aaron & Hur, Inc.
  21. Mario from clip art Reference not required © 2016 Aaron & Hur, Inc.
  22. © 2016 Aaron & Hur, Inc.
  23. © 2016 Aaron & Hur, Inc.
  24. © 2016 Aaron & Hur, Inc.