52
Security and Risk in a Mobile World

Security and risk in a mobile world

Embed Size (px)

DESCRIPTION

My presentation for the Managed BYOD and Mobile USA conference that took place in San Francisco. Talks about the the pull between Enterprise Security and Employee flexibility and then how to meet the needs of the employees and the enterprise.

Citation preview

Page 1: Security and risk in a mobile world

Security and Risk in a Mobile World

Page 2: Security and risk in a mobile world

Who am I?@bmkatz

Day job - Director at Sanofi, Head of End-User Experience and Innovation

Just a nutter with a blog – http://ascrewsloose.com

Host: @themobilecast podcast

Page 3: Security and risk in a mobile world

3

BYOD is an ownership issue. Nothing more,

nothing less.

Page 4: Security and risk in a mobile world

4

BYOD is dead! It's all just mobile!

Page 5: Security and risk in a mobile world

5

Enterprise Security vs Employee Flexibility

Page 6: Security and risk in a mobile world

6

What it really looks like

Page 7: Security and risk in a mobile world

7

Page 8: Security and risk in a mobile world

8

Page 9: Security and risk in a mobile world

9

Page 10: Security and risk in a mobile world

10

Page 11: Security and risk in a mobile world

11

Page 12: Security and risk in a mobile world

12

Page 13: Security and risk in a mobile world

13

Page 14: Security and risk in a mobile world

14

What do all these have in Common?

Page 15: Security and risk in a mobile world

15

It’s 10am, Do you know where your data is?

Page 16: Security and risk in a mobile world

16

Page 17: Security and risk in a mobile world

17

Page 18: Security and risk in a mobile world

18

Page 19: Security and risk in a mobile world

19

How do we get started?

Page 20: Security and risk in a mobile world

Let go of Legacy Thinking

Page 21: Security and risk in a mobile world

21

Security has to learn to partner with the business

and the users

Page 22: Security and risk in a mobile world

22

#FUN Principle

Focus on the User Needs!

Page 23: Security and risk in a mobile world

23

Page 24: Security and risk in a mobile world

24

Page 25: Security and risk in a mobile world

25

Page 26: Security and risk in a mobile world

26

Page 27: Security and risk in a mobile world

27

Page 28: Security and risk in a mobile world

Who Crafts the Policy?

• Security

• Legal

• IT

• Business

•Users

Page 29: Security and risk in a mobile world

29

New Approach to End User Computing

Page 30: Security and risk in a mobile world

30

Page 31: Security and risk in a mobile world

31

Page 32: Security and risk in a mobile world

32

Data

Apps

Device

Netw

ork

IAM

Page 33: Security and risk in a mobile world

33

Page 34: Security and risk in a mobile world

34

“Life…finds a way.”

“Users…find a way.”

Page 35: Security and risk in a mobile world

35

Educate yourselves

Page 36: Security and risk in a mobile world

36

Page 37: Security and risk in a mobile world

37

Offer Better alternatives

Page 38: Security and risk in a mobile world

38

Educate Everyone

Page 39: Security and risk in a mobile world

39

Everyone is responsible for security…

Page 40: Security and risk in a mobile world

40

Page 41: Security and risk in a mobile world

41

Mobile phone users are at least 3x more likely to become victims of phishing

attacks than desktop users

Page 42: Security and risk in a mobile world

42

There are more than 500 3rd party app stores containing malicious apps

Page 43: Security and risk in a mobile world

43

Dos and Don’ts

Page 44: Security and risk in a mobile world

44

M.D.M.

Page 45: Security and risk in a mobile world

45

Page 46: Security and risk in a mobile world

Best Practices

• When setting up Data wipe policies, lock phone first, then wipe (reporting skyrockets)

• Invest in IAM and mobile SSO

• Use your tools to figure out what your users are using…

• Involve your users

…….

Page 47: Security and risk in a mobile world

Best Practices

• Shrink the Perimeter

• Avoid VPN

• Allow app ratings

• Embrace Shadow Innovation

Page 48: Security and risk in a mobile world

BYOD

• It’s an ownership issue

• Still needs to be addressed in policy

• Who owns the data (international?)

• e-discovery

• People leave…

…….

Page 49: Security and risk in a mobile world

49

The goal of any technology program is to enable your users to get work done to

achieve business goals

Page 50: Security and risk in a mobile world

50

Enablement

Page 51: Security and risk in a mobile world

51

Enablement

Page 52: Security and risk in a mobile world