14
CIO Roadmap to Mobile Security A Top Concern for IT and Business Leaders Dimension Data guest blog series highlighting essential policy and programs

Dimension Data Blog Series

Embed Size (px)

Citation preview

Page 1: Dimension Data Blog Series

CIO Roadmap to Mobile Security

A Top Concern for IT and Business Leaders

Dimension Data guest blog series highlighting essential policy and programs

Page 2: Dimension Data Blog Series

#MobileSecurity

Darryl WilsonDirector, Enterprise Mobility for Dimension

Data Americas

Stefaan HinderyckxDirector, Network Integration and Security

for Dimension Data Europe

Dimension Data Authors

Jason HarrisPrincipal Consultant for Security and

Enterprise Mobility for Dimension Data Americas

Rory DuncanSecurity Line of Business Manager for

Dimension Data UK

Page 3: Dimension Data Blog Series

Click this button to tweet the information on the

slide.

Page 4: Dimension Data Blog Series

Dimension Data Series #1: Mobile Security: Actions Speak Louder than Words

If securing company data and successfully

implementing a mobile policy is of such

importance, why aren’t more IT leaders taking

strategic action?

#MobileSecurity

Page 5: Dimension Data Blog Series

• 79% say mobility is a top priority for their organization. However, the report indicates that a much smaller segment of those IT leaders’ actions back it up.

• 77% of those surveyed believe data is the greatest concern pertaining to mobility.

• Yet only 55% have a mobility roadmap in place.

• 67% of all devices, all of which are on mature networks, carry at least one known security vulnerability.

Did You Know:

Source: Dimension Data 2014 Secure Mobility Survey

#MobileSecurity

Page 6: Dimension Data Blog Series

Dimension Data Series #2: Mobility Policy: The Mobile Endpoint is the New Perimeter

Employees use their devices to access our systems on their own. It’s nearly impossible

to stop.

#MobileSecurity

Page 7: Dimension Data Blog Series

Short list of what recommended operational security policies should include:

• Define what constitutes a Bring Your Own Device

• Determine a plan for how known and unknown devices are brought onto the network

• Outline a policy for what happens when a device is lost or stolen

• Decide how organizations and users deal with device disposal

• Institute cloud backup and restoration policies#MobileSecurity

Page 8: Dimension Data Blog Series

Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation

There is a gap between the vision for

secure mobility and the real-world

implementation.

#MobileSecurity

Page 9: Dimension Data Blog Series

1)Determine a Mobility Policy and Data Classification Model

2)Define Access Control

3)Introduce Mobile Device Management

4)Ensure Data Leakage Prevention from a mobile perspective is respected

Four steps to consider when turning a secure mobility vision into reality:

#MobileSecurity

Page 10: Dimension Data Blog Series

Dimension Data Series #4: The Opportunity and Risk of Secure Mobility from the Top Down

Empowering the mobile worker pays

dividends in terms of worker productivity

and efficiency.

#MobileSecurity

Page 11: Dimension Data Blog Series

Real Opportunities:

• Embracing mobility can retain staff between the ages of 18-35, especially as many in this age group bring or are expected to bring at least one device from home to use for work.

• Mobility offers increased productivity by mobilizing business processes. This functionality can extend across the value chain, helping improve customer interaction, enable quicker sales, and more.

#MobileSecurity

Page 12: Dimension Data Blog Series

Top-Down Approach:

• Organization and IT leaders must match business-driven policy from an architecture approach. Business objectives and goals must be translated down into actual technical security control and policies to enable that proper secure mobility.

• Help mitigate the risks IT and business leaders feel and ensure organizations are dedicating enough resources to fully enabling users to leverage existing business applications in ways that substantially increase the opportunities of mobility.

#MobileSecurity

Page 13: Dimension Data Blog Series

Read the Entire Blog Series on Mobile Security• Dimension Data Series #1: Mobile Security: Actions

Speak Louder than Words

• Dimension Data Series #2 – Mobility Policy: The Mobile Endpoint is the New Perimeter

• Dimension Data Series #3: Closing the Gap Between the Secure Mobility Vision and Real-World Implementation

• Dimension Data Series #4- The Opportunities and Risk of Secure Mobility from the Top Down

#MobileSecurity