SlideShare a Scribd company logo
1 of 15
Download to read offline
Securing BYOD
Giri Sreenivas
VP and GM, Mobile
Dirk Sigurdson
Director of Engineering
2
Giri Sreenivas
VP and GM, Mobile
Rapid7
Presenters
Dirk Sigurdson
Director of Engineering
Rapid7
Big, pervasive trend
• 80+% of companies experience it today
Fewer than half of all companies have begun to manage it
• Do nothing, ActiveSync or MDM
What can you be doing to secure BYOD?
BYOD Is Here To Stay
3
IT - Enforcer
Roles of IT and Security for BYOD
4
Security – Advisor
Rest of IT Resources
Written, legally vetted acceptable use
policies
Dedicated operations staff
Controls, tools
Risk assessment
Remediation / mitigation plans
5
Going With What You Know To Enable BYOD
BYOD + Mobile
Acceptable use policy is under revision for
end user acceptance
Yet another “system” for existing staff
MDM, MAM, EMM, MCM, …
?
?
Lost/Stolen Devices and Terminated Employees
Jailbroken Devices / Custom ROMs
Malware / Trojans
User Behavior with apps
Promiscuous apps
Phishing
Sniffing / MITM
Top Mobile Threats
6
Numerous examples where policies and controls fail to protect data
• DroidDream
• PDF exploits
• Web site exploits
• iOS Lockscreen Bypass
Today’s focus: DroidDream and iOS Lockscreen Bypass Attacks
Know your vulnerability risk
“But We Have Policies And Controls?!”
7
Initially showed up in iOS 4.1
• Took approximately 1 month for an OS update to patch the vulnerability
Regressed in iOS 6.1 with one bypass attack
• http://www.youtube.com/watch?v=MP-w436CfvQ
A second bypass attack was discovered shortly after the initial attack
No assurances on policies and controls for lost/stolen devices
iOS Lockscreen Bypass
8
9
Approximately 60 apps and games in the Google Play Market were pirated and
had DroidDream embedded in them in 2011
These pirated/infected copies were downloaded by approx. 250,000 phones
The malware looked to exploit two vulnerabilities to gain root access
Upon gaining root access, the malware package downloaded and installed
another malicious application from a C&C server
From there, information was exfiltrated off devices
DroidDream Malware: Breaking It Down
10
11
Get visibility into all devices and users accessing corporate resources
Assess the vulnerability risk these devices present
• 49% of Android and 18% of iOS devices have at least one high severity vulnerability
Take mitigation and remediation steps to reduce or eliminate risks to
your data
• Only 6% of devices with latest firmware version have a high severity vulnerability
Manage Your Mobile Risks
12
Available for on premise Exchange and starting last week, available for
Office365
Demo to follow
Mobilisafe: Mobile Risk Management
13
Mobilisafe available for on premise Exchange and starting last week,
available for Office365
Take Mobilisafe for a test drive! Try our online demo:
http://information.rapid7.com/mobilisafe-demo.html
Q&A
14
Thanks!
Contact: giri_sreenivas@rapid7.com

More Related Content

More from Rapid7

More from Rapid7 (13)

[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
[INFOGRAPHIC] The Credit Card Criminal's Playbook: A Retail Data Breach Attac...
 
Life's a Breach: Yahoo Gets Burned by SQL Injection
Life's a Breach: Yahoo Gets Burned by SQL InjectionLife's a Breach: Yahoo Gets Burned by SQL Injection
Life's a Breach: Yahoo Gets Burned by SQL Injection
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
 
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
Rapid7 Report: Security Flaws in Universal Plug and Play: Unplug, Don't Play.
 
Rapid7 CAG Compliance Guide
Rapid7 CAG Compliance GuideRapid7 CAG Compliance Guide
Rapid7 CAG Compliance Guide
 
Rapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance GuideRapid7 FISMA Compliance Guide
Rapid7 FISMA Compliance Guide
 
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher Education
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
The Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization SecurityThe Dynamic Nature of Virtualization Security
The Dynamic Nature of Virtualization Security
 
What is Penetration Testing?
What is Penetration Testing?What is Penetration Testing?
What is Penetration Testing?
 
Combating Phishing Attacks
Combating Phishing AttacksCombating Phishing Attacks
Combating Phishing Attacks
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

Securing BYOD in Three Easy Steps

  • 1. Securing BYOD Giri Sreenivas VP and GM, Mobile Dirk Sigurdson Director of Engineering
  • 2. 2 Giri Sreenivas VP and GM, Mobile Rapid7 Presenters Dirk Sigurdson Director of Engineering Rapid7
  • 3. Big, pervasive trend • 80+% of companies experience it today Fewer than half of all companies have begun to manage it • Do nothing, ActiveSync or MDM What can you be doing to secure BYOD? BYOD Is Here To Stay 3
  • 4. IT - Enforcer Roles of IT and Security for BYOD 4 Security – Advisor
  • 5. Rest of IT Resources Written, legally vetted acceptable use policies Dedicated operations staff Controls, tools Risk assessment Remediation / mitigation plans 5 Going With What You Know To Enable BYOD BYOD + Mobile Acceptable use policy is under revision for end user acceptance Yet another “system” for existing staff MDM, MAM, EMM, MCM, … ? ?
  • 6. Lost/Stolen Devices and Terminated Employees Jailbroken Devices / Custom ROMs Malware / Trojans User Behavior with apps Promiscuous apps Phishing Sniffing / MITM Top Mobile Threats 6
  • 7. Numerous examples where policies and controls fail to protect data • DroidDream • PDF exploits • Web site exploits • iOS Lockscreen Bypass Today’s focus: DroidDream and iOS Lockscreen Bypass Attacks Know your vulnerability risk “But We Have Policies And Controls?!” 7
  • 8. Initially showed up in iOS 4.1 • Took approximately 1 month for an OS update to patch the vulnerability Regressed in iOS 6.1 with one bypass attack • http://www.youtube.com/watch?v=MP-w436CfvQ A second bypass attack was discovered shortly after the initial attack No assurances on policies and controls for lost/stolen devices iOS Lockscreen Bypass 8
  • 9. 9
  • 10. Approximately 60 apps and games in the Google Play Market were pirated and had DroidDream embedded in them in 2011 These pirated/infected copies were downloaded by approx. 250,000 phones The malware looked to exploit two vulnerabilities to gain root access Upon gaining root access, the malware package downloaded and installed another malicious application from a C&C server From there, information was exfiltrated off devices DroidDream Malware: Breaking It Down 10
  • 11. 11
  • 12. Get visibility into all devices and users accessing corporate resources Assess the vulnerability risk these devices present • 49% of Android and 18% of iOS devices have at least one high severity vulnerability Take mitigation and remediation steps to reduce or eliminate risks to your data • Only 6% of devices with latest firmware version have a high severity vulnerability Manage Your Mobile Risks 12
  • 13. Available for on premise Exchange and starting last week, available for Office365 Demo to follow Mobilisafe: Mobile Risk Management 13
  • 14. Mobilisafe available for on premise Exchange and starting last week, available for Office365 Take Mobilisafe for a test drive! Try our online demo: http://information.rapid7.com/mobilisafe-demo.html Q&A 14