• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
iPad-style mobility in the age of Wikileaks
 

iPad-style mobility in the age of Wikileaks

on

  • 765 views

This is the presentation I delivered on securing mobile tablet style devices. An emerging technology area with the assoicated risks.

This is the presentation I delivered on securing mobile tablet style devices. An emerging technology area with the assoicated risks.

Statistics

Views

Total Views
765
Views on SlideShare
765
Embed Views
0

Actions

Likes
1
Downloads
29
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Summary…

iPad-style mobility in the age of Wikileaks iPad-style mobility in the age of Wikileaks Presentation Transcript

  • Trevor Iverach
    Principal Consultant, CA Technologies
    iPad-style mobility in the age of Wikileaks
  • agenda
    address the ‘mobilution’ challenge
    3 layered security approach
    establish a position
  • the ‘mobilution’ challenge?
  • why now?
  • understand the threat
  • contrasting mobile devices
  • Mitigating the risk
  • where to secure the risk?
    device
    data
    10111001100010111111010111
    enterprise
  • Securing the device
    passcodes/passwords
    remote wipe
    hardware based encryption
    policies
    device type, configuration
    restrictions
  • securing the data?
    information protection and control
    non-public information
    personally identifiable information
    intellectual property
    identity aware data loss prevention
  • Demonstration
  • securing the enterprise
    device authenticity is crucial
    device dna
    strong authentication
    two factor authentication
    different needs for different usercommunities
    client virtualisation
    greater control
  • demonstration
  • putting it all together
    securethe enterprise
    • device authenticity
    • user authenticity
    securethe device
    passwords
    • restrictions
    • config
    securethe data
    control points data in use, motion, rest
  • these devices are inevitable
    Summary
    secure the device, data & enterprise
    establish a position
  • moving forward
    Mobilution Offer
  • thank youtwitter.com/thesecureid