• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
The enemy in your pocket
 

The enemy in your pocket

on

  • 237 views

 

Statistics

Views

Total Views
237
Views on SlideShare
237
Embed Views
0

Actions

Likes
0
Downloads
6
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    The enemy in your pocket The enemy in your pocket Presentation Transcript

    • The enemy in your pocket Securing smartphones in the enterprise Vicente Diaz, Senior Security Analyst, GReAT Gartner Symposium/ITxpo 2012, BarcelonaPAGE 1 |
    • BYOD will come regardless you have a policy or not Human behavior has shifted, BYOD is a response to that My CEO heard we can save money through BYODPAGE 2 |
    • PAGE 3 |
    • 1. The problemPAGE 4 |
    • BYOD reanalyzed Where? What devices?PAGE 5 | 1 2
    • What´s the problem? Problem 1: InfectionPAGE 6 | 1 2
    • Can this happen?PAGE 7 | 1 2
    • What are we really afraid of?PAGE 8 | 1 2
    • Bad PR is worse than bad ITPAGE 9 | 1 2
    • What´s new then?PAGE 10 | 1 2
    • Are they vulnerable? !   Highlights from 2012: !   NFC Vulnerability by Charlie Miller !   iPhone 4S and Samsung Galaxy S3 ownedPAGE 11 | 1 2
    • Do you like chocolates?PAGE 12 | 1 2
    • Who else wants to spy on you?PAGE 13 | 1 2
    • FinSpyPAGE 14 | 1 2
    • Protection Sure, I have swipe gesture passwordPAGE 15 | 1 2
    • PAGE 16 | 1 2
    • BYOD ≠ Data LeakPAGE 17 | 1 2
    • 2. PerspectivePAGE 18 | 1 2
    • PerspectivePAGE 19 | 1 2
    • PerspectivePAGE 20 | 1 2
    • PAGE 21 | 1 2
    • PerspectivePAGE 22 | 1 2
    • Abusing Consumerization - Mobile devices Are they dangerous? It depends on what you do with it! Facebook Twitter Gmail Corporate e-mail Reading corporate documents Writing confidential e-mails?PAGE 23 | 1 2
    • Where is the data?PAGE 24 | 1 2
    • DemoPAGE 25 | 1 2
    • Using the cloudPAGE 26 | 1 2
    • Some toolsPAGE 27 | 1 2
    • 3. What now?PAGE 28 | 1 2
    • Kim StevensonPAGE 29 | 1 2
    • Reality for most companies is differentPAGE 30 | 1 2
    • Reality for most companies is differentPAGE 31 | 1 2
    • Conclusions !   BYOD: Myth vs Reality !   Policies are necessary, but they are not enough !   Is the problem in the device or in educating users? !   Who is responsible for the security of the device? !   We all love chocolates!PAGE 32 | 1 2
    • Thank You Questions? Vicente Diaz, Senior Security Researcher, Global Research and Analysis Team @trompi vicente.diaz@kaspersky.comPAGE 33 |