SlideShare a Scribd company logo
Mobile Security:
Preparing for the 2017
Threat Landscape
ISMG SECURITY EXECUTIVE ROUNDTABLE
SPONSORED BY BLACKBERRY
For years, security researchers and leaders have warned: “The
mobile threat is coming.” Well, in 2016 it arrived in full force.
Attackers are finding new, creative means of stealing user
credentials and penetrating critical systems via the mobile
channel. And healthcare entities—with an increasingly mobile
workforce and patient population—are square in the middle of
this expanding mobile threatscape, as attackers seek to capture
and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading
organizations doing to bolster mobile security as we head into
2017?
Welcome to this exclusive executive roundtable discussion on
Mobile Security: Preparing for the 2017 Threat Landscape.
This invitation-only roundtable will draw upon insight from new
mobile security research developed by BlackBerry Limited,
which finds that 37 percent of healthcare organizations do
not believe their current mobile device security strategies are
sufficient. Through an interactive discussion of threats, strategies
and solutions, attendees will tackle topics such as:
•	 Top mobile threats to healthcare organizations;
•	 The most important elements of an effective mobile security
strategy;
•	 How to overcome resistance by users who view mobile
security controls as an obstruction.
In addition to the peer-to-peer dialogue, benefit from
BlackBerry’s new mobile security research, which reveals:
•	 73 percent of organizations have a mobile security strategy
in place, but only 3 percent say they have implemented the
highest levels of security;
•	 82 percent of executives say mobile security precautions
cause at least some frustration among employees;
•	 44 percent fear that too much mobile security will prevent
employees from doing their jobs.
You’ll have the opportunity to discuss this evolving mobile
threat landscape with a handful of senior executives and market
leaders in an informal, closed-door setting, from which you will
emerge with new strategies and solutions you can immediately
put to work.
Introduction
Key Takeaway: Through interactive dialogue, understand how your peers are
tackling emerging mobile security threats. Walk away with new insights and
ideas about the threat landscape and how to prepare to tackle it in 2017.
Mobile Security: Preparing for the 2017 Threat Landscape 2
Discussion Points
Among the questions to be presented for open discourse:
•	 How do you assess the state of mobile security at your organization today?
•	 What points stand out to you from the mobile security research that was just shared?
•	 What do you see as the top mobile security threats to your organizations heading into 2017?
•	 What level of resistance do you face from your own end users, who see security as an obstruction?
•	 How do you counter this resistance?
•	 What are the key elements of your mobile security strategy for 2017?
•	 What types of investments will you make to fulfill that strategy?
Mobile Security: Preparing for the 2017 Threat Landscape 3
About the Expert
Joining our discussion today, to share the latest insights and
case studies on mobile security, is:
Sinisha Patkovic
VP Government Solutions,
BlackBerry Limited
Patkovic leads a global team with the remit that the BlackBerry security product offering remains
relevant to both commercial and public sector organizations’ evolving set of needs. He has been
working on secure communications projects with many federal governments and has been actively
engaged in the dialog on emerging issues spanning cybersecurity, ecommerce, and privacy.
About BlackBerry
BlackBerry secures, connects and mobilizes the enterprise. For today’s enterprise of things,
BlackBerry provides devices and a software platform that enables and manages security, mobility
and communications between and among hardware, programs, mobile apps and the internet of
things. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates in North America,
Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker
symbols “BB” on the Toronto Stock Exchange and “BBRY” on the NASDAQ.
For more information, visit www.BlackBerry.com.
Mobile Security: Preparing for the 2017 Threat Landscape 4
About the Moderator
Leading our discussion today is:
Mathew Schwartz
Executive Editor,
Information Security Media Group
Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers
and electronic media. He has covered the information security and privacy sector throughout
his career. Before joining Information Security Media Group in 2014, where he now serves as the
Executive Editor, DataBreachToday, and European News Coverage, Schwartz was the information
security beat reporter for InformationWeek and a frequent contributor to DarkReading, amongst
other publications. He lives in Scotland.
About ISMG
Information Security Media Group (ISMG) is the world’s largest media organization devoted solely
to information security and risk management. Each of our 28 media properties provides education,
research and news that is specifically tailored to key vertical sectors including banking, healthcare
and the public sector; geographies from North America to Southeast Asia; and topics such as data
breach prevention, cyber risk assessment and fraud. Our annual global Summit series connects
senior security professionals with industry thought leaders to find actionable solutions for pressing
cybersecurity challenges.
For more information, visit www.ismgcorp.com.
Mobile Security: Preparing for the 2017 Threat Landscape 5
NOTE: In advance of this event, ISMG’s Mathew Schwartz spoke
with BlackBerry’s Sinisha Patkovic about mobile security. Here is
an excerpt of that conversation.
Research Highlights
MATHEW SCHWARTZ: BlackBerry recently conducted some
mobile security research. What would you say are some of the
highlights of this study?
SINISHA PATKOVIC: We do studies as frequently as we can to
understand what the market is asking and what new features,
new products and areas of innovation we need to work on. We’re
currently in a strong innovation cycle, with some of our new
products having to do with mobile security and the internet of
things, as well as helping enterprises in general do more with less
but in a very secure manner.
We’ve found that the threat landscape has been changing over
the past few years. Recently, we’ve seen one of those interesting
new IoT attacks which essentially bridge the omnipresence of
devices connected to the internet. As we have more and more
of these devices connected inside and outside the enterprise,
getting these comprehensive tools put into place by enterprise IT
is more critical than ever. This is pretty much in the center of our
interest.
Mobile Security Threats
SCHWARTZ: What do you see as some of the top mobile security
threats?
PATKOVIC: There is a huge variety of business in the UK, both
public and private sector, from small ones with very small IT
shops to large ones with sophisticated, layered enterprise IT
organizations. And each one deals with mobile security threats
differently.
Two things come to mind when we talk to organizations across
all sectors. One is that all of them actually have a lot of extremely
sensitive information, and they want to do everything in their
power to protect them. At the same time, they need to share
that data. So, they struggle with the challenge of collaborating
effectively while not losing that important control.
Two, organizations have become very conscious of the many
computerized and interconnected tools and devices they use,
all of which generate data. These tools and devices can be
compromised through vulnerabilities in supply chains or while in
operation. Either scenario can take out critical IT systems and put
data at risk.
As you can see, there is a desperate need for better, more secure
workflows during all of these processes.
CONTEXT
Discussion Points
Q&A with Sinisha Patkovic of BlackBerry on Mobile Security
“[H]ealthcare organizations have become
very conscious of the many computerized
and interconnected tools and devices
they use, all of which generate data.”
Mobile Security: Preparing for the 2017 Threat Landscape 6
User Resistance
SCHWARTZ: How can security leaders overcome this resistance
from end users who sometimes see security as an obstruction to
them being able to do their jobs?
PATKOVIC: You’ve just asked one of the most fundamental IT
security questions. And the answer to it is in the transparency
and the ease of use of security. Usability will win over anything
that’s thrown at the users. Users, typically, will go with the least
resistance, no matter what.
When organizations deploy secure file sharing systems, their
employees suddenly start accessing files from their phones,
desktops and laptops and share documents with their internal
colleagues as well as with their peers at other agencies. And they
can do so without fear of losing control. When employees realize
they can provision a document for sharing—or revoke that access
once it’s no longer needed—with a touch or a flick, they are more
effective and productive, and organizations are safer overall.
Mobile Security Strategy
SCHWARTZ: In today’s landscape, what are the key elements of a
mobile security strategy?
PATKOVIC: Organizations want to make sure security is baked in
at both the device and application level and layered in throughout.
That means they want ease of application deployment, and they
want ease of use in both corporate-owned devices, as well as
BYOD. They want simplicity and consistency of interface, but most
importantly, they want a really high level of security.
One of the biggest trends in today’s landscape, therefore,
is supplying easy to use, two-factor authentication over an
application container. This means you can bring your own
device to the enterprise and have it provisioned on the fly. You
can access your corporate apps whether you’re an employee
or coming from the outside as a partner. Your apps are pushed
to you on the fly, via two-factor authentication that’s easy to
revoke once you no longer need that access. Having that ease of
deployment for IT and ease of use for the end user is a win-win
strategy.
SCHWARTZ: Talk to me a little bit about BlackBerry. How are you
helping your customers respond better to today’s mobile threats?
PATKOVIC: Strategic mobility is the primary theme with our
customers today. We’re past the time when MDM or simplistic
EMM is sufficient. Shops that just deploy MDM controls see little
return on investment because their end users are unhappy with
its limited functionality. For instance, if your MDM tooling doesn’t
keep work and personal mailboxes segregated, you could lose
personal data on doctors’ BYOD devices if you have to remove
them or wipe them. Or worse, if your tooling does not allow for
work-specific access control, you will have to enforce a lock
on the entire device. This causes staff to be unable to respond
to personal or other emergencies outside of the organization
whenever their phone is locked, and your Help Desk will get
swamped with high-priority user calls.
We’ve done a tremendous amount of work on bringing together
the most comprehensive portfolio in terms of security and
enterprise mobility. It enables our customers to very quickly
create a secure, strategically protected mobile environment. We
help them devise a strategic path for them to secure their mobile
enterprise. We offer a very comprehensive and layered portfolio
that encompasses EMM, MDM, file sharing, container systems,
and two-factor authentication, all of which can work across all
devices in all modes of operation. They need just one tool set
to run, subscribe to and administer different sets of controls and
strategies to all of their various departments.
And the customers can really go and pick different departments
in their organization and deploy different sets of controls and
strategies for each with only one tool set­­—one tool set to run, one
tool set to subscribe to, and one tool set to administer.
Since January of 2016, we’ve won contracts with 11 out of 43
U.K. law enforcement agencies both in terms of switching from
competitive solutions and in terms of operating their suites with
the latest BlackBerry Enterprise Portfolio, which encompass EMM
tools, file-sharing and real-time secure chat, among other tools.
Our customers realize the opportunity we can provide them
and leverage our portfolio to provide their organization with a
sustainable mobile strategy that protects against threats and
improves productivity for the next several years. n
“Usability will win over anything
that’s thrown at the users. Users,
typically, will go with the least
resistance, no matter what.”
Mobile Security: Preparing for the 2017 Threat Landscape 7
902 Carnegie Center • Princeton, NJ • 08540 • www.ismgcorp.com
About ISMG
Information Security Media Group (ISMG) is the world’s largest media organisation devoted solely to information
security and risk management. Each of our 28 media properties provides education, research and news that is
specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from
North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud.
Our annual global Summit series connects senior security professionals with industry thought leaders to find
actionable solutions for pressing cybersecurity challenges.
Contact
(800) 944-0401 • sales@ismgcorp.com

More Related Content

What's hot

Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Nuno Alves
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
Marta Kusinska
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis Communication
BlackBerry
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
BlackBerry
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
thaiantivirus
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
Array Networks
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
ReadWrite
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
IBM Security
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
Wing Venture Capital
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
BlackBerry
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
Andris Soroka
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
Satya Harish
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
Juniper Networks
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
CA API Management
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
J
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
Chris Pepin
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
Icomm Technologies
 
Security that works
Security that worksSecurity that works
Security that works
James1280
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
IBM Security
 

What's hot (20)

Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis Communication
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Security that works
Security that worksSecurity that works
Security that works
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 

Viewers also liked

BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry Secure
BlackBerry
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
MarketingArrowECS_CZ
 
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APTBYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
Jimmy Shah
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
bugcrowd
 
2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human
PhishLabs
 
Fuerzas del mercado
Fuerzas del mercadoFuerzas del mercado
Fuerzas del mercado
Mario Ronzón
 
Los simpsons Nerea Vlada Aroa
Los simpsons Nerea Vlada AroaLos simpsons Nerea Vlada Aroa
Los simpsons Nerea Vlada Aroa
cefeli
 
Reflexion elviolinista
Reflexion elviolinistaReflexion elviolinista
Reflexion elviolinista
PIOLINPCR991
 
SUCCESS - Mobile Health 2012 - Launch and Iterate in Baby Steps
SUCCESS - Mobile Health 2012 - Launch and Iterate in Baby StepsSUCCESS - Mobile Health 2012 - Launch and Iterate in Baby Steps
SUCCESS - Mobile Health 2012 - Launch and Iterate in Baby Steps
K9 Ventures
 
Challenge: Science, Technology, and Innovation and the Triple Bottom Line
Challenge: Science, Technology, and Innovation and the Triple Bottom LineChallenge: Science, Technology, and Innovation and the Triple Bottom Line
Challenge: Science, Technology, and Innovation and the Triple Bottom Line
Olivier Serrat
 
Developing Great Team Presentations
Developing Great Team PresentationsDeveloping Great Team Presentations
Developing Great Team Presentations
Erica Olson
 
NESA DC 2017 Action Plan
NESA DC 2017 Action PlanNESA DC 2017 Action Plan
NESA DC 2017 Action Plan
David Paschane, Ph.D.
 
Portafolio Modelado 3D
Portafolio Modelado 3DPortafolio Modelado 3D
Portafolio Modelado 3D
David Guillermo Esteva
 
Esos Raros Lenguajes Nuevos
Esos Raros Lenguajes NuevosEsos Raros Lenguajes Nuevos
Esos Raros Lenguajes Nuevos
Eduardo Diaz
 
Ramping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for DevelopmentRamping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for Development
Olivier Serrat
 
Las fuerzas de equilibrio en la economía
Las fuerzas de equilibrio en la economíaLas fuerzas de equilibrio en la economía
Las fuerzas de equilibrio en la economía
Emmanuel Aguilar
 

Viewers also liked (17)

BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry Secure
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
 
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APTBYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human
 
Fuerzas del mercado
Fuerzas del mercadoFuerzas del mercado
Fuerzas del mercado
 
Los simpsons Nerea Vlada Aroa
Los simpsons Nerea Vlada AroaLos simpsons Nerea Vlada Aroa
Los simpsons Nerea Vlada Aroa
 
Reflexion elviolinista
Reflexion elviolinistaReflexion elviolinista
Reflexion elviolinista
 
SUCCESS - Mobile Health 2012 - Launch and Iterate in Baby Steps
SUCCESS - Mobile Health 2012 - Launch and Iterate in Baby StepsSUCCESS - Mobile Health 2012 - Launch and Iterate in Baby Steps
SUCCESS - Mobile Health 2012 - Launch and Iterate in Baby Steps
 
Challenge: Science, Technology, and Innovation and the Triple Bottom Line
Challenge: Science, Technology, and Innovation and the Triple Bottom LineChallenge: Science, Technology, and Innovation and the Triple Bottom Line
Challenge: Science, Technology, and Innovation and the Triple Bottom Line
 
Developing Great Team Presentations
Developing Great Team PresentationsDeveloping Great Team Presentations
Developing Great Team Presentations
 
NESA DC 2017 Action Plan
NESA DC 2017 Action PlanNESA DC 2017 Action Plan
NESA DC 2017 Action Plan
 
Portafolio Modelado 3D
Portafolio Modelado 3DPortafolio Modelado 3D
Portafolio Modelado 3D
 
Esos Raros Lenguajes Nuevos
Esos Raros Lenguajes NuevosEsos Raros Lenguajes Nuevos
Esos Raros Lenguajes Nuevos
 
Ramping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for DevelopmentRamping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for Development
 
Las fuerzas de equilibrio en la economía
Las fuerzas de equilibrio en la economíaLas fuerzas de equilibrio en la economía
Las fuerzas de equilibrio en la economía
 

Similar to Mobile Security: Preparing for the 2017 Threat Landscape

40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
Bradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
TopCyberNewsMAGAZINE
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
Matthew Rosenquist
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
Ulf Mattsson
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
learntransformation0
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
Vasuki Kashyap
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
Mighty Guides, Inc.
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!
Daniel L. Cruz
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
Mighty Guides, Inc.
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Mighty Guides, Inc.
 
Challenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber ConfidenceChallenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber Confidence
S-RM Risk and Intelligence Consulting
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
Bala Guntipalli ♦ MBA
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
DIGITALCONFEX
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
CMR WORLD TECH
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
SelectedPresentations
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
Southern Cross Group Services
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
Matthew Rosenquist
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
Ahad
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
Ahad
 

Similar to Mobile Security: Preparing for the 2017 Threat Landscape (20)

40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Challenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber ConfidenceChallenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber Confidence
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 

More from BlackBerry

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner Benefits
BlackBerry
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
BlackBerry
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car Scene
BlackBerry
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
BlackBerry
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting Point
BlackBerry
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of Things
BlackBerry
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives
BlackBerry
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to Work
BlackBerry
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
BlackBerry
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
BlackBerry
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile Applications
BlackBerry
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for Government
BlackBerry
 
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry
 
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry
 
BlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics
BlackBerry
 
BlackBerry Docs To Go
BlackBerry Docs To GoBlackBerry Docs To Go
BlackBerry Docs To Go
BlackBerry
 

More from BlackBerry (20)

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner Benefits
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car Scene
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting Point
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of Things
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to Work
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & Manufacturing
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile Applications
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for Healthcare
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for Government
 
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & Utilities
 
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
 
BlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity Connectors
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics
 
BlackBerry Docs To Go
BlackBerry Docs To GoBlackBerry Docs To Go
BlackBerry Docs To Go
 

Recently uploaded

Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
safelyiotech
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
NishanthaBulumulla1
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
Karya Keeper
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
YousufSait3
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
ISH Technologies
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
sjcobrien
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
Rakesh Kumar R
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
Massimo Artizzu
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 

Recently uploaded (20)

Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
Safelyio Toolbox Talk Softwate & App (How To Digitize Safety Meetings)
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
 
Project Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdfProject Management: The Role of Project Dashboards.pdf
Project Management: The Role of Project Dashboards.pdf
 
SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
Malibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed RoundMalibou Pitch Deck For Its €3M Seed Round
Malibou Pitch Deck For Its €3M Seed Round
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 

Mobile Security: Preparing for the 2017 Threat Landscape

  • 1. Mobile Security: Preparing for the 2017 Threat Landscape ISMG SECURITY EXECUTIVE ROUNDTABLE SPONSORED BY BLACKBERRY
  • 2. For years, security researchers and leaders have warned: “The mobile threat is coming.” Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities—with an increasingly mobile workforce and patient population—are square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data. What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017? Welcome to this exclusive executive roundtable discussion on Mobile Security: Preparing for the 2017 Threat Landscape. This invitation-only roundtable will draw upon insight from new mobile security research developed by BlackBerry Limited, which finds that 37 percent of healthcare organizations do not believe their current mobile device security strategies are sufficient. Through an interactive discussion of threats, strategies and solutions, attendees will tackle topics such as: • Top mobile threats to healthcare organizations; • The most important elements of an effective mobile security strategy; • How to overcome resistance by users who view mobile security controls as an obstruction. In addition to the peer-to-peer dialogue, benefit from BlackBerry’s new mobile security research, which reveals: • 73 percent of organizations have a mobile security strategy in place, but only 3 percent say they have implemented the highest levels of security; • 82 percent of executives say mobile security precautions cause at least some frustration among employees; • 44 percent fear that too much mobile security will prevent employees from doing their jobs. You’ll have the opportunity to discuss this evolving mobile threat landscape with a handful of senior executives and market leaders in an informal, closed-door setting, from which you will emerge with new strategies and solutions you can immediately put to work. Introduction Key Takeaway: Through interactive dialogue, understand how your peers are tackling emerging mobile security threats. Walk away with new insights and ideas about the threat landscape and how to prepare to tackle it in 2017. Mobile Security: Preparing for the 2017 Threat Landscape 2
  • 3. Discussion Points Among the questions to be presented for open discourse: • How do you assess the state of mobile security at your organization today? • What points stand out to you from the mobile security research that was just shared? • What do you see as the top mobile security threats to your organizations heading into 2017? • What level of resistance do you face from your own end users, who see security as an obstruction? • How do you counter this resistance? • What are the key elements of your mobile security strategy for 2017? • What types of investments will you make to fulfill that strategy? Mobile Security: Preparing for the 2017 Threat Landscape 3
  • 4. About the Expert Joining our discussion today, to share the latest insights and case studies on mobile security, is: Sinisha Patkovic VP Government Solutions, BlackBerry Limited Patkovic leads a global team with the remit that the BlackBerry security product offering remains relevant to both commercial and public sector organizations’ evolving set of needs. He has been working on secure communications projects with many federal governments and has been actively engaged in the dialog on emerging issues spanning cybersecurity, ecommerce, and privacy. About BlackBerry BlackBerry secures, connects and mobilizes the enterprise. For today’s enterprise of things, BlackBerry provides devices and a software platform that enables and manages security, mobility and communications between and among hardware, programs, mobile apps and the internet of things. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates in North America, Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols “BB” on the Toronto Stock Exchange and “BBRY” on the NASDAQ. For more information, visit www.BlackBerry.com. Mobile Security: Preparing for the 2017 Threat Landscape 4
  • 5. About the Moderator Leading our discussion today is: Mathew Schwartz Executive Editor, Information Security Media Group Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the Executive Editor, DataBreachToday, and European News Coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, amongst other publications. He lives in Scotland. About ISMG Information Security Media Group (ISMG) is the world’s largest media organization devoted solely to information security and risk management. Each of our 28 media properties provides education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Our annual global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges. For more information, visit www.ismgcorp.com. Mobile Security: Preparing for the 2017 Threat Landscape 5
  • 6. NOTE: In advance of this event, ISMG’s Mathew Schwartz spoke with BlackBerry’s Sinisha Patkovic about mobile security. Here is an excerpt of that conversation. Research Highlights MATHEW SCHWARTZ: BlackBerry recently conducted some mobile security research. What would you say are some of the highlights of this study? SINISHA PATKOVIC: We do studies as frequently as we can to understand what the market is asking and what new features, new products and areas of innovation we need to work on. We’re currently in a strong innovation cycle, with some of our new products having to do with mobile security and the internet of things, as well as helping enterprises in general do more with less but in a very secure manner. We’ve found that the threat landscape has been changing over the past few years. Recently, we’ve seen one of those interesting new IoT attacks which essentially bridge the omnipresence of devices connected to the internet. As we have more and more of these devices connected inside and outside the enterprise, getting these comprehensive tools put into place by enterprise IT is more critical than ever. This is pretty much in the center of our interest. Mobile Security Threats SCHWARTZ: What do you see as some of the top mobile security threats? PATKOVIC: There is a huge variety of business in the UK, both public and private sector, from small ones with very small IT shops to large ones with sophisticated, layered enterprise IT organizations. And each one deals with mobile security threats differently. Two things come to mind when we talk to organizations across all sectors. One is that all of them actually have a lot of extremely sensitive information, and they want to do everything in their power to protect them. At the same time, they need to share that data. So, they struggle with the challenge of collaborating effectively while not losing that important control. Two, organizations have become very conscious of the many computerized and interconnected tools and devices they use, all of which generate data. These tools and devices can be compromised through vulnerabilities in supply chains or while in operation. Either scenario can take out critical IT systems and put data at risk. As you can see, there is a desperate need for better, more secure workflows during all of these processes. CONTEXT Discussion Points Q&A with Sinisha Patkovic of BlackBerry on Mobile Security “[H]ealthcare organizations have become very conscious of the many computerized and interconnected tools and devices they use, all of which generate data.” Mobile Security: Preparing for the 2017 Threat Landscape 6
  • 7. User Resistance SCHWARTZ: How can security leaders overcome this resistance from end users who sometimes see security as an obstruction to them being able to do their jobs? PATKOVIC: You’ve just asked one of the most fundamental IT security questions. And the answer to it is in the transparency and the ease of use of security. Usability will win over anything that’s thrown at the users. Users, typically, will go with the least resistance, no matter what. When organizations deploy secure file sharing systems, their employees suddenly start accessing files from their phones, desktops and laptops and share documents with their internal colleagues as well as with their peers at other agencies. And they can do so without fear of losing control. When employees realize they can provision a document for sharing—or revoke that access once it’s no longer needed—with a touch or a flick, they are more effective and productive, and organizations are safer overall. Mobile Security Strategy SCHWARTZ: In today’s landscape, what are the key elements of a mobile security strategy? PATKOVIC: Organizations want to make sure security is baked in at both the device and application level and layered in throughout. That means they want ease of application deployment, and they want ease of use in both corporate-owned devices, as well as BYOD. They want simplicity and consistency of interface, but most importantly, they want a really high level of security. One of the biggest trends in today’s landscape, therefore, is supplying easy to use, two-factor authentication over an application container. This means you can bring your own device to the enterprise and have it provisioned on the fly. You can access your corporate apps whether you’re an employee or coming from the outside as a partner. Your apps are pushed to you on the fly, via two-factor authentication that’s easy to revoke once you no longer need that access. Having that ease of deployment for IT and ease of use for the end user is a win-win strategy. SCHWARTZ: Talk to me a little bit about BlackBerry. How are you helping your customers respond better to today’s mobile threats? PATKOVIC: Strategic mobility is the primary theme with our customers today. We’re past the time when MDM or simplistic EMM is sufficient. Shops that just deploy MDM controls see little return on investment because their end users are unhappy with its limited functionality. For instance, if your MDM tooling doesn’t keep work and personal mailboxes segregated, you could lose personal data on doctors’ BYOD devices if you have to remove them or wipe them. Or worse, if your tooling does not allow for work-specific access control, you will have to enforce a lock on the entire device. This causes staff to be unable to respond to personal or other emergencies outside of the organization whenever their phone is locked, and your Help Desk will get swamped with high-priority user calls. We’ve done a tremendous amount of work on bringing together the most comprehensive portfolio in terms of security and enterprise mobility. It enables our customers to very quickly create a secure, strategically protected mobile environment. We help them devise a strategic path for them to secure their mobile enterprise. We offer a very comprehensive and layered portfolio that encompasses EMM, MDM, file sharing, container systems, and two-factor authentication, all of which can work across all devices in all modes of operation. They need just one tool set to run, subscribe to and administer different sets of controls and strategies to all of their various departments. And the customers can really go and pick different departments in their organization and deploy different sets of controls and strategies for each with only one tool set­­—one tool set to run, one tool set to subscribe to, and one tool set to administer. Since January of 2016, we’ve won contracts with 11 out of 43 U.K. law enforcement agencies both in terms of switching from competitive solutions and in terms of operating their suites with the latest BlackBerry Enterprise Portfolio, which encompass EMM tools, file-sharing and real-time secure chat, among other tools. Our customers realize the opportunity we can provide them and leverage our portfolio to provide their organization with a sustainable mobile strategy that protects against threats and improves productivity for the next several years. n “Usability will win over anything that’s thrown at the users. Users, typically, will go with the least resistance, no matter what.” Mobile Security: Preparing for the 2017 Threat Landscape 7
  • 8. 902 Carnegie Center • Princeton, NJ • 08540 • www.ismgcorp.com About ISMG Information Security Media Group (ISMG) is the world’s largest media organisation devoted solely to information security and risk management. Each of our 28 media properties provides education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Our annual global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges. Contact (800) 944-0401 • sales@ismgcorp.com