SlideShare a Scribd company logo
1 of 33
Download to read offline
Why	
  You’ll	
  Care	
  More	
  About	
  Mobile	
  
Security	
  in	
  2020
Tom	
  Bain
@tmbainjr1
Presentation	
  Agenda
• Today’s	
  emerging	
  ‘threatscape’	
  +	
  
the	
  key	
  trends	
  impacting	
  mobile	
  
security
• Common	
  &	
  emerging	
  exploits	
  +	
  
impact
• Seven	
  steps	
  to	
  tackling	
  mobile	
  
security	
  &	
  a	
  glimpse	
  forward
WHAT	
  WE’LL	
  COVER	
  TODAY
• Next-­‐generation	
  security	
  firm	
  in	
  the	
  EDR	
  market
• Venture-­‐backed	
  endpoint	
  security	
  organization	
  with	
  
$56M	
  total	
  raise
• Office	
  locations:	
  
Boston;	
  Los	
  Angeles;	
  Sacramento,	
  Washington,	
  DC
• EDR	
  and	
  IR	
  Product	
  Suite:	
  (200+	
  customers)	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  
Sentinel,	
  Active	
  Defense,	
  Responder	
  PRO
• Recognized	
  by	
  Gartner,	
  451,	
  ESG	
  &	
  Forrester
• Android	
  sensor	
  to	
  GA	
  soon
Big	
  Data	
  Endpoint	
  
Detection	
  &	
  Response	
  	
  
Investors
Who	
  Am	
  I?
@tmbainjr1
@CounterTack
• 13+	
  years	
  in	
  information	
  security
• CounterTack |	
  MCSI,	
  Security	
  Innovation,	
  
Q1	
  Labs/IBM,	
  Application	
  Security,	
  
Inc./TrustWave,	
  Sophos,	
  WAVE	
  Systems
• Hacker	
  Halted,	
  Global	
  CISO	
  Forum,	
  
SecureWorld Expo,	
  ISSA,	
  OWASP,	
  Boston	
  
Security	
  Conference,	
  Terrapin	
  
Cybersecurity	
  Conference,	
  Strata	
  +	
  
Hadoop	
  World
• Struggling	
  musician
• Mobile	
  device	
  owner
TODAY’S	
  EMERGING
‘THREATSCAPE’	
  +	
  KEY	
  TRENDS
Enterprise	
  and	
  Individual	
  Threats	
  are	
  Colliding
You	
  Can’t	
  Defend	
  Against	
  What	
  You	
  
Don’t	
  Understand
In	
  2014
95%	
  
of	
  major	
  data	
  
breaches	
  were	
  
unknown	
  
Known	
  Previously
70%
Unknown
30%
2015	
  Verizon	
  Business	
  Data	
  Breach	
  Investigations	
  Report
The	
  Mobile	
  Explosion
• 73%	
  organizations	
  plan	
  to	
  spend	
  
increase	
  spending	
  on	
  mobility
• Enterprise/Fortune	
  500	
  spend	
  an	
  
average	
  of	
  $34M	
  developing	
  mobile	
  
apps	
  for	
  business	
  purposes
• 5.5%	
  of	
  the	
  mobile	
  budget	
  is	
  targeted	
  at	
  
app	
  security	
  
• Only	
  50%	
  of	
  organizations	
  appropriate	
  
budget	
  toward	
  securing	
  mobile	
  apps
• 62%	
  of	
  enterprise	
  org’s	
  say	
  mobile	
  
computing	
  increases	
  difficulty	
  of	
  security	
  
management
ENTERPRISE	
  SPENDING
The	
  Mobile	
  Explosion
ENTERPRISE	
  PRIORITIES
• 25%	
  of	
  organizations	
  state	
  that	
  mobile	
  
computing	
  platforms	
  are	
  the	
  highest	
  
software	
  development	
  priority
• 66%	
  of	
  organizations	
  say	
  that	
  mobile	
  
platforms	
  will	
  become	
  the	
  dominant	
  
software	
  development	
  priority	
  over	
  the	
  
next	
  24	
  months
• 55%	
  of	
  enterprises	
  believe	
  mobile	
  
computing	
  increases	
  productivity
• 300M	
  mobile	
  devices	
  sold	
  per	
  quarter
2014	
  State	
  of	
  Mobile	
  Security,	
  Enterprise	
  Strategy	
  Group
Today’s	
  Threatscape
• Mobile	
  threats	
  are	
  more	
  pervasive	
  and	
  
more	
  sophisticated
• Users	
  continue	
  to	
  engage	
  in	
  risky	
  
behavior
• IoT has	
  opened	
  up	
  a	
  new	
  attack	
  surface
• Organizations	
  find	
  assessing	
  their	
  mobile	
  
security	
  risk	
  levels	
  challenging
• Building	
  a	
  mobile	
  security	
  policy	
  
presents	
  multiple	
  challenges	
  &	
  needs	
  
sponsorship
• Targeting	
  an	
  individual	
  can	
  help	
  
penetrate	
  an	
  organization
INCREASED	
  RISK
Today’s	
  Threatscape
MOBILE	
  MALWARE:	
  JUST	
  LAST	
  YEAR!
• 98%	
  of	
  all	
  mobile	
  malware	
  targets	
  Android	
  
users
• Kaspersky:	
  3.4M	
  malware	
  detections	
  on	
  
1.1M	
  devices
• 60%	
  of	
  all	
  attacks	
  are	
  capable	
  of	
  stealing	
  
users’	
  money
• Reported	
  attacks	
  have	
  increased	
  6X!	
  (from	
  
35K	
  in	
  August	
  2013	
  to	
  242K	
  as	
  of	
  March	
  
2014
Today’s	
  Threatscape
MOBILE	
  MALWARE:	
  A	
  YEAR	
  LATER
• By	
  end	
  of	
  2014,	
  an	
  estimated	
  16M	
  
devices	
  were	
  infected	
  with	
  malware
• 80%	
  believe	
  mobile	
  malware	
  will	
  
become	
  significantly/somewhat	
  more	
  
dangerous	
  over	
  the	
  next	
  two	
  years
• Estimated	
  that	
  11.6M	
  devices	
  are	
  
infected	
  with	
  malicious	
  code	
  at	
  any	
  
given	
  time
• Closer	
  to	
  99%	
  of	
  all	
  mobile	
  malware	
  
targets	
  Android	
  users
• 57%	
  of	
  all	
  malicious	
  programs	
  detected	
  
by	
  Kaspersky	
  were	
  Trojans	
  designed	
  to	
  
proliferate	
  via	
  SMS
Today’s	
  Threatscape
WE	
  ARE	
  SEEING	
  THE	
  IMPACT
Reported	
  a	
  security	
  breach	
  
resulting	
  from	
  a	
  compromised	
  
mobile	
  device	
  in	
  2014.
47% 90%
Of	
  the	
  most	
  popular	
  mobile	
  
applications	
  have	
  been	
  
breached.	
  (multiple	
  times)
Why	
  Are	
  We	
  Here?	
  
CAUSES/PATTERNS
• Lost/stolen	
  devices
• Jailbroken devices
• Device	
  misuse
• Non	
  App	
  Store	
  or	
  Play	
  Store	
  3rd party	
  apps	
  
downloaded
• No	
  formal	
  mobile	
  security	
  policy
COMMON	
  &	
  EMERGING
EXPLOITS	
  +	
  IMPACT
Specific	
  Threats	
  &	
  Impact
StageFright
1	
  Text	
  
950M	
  devices
FakeToken
Spveng
$1M
350K	
  devices
Exploits	
  @	
  Black	
  Hat
• Universal	
  Android	
  Rooting
• Researchers:	
  KEEN	
  Team	
  (Wen	
  Xu)
• Achieved	
  permanent	
  root	
  on	
  most	
  Android	
  
devices	
  through	
  kernel	
  memory	
  control
• @K33nTeam
• iOS	
  Exploit:	
  TrustKit
• Researchers:	
  Data	
  Theorem
• New	
  technique	
  around	
  SSL	
  pinning	
  for	
  iOS	
  8
• https://datatheorem.github.io/ios/ssl/2015
/08/08/introducing-­‐trustkit/
Android	
  Kit	
  Resources
iOS	
  Kit	
  Resources
SEVEN	
  STEPS	
  TO	
  TACKLING	
  
MOBILE	
  SECURITY	
  HEAD-­‐ON
There’s	
  No	
  One	
  ‘Right’	
  Way	
  to	
  Do	
  It
Assess	
  Your	
  Risk
1.	
  START	
  WITH	
  A	
  CHECKLIST
ü Take	
  an	
  inventory	
  of	
  your	
  high-­‐risk	
  aps	
  
and	
  mobile	
  applications.
ü Determine	
  business	
  criticality.	
  
ü What’s	
  your	
  attack	
  probability?
ü How	
  do	
  you	
  define	
  the	
  attack	
  surface?
ü Consider	
  overall	
  business	
  impact.
ü Where	
  does	
  compliance	
  factor	
  in?
ü What	
  are	
  the	
  security	
  threats?
Examine	
  &	
  Verify	
  BYOD	
  Challenges
2.	
  VERIFY	
  CHALLENGES
Devices
Data/Content
Applications
Users
Policy	
  Management
Integration	
  
Access	
  Controls	
  &	
  Organizational	
  Roles
3.	
  DETERMINE	
  WHO	
  &	
  WHAT	
  THEY	
  DO
• Which	
  departments/groups/individuals	
  have	
  been	
  
most	
  active	
  in	
  developing	
  policies?	
  
• Has	
  there	
  been	
  any	
  previous	
  collaboration	
  
between	
  policies	
  and	
  authors?
• Can	
  you	
  identify	
  a	
  potential	
  champion(s)	
  to	
  
support	
  the	
  new	
  policy?	
  
• Areas	
  of	
  agreement	
  in	
  commonly	
  implemented	
  
controls	
  re:	
  policies?
• Support	
  documents,	
  materials	
  and	
  related	
  policies	
  
should	
  be	
  cited	
  in	
  mobile	
  device	
  policy.
Phase	
  I:	
  Policy	
  Construction
ü Consider	
  risk	
  scenarios	
  in	
  your	
  business.
ü Adapt	
  from	
  proven	
  or	
  trustworthy	
  
models.
ü Measure	
  perception.
ü Understand	
  roles,	
  privileges	
  and	
  what’s	
  in	
  
place	
  today.
ü Get	
  granular	
  with	
  your	
  questions	
  &	
  
considerations.
ü Figure	
  out	
  a	
  strategy	
  for	
  testing	
  your	
  
applications.	
  
ü Policy	
  enforcement.
ü Raise	
  awareness/required	
  training.
4.	
  FACTORS	
  INFLUENCING	
  HOW	
  YOU	
  BUILD	
  A	
  POLICY	
  
Phase	
  II:	
  Further	
  Define	
  Policy
5.	
  GET	
  GRANULAR	
  &	
  SET	
  OBJECTIVES	
  
• Provide	
  contextual,	
  technical	
  guidelines
• Map	
  to	
  compliance	
  mandates
• Considers	
  criticality	
  of	
  application	
  and	
  data
‒ Requirements,	
  activities	
  and	
  level	
  of	
  detail	
  needed	
  will	
  differ
• Have	
  clear	
  exception	
  policies	
  where	
  necessary
‒ What	
  if	
  minimum	
  standards	
  can’t	
  be	
  met?	
  What	
  is	
  
considered	
  acceptable?	
  Who	
  approves?
• Includes	
  internally	
  built	
  and	
  third	
  party	
  applications
• Reflects	
  current	
  maturity	
  and	
  skillset	
  of	
  staff
‒ The	
  more	
  skilled,	
  the	
  less	
  explicit	
  you	
  need	
  to	
  be	
  with	
  
policies
Mobile	
  Device	
  Management	
  Strategy
6.	
  BUILD	
  ON	
  BROADER	
  POLICY	
  
• Establish	
  certificate	
  policies	
  to	
  require	
  valid	
  
signatures	
  (VPN,	
  email,	
  WiFi)
• Policy	
  on	
  no	
  rooting	
  – wipe	
  if	
  violated
• Define	
  the	
  platforms	
  supported	
  (firmware	
  
specs,	
  OS	
  levels)
• Reporting	
  of	
  lost	
  or	
  stolen	
  devices	
  
• Password	
  policy	
  – complexity,	
  length,	
  time-­‐
out	
  and	
  limit	
  of	
  re-­‐try’s
• Right	
  to	
  wipe	
  – the	
  organization	
  can	
  reserve	
  
this	
  right
• Containment	
  – data	
  &	
  apps	
  isolated	
  by	
  
authentication	
  &	
  crypto	
  (separate	
  from	
  
underlying	
  platform	
  for	
  greater	
  visibility)
• Static	
  application	
  testing
Enforcement	
  of	
  Policy
7.	
  ENFORCEMENT	
  STRATEGY	
  IS	
  CRITICAL	
  
• You	
  need	
  management	
  buy-­‐in!
• Broad	
  strategy	
  vs Targeted	
  strategy	
  roll-­‐out
• On-­‐boarding:	
  
‒ Require	
  all	
  device	
  info	
  as	
  part	
  of	
  hiring	
  process
‒ Require	
  policy	
  training	
  up	
  front
• Require	
  training	
  for	
  various	
  departments:
‒ General	
  population	
  receives	
  awareness	
  training
‒ Technical	
  employees	
  receive	
  in-­‐depth	
  training
• Monitor	
  for	
  effectiveness	
  – EX:	
  Deliver	
  training	
  or	
  reminder	
  
when	
  employee	
  is	
  out	
  of	
  compliance.	
  
LOOKING	
  FORWARD
What	
  Can	
  We	
  Expect?
Rinse	
  and	
  Repeat
Implementation
Technology
People Process
Data
By	
  2020
4.3B
of	
  global	
  GDP	
  (mobile	
  industry)
people	
  globally	
  own	
  a	
  mobile	
  device
infected	
  devices	
  
unique	
  subscribers
5.1%	
  
56%	
  
100M
Sources
• Containing	
  Mobile	
  Security	
  Risks	
  with	
  the	
  80/20	
  Rule,	
  Gartner
• 2015	
  Mobile	
  Security	
  Trends,	
  IBM	
  Security	
  Systems
• The	
  State	
  of	
  Mobile	
  Computing	
  Security,	
  2014,	
  Enterprise	
  Strategy	
  Group
• Introducing	
  the	
  Mobile	
  Security	
  Assessment	
  and	
  Audit	
  Framework,	
  
Gartner
• Motive	
  Security	
  Labs	
  2H2014	
  Malware	
  Report,	
  Motive	
  Security/Alcatel-­‐
Lucent
• Mobile	
  Cyber	
  Threats,	
  Kaspersky/Interpol	
  study
• Managed	
  Diversity	
  Model	
  for	
  BYOD	
  and	
  CYOD	
  to	
  Manage	
  and	
  Safeguard	
  
Users,	
  IT	
  and	
  Business,	
  Gartner
Thank	
  you.	
  
Tom	
  Bain
@tmbainjr1
@CounterTack

More Related Content

What's hot

Security in the News
Security in the NewsSecurity in the News
Security in the News
James Sutter
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
Roger Hagedorn
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructure
Intel IT Center
 

What's hot (20)

The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile SecurityMojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
 
Scot Secure 2015
Scot Secure 2015Scot Secure 2015
Scot Secure 2015
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Security in the News
Security in the NewsSecurity in the News
Security in the News
 
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are AskingMobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructure
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
IBM Security Services Overview
IBM Security Services OverviewIBM Security Services Overview
IBM Security Services Overview
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 PredictionsMobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
 

Viewers also liked

Viewers also liked (8)

McKinsey Global Institute MEDA presentation - Fall Conf 2014
McKinsey Global Institute MEDA presentation - Fall Conf 2014McKinsey Global Institute MEDA presentation - Fall Conf 2014
McKinsey Global Institute MEDA presentation - Fall Conf 2014
 
Making loyalty pay: How to build - not destroy - value
Making loyalty pay: How to build - not destroy - valueMaking loyalty pay: How to build - not destroy - value
Making loyalty pay: How to build - not destroy - value
 
Brand loyalty management
Brand loyalty managementBrand loyalty management
Brand loyalty management
 
Brand loyalty
Brand loyaltyBrand loyalty
Brand loyalty
 
McKinsey: Understanding shifts in consumer behavior
McKinsey: Understanding shifts in consumer behaviorMcKinsey: Understanding shifts in consumer behavior
McKinsey: Understanding shifts in consumer behavior
 
The Deloitte Millennial Survey 2016
The Deloitte Millennial Survey 2016The Deloitte Millennial Survey 2016
The Deloitte Millennial Survey 2016
 
Strategy, Not Technology, Drives Digital Transformation
Strategy, Not Technology, Drives Digital TransformationStrategy, Not Technology, Drives Digital Transformation
Strategy, Not Technology, Drives Digital Transformation
 
TMT Outlook 2017: A new wave of advances offer opportunities and challenges
TMT Outlook 2017:  A new wave of advances offer opportunities and challengesTMT Outlook 2017:  A new wave of advances offer opportunities and challenges
TMT Outlook 2017: A new wave of advances offer opportunities and challenges
 

Similar to Why You’ll Care More About Mobile Security in 2020 - Tom Bain

Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
Steve Markey
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
Onwubiko Emmanuel
 

Similar to Why You’ll Care More About Mobile Security in 2020 - Tom Bain (20)

BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
dataProtection_p3.ppt
dataProtection_p3.pptdataProtection_p3.ppt
dataProtection_p3.ppt
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
The Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security BreachesThe Top 7 Causes of Major Security Breaches
The Top 7 Causes of Major Security Breaches
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk Imperative
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
 
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
Frost & Sullivan The New Mobility: How Mobile Applications and Devices are Ch...
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 

More from EC-Council

Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
EC-Council
 

More from EC-Council (20)

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 

Why You’ll Care More About Mobile Security in 2020 - Tom Bain

  • 1. Why  You’ll  Care  More  About  Mobile   Security  in  2020 Tom  Bain @tmbainjr1
  • 2. Presentation  Agenda • Today’s  emerging  ‘threatscape’  +   the  key  trends  impacting  mobile   security • Common  &  emerging  exploits  +   impact • Seven  steps  to  tackling  mobile   security  &  a  glimpse  forward WHAT  WE’LL  COVER  TODAY
  • 3. • Next-­‐generation  security  firm  in  the  EDR  market • Venture-­‐backed  endpoint  security  organization  with   $56M  total  raise • Office  locations:   Boston;  Los  Angeles;  Sacramento,  Washington,  DC • EDR  and  IR  Product  Suite:  (200+  customers)                                                             Sentinel,  Active  Defense,  Responder  PRO • Recognized  by  Gartner,  451,  ESG  &  Forrester • Android  sensor  to  GA  soon Big  Data  Endpoint   Detection  &  Response     Investors
  • 4. Who  Am  I? @tmbainjr1 @CounterTack • 13+  years  in  information  security • CounterTack |  MCSI,  Security  Innovation,   Q1  Labs/IBM,  Application  Security,   Inc./TrustWave,  Sophos,  WAVE  Systems • Hacker  Halted,  Global  CISO  Forum,   SecureWorld Expo,  ISSA,  OWASP,  Boston   Security  Conference,  Terrapin   Cybersecurity  Conference,  Strata  +   Hadoop  World • Struggling  musician • Mobile  device  owner
  • 5. TODAY’S  EMERGING ‘THREATSCAPE’  +  KEY  TRENDS Enterprise  and  Individual  Threats  are  Colliding
  • 6. You  Can’t  Defend  Against  What  You   Don’t  Understand In  2014 95%   of  major  data   breaches  were   unknown   Known  Previously 70% Unknown 30% 2015  Verizon  Business  Data  Breach  Investigations  Report
  • 7. The  Mobile  Explosion • 73%  organizations  plan  to  spend   increase  spending  on  mobility • Enterprise/Fortune  500  spend  an   average  of  $34M  developing  mobile   apps  for  business  purposes • 5.5%  of  the  mobile  budget  is  targeted  at   app  security   • Only  50%  of  organizations  appropriate   budget  toward  securing  mobile  apps • 62%  of  enterprise  org’s  say  mobile   computing  increases  difficulty  of  security   management ENTERPRISE  SPENDING
  • 8. The  Mobile  Explosion ENTERPRISE  PRIORITIES • 25%  of  organizations  state  that  mobile   computing  platforms  are  the  highest   software  development  priority • 66%  of  organizations  say  that  mobile   platforms  will  become  the  dominant   software  development  priority  over  the   next  24  months • 55%  of  enterprises  believe  mobile   computing  increases  productivity • 300M  mobile  devices  sold  per  quarter 2014  State  of  Mobile  Security,  Enterprise  Strategy  Group
  • 9. Today’s  Threatscape • Mobile  threats  are  more  pervasive  and   more  sophisticated • Users  continue  to  engage  in  risky   behavior • IoT has  opened  up  a  new  attack  surface • Organizations  find  assessing  their  mobile   security  risk  levels  challenging • Building  a  mobile  security  policy   presents  multiple  challenges  &  needs   sponsorship • Targeting  an  individual  can  help   penetrate  an  organization INCREASED  RISK
  • 10. Today’s  Threatscape MOBILE  MALWARE:  JUST  LAST  YEAR! • 98%  of  all  mobile  malware  targets  Android   users • Kaspersky:  3.4M  malware  detections  on   1.1M  devices • 60%  of  all  attacks  are  capable  of  stealing   users’  money • Reported  attacks  have  increased  6X!  (from   35K  in  August  2013  to  242K  as  of  March   2014
  • 11. Today’s  Threatscape MOBILE  MALWARE:  A  YEAR  LATER • By  end  of  2014,  an  estimated  16M   devices  were  infected  with  malware • 80%  believe  mobile  malware  will   become  significantly/somewhat  more   dangerous  over  the  next  two  years • Estimated  that  11.6M  devices  are   infected  with  malicious  code  at  any   given  time • Closer  to  99%  of  all  mobile  malware   targets  Android  users • 57%  of  all  malicious  programs  detected   by  Kaspersky  were  Trojans  designed  to   proliferate  via  SMS
  • 12. Today’s  Threatscape WE  ARE  SEEING  THE  IMPACT Reported  a  security  breach   resulting  from  a  compromised   mobile  device  in  2014. 47% 90% Of  the  most  popular  mobile   applications  have  been   breached.  (multiple  times)
  • 13. Why  Are  We  Here?   CAUSES/PATTERNS • Lost/stolen  devices • Jailbroken devices • Device  misuse • Non  App  Store  or  Play  Store  3rd party  apps   downloaded • No  formal  mobile  security  policy
  • 14. COMMON  &  EMERGING EXPLOITS  +  IMPACT Specific  Threats  &  Impact
  • 18. Exploits  @  Black  Hat • Universal  Android  Rooting • Researchers:  KEEN  Team  (Wen  Xu) • Achieved  permanent  root  on  most  Android   devices  through  kernel  memory  control • @K33nTeam • iOS  Exploit:  TrustKit • Researchers:  Data  Theorem • New  technique  around  SSL  pinning  for  iOS  8 • https://datatheorem.github.io/ios/ssl/2015 /08/08/introducing-­‐trustkit/
  • 21. SEVEN  STEPS  TO  TACKLING   MOBILE  SECURITY  HEAD-­‐ON There’s  No  One  ‘Right’  Way  to  Do  It
  • 22. Assess  Your  Risk 1.  START  WITH  A  CHECKLIST ü Take  an  inventory  of  your  high-­‐risk  aps   and  mobile  applications. ü Determine  business  criticality.   ü What’s  your  attack  probability? ü How  do  you  define  the  attack  surface? ü Consider  overall  business  impact. ü Where  does  compliance  factor  in? ü What  are  the  security  threats?
  • 23. Examine  &  Verify  BYOD  Challenges 2.  VERIFY  CHALLENGES Devices Data/Content Applications Users Policy  Management Integration  
  • 24. Access  Controls  &  Organizational  Roles 3.  DETERMINE  WHO  &  WHAT  THEY  DO • Which  departments/groups/individuals  have  been   most  active  in  developing  policies?   • Has  there  been  any  previous  collaboration   between  policies  and  authors? • Can  you  identify  a  potential  champion(s)  to   support  the  new  policy?   • Areas  of  agreement  in  commonly  implemented   controls  re:  policies? • Support  documents,  materials  and  related  policies   should  be  cited  in  mobile  device  policy.
  • 25. Phase  I:  Policy  Construction ü Consider  risk  scenarios  in  your  business. ü Adapt  from  proven  or  trustworthy   models. ü Measure  perception. ü Understand  roles,  privileges  and  what’s  in   place  today. ü Get  granular  with  your  questions  &   considerations. ü Figure  out  a  strategy  for  testing  your   applications.   ü Policy  enforcement. ü Raise  awareness/required  training. 4.  FACTORS  INFLUENCING  HOW  YOU  BUILD  A  POLICY  
  • 26. Phase  II:  Further  Define  Policy 5.  GET  GRANULAR  &  SET  OBJECTIVES   • Provide  contextual,  technical  guidelines • Map  to  compliance  mandates • Considers  criticality  of  application  and  data ‒ Requirements,  activities  and  level  of  detail  needed  will  differ • Have  clear  exception  policies  where  necessary ‒ What  if  minimum  standards  can’t  be  met?  What  is   considered  acceptable?  Who  approves? • Includes  internally  built  and  third  party  applications • Reflects  current  maturity  and  skillset  of  staff ‒ The  more  skilled,  the  less  explicit  you  need  to  be  with   policies
  • 27. Mobile  Device  Management  Strategy 6.  BUILD  ON  BROADER  POLICY   • Establish  certificate  policies  to  require  valid   signatures  (VPN,  email,  WiFi) • Policy  on  no  rooting  – wipe  if  violated • Define  the  platforms  supported  (firmware   specs,  OS  levels) • Reporting  of  lost  or  stolen  devices   • Password  policy  – complexity,  length,  time-­‐ out  and  limit  of  re-­‐try’s • Right  to  wipe  – the  organization  can  reserve   this  right • Containment  – data  &  apps  isolated  by   authentication  &  crypto  (separate  from   underlying  platform  for  greater  visibility) • Static  application  testing
  • 28. Enforcement  of  Policy 7.  ENFORCEMENT  STRATEGY  IS  CRITICAL   • You  need  management  buy-­‐in! • Broad  strategy  vs Targeted  strategy  roll-­‐out • On-­‐boarding:   ‒ Require  all  device  info  as  part  of  hiring  process ‒ Require  policy  training  up  front • Require  training  for  various  departments: ‒ General  population  receives  awareness  training ‒ Technical  employees  receive  in-­‐depth  training • Monitor  for  effectiveness  – EX:  Deliver  training  or  reminder   when  employee  is  out  of  compliance.  
  • 31. By  2020 4.3B of  global  GDP  (mobile  industry) people  globally  own  a  mobile  device infected  devices   unique  subscribers 5.1%   56%   100M
  • 32. Sources • Containing  Mobile  Security  Risks  with  the  80/20  Rule,  Gartner • 2015  Mobile  Security  Trends,  IBM  Security  Systems • The  State  of  Mobile  Computing  Security,  2014,  Enterprise  Strategy  Group • Introducing  the  Mobile  Security  Assessment  and  Audit  Framework,   Gartner • Motive  Security  Labs  2H2014  Malware  Report,  Motive  Security/Alcatel-­‐ Lucent • Mobile  Cyber  Threats,  Kaspersky/Interpol  study • Managed  Diversity  Model  for  BYOD  and  CYOD  to  Manage  and  Safeguard   Users,  IT  and  Business,  Gartner
  • 33. Thank  you.   Tom  Bain @tmbainjr1 @CounterTack