SlideShare a Scribd company logo
1 of 47
Going Mobile: Handling Devices
in the Public Sector
Steven C. Markey,MSIS,PMP,CISSP,CIPP,CISM,CISA,STS-EV,CCSK
Principal,nControl,LLC
AdjunctProfessor
• Presentation Overview
– Mobile Computing Overview
• Mobile Device Overview
• Security Guidance
• Bring Your Own Device (BYOD)
• Mobile Applications (Social Media, etc.)
– Case Studies
• Fairfax County Public School (FCPS)
Going Mobile
• General Overview
– Why should you care about mobile devices?
Going Mobile
Source: thesocialskinny
• What is Mobile Computing?
– (Relatively) New Business Model
• Taking remote computing (laptops) to the next level
• Includes Smartphones & Tablets
• OEMs, Content & (Connectivity) Service Providers
– Causing the Blur of Business & Personal Use
• Personal content / access on business device
• Business content / access on personal device
• Personal use has driven business use
Going Mobile
• Mobile Computing
– Pros
• Enhanced Productivity
• Enables Remote Work
• Potential Cost Savings
• Enhanced Worker / Customer Satisfaction
– Cons
• Security, Legal & Privacy Issues Abound
• Blurred Ownership for BYOD
• Immature Technology
• Lack of Strategy, Tactics & Policies
Going Mobile
• Security Guidance
– To Go or Not To Go Mobile
• Go
– Customers Are Asking / Begging for It!
– Budget & Executive Support
• Do Not Go
– To Be Cool / Bleeding Edge
– Save Money
» Mobile technology is usually an enhancement/added functionality
– Without a Strategy, Tactics & Policies
Going Mobile
Going Mobile
• Data Breaches & Security Incidents
– Average Cost: $7.2 million
– http://www.networkworld.com/news/2011/030811-
ponemon-data-breach.html
– Leading Cause: Negligence, 41%; Hacks, 31%
– http://www.networkworld.com/news/2011/030811-
ponemon-data-breach.html
– Responsible Party: Vendors, 39%
– http://www.theiia.org/chapters/index.cfm/view.news_detail/
cid/197/newsid/13809
– Increased Frequency: 2010-2011, 58%
– http://www.out-law.com/en/articles/2011/october/personal-
data-breaches-on-the-increase-in-private-sector-reports-ico/
Going Mobile
Source: Symantec
Going Mobile
• Security Guidance
– Mobile Device Digital Forensics
• Policy
– City of Ontario, CA v. Quon
• Vendor / Counsel Due Diligence
– Physical Security
• Screen Filters
Going Mobile
Going Mobile
Outdated Thinking:
75% of companies have not addressed smartphone security*
(60% cite security as biggest mobility obstacle*)
IT is Organizing:
Ad hoc deployment giving way
to centralized policies that
include all endpoints
(Server, PC, Laptop and Mobile)
Mobile/wireless IT spending likely
to exceed IT budget growth in
many organizations: 12.5% avg.
growth rate
(Source: Gartner)
Increasing Mobile Device Threats:
Mobile virus variants have doubled
every 6 months since 2004
(235 mobile virus variants in H1’06)
(Source: Symantec Security
Response)
Enterprise Faith:
80% of companies are
allowing corporate
data on devices, yet
continue to not secure
the data*
Fastest Growing Device Segment:
Smartphone growth = 77%
Other mobiles = 27%
Mobiles out ship PC’s 5:1 in 2006
(Source: Canalys for H1’05 to H1’06,
IDC & Gartner)
Source: Symantec
• BYOD
– Affects all with devices and access to your network
• Employees / Contractors / Vendors
– Strategy First, Policy Second, Technology Third
• Deployment
– Who can and who cannot use BYOD?
– Devices & applications supported?
– Data wipes?
– Replace procured devices (BlackBerries)?
– Reimbursements?
– Functionality?
• Acceptable Use
– Jailbreaking?
– Back-ups?
– Indemnity?
Going Mobile
Source: Good Technologies
Source: Fiberlink
Going Mobile
Going Mobile
Source: Cisco
Source: Fiberlink
• BYOD
– Strategy First, Policy Second, Technology Third
• Technical Details
– Mobile Device Management (MDM)
– Mobile Application Management (MAM)
– Enterprise App Stores
– Data-boxing / Sandboxing
Going Mobile
Source: CIO
Source: Dell
Source: Airwatch
Source: Airwatch
Source: Airwatch
Source: Nokia
• BYOD
– Money
• Additional Staff (IT Support, Accounting)
• 100 Devices Cost $170,000 / Year
– $172 / Month / User for VMware
• What is reimbursable? What is not?
– Batteries
– Screen Covers
– Docking Stations
– Carrier Service Plans
– Apps
– Chargers
Going Mobile
Source: CIO
• BYOD
– Productivity
• Mobile Device Users Work More Hours
– 240+ Hours Year
• Classify Workers
– Executives
– (Non) Customer Facing
– (Non) Exempt
– FTEs / Contractors
Going Mobile
Source: WatchGuard
Source: Fiberlink
Going Mobile
• Mobile Applications
– Strategy First, Technology Second
• Strategy
– Centralized / De-centralized Departmental Deployments
– End-User: Internal, External or Both
– Development: Internal, External or Both
– Mobile Device Platform(s)
– Administration & Management
• Technologies
– Social Media
– Custom Apps
– Commercial Off the Shelf (COTS) Apps
– Modified Apps
Going Mobile
Going Mobile
Going Mobile
Source: Mobile Enterprise
Source: Mobile Enterprise
Source: Mobile Enterprise
Seven Mobile App Development Tips
• Keep it simple — Don’t overdo it. The app should mean one thing when you publicize it.
Multiple functions may require a separate app or system.
• Be open to ideas — Engage other departments in the design and functionality of the app.
• Know your audience — The Internet is accessed more frequently via mobile solutions by
people below the poverty line (due to the low initial price point). You’re involving a new
group and need to plan your outreach accordingly.
• Make it relevant — Know what functions and issues are of concern to the community and
make your app more than just a problem reporting program.
• Location, location, location — If your app doesn’t have a spatial component to it and you don’t
have an ability to extract GIS information from the app, you’re more than missing the boat
— you don’t know where the water is.
• Data integration — Make sure the mobile app can feed into your existing work order or
dispatch systems. You don’t want to waste staff time trying to bridge systems.
• Cross-platform support — Don’t leave two-thirds of your public unable to interact with their
local government easily because you decide to only develop
Going Mobile
Source: GovTech
Going Mobile
• Mobile AppDev Vendor Due Diligence
– Certifications, Attestations & Best Practices
• SAS 70 Type II / SSAE 16 SOC I-II-III / ISAE 3402
• ISO 27001 / 2
• ISO 27036
• ISO 9000
• Capability Maturity Model Integration, CMMi
• Building Security In Maturity Model, BSIMM
• Case Study: FCPS
– Background
– Drivers
– Technologies
– Limitations
– Risks
– Lessons Learned
– Next Steps
Going Mobile
• Case Study: FCPS
– Background
–Push BYOD to 180k Students, 23k Staff
– Drivers
–Cost
– Technologies
–iOS, Android, BlackBerry Devices
–WiFi via WPA2-Enterprise
–XpressConnect WLAN
Going Mobile
• Case Study: FCPS
– Limitations
–COPPA-based Regulations
–Limited Staff & Budget
– Risks
–Lost Devices
–Malware Infestations
–COPPA Violations
Going Mobile
• Case Study: FCPS
– Lessons Learned
–(Assumed) Choose Your Battles
–(Assumed) Policy First
– Nest Steps
–(Assumed) Malware Detection
–(Assumed) White Listing of Apps
Going Mobile
Going Mobile
• Presentation Take Aways
– Mobile is here to stay.
–With New Bells & Whistles (Big Data, etc.)
– Paradigm Shift Towards Empowerment
– Strategy & Due Diligence Are VERY Important
–Must Consider the Ecosystem
–Probably Not Cost Effective, Yet Productive
• Questions?
• Contact
– Email: steve@ncontrol-llc.com
– Twitter: @markes1
– LI: http://www.linkedin.com/in/smarkey

More Related Content

What's hot

BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
Harsh Kishore Mishra
 
Misd chap 11 distributed management
Misd chap 11 distributed managementMisd chap 11 distributed management
Misd chap 11 distributed management
Ediey Smile
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
J M
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
Aisha Visram
 

What's hot (20)

BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Bring Your Own Device
Bring Your Own Device Bring Your Own Device
Bring Your Own Device
 
BYOD: Implementation and Security Issues
BYOD: Implementation and Security IssuesBYOD: Implementation and Security Issues
BYOD: Implementation and Security Issues
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD] Business Case Of Bring Your Own Device[ BYOD]
Business Case Of Bring Your Own Device[ BYOD]
 
Wireless Mobility
Wireless MobilityWireless Mobility
Wireless Mobility
 
IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012IBM Mobile Strategy - Mobile World Congress 2012
IBM Mobile Strategy - Mobile World Congress 2012
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
Misd chap 11 distributed management
Misd chap 11 distributed managementMisd chap 11 distributed management
Misd chap 11 distributed management
 
Importance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in HealthcareImportance of Enterprise Mobility Solution in Healthcare
Importance of Enterprise Mobility Solution in Healthcare
 
Csop 2011 Al Raymond
Csop 2011 Al RaymondCsop 2011 Al Raymond
Csop 2011 Al Raymond
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
Come costruire una strategia vincente di BYOD, Bring Your Own Device | Clever...
 
Byod market - A Quick Snapshot
Byod market  - A Quick SnapshotByod market  - A Quick Snapshot
Byod market - A Quick Snapshot
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Mobile Device Managment
Mobile Device Managment Mobile Device Managment
Mobile Device Managment
 
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
Driving Enterprise Mobility Solutions Demand: Understanding End User Requirem...
 

Viewers also liked

Reverse_Engineering_Thick-clients
Reverse_Engineering_Thick-clientsReverse_Engineering_Thick-clients
Reverse_Engineering_Thick-clients
Steve Markey
 
Securing_Medical_Devices_v5
Securing_Medical_Devices_v5Securing_Medical_Devices_v5
Securing_Medical_Devices_v5
Steve Markey
 
ICS_Cybersecurity_FINAL
ICS_Cybersecurity_FINALICS_Cybersecurity_FINAL
ICS_Cybersecurity_FINAL
Steve Markey
 
Na it infographic_fnl
Na it infographic_fnlNa it infographic_fnl
Na it infographic_fnl
Thuyly Vu
 
Vendor_Mgmt_101_IIMC_v2
Vendor_Mgmt_101_IIMC_v2Vendor_Mgmt_101_IIMC_v2
Vendor_Mgmt_101_IIMC_v2
Steve Markey
 
Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1
Steve Markey
 
Securing_Dbs_in_Cloud_v12
Securing_Dbs_in_Cloud_v12Securing_Dbs_in_Cloud_v12
Securing_Dbs_in_Cloud_v12
Steve Markey
 
e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5
Steve Markey
 
FOJ Marketing 2015
FOJ Marketing 2015FOJ Marketing 2015
FOJ Marketing 2015
Erin Perkins
 
Secure_Development_ISSA_v4
Secure_Development_ISSA_v4Secure_Development_ISSA_v4
Secure_Development_ISSA_v4
Steve Markey
 

Viewers also liked (20)

Reverse_Engineering_Thick-clients
Reverse_Engineering_Thick-clientsReverse_Engineering_Thick-clients
Reverse_Engineering_Thick-clients
 
SSO_Good_Bad_Ugly
SSO_Good_Bad_UglySSO_Good_Bad_Ugly
SSO_Good_Bad_Ugly
 
Passion, Persistence, and Patience: The Search for Amelia Earhart
Passion, Persistence, and Patience: The Search for Amelia EarhartPassion, Persistence, and Patience: The Search for Amelia Earhart
Passion, Persistence, and Patience: The Search for Amelia Earhart
 
Securing_Medical_Devices_v5
Securing_Medical_Devices_v5Securing_Medical_Devices_v5
Securing_Medical_Devices_v5
 
Alpha and Omega: Program Outcomes to the Capstone
Alpha and Omega: Program Outcomes to the CapstoneAlpha and Omega: Program Outcomes to the Capstone
Alpha and Omega: Program Outcomes to the Capstone
 
ICS_Cybersecurity_FINAL
ICS_Cybersecurity_FINALICS_Cybersecurity_FINAL
ICS_Cybersecurity_FINAL
 
Safety webinar with mark friend
Safety webinar with mark friendSafety webinar with mark friend
Safety webinar with mark friend
 
MARIA AUXILIADORA
MARIA AUXILIADORAMARIA AUXILIADORA
MARIA AUXILIADORA
 
Na it infographic_fnl
Na it infographic_fnlNa it infographic_fnl
Na it infographic_fnl
 
Vendor_Mgmt_101_IIMC_v2
Vendor_Mgmt_101_IIMC_v2Vendor_Mgmt_101_IIMC_v2
Vendor_Mgmt_101_IIMC_v2
 
Webinar Slides-Three Knows to Great Writing Nov 4 2014
Webinar Slides-Three Knows to Great Writing Nov 4 2014Webinar Slides-Three Knows to Great Writing Nov 4 2014
Webinar Slides-Three Knows to Great Writing Nov 4 2014
 
Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1Cloud_Computing_IIMC_v1
Cloud_Computing_IIMC_v1
 
Presentatie hrm inspiratiedag
Presentatie hrm inspiratiedagPresentatie hrm inspiratiedag
Presentatie hrm inspiratiedag
 
Cryptov2 v1
Cryptov2 v1Cryptov2 v1
Cryptov2 v1
 
Maotchitim
MaotchitimMaotchitim
Maotchitim
 
Securing_Dbs_in_Cloud_v12
Securing_Dbs_in_Cloud_v12Securing_Dbs_in_Cloud_v12
Securing_Dbs_in_Cloud_v12
 
ERAU Webinar Slides: Global Business Environment--China Trip
ERAU Webinar Slides:  Global Business Environment--China TripERAU Webinar Slides:  Global Business Environment--China Trip
ERAU Webinar Slides: Global Business Environment--China Trip
 
e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5e-Discovery_2_Cloud_v5
e-Discovery_2_Cloud_v5
 
FOJ Marketing 2015
FOJ Marketing 2015FOJ Marketing 2015
FOJ Marketing 2015
 
Secure_Development_ISSA_v4
Secure_Development_ISSA_v4Secure_Development_ISSA_v4
Secure_Development_ISSA_v4
 

Similar to Going_Mobile_101_IIMC_v5

Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
Dipesh Mukerji
 

Similar to Going_Mobile_101_IIMC_v5 (20)

Building a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing SystemsBuilding a Mobile Supply Chain while Leveraging Existing Systems
Building a Mobile Supply Chain while Leveraging Existing Systems
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Enterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-PremEnterprise mobility in the Cloud vs On-Prem
Enterprise mobility in the Cloud vs On-Prem
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Cloud Mobility SIG
Cloud Mobility SIGCloud Mobility SIG
Cloud Mobility SIG
 
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
ACT 2014 Business or Pleasure the Challenges of Bring Your Own Device Policie...
 
Enterprise mobility trends 2013
Enterprise mobility trends 2013 Enterprise mobility trends 2013
Enterprise mobility trends 2013
 
The impact of mobile on the IT organization
The impact of mobile on the IT organizationThe impact of mobile on the IT organization
The impact of mobile on the IT organization
 
Federal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive PanelFederal IT Initiatives - BDPA Conference Executive Panel
Federal IT Initiatives - BDPA Conference Executive Panel
 
Build a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYODBuild a Mobile Strategy: Beyond BYOD
Build a Mobile Strategy: Beyond BYOD
 
Overview of Enterprise Mobility
Overview of Enterprise MobilityOverview of Enterprise Mobility
Overview of Enterprise Mobility
 
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
Transportationmobicloudwebinarv2 0englishedition-130620090944-phpapp02
 
Enterprise mobility platforms
Enterprise mobility platformsEnterprise mobility platforms
Enterprise mobility platforms
 
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC BirminghamWhat is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
What is SOTI Unified Endpoint Management - FM 2015 NEC Birmingham
 
MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English MobiCloud Transport Webinar series June 2013 - English
MobiCloud Transport Webinar series June 2013 - English
 
Smarter cyber security v8
Smarter cyber security v8Smarter cyber security v8
Smarter cyber security v8
 

Going_Mobile_101_IIMC_v5

  • 1. Going Mobile: Handling Devices in the Public Sector Steven C. Markey,MSIS,PMP,CISSP,CIPP,CISM,CISA,STS-EV,CCSK Principal,nControl,LLC AdjunctProfessor
  • 2. • Presentation Overview – Mobile Computing Overview • Mobile Device Overview • Security Guidance • Bring Your Own Device (BYOD) • Mobile Applications (Social Media, etc.) – Case Studies • Fairfax County Public School (FCPS) Going Mobile
  • 3. • General Overview – Why should you care about mobile devices? Going Mobile
  • 4.
  • 6.
  • 7.
  • 8. • What is Mobile Computing? – (Relatively) New Business Model • Taking remote computing (laptops) to the next level • Includes Smartphones & Tablets • OEMs, Content & (Connectivity) Service Providers – Causing the Blur of Business & Personal Use • Personal content / access on business device • Business content / access on personal device • Personal use has driven business use Going Mobile
  • 9. • Mobile Computing – Pros • Enhanced Productivity • Enables Remote Work • Potential Cost Savings • Enhanced Worker / Customer Satisfaction – Cons • Security, Legal & Privacy Issues Abound • Blurred Ownership for BYOD • Immature Technology • Lack of Strategy, Tactics & Policies Going Mobile
  • 10. • Security Guidance – To Go or Not To Go Mobile • Go – Customers Are Asking / Begging for It! – Budget & Executive Support • Do Not Go – To Be Cool / Bleeding Edge – Save Money » Mobile technology is usually an enhancement/added functionality – Without a Strategy, Tactics & Policies Going Mobile
  • 11. Going Mobile • Data Breaches & Security Incidents – Average Cost: $7.2 million – http://www.networkworld.com/news/2011/030811- ponemon-data-breach.html – Leading Cause: Negligence, 41%; Hacks, 31% – http://www.networkworld.com/news/2011/030811- ponemon-data-breach.html – Responsible Party: Vendors, 39% – http://www.theiia.org/chapters/index.cfm/view.news_detail/ cid/197/newsid/13809 – Increased Frequency: 2010-2011, 58% – http://www.out-law.com/en/articles/2011/october/personal- data-breaches-on-the-increase-in-private-sector-reports-ico/
  • 14. • Security Guidance – Mobile Device Digital Forensics • Policy – City of Ontario, CA v. Quon • Vendor / Counsel Due Diligence – Physical Security • Screen Filters Going Mobile
  • 15. Going Mobile Outdated Thinking: 75% of companies have not addressed smartphone security* (60% cite security as biggest mobility obstacle*) IT is Organizing: Ad hoc deployment giving way to centralized policies that include all endpoints (Server, PC, Laptop and Mobile) Mobile/wireless IT spending likely to exceed IT budget growth in many organizations: 12.5% avg. growth rate (Source: Gartner) Increasing Mobile Device Threats: Mobile virus variants have doubled every 6 months since 2004 (235 mobile virus variants in H1’06) (Source: Symantec Security Response) Enterprise Faith: 80% of companies are allowing corporate data on devices, yet continue to not secure the data* Fastest Growing Device Segment: Smartphone growth = 77% Other mobiles = 27% Mobiles out ship PC’s 5:1 in 2006 (Source: Canalys for H1’05 to H1’06, IDC & Gartner) Source: Symantec
  • 16. • BYOD – Affects all with devices and access to your network • Employees / Contractors / Vendors – Strategy First, Policy Second, Technology Third • Deployment – Who can and who cannot use BYOD? – Devices & applications supported? – Data wipes? – Replace procured devices (BlackBerries)? – Reimbursements? – Functionality? • Acceptable Use – Jailbreaking? – Back-ups? – Indemnity? Going Mobile
  • 19.
  • 20.
  • 23. • BYOD – Strategy First, Policy Second, Technology Third • Technical Details – Mobile Device Management (MDM) – Mobile Application Management (MAM) – Enterprise App Stores – Data-boxing / Sandboxing Going Mobile
  • 30. • BYOD – Money • Additional Staff (IT Support, Accounting) • 100 Devices Cost $170,000 / Year – $172 / Month / User for VMware • What is reimbursable? What is not? – Batteries – Screen Covers – Docking Stations – Carrier Service Plans – Apps – Chargers Going Mobile Source: CIO
  • 31. • BYOD – Productivity • Mobile Device Users Work More Hours – 240+ Hours Year • Classify Workers – Executives – (Non) Customer Facing – (Non) Exempt – FTEs / Contractors Going Mobile Source: WatchGuard
  • 33. • Mobile Applications – Strategy First, Technology Second • Strategy – Centralized / De-centralized Departmental Deployments – End-User: Internal, External or Both – Development: Internal, External or Both – Mobile Device Platform(s) – Administration & Management • Technologies – Social Media – Custom Apps – Commercial Off the Shelf (COTS) Apps – Modified Apps Going Mobile
  • 39.
  • 40. Seven Mobile App Development Tips • Keep it simple — Don’t overdo it. The app should mean one thing when you publicize it. Multiple functions may require a separate app or system. • Be open to ideas — Engage other departments in the design and functionality of the app. • Know your audience — The Internet is accessed more frequently via mobile solutions by people below the poverty line (due to the low initial price point). You’re involving a new group and need to plan your outreach accordingly. • Make it relevant — Know what functions and issues are of concern to the community and make your app more than just a problem reporting program. • Location, location, location — If your app doesn’t have a spatial component to it and you don’t have an ability to extract GIS information from the app, you’re more than missing the boat — you don’t know where the water is. • Data integration — Make sure the mobile app can feed into your existing work order or dispatch systems. You don’t want to waste staff time trying to bridge systems. • Cross-platform support — Don’t leave two-thirds of your public unable to interact with their local government easily because you decide to only develop Going Mobile Source: GovTech
  • 41. Going Mobile • Mobile AppDev Vendor Due Diligence – Certifications, Attestations & Best Practices • SAS 70 Type II / SSAE 16 SOC I-II-III / ISAE 3402 • ISO 27001 / 2 • ISO 27036 • ISO 9000 • Capability Maturity Model Integration, CMMi • Building Security In Maturity Model, BSIMM
  • 42. • Case Study: FCPS – Background – Drivers – Technologies – Limitations – Risks – Lessons Learned – Next Steps Going Mobile
  • 43. • Case Study: FCPS – Background –Push BYOD to 180k Students, 23k Staff – Drivers –Cost – Technologies –iOS, Android, BlackBerry Devices –WiFi via WPA2-Enterprise –XpressConnect WLAN Going Mobile
  • 44. • Case Study: FCPS – Limitations –COPPA-based Regulations –Limited Staff & Budget – Risks –Lost Devices –Malware Infestations –COPPA Violations Going Mobile
  • 45. • Case Study: FCPS – Lessons Learned –(Assumed) Choose Your Battles –(Assumed) Policy First – Nest Steps –(Assumed) Malware Detection –(Assumed) White Listing of Apps Going Mobile
  • 46. Going Mobile • Presentation Take Aways – Mobile is here to stay. –With New Bells & Whistles (Big Data, etc.) – Paradigm Shift Towards Empowerment – Strategy & Due Diligence Are VERY Important –Must Consider the Ecosystem –Probably Not Cost Effective, Yet Productive
  • 47. • Questions? • Contact – Email: steve@ncontrol-llc.com – Twitter: @markes1 – LI: http://www.linkedin.com/in/smarkey