SlideShare a Scribd company logo
1 of 33
Download to read offline
BYOD:
Device Control in the
 Wild, Wild, West



      September 25th, 2012
About the Speaker
• Chief Security Officer, Q2ebanking

• Former CIO for multi-billion financial institution

• 13 years industry exp. in Information Technology & Security

• CISSP® (Certified Information Systems Security Professional)

• Published & quoted in American Banker, ABA Banking
  Journal, BankInfoSecurity.com, CIO Magazine,
  ComputerWorld, Credit Union Times

• Speaker/evangelist - InfoSec World, Innotech, ComputerWorld
  SNW, BAI PaymentsConnect, regional banking conferences
Agenda
• Changing mobile landscape
• Drivers behind BYOD(evice)
• Considering threat agents
• Implementing a BYOD program
 • policies, technologies, privacy
• Summary & QA
Mobile Tidal Wave
• 300,000        apps developed in 3 years

• 1.2 billion    mobile web users

• 8 trillion     SMS messages sent last year

• 35 billion     value of apps downloaded

• 86.1 billion   mobile payments made in 2011

• 1.1 billion    mobile banking customers (2015)
BYOD:
    Bring Your Own Device
formally advocates use of personal or non-company
issued equipment to accessing corporate resources
& data

obligates IT to ensure jobs can be performed with an
accept- able level of security
Business Benefits
•   Cut operating costs by eliminating support

       -   Operating system support

       -   Application support

       -   Access support

•   Reduce device hardware costs & procurement

•   Remove productivity barriers (flexible work styles)

•   Extend applications to offsite/traveling employees

•   Increase employee satisfaction through programs

•   On-demand, whenever, wherever, multiple channels
BYOR(isk)
• Understand the risks
  being introduced

• Industry is coming to
  terms with security
  concerns that exist
  around unsecured mobile
  devices/smartphones

• Conduct a risk
  assessment to identify
  address the different
  threat agents
Protect   What?

     From   whom? or what?

    and   How?
BYOD presents a NEW
    problem...

  ...well, not really
The “Human” Problem
• Increased use of social media, coupled with the ubiquity of
  ecommerce, has fueled growth in socially engineered schemes
  waged for financial gain

• According to the Anti-Phishing Working Group, there are
  presently about 30,000 to 35,000 unique phishing campaigns
  every month, each targeting hundreds of thousands to millions
  of email users

• Anytime a user is asked to make a voluntary decision, phishing
  schemes will work, because humans are easy to manipulate

               ➡ this a social problem, not a technical problem.
Do you really believe
that you control your
     endpoints?
Device Control
•   How many of you have local admin rights on
    your computer?

•   How many of you are able to take your
    computer and browse the Internet freely
    away from the network?

•   How many of you disallow PST files - do
    prevent users from taking data?

•   How many of you are doing mobile device
    management?
How do you manage a device
  that you don’t control?
Get out in Front
Reactive approaches result in ad hoc programs

 Are you prepared to answer
 this question from your CEO:

 “what security did we have on
 the device when he lost it?”
Understand your Data
What are you protecting?
• How sensitive is your data?
• How is your sensitive data used?
• What compliance and/or regulations
  exist?
Focus Group:
Computer Security
Jailbreaking Devices
•   Why? for functionality or to
    get paid apps for free

•   “Jailbreaking” or “rooting
    destroys the security model

•   Jailbreaking techniques leave
    the device with a standard
    root password that may grant
    admin-level access to an
    app...(and attacker or
    malware)

•   Convenience at the sake of
    security
Mobile Malware
Mobile Malware
•   Researchers identify
    first instance of mobile
    malware in 2004

•   More than 80 infected     ex. Gozi
    apps have been
    removed from Google
    Play since 2011

•   Android malware has
    infected more than
    250,000 users
QR Codes
• QR codes surfacing
  containing malicious links

• First case confirmed by
  Kaspersky Labs last year -
  mobile malware used to         http://siliconangle.com/blog/

  send premium SMS
                               2011/10/21/infected-qr-malware-
                               surfaces-on-smartphones-apps/
  messages
Which one is evil?
Not the Device
• Over focused on the     • Data in motion
  endpoint and device       (network)

• ...it’s the data stupid! • Data presentation
                            (application)

                          • Data at rest
                            (data stores/shares)
Establish Policies
•   Will a formal agreement between the institution and the
    BYOD user (EULA) specify allowed activities and the
    consequences for breaking the agreement?
•   Create policies before procuring devices
•   Do your BYOD policies address?
       • the use of consumer apps
       • services such as cloud storage
         > Box.net, Dropbox, SpiderOak, Evernote, SkyDrive, iCloud

•   Communicate the privacy policy to employees and make
    it clear what data you can & cannot collect from their
    mobile devices
MDM Solutions
•   What are you trying to protect
•   Address four key areas:
      1) standardization of service, not device
         • consistent set of security controls across different
             platforms while providing the same level of service
      2) common delivery methods
      3) intelligent access controls - role, group, etc.
      4) data containment
         • encryption
         • partitioning
         • sandboxing
Questions to Consider
•   Which devices will be supported?

•   What is the risk profile of the employee/group using the devices?

•   Does the institution have the ability to require and install
    applications to the device(s), such as remote wipe and/or virus/
    malware software?

•   Can the institution require a “business only secure partition” on
    the mobile device? 

•   Mandatory or will the organization bend for certain users?

•   What happens if the device is compromised?  Will your
    institution be able to perform any forensics?

•   When should we say no?
Balancing User Privacy
•   Is ‘sandboxing’ or ‘partitioning’ sufficient
    to maintain separate personas?

•   Is there a reasonable expectation of
    privacy?

     ✓should the organization be able to
        read messages?

     ✓should the organization be able to
        perform a full wipe of the device?

•   State specific privacy laws (ex CA/MA)
    may prevent corporations from even
    viewing non-corporate data
Policy + Technology
•   Policies alone not sufficient - Technology ensures enforcement

•   Many solutions, but requirements should include:

     ✓simple self-enrollment --> complexity increases non-
        compliance

     ✓over-the-air updating
     ✓ability to selectively wipe data on the device
         •   corporate apps, email, and documents must be protected
             by IT if the employee decides to leave the organization

     ✓management of the OS patch/update process
     ✓reporting & alerting --> devices that are non-compliant
COMPLIANCE
Legal Issues
• Big question surrounds legal issues -- agreements
  between employees and employer -- and placing a
  company-owned agent on an employee’s handset

• It’s the start of whole new relationship between
  mobile device users, in dual roles as individual
  consumer and employee, and the company for
  which they work.

• Unresolved questions?

        • e-discovery, Culpability, Liability

        • ex: combined mailboxes
Summary
•   Understand the mobile landscape of your device
    population
•   Policies and procedures should reflect the allowable usage
    and the breadth and depth of security and control settings

•   Consider how BYOD policies can be tested and validated
    to ensure that security and controls have been
    successfully implemented

•   Threat landscape is continuously changing

•   Risk assessments should be performed regularly to identify
    threats and vulnerabilities
Thank You
if    “?” >=

     then

response_variable = ‘answer‘

     else

response_variable = ‘thankyou’

end if;

More Related Content

What's hot

The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
mkeane
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
Caston Thomas
 

What's hot (20)

Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
Security Awareness
Security AwarenessSecurity Awareness
Security Awareness
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011
 
Mobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefitsMobile device management and BYOD – simple changes, big benefits
Mobile device management and BYOD – simple changes, big benefits
 
Community IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best PracticesCommunity IT Innovators - IT Security Best Practices
Community IT Innovators - IT Security Best Practices
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti Porfolio
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation3 ways to secure your law firm’s information and reputation
3 ways to secure your law firm’s information and reputation
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 

Viewers also liked

White Paper: Aligning application security and compliance
White Paper: Aligning application security and complianceWhite Paper: Aligning application security and compliance
White Paper: Aligning application security and compliance
Security Innovation
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
Bloxx
 
Le BYOD : entre perspectives et réalités pédagogiques
Le BYOD : entre perspectives et réalités pédagogiquesLe BYOD : entre perspectives et réalités pédagogiques
Le BYOD : entre perspectives et réalités pédagogiques
Aurélien Fiévez
 

Viewers also liked (20)

BYOD Security Risks for Business
BYOD Security Risks for BusinessBYOD Security Risks for Business
BYOD Security Risks for Business
 
Ravi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security RisksRavi Namboori Equinix on BYOD Security Risks
Ravi Namboori Equinix on BYOD Security Risks
 
White Paper: Aligning application security and compliance
White Paper: Aligning application security and complianceWhite Paper: Aligning application security and compliance
White Paper: Aligning application security and compliance
 
BYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for EducationBYOD & Social Media: The Risks and Benefits for Education
BYOD & Social Media: The Risks and Benefits for Education
 
Can You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security RisksCan You Steal From Me Now? Mobile and BYOD Security Risks
Can You Steal From Me Now? Mobile and BYOD Security Risks
 
The challenges of BYOD for campus network by Leonard Raphael
The challenges of BYOD for campus network by Leonard RaphaelThe challenges of BYOD for campus network by Leonard Raphael
The challenges of BYOD for campus network by Leonard Raphael
 
BYOD: Risks and Opportunities
BYOD: Risks and OpportunitiesBYOD: Risks and Opportunities
BYOD: Risks and Opportunities
 
Turn BYOD into a Business Asset
Turn BYOD into a Business AssetTurn BYOD into a Business Asset
Turn BYOD into a Business Asset
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
10 idées recues sur le Bring Your Own Device
10 idées recues sur le Bring Your Own Device10 idées recues sur le Bring Your Own Device
10 idées recues sur le Bring Your Own Device
 
Enterprise Mobility: Challenges and Choices
Enterprise Mobility: Challenges and ChoicesEnterprise Mobility: Challenges and Choices
Enterprise Mobility: Challenges and Choices
 
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
10-8-13 BYOD Risk Presentation for Nassau County Bar Committee
 
Le BYOD : entre perspectives et réalités pédagogiques
Le BYOD : entre perspectives et réalités pédagogiquesLe BYOD : entre perspectives et réalités pédagogiques
Le BYOD : entre perspectives et réalités pédagogiques
 
Mobile Enterprise Application Platform: A solution to myriad challenges in en...
Mobile Enterprise Application Platform: A solution to myriad challenges in en...Mobile Enterprise Application Platform: A solution to myriad challenges in en...
Mobile Enterprise Application Platform: A solution to myriad challenges in en...
 
The Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full PresentationThe Financial Impact of BYOD Full Presentation
The Financial Impact of BYOD Full Presentation
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
AEROW DIGITAL - BYOD / Enterprise Mobility Management
AEROW DIGITAL - BYOD / Enterprise Mobility ManagementAEROW DIGITAL - BYOD / Enterprise Mobility Management
AEROW DIGITAL - BYOD / Enterprise Mobility Management
 
Mobiquant - Enterprise Mobility Facts 2015 Infographics - Société
Mobiquant - Enterprise Mobility Facts 2015 Infographics - SociétéMobiquant - Enterprise Mobility Facts 2015 Infographics - Société
Mobiquant - Enterprise Mobility Facts 2015 Infographics - Société
 
BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 

Similar to BYOD: Device Control in the Wild, Wild, West

Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
Sonny Hashmi
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
tmbainjr131
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
Steve Markey
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
K Singh
 

Similar to BYOD: Device Control in the Wild, Wild, West (20)

Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Building a Mobile Security Model
Building a Mobile Security Model Building a Mobile Security Model
Building a Mobile Security Model
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
Security For Business: Are You And Your Customers Safe
Security For Business:  Are You And Your Customers SafeSecurity For Business:  Are You And Your Customers Safe
Security For Business: Are You And Your Customers Safe
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
U nit 4
U nit 4U nit 4
U nit 4
 
BYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi MaruBYOD: Beating IT’s Kobayashi Maru
BYOD: Beating IT’s Kobayashi Maru
 
Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5Going_Mobile_101_IIMC_v5
Going_Mobile_101_IIMC_v5
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
Richard_Hayton_SUPPORTING_ANY_DEVICE_IT-tinget_2014
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 

More from Jay McLaughlin

Evaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentEvaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC Assessment
Jay McLaughlin
 

More from Jay McLaughlin (6)

Evaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentEvaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC Assessment
 
Securing the Virtual Branch
Securing the Virtual BranchSecuring the Virtual Branch
Securing the Virtual Branch
 
Exploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsExploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial Institutions
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information Infrastructure
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The Enterprise
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

BYOD: Device Control in the Wild, Wild, West

  • 1. BYOD: Device Control in the Wild, Wild, West September 25th, 2012
  • 2. About the Speaker • Chief Security Officer, Q2ebanking • Former CIO for multi-billion financial institution • 13 years industry exp. in Information Technology & Security • CISSP® (Certified Information Systems Security Professional) • Published & quoted in American Banker, ABA Banking Journal, BankInfoSecurity.com, CIO Magazine, ComputerWorld, Credit Union Times • Speaker/evangelist - InfoSec World, Innotech, ComputerWorld SNW, BAI PaymentsConnect, regional banking conferences
  • 3. Agenda • Changing mobile landscape • Drivers behind BYOD(evice) • Considering threat agents • Implementing a BYOD program • policies, technologies, privacy • Summary & QA
  • 4. Mobile Tidal Wave • 300,000 apps developed in 3 years • 1.2 billion mobile web users • 8 trillion SMS messages sent last year • 35 billion value of apps downloaded • 86.1 billion mobile payments made in 2011 • 1.1 billion mobile banking customers (2015)
  • 5. BYOD: Bring Your Own Device formally advocates use of personal or non-company issued equipment to accessing corporate resources & data obligates IT to ensure jobs can be performed with an accept- able level of security
  • 6. Business Benefits • Cut operating costs by eliminating support - Operating system support - Application support - Access support • Reduce device hardware costs & procurement • Remove productivity barriers (flexible work styles) • Extend applications to offsite/traveling employees • Increase employee satisfaction through programs • On-demand, whenever, wherever, multiple channels
  • 7.
  • 8. BYOR(isk) • Understand the risks being introduced • Industry is coming to terms with security concerns that exist around unsecured mobile devices/smartphones • Conduct a risk assessment to identify address the different threat agents
  • 9. Protect What? From whom? or what? and How?
  • 10. BYOD presents a NEW problem... ...well, not really
  • 11. The “Human” Problem • Increased use of social media, coupled with the ubiquity of ecommerce, has fueled growth in socially engineered schemes waged for financial gain • According to the Anti-Phishing Working Group, there are presently about 30,000 to 35,000 unique phishing campaigns every month, each targeting hundreds of thousands to millions of email users • Anytime a user is asked to make a voluntary decision, phishing schemes will work, because humans are easy to manipulate ➡ this a social problem, not a technical problem.
  • 12. Do you really believe that you control your endpoints?
  • 13. Device Control • How many of you have local admin rights on your computer? • How many of you are able to take your computer and browse the Internet freely away from the network? • How many of you disallow PST files - do prevent users from taking data? • How many of you are doing mobile device management?
  • 14. How do you manage a device that you don’t control?
  • 15. Get out in Front Reactive approaches result in ad hoc programs Are you prepared to answer this question from your CEO: “what security did we have on the device when he lost it?”
  • 16. Understand your Data What are you protecting? • How sensitive is your data? • How is your sensitive data used? • What compliance and/or regulations exist?
  • 18. Jailbreaking Devices • Why? for functionality or to get paid apps for free • “Jailbreaking” or “rooting destroys the security model • Jailbreaking techniques leave the device with a standard root password that may grant admin-level access to an app...(and attacker or malware) • Convenience at the sake of security
  • 20. Mobile Malware • Researchers identify first instance of mobile malware in 2004 • More than 80 infected ex. Gozi apps have been removed from Google Play since 2011 • Android malware has infected more than 250,000 users
  • 21. QR Codes • QR codes surfacing containing malicious links • First case confirmed by Kaspersky Labs last year - mobile malware used to http://siliconangle.com/blog/ send premium SMS 2011/10/21/infected-qr-malware- surfaces-on-smartphones-apps/ messages
  • 22. Which one is evil?
  • 23.
  • 24. Not the Device • Over focused on the • Data in motion endpoint and device (network) • ...it’s the data stupid! • Data presentation (application) • Data at rest (data stores/shares)
  • 25. Establish Policies • Will a formal agreement between the institution and the BYOD user (EULA) specify allowed activities and the consequences for breaking the agreement? • Create policies before procuring devices • Do your BYOD policies address? • the use of consumer apps • services such as cloud storage > Box.net, Dropbox, SpiderOak, Evernote, SkyDrive, iCloud • Communicate the privacy policy to employees and make it clear what data you can & cannot collect from their mobile devices
  • 26. MDM Solutions • What are you trying to protect • Address four key areas: 1) standardization of service, not device • consistent set of security controls across different platforms while providing the same level of service 2) common delivery methods 3) intelligent access controls - role, group, etc. 4) data containment • encryption • partitioning • sandboxing
  • 27. Questions to Consider • Which devices will be supported? • What is the risk profile of the employee/group using the devices? • Does the institution have the ability to require and install applications to the device(s), such as remote wipe and/or virus/ malware software? • Can the institution require a “business only secure partition” on the mobile device?  • Mandatory or will the organization bend for certain users? • What happens if the device is compromised?  Will your institution be able to perform any forensics? • When should we say no?
  • 28. Balancing User Privacy • Is ‘sandboxing’ or ‘partitioning’ sufficient to maintain separate personas? • Is there a reasonable expectation of privacy? ✓should the organization be able to read messages? ✓should the organization be able to perform a full wipe of the device? • State specific privacy laws (ex CA/MA) may prevent corporations from even viewing non-corporate data
  • 29. Policy + Technology • Policies alone not sufficient - Technology ensures enforcement • Many solutions, but requirements should include: ✓simple self-enrollment --> complexity increases non- compliance ✓over-the-air updating ✓ability to selectively wipe data on the device • corporate apps, email, and documents must be protected by IT if the employee decides to leave the organization ✓management of the OS patch/update process ✓reporting & alerting --> devices that are non-compliant
  • 31. Legal Issues • Big question surrounds legal issues -- agreements between employees and employer -- and placing a company-owned agent on an employee’s handset • It’s the start of whole new relationship between mobile device users, in dual roles as individual consumer and employee, and the company for which they work. • Unresolved questions? • e-discovery, Culpability, Liability • ex: combined mailboxes
  • 32. Summary • Understand the mobile landscape of your device population • Policies and procedures should reflect the allowable usage and the breadth and depth of security and control settings • Consider how BYOD policies can be tested and validated to ensure that security and controls have been successfully implemented • Threat landscape is continuously changing • Risk assessments should be performed regularly to identify threats and vulnerabilities
  • 33. Thank You if “?” >= then response_variable = ‘answer‘ else response_variable = ‘thankyou’ end if;