Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
& Pri vacy     le Sec urityM obi                                  !                          or That                  An A...
Smart Phones
Gadgets
Functionality…!   Multimedia          !   Email!   Voice & Video       !   Calendar!   Photography         !   Web Surfing...
….and more apps!!
…not your Dad’s PC
…or his mobile phone
…the future’s so bright
Technology for Humanity
Historical Perspective…technology can come with unexpected consequences
…and of course
Wireless & Cellular!   Wi-Fi       !   Wi-Max!   Hotspots    !   4G!   Bluetooth   !   LTE
Big Brother
Does Privacy Exist?!   Personal information & photos on Facebook?!   Hackers trying to steal your data!   Corporations col...
Threats on the Move!   Botnets                    !   Spyware  !   Mobile Zombie Networks     !   Apps or malware that    ...
Mobile Threat Evolution
Securing your Mobile Device!   Tracking lost phones!   Antivirus, malware, spyware!   Encryption!   Where do you store/bac...
Consumer Solutions!   Lookout Mobile Security  ! MyLookout.com!   McAfee Mobile Security  ! McAfee.com!   Do you have any ...
Enterprise MDM & PointSolutions!   McAfee Enterprise Mobility Management!   Enterproid – http://www.enterproid.com!   Touc...
Conclusion!   The bad guys can get what’s on your phone, even if you encrypt it    and use a password!   The casual thief ...
Q&A!   Do your best and don’t lose sleep over it!!   Now you can go back to playing Angry Birds!!
AITP Presentation on Mobile Security
AITP Presentation on Mobile Security
Upcoming SlideShare
Loading in …5
×

AITP Presentation on Mobile Security

519 views

Published on

Dr. John D. Johnson presents on mobile security to AITP chapter in Davenport, IA. October 2011.

  • Be the first to comment

  • Be the first to like this

AITP Presentation on Mobile Security

  1. 1. & Pri vacy le Sec urityM obi ! or That An App F There’s
  2. 2. Smart Phones
  3. 3. Gadgets
  4. 4. Functionality…!   Multimedia !   Email!   Voice & Video !   Calendar!   Photography !   Web Surfing!   Social Media !   Work!   Shopping !   Reading!   Apps… Apps… Apps! !   Games
  5. 5. ….and more apps!!
  6. 6. …not your Dad’s PC
  7. 7. …or his mobile phone
  8. 8. …the future’s so bright
  9. 9. Technology for Humanity
  10. 10. Historical Perspective…technology can come with unexpected consequences
  11. 11. …and of course
  12. 12. Wireless & Cellular!   Wi-Fi !   Wi-Max!   Hotspots !   4G!   Bluetooth !   LTE
  13. 13. Big Brother
  14. 14. Does Privacy Exist?!   Personal information & photos on Facebook?!   Hackers trying to steal your data!   Corporations collecting and selling your info!   The government watching what you do!   Sensors in many of our consumer goods (cars, appliances, phones, clothing?)
  15. 15. Threats on the Move!   Botnets !   Spyware !   Mobile Zombie Networks !   Apps or malware that steal info/GPS!   Bad Apples !   Bluetooth Hijacking !   Malware in App Stores!   Social Networks !   Wi-Fi Attacks !   A vector for malware !   Spoofs and Phishing !   Spear Phishing
  16. 16. Mobile Threat Evolution
  17. 17. Securing your Mobile Device!   Tracking lost phones!   Antivirus, malware, spyware!   Encryption!   Where do you store/back up your data?!   Apps that use geo-location and access your info!   We often trade privacy for functionality/convenience
  18. 18. Consumer Solutions!   Lookout Mobile Security ! MyLookout.com!   McAfee Mobile Security ! McAfee.com!   Do you have any suggestions to share??
  19. 19. Enterprise MDM & PointSolutions!   McAfee Enterprise Mobility Management! Enterproid – http://www.enterproid.com!   Touchdown for Android - http://www.nitrodesk.com/!   Symantec Mobile Security!   Good MDM!   Mobile Active Defense (like BlackBerry)!   RIM
  20. 20. Conclusion!   The bad guys can get what’s on your phone, even if you encrypt it and use a password!   The casual thief is who you want to protect against!   Don’t keep really sensitive stuff on your mobile device!   Use a tool that allows you to wipe your device if it is stolen (via a web page)!   Apply security policies that make sense: (encryption, PIN, locking, timeout, remote wipe…)!   Leverage good point solutions, even in the enterprise
  21. 21. Q&A!   Do your best and don’t lose sleep over it!!   Now you can go back to playing Angry Birds!!

×