SlideShare a Scribd company logo
& Pri vacy
     le Sec urity
M obi
                                  !
                          or That
                  An App F
        There’s
Smart Phones
Gadgets
Functionality…
!   Multimedia          !   Email

!   Voice & Video       !   Calendar

!   Photography         !   Web Surfing

!   Social Media        !   Work

!   Shopping            !   Reading

!   Apps… Apps… Apps!   !   Games
….and more apps!!
…not your Dad’s PC
…or his mobile phone
…the future’s so bright
Technology for Humanity
Historical Perspective




…technology can come with unexpected consequences
…and of course
Wireless & Cellular
!   Wi-Fi       !   Wi-Max

!   Hotspots    !   4G

!   Bluetooth   !   LTE
Big Brother
Does Privacy Exist?
!   Personal information & photos on Facebook?

!   Hackers trying to steal your data

!   Corporations collecting and selling your info

!   The government watching what you do

!   Sensors in many of our consumer goods
    (cars, appliances, phones, clothing?)
Threats on the Move
!   Botnets                    !   Spyware

  !   Mobile Zombie Networks     !   Apps or malware that
                                     steal info/GPS
!   Bad Apples
                               !   Bluetooth Hijacking
  !   Malware in App Stores
!   Social Networks            !   Wi-Fi Attacks

  !   A vector for malware     !   Spoofs and Phishing

                                 !   Spear Phishing
Mobile Threat Evolution
Securing your Mobile Device
!   Tracking lost phones

!   Antivirus, malware, spyware

!   Encryption

!   Where do you store/back up your data?

!   Apps that use geo-location and access your info

!   We often trade privacy for functionality/convenience
Consumer Solutions
!   Lookout Mobile Security
  ! MyLookout.com
!   McAfee Mobile Security
  ! McAfee.com
!   Do you have any suggestions to share??
Enterprise MDM & Point
Solutions
!   McAfee Enterprise Mobility Management
!   Enterproid – http://www.enterproid.com
!   Touchdown for Android - http://www.nitrodesk.com/
!   Symantec Mobile Security
!   Good MDM

!   Mobile Active Defense (like BlackBerry)
!   RIM
Conclusion
!   The bad guys can get what’s on your phone, even if you encrypt it
    and use a password

!   The casual thief is who you want to protect against

!   Don’t keep really sensitive stuff on your mobile device

!   Use a tool that allows you to wipe your device if it is stolen (via a web
    page)

!   Apply security policies that make sense:
    (encryption, PIN, locking, timeout, remote wipe…)

!   Leverage good point solutions, even in the enterprise
Q&A
!   Do your best and don’t lose sleep over it!




!   Now you can go back to playing Angry Birds!!

More Related Content

What's hot

Teacher awareness talk slides
Teacher awareness talk slidesTeacher awareness talk slides
Teacher awareness talk slides
Philip Ling
 
Tech trends 2011
Tech trends 2011Tech trends 2011
Tech trends 2011sputnik5
 
Copy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintCopy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintJames Webb
 
Emerging Web Trends & Career Opportunities in IT 2013
Emerging Web Trends & Career Opportunities in IT 2013Emerging Web Trends & Career Opportunities in IT 2013
Emerging Web Trends & Career Opportunities in IT 2013
Vernon Fernandes
 
Lo1 405 moochies_presentation
Lo1 405 moochies_presentationLo1 405 moochies_presentation
Lo1 405 moochies_presentation
kauepgarcia
 
Mobile Changing the Face of Business
Mobile Changing the Face of BusinessMobile Changing the Face of Business
Mobile Changing the Face of Business
Kim Hughes
 
Internet of Things to make a sale
Internet of Things to make a saleInternet of Things to make a sale
Internet of Things to make a sale
Ashish Jhalani
 
Role of mobile phone in life
Role of mobile phone in lifeRole of mobile phone in life
Role of mobile phone in life
Taimoor Muzaffar Gondal
 
Cool Tools
Cool ToolsCool Tools
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)itgsabc
 
Technology: It's Not Just for Work, You Know
Technology: It's Not Just for Work, You KnowTechnology: It's Not Just for Work, You Know
Technology: It's Not Just for Work, You Know
Sally Gore, Lamar Soutter Library, UMass Medical School
 
How Social Do You Want Your PR? Six Tips For 2013
How Social Do You Want Your PR? Six Tips For 2013How Social Do You Want Your PR? Six Tips For 2013
How Social Do You Want Your PR? Six Tips For 2013
twofourseven
 
Smartphones
SmartphonesSmartphones
Smartphones
Zobia Hamid
 
Should you get the come backing nokia banana phone
Should you get the come backing nokia banana phoneShould you get the come backing nokia banana phone
Should you get the come backing nokia banana phone
Gina Benderson
 
Mr and Mrs Presenter
Mr and Mrs PresenterMr and Mrs Presenter
Mr and Mrs PresenterGovinda raj
 
Content management for cross device final
Content management for cross device finalContent management for cross device final
Content management for cross device finalGeorges-Alexandre Hanin
 

What's hot (19)

Teacher awareness talk slides
Teacher awareness talk slidesTeacher awareness talk slides
Teacher awareness talk slides
 
Tech trends 2011
Tech trends 2011Tech trends 2011
Tech trends 2011
 
Fosi parent-tips
Fosi parent-tipsFosi parent-tips
Fosi parent-tips
 
Copy of Managing Your Digital Footprint
Copy of Managing Your Digital FootprintCopy of Managing Your Digital Footprint
Copy of Managing Your Digital Footprint
 
Emerging Web Trends & Career Opportunities in IT 2013
Emerging Web Trends & Career Opportunities in IT 2013Emerging Web Trends & Career Opportunities in IT 2013
Emerging Web Trends & Career Opportunities in IT 2013
 
Lo1 405 moochies_presentation
Lo1 405 moochies_presentationLo1 405 moochies_presentation
Lo1 405 moochies_presentation
 
Mobile Changing the Face of Business
Mobile Changing the Face of BusinessMobile Changing the Face of Business
Mobile Changing the Face of Business
 
Internet of Things to make a sale
Internet of Things to make a saleInternet of Things to make a sale
Internet of Things to make a sale
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Cscs (4)
Cscs (4)Cscs (4)
Cscs (4)
 
Role of mobile phone in life
Role of mobile phone in lifeRole of mobile phone in life
Role of mobile phone in life
 
Cool Tools
Cool ToolsCool Tools
Cool Tools
 
Revision Terrorist And Rebel Use Of It (David & Jorge)
Revision   Terrorist And Rebel Use Of It (David & Jorge)Revision   Terrorist And Rebel Use Of It (David & Jorge)
Revision Terrorist And Rebel Use Of It (David & Jorge)
 
Technology: It's Not Just for Work, You Know
Technology: It's Not Just for Work, You KnowTechnology: It's Not Just for Work, You Know
Technology: It's Not Just for Work, You Know
 
How Social Do You Want Your PR? Six Tips For 2013
How Social Do You Want Your PR? Six Tips For 2013How Social Do You Want Your PR? Six Tips For 2013
How Social Do You Want Your PR? Six Tips For 2013
 
Smartphones
SmartphonesSmartphones
Smartphones
 
Should you get the come backing nokia banana phone
Should you get the come backing nokia banana phoneShould you get the come backing nokia banana phone
Should you get the come backing nokia banana phone
 
Mr and Mrs Presenter
Mr and Mrs PresenterMr and Mrs Presenter
Mr and Mrs Presenter
 
Content management for cross device final
Content management for cross device finalContent management for cross device final
Content management for cross device final
 

Similar to AITP Presentation on Mobile Security

Mobile Connects the Future
Mobile Connects the FutureMobile Connects the Future
Mobile Connects the Future
BrandEmotivity
 
Mobile changes everything, no one is safe
Mobile changes everything, no one is safeMobile changes everything, no one is safe
Mobile changes everything, no one is safe
Jorge Sebastiao
 
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
edSocialMedia
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Allan Isfan
 
Mobile 101
Mobile 101 Mobile 101
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
Quick Heal Technologies Ltd.
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
The Center for Identity
 
The Mobile Future
The Mobile FutureThe Mobile Future
The Mobile Future
MintTwist
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
Barbara Ludwig
 
Going Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always ConnectedGoing Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always Connected
BusinessOnline
 
Going Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always ConnectedGoing Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always Connected
BusinessOnline
 
Mobile security
Mobile securityMobile security
Mobile security
CyberoamAcademy
 
Tom Purves: Designing for An Augmented Reality World
Tom Purves: Designing for An Augmented Reality WorldTom Purves: Designing for An Augmented Reality World
Tom Purves: Designing for An Augmented Reality WorldRefresh Events
 
Designing for an Augmented Reality world
Designing for an Augmented Reality worldDesigning for an Augmented Reality world
Designing for an Augmented Reality world
thomas.purves
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
i4box Anon
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
Sheikh Ali Asghar
 
Who needs a smarter phone?
Who needs a smarter phone?Who needs a smarter phone?
Who needs a smarter phone?
Nikolay Sotirov
 
Heavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online SecurityHeavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
Rihab Chebbah
 

Similar to AITP Presentation on Mobile Security (20)

Mobile Connects the Future
Mobile Connects the FutureMobile Connects the Future
Mobile Connects the Future
 
Mobile changes everything, no one is safe
Mobile changes everything, no one is safeMobile changes everything, no one is safe
Mobile changes everything, no one is safe
 
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
Jon Moser's edSocialMedia Webinar: Going Mobile: How it Pertains to Social Me...
 
Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015Myeventapps mobile 101 self guided july 2015
Myeventapps mobile 101 self guided july 2015
 
Mobile 101
Mobile 101 Mobile 101
Mobile 101
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
The Mobile Future
The Mobile FutureThe Mobile Future
The Mobile Future
 
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At QualcommIf At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
If At First You Don't Succeed... The Mobile Learning Journey At Qualcomm
 
Going Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always ConnectedGoing Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always Connected
 
Going Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always ConnectedGoing Mobile: Serving the Always On, Always Connected
Going Mobile: Serving the Always On, Always Connected
 
Mobile security
Mobile securityMobile security
Mobile security
 
Tom Purves: Designing for An Augmented Reality World
Tom Purves: Designing for An Augmented Reality WorldTom Purves: Designing for An Augmented Reality World
Tom Purves: Designing for An Augmented Reality World
 
Designing for an Augmented Reality world
Designing for an Augmented Reality worldDesigning for an Augmented Reality world
Designing for an Augmented Reality world
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Smartphones 2015
Smartphones 2015Smartphones 2015
Smartphones 2015
 
Who needs a smarter phone?
Who needs a smarter phone?Who needs a smarter phone?
Who needs a smarter phone?
 
Heavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online SecurityHeavy Chef Session - Justin Stanford's presentation on Online Security
Heavy Chef Session - Justin Stanford's presentation on Online Security
 
BYOD - Bring Your Own Device
BYOD - Bring Your Own DeviceBYOD - Bring Your Own Device
BYOD - Bring Your Own Device
 

More from John D. Johnson

Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
John D. Johnson
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
John D. Johnson
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
John D. Johnson
 
Fundamentals of Light and Matter
Fundamentals of Light and MatterFundamentals of Light and Matter
Fundamentals of Light and Matter
John D. Johnson
 
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
John D. Johnson
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
John D. Johnson
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive Team
John D. Johnson
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?
John D. Johnson
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
John D. Johnson
 
Cyber Education ISACA 25 April 2017
Cyber Education ISACA 25 April 2017Cyber Education ISACA 25 April 2017
Cyber Education ISACA 25 April 2017
John D. Johnson
 
Discovering a Universe Beyond the Cosmic Shore
Discovering a Universe Beyond the Cosmic ShoreDiscovering a Universe Beyond the Cosmic Shore
Discovering a Universe Beyond the Cosmic Shore
John D. Johnson
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
John D. Johnson
 
Mars Talk for IEEE
Mars Talk for IEEEMars Talk for IEEE
Mars Talk for IEEE
John D. Johnson
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote
John D. Johnson
 

More from John D. Johnson (14)

Security & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing TechnologySecurity & Privacy Considerations for Advancing Technology
Security & Privacy Considerations for Advancing Technology
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Fundamentals of Light and Matter
Fundamentals of Light and MatterFundamentals of Light and Matter
Fundamentals of Light and Matter
 
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
CERIAS Symposium: John Johnson, Future of Cybersecurity 2050
 
Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?Managing Enterprise Risk: Why U No Haz Metrics?
Managing Enterprise Risk: Why U No Haz Metrics?
 
Presenting Metrics to the Executive Team
Presenting Metrics to the Executive TeamPresenting Metrics to the Executive Team
Presenting Metrics to the Executive Team
 
Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?Big Data: Big Deal or Big Brother?
Big Data: Big Deal or Big Brother?
 
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and DoubtThe Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
The Journey to Cyber Resilience in a World of Fear, Uncertainty and Doubt
 
Cyber Education ISACA 25 April 2017
Cyber Education ISACA 25 April 2017Cyber Education ISACA 25 April 2017
Cyber Education ISACA 25 April 2017
 
Discovering a Universe Beyond the Cosmic Shore
Discovering a Universe Beyond the Cosmic ShoreDiscovering a Universe Beyond the Cosmic Shore
Discovering a Universe Beyond the Cosmic Shore
 
Security & Privacy in Cloud Computing
Security & Privacy in Cloud ComputingSecurity & Privacy in Cloud Computing
Security & Privacy in Cloud Computing
 
Mars Talk for IEEE
Mars Talk for IEEEMars Talk for IEEE
Mars Talk for IEEE
 
2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote2011 SC Magazine Insider Threat Keynote
2011 SC Magazine Insider Threat Keynote
 

AITP Presentation on Mobile Security

  • 1. & Pri vacy le Sec urity M obi ! or That An App F There’s
  • 4. Functionality… !   Multimedia !   Email !   Voice & Video !   Calendar !   Photography !   Web Surfing !   Social Media !   Work !   Shopping !   Reading !   Apps… Apps… Apps! !   Games
  • 6.
  • 10.
  • 12. Historical Perspective …technology can come with unexpected consequences
  • 14. Wireless & Cellular !   Wi-Fi !   Wi-Max !   Hotspots !   4G !   Bluetooth !   LTE
  • 16. Does Privacy Exist? !   Personal information & photos on Facebook? !   Hackers trying to steal your data !   Corporations collecting and selling your info !   The government watching what you do !   Sensors in many of our consumer goods (cars, appliances, phones, clothing?)
  • 17. Threats on the Move !   Botnets !   Spyware !   Mobile Zombie Networks !   Apps or malware that steal info/GPS !   Bad Apples !   Bluetooth Hijacking !   Malware in App Stores !   Social Networks !   Wi-Fi Attacks !   A vector for malware !   Spoofs and Phishing !   Spear Phishing
  • 19. Securing your Mobile Device !   Tracking lost phones !   Antivirus, malware, spyware !   Encryption !   Where do you store/back up your data? !   Apps that use geo-location and access your info !   We often trade privacy for functionality/convenience
  • 20. Consumer Solutions !   Lookout Mobile Security ! MyLookout.com !   McAfee Mobile Security ! McAfee.com !   Do you have any suggestions to share??
  • 21. Enterprise MDM & Point Solutions !   McAfee Enterprise Mobility Management ! Enterproid – http://www.enterproid.com !   Touchdown for Android - http://www.nitrodesk.com/ !   Symantec Mobile Security !   Good MDM !   Mobile Active Defense (like BlackBerry) !   RIM
  • 22. Conclusion !   The bad guys can get what’s on your phone, even if you encrypt it and use a password !   The casual thief is who you want to protect against !   Don’t keep really sensitive stuff on your mobile device !   Use a tool that allows you to wipe your device if it is stolen (via a web page) !   Apply security policies that make sense: (encryption, PIN, locking, timeout, remote wipe…) !   Leverage good point solutions, even in the enterprise
  • 23. Q&A !   Do your best and don’t lose sleep over it! !   Now you can go back to playing Angry Birds!!