Agenda:
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
BYOD or BYOA
How to Secure the data storages and transportation
A brief comparison between two cloud platforms AWS vs. Azure. Compare Microsoft Azure services, pricing, customers and more with Amazon AWS through slides.
A brief comparison between two cloud platforms AWS vs. Azure. Compare Microsoft Azure services, pricing, customers and more with Amazon AWS through slides.
A Zero Trust approach should extend throughout the entire digital estate and serve as an integrated security philosophy and end to end strategy.
Identities. Identities whether they represent people, services, or IOT devices define the Zero Trust control plane. When an identity attempts to access a resource, we need to verify that identity with strong authentication, ensure access is compliant and typical for that identity, and follows least privilege access principles.
Devices. Once an identity has been granted access to a resource, data can flow to a variety of different devices From IoT devices to smartphones, BYOD to partner managed devices, and on premises workloads to cloud hosted servers. This diversity creates a massive attack surface area, requiring we monitor and enforce device health and compliance for secure access.
Applications. Applications and APIs provide the interface by which data is consumed. They may be legacy on premises, lift and shifted to cloud workloads, or modern SaaS applications. Controls and technologies should be applied to discover Shadow IT, ensure appropriate in-app permissions, gate access based on real-time analytics, monitor for abnormal behavior, control of user actions, and validate secure configuration options.
Data. Ultimately, security teams are focused on protecting data. Where possible, data should remain safe even if it leaves the devices, apps, infrastructure, and networks the organization controls. Data should be classified, labeled, and encrypted, and access restricted based on those attributes.
Infrastructure. Infrastructure (whether on premises servers, cloud based VMs, containers, or micro services) represents a critical threat vector. Assess for version, configuration, and JIT access to harden defense, use telemetry to detect attacks and anomalies, and automatically block and flag risky behavior and take protective actions.
Networks. All data is ultimately accessed over network infrastructure. Networking controls can provide critical “in pipe” controls to enhance visibility and help prevent attackers from moving laterally across the network. Networks should be segmented (including deeper in network micro segmentation) and real time threat protection, end to end encryption, monitoring, and analytics should be employed.
Each of these six foundational elements serves as a source of the signal, a control plane for enforcement, and a critical resource to defend. You should appropriately spread your investments across each of these elements for maximum protection.
Identity and Access Management (IAM) is a crucial part of living in a connected world. It involves managing multiple identities of an individual or entity, distributed across disparate portals. In an enterprise, IAM solutions serve as a mean to secure access, control user activities and manage authentication for an App or a group of software (infrastructure).
This detailed PowerPoint brings you the most fundamental concepts and ideas related to identity and access management. Plus, we have debunked some popular IAM myths, so do checkout!
Private Cloud Architecture: Moving Wits beyond the cutting edge. This is a talk on our private cloud architecture that we are implementing at the University of the Witwatersrand, Johannesburg.
Deep Dive: AWS Direct Connect and VPNs - NET403 - re:Invent 2017Amazon Web Services
As enterprises move to the cloud, robust connectivity is often an early consideration. AWS Direct Connect provides a more consistent network experience for accessing your AWS resources, typically with greater bandwidth and reduced network costs. This session dives deep into the features of AWS Direct Connect and VPNs. We discuss deployment architectures and the process from start to finish. We show you how to configure public and private virtual interfaces, configure routers, use VPN backup, and provide secure communication between sites by using the AWS VPN CloudHub.
(SOV209) Introducing AWS Directory Service | AWS re:Invent 2014Amazon Web Services
AWS Directory Service is a managed service that allows you to connect your AWS resources with an existing on-premises Microsoft Active Directory or to set up a new, standalone directory in the AWS cloud. Connecting to an on-premises directory is easy, and once this connection is established, all users can access AWS resources and applications with their existing corporate credentials. You can also launch managed, Samba-based directories in a matter of minutes, simplifying the deployment and management of Windows workloads in the AWS cloud. You can join Amazon EC2 Windows instances, get Kerberos-based SSO, and use your favorite Windows tools for administration. In this session, we demonstrate AWS Directory Service features and show you how to use this service to reduce workflow complexity for your users and IT staff.
This PPT provides an introduction to cloud Computing. It briefly talks about fundamental cloud services, deployment models and the factors that made it an emerging paradigm.
This AWS Security Checklist webinar will help you and your auditors assess the security of your AWS environment in accordance with industry or regulatory standards. This security focused checklist builds on recently revised Operational Checklists for AWS, which helps you evaluate your applications against a list of best practices before deployment.
Learning Objectives:
* Evaluate the ability of AWS services to meet information security objectives and ensure future deployments within the AWS cloud are done in a secure and compliant way
* Assess your existing organisational use of AWS and to ensure it meets security best practices
* Develop AWS usage policies or validate that existing policies are being followed
The presentation provides the following:
- McAfee Company Overview
- McAfee Strategy
- Device Security, Network Security, Cloud Security
- Open Architecture
- Industry Analyst
- Services
- MVISION
- Unified Cloud Edge (UCE)
Please note all the information is based prior to Feb 2020.
Mike Killian from Cisco was in attendance at Next Dimension to discuss IoT, IT/OT Convergence, and all things Smart Manufacturing. This presentation showcases the impact of Smart Manufacturing strategies as implemented across Cisco's supply chain.
[Michael Noel] Microsoft has expended significant effort in the creation of an all-encompassing tool that provides organizations with the ability to quickly and easily synchronize information from on-premises Active Directory to Azure Active Directory instances such as those running as part of Office 365. This tool, named Azure AD Connect, has robust bidirectional synchronization options as well as the built-in ability to provide for Single Sign On (SSO) with Active Directory Federation Services. While simple to deploy, management and maintenance of the tool requires a thorough understanding of the core components utilized by the tool. This session takes an in-depth technical look at the various components of Azure AD Connect, walking the audience through various deployment scenarios, the upgrade approach used by the tool, SSO with ADFS, and how to maintain and manage the various running components.
• Understand key deployment scenarios with Azure AD Connect, including password and directory synchronization, Single Sign-On, and self-service password reset as part of Azure AD Premium.
• Explore the various synchronization components of Azure AD Connect and how to use and manage them to transfer directory info from on-premises Active Directory to Azure AD
• Examine the requirements to implement Single Sign On to Azure AD/Office 365 using the built-in Azure AD Connect AD FS components
A Zero Trust approach should extend throughout the entire digital estate and serve as an integrated security philosophy and end to end strategy.
Identities. Identities whether they represent people, services, or IOT devices define the Zero Trust control plane. When an identity attempts to access a resource, we need to verify that identity with strong authentication, ensure access is compliant and typical for that identity, and follows least privilege access principles.
Devices. Once an identity has been granted access to a resource, data can flow to a variety of different devices From IoT devices to smartphones, BYOD to partner managed devices, and on premises workloads to cloud hosted servers. This diversity creates a massive attack surface area, requiring we monitor and enforce device health and compliance for secure access.
Applications. Applications and APIs provide the interface by which data is consumed. They may be legacy on premises, lift and shifted to cloud workloads, or modern SaaS applications. Controls and technologies should be applied to discover Shadow IT, ensure appropriate in-app permissions, gate access based on real-time analytics, monitor for abnormal behavior, control of user actions, and validate secure configuration options.
Data. Ultimately, security teams are focused on protecting data. Where possible, data should remain safe even if it leaves the devices, apps, infrastructure, and networks the organization controls. Data should be classified, labeled, and encrypted, and access restricted based on those attributes.
Infrastructure. Infrastructure (whether on premises servers, cloud based VMs, containers, or micro services) represents a critical threat vector. Assess for version, configuration, and JIT access to harden defense, use telemetry to detect attacks and anomalies, and automatically block and flag risky behavior and take protective actions.
Networks. All data is ultimately accessed over network infrastructure. Networking controls can provide critical “in pipe” controls to enhance visibility and help prevent attackers from moving laterally across the network. Networks should be segmented (including deeper in network micro segmentation) and real time threat protection, end to end encryption, monitoring, and analytics should be employed.
Each of these six foundational elements serves as a source of the signal, a control plane for enforcement, and a critical resource to defend. You should appropriately spread your investments across each of these elements for maximum protection.
Identity and Access Management (IAM) is a crucial part of living in a connected world. It involves managing multiple identities of an individual or entity, distributed across disparate portals. In an enterprise, IAM solutions serve as a mean to secure access, control user activities and manage authentication for an App or a group of software (infrastructure).
This detailed PowerPoint brings you the most fundamental concepts and ideas related to identity and access management. Plus, we have debunked some popular IAM myths, so do checkout!
Private Cloud Architecture: Moving Wits beyond the cutting edge. This is a talk on our private cloud architecture that we are implementing at the University of the Witwatersrand, Johannesburg.
Deep Dive: AWS Direct Connect and VPNs - NET403 - re:Invent 2017Amazon Web Services
As enterprises move to the cloud, robust connectivity is often an early consideration. AWS Direct Connect provides a more consistent network experience for accessing your AWS resources, typically with greater bandwidth and reduced network costs. This session dives deep into the features of AWS Direct Connect and VPNs. We discuss deployment architectures and the process from start to finish. We show you how to configure public and private virtual interfaces, configure routers, use VPN backup, and provide secure communication between sites by using the AWS VPN CloudHub.
(SOV209) Introducing AWS Directory Service | AWS re:Invent 2014Amazon Web Services
AWS Directory Service is a managed service that allows you to connect your AWS resources with an existing on-premises Microsoft Active Directory or to set up a new, standalone directory in the AWS cloud. Connecting to an on-premises directory is easy, and once this connection is established, all users can access AWS resources and applications with their existing corporate credentials. You can also launch managed, Samba-based directories in a matter of minutes, simplifying the deployment and management of Windows workloads in the AWS cloud. You can join Amazon EC2 Windows instances, get Kerberos-based SSO, and use your favorite Windows tools for administration. In this session, we demonstrate AWS Directory Service features and show you how to use this service to reduce workflow complexity for your users and IT staff.
This PPT provides an introduction to cloud Computing. It briefly talks about fundamental cloud services, deployment models and the factors that made it an emerging paradigm.
This AWS Security Checklist webinar will help you and your auditors assess the security of your AWS environment in accordance with industry or regulatory standards. This security focused checklist builds on recently revised Operational Checklists for AWS, which helps you evaluate your applications against a list of best practices before deployment.
Learning Objectives:
* Evaluate the ability of AWS services to meet information security objectives and ensure future deployments within the AWS cloud are done in a secure and compliant way
* Assess your existing organisational use of AWS and to ensure it meets security best practices
* Develop AWS usage policies or validate that existing policies are being followed
The presentation provides the following:
- McAfee Company Overview
- McAfee Strategy
- Device Security, Network Security, Cloud Security
- Open Architecture
- Industry Analyst
- Services
- MVISION
- Unified Cloud Edge (UCE)
Please note all the information is based prior to Feb 2020.
Mike Killian from Cisco was in attendance at Next Dimension to discuss IoT, IT/OT Convergence, and all things Smart Manufacturing. This presentation showcases the impact of Smart Manufacturing strategies as implemented across Cisco's supply chain.
[Michael Noel] Microsoft has expended significant effort in the creation of an all-encompassing tool that provides organizations with the ability to quickly and easily synchronize information from on-premises Active Directory to Azure Active Directory instances such as those running as part of Office 365. This tool, named Azure AD Connect, has robust bidirectional synchronization options as well as the built-in ability to provide for Single Sign On (SSO) with Active Directory Federation Services. While simple to deploy, management and maintenance of the tool requires a thorough understanding of the core components utilized by the tool. This session takes an in-depth technical look at the various components of Azure AD Connect, walking the audience through various deployment scenarios, the upgrade approach used by the tool, SSO with ADFS, and how to maintain and manage the various running components.
• Understand key deployment scenarios with Azure AD Connect, including password and directory synchronization, Single Sign-On, and self-service password reset as part of Azure AD Premium.
• Explore the various synchronization components of Azure AD Connect and how to use and manage them to transfer directory info from on-premises Active Directory to Azure AD
• Examine the requirements to implement Single Sign On to Azure AD/Office 365 using the built-in Azure AD Connect AD FS components
BYOD (Bring Your Own Device) Risks And BenefitsModis
Today, most companies tell their employees that it's okay to bring their own devices to work. However, while there are many benefits to your company that go hand-in-hand with this policy, when you allow employees to BYOD (Bring Your Own Device), you are also allowing them to bring in a host of challenges for your IT department, your security, and your budget.
In this powerpoint, we explore the pros and cons of BYOD and discuss the development of a BYOD policy that makes sense for your business.
The trend towards personally owned devices in the workplace is on the rise, requiring IT organizations to address this concept with flexibility, yet without compromising security and regulatory requirements.
Download the slide deck as C/D/H discusses:
■Why the move to personal devices?
■How and what technologies are involved?
■Advantages and disadvantages of personal devices
■Managing personal devices
■Four different corporate policies
■What’s next
For more information about C/D/H, contact us at (616) 776-1600 or (248) 546-1800.
Track it, whenever, wherever!
TGT is a Tracking Management System for companies or personal use that allows you to track all your goods/package transportation, whenever, wherever, from your computer or mobile device.
(Note: this product is not real, it represents a commercial for a wrong business idea)
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
Subjects covered will include mobile devices OS security, state of malware on mobile devices, data loss prevention, VPN and remote access, 802.1x and certificate deployment, profiling, posture, web security, MDMs and others. For more information please visit our website: http://www.cisco.com/web/CA/index.html
In this presentation by InTechnology’s Mobile specialist, Richard Allgate, looks at the growing trend of Bring Your Own Device (BYOD). It covers the drivers behind the growing trend, how to implement a successful BYOD policy and the common pitfalls and business considerations.
An Insight to the World of Wearable ComputingFAIZAL T H
This paper gives idea on the concept of wearable computing and its evolution over the years and the emerging trends in the field of wearable technology, their advantages and disadvantages and so on..
TRB 2011 - Evaluating the Effectiveness of the Travel Assistance DeviceSean Barbeau
Independence for individuals with disabilities can be facilitated through the use of devices that have been created and adapted for these individuals. Research regarding the use of technology to afford independence to those with disabilities is growing as new electronic devices are created. One such device is the Travel Assistance Device (TAD), a software application for mobile phones which provides real-time navigation guidance to public transportation riders. TAD has undergone technology proof-of-concept testing, which determined that TAD could provide timely prompts to transit riders at the programmed locations. The purpose of this research study was to determine whether the prompts given by TAD would exhibit stimulus control over the participant’s behavior of pulling the cord to stop the bus at the appropriate time and exiting the bus at the appropriate stop. TAD was evaluated in an ABAB design with three adults with mental retardation. Results show favorable outcomes for the 3 participants who were able to pull the bus cord at the appropriate stops and exit the bus only when TAD delivered prompts.
Presented at the National Academy of Sciences’ Transportation Research Board 90th Annual Meeting.
Read the entire paper here:
http://bit.ly/Bolechala-EvaluatingTAD-TRB2011
Internet of Things - Technological PerspectiveAndri Yadi
When I was asked to go back to my campus and share about Internet of Things, I found that it's a broad topic. So I limit the talk only from technological standpoint while still giving a bit about business opportunities. So this is the deck used for that talk.
Sensors for Biometry and Recognition - 2016 Report by Yole DeveloppementYole Developpement
In a global biometric hardware market worth over $4B, traditional fingerprint/palm sensors still monopolize 95% of the market, but face and iris sensors lie in wait.
Fingerprint technology impressively dominates the market - but changes are expected
Due to historical reasons, like the criminal fingerprint database established by the FBI with ink-based techniques, fingerprint sensing is the most common biometric technology currently used, by far. We estimate that the annual revenues generated by fingerprint-based solutions are currently $4.25B, representing 95% of the hardware market. Fingerprint sensing dominates technologies like iris, face, palm or voice recognition, because it meets almost all the requirements of a “perfect” biometric recognition technology. It is robust, stable and repeatable, time-invariant, difficult to spoof, has a distinctive meaning, is "unique" amongst a population, accessible, easy to use and acceptably non-intrusive. All other biometric technologies do not yet fulfill those requirements as specifically as fingerprint technology. Hardware revenues generated by the other biometric technologies are relatively low, estimated at $250M, mostly from iris and face recognition. This report identifies the players in the biometric hardware market, and provides technology, market and trend evolution insights. The fingerprint market has experienced an incredible volume increase in the consumer market with the adoption of the active capacitance detection on an increasing number of smartphones to answer the demand of online identification, mobile payment and unlocking applications. Diverse technologies, such as optical, thermal, and Piezoelectric Micromachined Ultrasonic Transducers (PMUT), are also trying to penetrate the consumer market, but are still very limited. The industrial and homeland/security markets are still widely using optical technology. Other biometric solutions like iris, face or voice recognition have been introduced but with a limited impact. Their performance hasn’t yet reached the requirements with regards to cost, reliability, false rejection rate and false acceptance rate to significantly penetrate either the consumer, industrial or homeland/security markets....
More information on that report: http://www.i-micronews.com/report/product/sensors-for-biometry-and-recognition.html
Exploring byod approaches for mobile learningDebbie Richards
Bring-your-own-device (BYOD) has emerged as a cost-effective solution, allowing organizations to adopt an mLearning approach without having to provide the devices. What are the concerns of BYOD, and how can you address them? What are the opportunities for BYOD? What are the key elements to consider when deploying mobile learning for a BYOD environment? BYOD offers employees and corporations countless business benefits, from increased efficiency to controlled costs on provisioning a mobile workforce.
This session will review the concerns and opportunities for BYOD in mobile learning. You will learn about BYOD policies, view examples, and learn about the importance of working with your IT department to ensure a successful BYOD mLearning program. You will also explore key elements to consider when deploying mobile learning for a BYOD environment. And finally, you will learn about BYOD mobile learning policies and how to implement them.
More and more organization employees are required to work outside the office using tablets, laptops and smartphones. These technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Mobile technologies collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company. This webinar will discuss the risks faced by small to medium size organizations that require employees to work remotely. We will also discuss mitigation strategies.
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
Smart phones and tablets are invading the business environment at top speed, with “bring your own device” (BYOD) providing a number of benefits for organisations across all sectors. With the right implementation, and ongoing secure support, performance through technology can be achieved in areas such as employee satisfaction, cost reduction, team work and collaboration and productivity.
Charlie Hales and Nigel Robson cover the important considerations a business should make before implementing an MDM/BYOD strategy, and will consider the ongoing implications of allowing corporate data to be accessed on personal devices ensuring the maximum benefit to businesses, customers and the end users.
IoT Systems provide powerful, flexible features for IT systems — tracking, monitoring, and other data sharing. Today’s IoT devices utilize microservices and APIs that make them easy to put into production. But securing them isn’t as easy.
This webinar will look at security risks of IoT devices, interfaces, and implementations. We’ll provide practical steps and checklists any DevOps team can use to make their IoT components as secure as possible. We’ll also cover some testing best practices that can be done pre- and post-production to verify security and resilience on an ongoing basis.
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
In a world where convenience is key, consumers are adopting every new connected device that hits the shelves - and doing so with the assumption that due diligence security has been considered. But recent IoT attacks suggest otherwise.
As organizations migrate from a primarily offline to online business model, they are failing to consider IoT’s unique threats which traditional solutions are unable to secure. As a result, steps must be taken to ensure that the device, connections and infrastructure are hardened, especially software which runs IoT devices and is the source of ~90% of attacks.
This webinar is ideal for risk, technology, and security professionals that want to understand why a hacker would want to attack their “harmless” IoT device and what the stealth risk to their organization and consumers is.
Topics covered include:
- IoT security – why it’s so different….and tough
- The IoT ecosystem and attack surface
- Managing liability - IoT risks to consumers and vendors
- Auditing IoT software development
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
While companies have made significant strides with mobile device security software on smart phones and tablets, the wearables category is a different story. Personal data, customer data, and sensitive corporate information is at risk with data leaks exposed at multiple end points. There are a number of factors contributing to this situation that we will look at in this presentation as well as best practices to address them. The miniaturization of sensors and cameras and unprecedented connectivity have created a scenario where data can be captured and stored very easily, and at times unwittingly, by users. Lack of policies and careless use of enterprise wearables can be more of a security risk than cyber criminals. The trend of this problem will likely get worse, market forecasts show that IoT devices and wearables will surpass volumes of mobile devices over the next few years. The great promise and benefits of these devices coupled with privacy and security concerns make this technology a double edge sword.
Augmented World Expo (AWE) is back for its seventh year in our largest conference and expo featuring technologies giving us superpowers: augmented reality (AR), virtual reality (VR) and wearable tech. Join over 4,000 attendees from all over the world including a mix of CEOs, CTOs, designers, developers, creative agencies, futurists, analysts, investors, and top press in a fantastic opportunity to learn, inspire, partner, and experience first hand the most exciting industry of our times. See more at http://AugmentedWorldExpo.com
Key Points To Be Discussed :
Introduction
Inscope items
Statistics on BYOD issues worldwide
Why we need to think about protection
Used Cases before going to create a Playbook
[Open to all for discussion continued on Key Takeaways]
Key Takeaways: Inscope items, Important concerns, & Solutions sharing
Speaker - J. Gokulavan
Designation: Senior Manager Compliance
Mitigating the Top 5 Cloud Security ThreatsBitglass
By now you are likely familiar with Cloud Access Security Brokers (CASBs) and understand how they fit into your broader security and cloud strategy. What should organizations be looking for in a CASB? What capabilities are here or on the horizon that can provide improved data protection in the cloud?
Bitglass and (ISC)2 presents the final episode of the CASB series where we will examine where cloud security is headed, discussing agentless and agent-based solutions, the growing number of cloud apps in use and the importance of easy deployment. Learn why cross-app security will become increasingly valuable as organizations look to third-party solutions for deep visibility, behavior analytics, and more.
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
IBM's industry-leading business and technology services for strategy/design and development/deployment of mobile applications, devices, communication and IT networks are an integral component of the IBM MobileFirst portfolio. Learn how we can help you begin, accelerate and manage your journey to becoming a mobile-first enterprise.
Similar to An Introduction on Design and Implementation on BYOD and Mobile Security (20)
this is a short awareness talk in one of OWASP MEETUP sessions in University Kuala Lumpur, Malaysia, discussing about Android application penetration testing and how to discover potential vulnerabilities
EC-Council Hackway Workshop Presentation- Social Media ForensicsSina Manavi
This Presentation involves with Social Media Forensics such as Email Tracing and investigation the Fraud, Scam... etc.. In the next section we covered the Twitter, Facebook, and Linkdin Forensics practically. After the video call and Instant Messaging tools, Skype is chosen because it is one of the top most popular chatting, voice/video calls (free and commercial plans). We demonstrated practically how to extract the chat conversation, contacts, call logs and much more information. Malware distribution is quite common is social media by social engineering techniques. We performed the analysis to how analysis and investigate the malware and social media investigation with malware distribution and social engineering perspective.
in this presentation we have discussed about different methodology in password cracking. Password bruteforce, social engineering attack , phishing attack, windows login cracking, web login cracking, application password cracking, Gmail password and facebook password extracting
Basic Android OS security mechanism,
Basic malware definition
Attacking Android platform with
Malware, Remote access, File is stealing and Social Engeering attack is methods have been done discussing in the class.
Attacking the Android:
Installing Kali Linux on android to perform attacks
Installing Dsploit for running attack with android (MITM, XSS, traffic sniffing…. Etc.)
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
2. ABOUT ME
My name is Sina Manavi ,
Master of Computer Security and Digital Forensics
CEH and CHFI Certificate Holder
Contact : Manavi.Sina@gmail.com
3. AGENDA
•
•
•
•
•
•
•
1.
2.
3.
4.
What are mobile devices?
Mobile device threads
BYOD
BYOD Pros and Cons
4 Steps to design BYOD:
BYOD Strategy
Mobile Hacking techniques demo:
Android Phone
Mobile Application Security
Laptop
Pendrives
• BYOD or BYOA
• How to Secure the data storages and
transportation
6. BYOD?!!!
Using the personally owned mobile devices such as smart
phones, IPad, Tablets , laptop, thumb drives to access organization network
and corporate data such as databases, organizational software, emails…etc.
7. BYOD PROS
• Cost effective:
•
No need to buy lots of PC, Tablets
• Technology familiarity:
•
Apple users are more comfortable with apples likewise windows user are more likely to use
windows applications
•
Flexibility:
•
Employees don’t need to carry both their personal devices and their work needs, they can work
whenever wherever they need while they have access to all data needed
8. BYOD CONS
Cost for employee:
• Not everybody has such devices,
• Increase usage and transportation may lead to quicker depreciation
• Repairing, upgrading or any possible accident would be under employee responsibility
which is not very pleasant
9. BYOD CONS
Different devices:
different OS, application and quality level, which brings difficulties in managing them.
Security:
Normally companies spend a lot amount of money to buy firewalls, Anti-viruses, original
application which as yearly supports and maintenance. Which employees cant afford such
prices himself
10. BYOD CONS (CONT…)
Security:
while PODs contain corporate data, it can bring security risk of data leackage
Privacy issue for employee, PODs should be accessible on demand for the organization
whenever they need to investigate, they might not be happy to surf internet or perform
their routine daily life with that device (e.g instant messaging, calls, social networking, web
browsing ,personal images….)
• What happens if an employee leave?!!!!!!!!!!
11. ICT AND POD
• Information and Communication Techonology devices ( Owned by
Organization) (ICT)
• Personally Owned Device (POD)
12. 4 STEPS TO DESIGN BYOD
1.
2.
3.
4.
Know your businesses and regulatory
Creating a protocol Foundation
Legal Right and responsibility
Security Concerns
13. STEP 1: KNOW YOUR BUSINESSES
AND REGULATORY
•
•
•
•
•
What does the company seek to gain from BYOD?
What unique divisions does the organization have?
What information and applications need to be accessed by each division?
What level of security will be applied to this information?
What are the data-usage requirements for each division?
14. STEP 2: CREATING A PROTOCOL
FOUNDATION
Sourcing: Where did the device or softwares come from? Was it a preferred
vendor or some random source?
Supporting devices: what if one individual employee uses very unknown device
?should the IT team be able to support all type of devices and vendors ?
Bandwidth: allocating bandwidth to employees based on their activity and
requirement related to his responsibility at work. (high speed bandwidth for
downloading?)
Business support vs. personal support: supporting all type of application although
they are not related to organization routines? For financial department is it
necessary to support Photoshop or 3D MAX? or Does multimedia design team
need to support specific hardware?
Device Lost: what strategy do you need for a lost device? Wiping the device
remotely? Detach it from network or known devices?
15. STEP 3: LEGAL RIGHT AND
RESPONSIBILITY
• Responsibility
The BYOD policy should determine who is responsible to protect data on the device?
• Privacy:
How much access can organization have to the private files of the employees
• Regulation and rights
Different countries and companies have their own regulation and rights
16. STEP 4: SECURITY CONCERNS
• Device:
what kind of device , OS and hardware is accessible for organization.
• Security:
In what level security and risk are needed for each device and employee.
• Application management:
What application can be installed on the device, and assign proper level of
control based on the employee requirement to perform her job
• Data access
Data access should be allocated based in a proper way, no need to give access
of financial or human resource department to nonrelated departments.
17. BYOD POLICY
• Individual user can only use the POD, if it has configuration and software
installed with the right privilege, otherwise they just can use guest internet
or network which has no access to the corporation network.
• Each POD has to have specific registered digital certificate, and it
shouldn’t be copy from one POD to another POD, although devices
blonge to one person
18. BYOD STRATEGY
• POD should be utilized with appropriate for of userID, Passwords and
authentication devices.
• Organization has the right to investigate and control its information and
device functionality, backup, retrieve, modify and deleting the corporation
data , without permission of owner or user POD
19. BYOD STRATEGY
• All PODs should have proper Antivirus according to the Administrator
management policy
• Synchronize the created or modified valuable corporate data on the
POD using corporate network or using secure removable media
• All the data should be transfer through the network or media storages in
encrypted form for instance :
Network (SSl or VPN)
Storage Media ( using like TrueCrypt)
20. BYOD STRATEGY
As organization may need to investigate the POD on demand based on the
reasonable expectation, the possibility of gaining access to the personal data is
high, users should be advice to store their private data in different directory
with a clear name such as “private” or “personal”
21. BYOD STRATEGY
Before any video/audio recording inside organization should be confirmed
with management Installing application on PODs should be under control of
the management (such as Email Client, social networks, web browser…etc.)
Employees and administrators should be educated and aware of risks and
vulnerabilities of the PODs
22. BYOD STRATEGY
Data that are not allowed to be stored, process, create on PODs:
• Classified secret files or above
• Highly valuable or sensitive information
• Big data such as 1Gb of corporate data on POD
23. BYOD STRATEGY
These strategies and policy may be different in different organization due to
organization nature and functionality
24. BYOD SECURITY PLAN STEPS
1- Identify the risk elements that BYOD introduces with a research group
2- Decide how to enforce policies for devices connecting to your network
3- Build a project plan to include these capabilities:
Remote device management
Application control
Policy compliance and audit reports
Data and device encryption
Augmenting cloud storage security
Wiping devices when retired
Revoking access to devices when end-user relationship changes from employee to guest
Revoking access to devices when employees are terminated by the company
25. BYOD SECURITY PLAN STEPS
4- Evaluation
from each department chose number of users to see the feedbacks
26. MOBILE HACKING DEVICE HACKING
TECHNIQUES DEMO: LAPTOP
•
•
•
•
Using hacking tools such Cain and Able
Wireshark for network sniffing
Bruteforce tools for password cracking
Sql injection or cookie injector tools for compromising the organization
database or website authentication.
• Virtualization application for Anti-Forensics activity
• Demo Now
27. MOBILE HACKING DEVICE HACKING
TECHNIQUES DEMO: MEDIA STORAGE
• Using personal data storage for backuping or running personal application
or data
• Running USB live tools such as Backtrack , Helix, or
• Live CD/DVD OS which has illegal tools such as Dropbox, google
Drive,….for accessing the or stealing data.
• Usually USB or live CD/DVD tools can be utilized for Anti-Forensics
activity
• Personal VPN to hide their activity
• Demo …… now
28. BYOD OR BYOA
• Bring Your Own Device = Bring Your Own Application
• Downloading unknown applications or downloading application from
untrusted appstores such as cracked tools can brings malwares as a gift to
the organization.
• Employees show be limited in downloading application which is beyond
the BYOD policy list
• Mobile phones should not be rooted or jailbreak
• Application should be download from trusted app markets such as
official Apple app-store or google Play or Microsoft app-store.
29. HOW TO SECURE DATA ON BYOD
• all the data storages must encrypt corporate data
• Just legitimate user can leave organization with corporation data
• All data transfer through network should be encrypted via SSL or VPN
which belongs to organization
33. NOW MY QUESTION?
Whats your opinion about BYOD?
• Do you think BYOD increase the IT and security cost
• Brings more risk to organization
• Data leakage
• Data lost
• Stealing data
35. Thanks for your attention
If you have any Question don’t hesitate to ask:
Manavi.Sina@gmail.com
Editor's Notes
Staff brings their Favorite device, complicate policy and data controlling in organizationAdvantage: happier user,Disadvantage: unknown device in network, data security, and ownership problem.