Barry Caplin
                                          CISO
                     MN Dept. of Human Services
NG Security Summit
barry.caplin@state.mn.us
bc@bjb.org, @bcaplin, +barry caplin
securityandcoffee.blogspot.com
http://about.me/barrycaplin
Apr. 3, 2010

300K ipads
1M apps
250K ebooks
… day 1!
2011 – tablet/smartphone sales exceeded PCs
Why are we talking about this?



  But really, all
  connected!
Business Driver?
What about…
Ineffective
Controls
1 Day
5 Stages of Tablet Grief
•    Surprise
•    Fear
•    Concern
•    Understanding
•    Evangelism
Security Challenges
Devices:
Exposure of data
Leakage of data – sold, donated,
tossed, repaired drives
Malware

    But don’t we have all this now???
Consumer App Security
“non-standard” software a challenge
Vetting, updates/patches, malware
No real 3rd party agreements
Privacy policies, data ownership
SOPA/PIPA/CISPA
Legal (IANAL)
Privacy – exposing company data
Litigation hold – on 3rd party services
Separation – what’s on Dropbox?
Copyright, trademark, IP?
How do you?:
  Get data from a 3rd party service?
BYOD Security Solutions
• Sync/MDM – Network or OTA

• VDI – Citrix or similar

• Containerization – Sandbox, MAM

• Direct Connection – Don’t!
DHS view - POE
•   Policy             •   Guest wireless
•   Supervisor         •   FAQs for
    approval               users/sups
•   Citrix only        •   Metrics
•   No Gov't records   •   $ - not yet
    on POE
    (unencrypted)
•   3G/4G or wired
Software Security Solutions
Policy – Examine existing –
 augment
Process – Vetting, updates,
 malware
3rd party agreements – where possible
Data classification/labeling
PIE – pre-Internet encryption
CoIT Nirvana
Any, Any, Any – work, device,
 where
Be nimble
Data stays “home”++
Situational awareness
Key Points
Business Need – Partner internally
BYOD, Consumer apps, or both?
Policy, Technical, Financial aspects
Watch the data
Make easy for users
Education/Awareness
Discussion…
Slides at http://slideshare.net/bcaplin
       barry.caplin@state.mn.us
 bc@bjb.org, @bcaplin, +barry caplin
     securityandcoffee.blogspot.com
Topics
Policy
Compliance/Consequences
Regulatory – IRS, HIPAA, MARS-E
Data Leakage
Remote wipe issues
DLP/DRM
Reimbursement
The “Non-Standard” Software issue
Non-Standard Software


                   New
                  Request

Embracing the IT Consumerization Imperative NG Security

Editor's Notes

  • #2 IT Consumerization is a major buzz-phrase
  • #3 Check out my about.me, with links to twitter feed and Security and Coffee blog.
  • #4 Mobile/portable devices are not new. Then an event occurred that changed the game… IBM “Portable” 5155, $4225, 30 lbs, 4.77MHz 8088; Apple Newton; AppleBook; original ThinkPad; 1 st gen android; Palm III; early Blackberry
  • #5 1 st iPad, 4/3/2010. 300K iPads sold, 1M apps, 250K ebooks downloaded on the first day. Features, form factor, intuitive use made it the people’s choice.
  • #6 1. mid-2011 tipping point 2. By early 2012, 50% of US mobile users use a smartphone
  • #8 2012 survey of IT leaders – Mobile is #1 tech impact But Cloud is 2, CoIT 3 and Social 4 – all connected
  • #9 The devices are hot and driving the space, but it’s really about the ability to have mobility – to bring the product or service to the consumer/customer. Not just “flavor of the week”.
  • #10 Just say no is not a viable IT or Security strategy or response. We must partner with the business/user to provide what is needed. Just say no is an…
  • #11 If your organization is saying “just say no” to consumer devices and apps, then they are already in your environment Take opportunity to partner, lead and add value.
  • #12 2.5 years ago Story of call from lawyer about iPads in a meeting This lead to…
  • #13 Quickly moved to last stage – evangelism Now security is dragging other groups kicking and screaming into the present. Security is leading and adding value.
  • #14 Exposure is device in hand – eavesdropping, MitM Leakage is device is gone. We have all this already. Datalossdb.org and Accidental Insider. 10% of 2 nd -hand drives bought had company/private data. StarTrib malware.
  • #15 1. Similarly, we have had software issues – local admin, devs, etc. can’t enumerate badness. If the service is free, we are the product not the customer.
  • #16 Be sure to include legal Information Discovery, Litigation Hold are big issues.
  • #17 Now for solutions – 4 general categories for devices Containerization includes Enterprise App Store
  • #18 Extensible policy; Citrix (no remnants); looking at containerization; guest wireless/wired; not yet considering $ (reimbursement/stipend) Gartner says at least 3-5 years for financial payoff.
  • #19 Policy already mentioned Working on process to more seamlessly allow consumer apps Know your data classifications PIE great for online storage, file sharing.
  • #21 Partner; Lead; Add value Good user experience is key
  • #22 Users are changing; expectations are changing; keep “eyes on the prize”; partner, solve problems, and add value