Embracing the IT
       Consumerization Imperative
                    Barry Caplin
                         CISO
              MN Dept. of Human Services
barry.caplin@state.mn.us
bc@bjb.org, @bcaplin, +barry caplin
http://about.me/barrycaplin
More About Me
• Native New Yorker!

• 30 years in IT/
  20 years in InfoSec
Apr. 3, 2010

300K ipads
1M apps
250K ebooks
… day 1!
2011 – tablet/smartphone sales exceeded PCs
The real reason we need tablets
Why are we talking about this?



But really, all
connected!
Business Driver?
What about…
Ineffective
 Controls
1 Day
5 Stages of Tablet Grief
•    Surprise
•    Fear
•    Concern
•    Understanding
•    Evangelism
Security Challenges
Devices:
•Exposure of data
•Leakage of data – sold, donated, tossed,
repaired drives
•Malware

    But don’t we have all this now???
Consumer App Security
•   “non-standard” software a challenge
•   Vetting, updates/patches, malware
•   No real 3rd party agreements
•   Privacy policies, data ownership
•   SOPA/PIPA/CISPA
Legal (IANAL)
•   Privacy – exposing company data
•   Litigation hold – on 3rd party services
•   Separation – what’s on Dropbox?
•   Copyright, trademark, IP?
•   How do you?:
    – Get data from a 3rd party service?
BYOD Security Solutions
• Sync – Network or OTA

• VDI – Citrix or similar

• Containerization – Sandbox, MAM

• Direct Connection – Don’t!
DHS view - POE
•   Policy             •   Guest wireless
•   Supervisor         •   FAQs for
    approval               users/sups
•   Citrix only        •   Metrics
•   No Gov't records   •   $ - not yet
    on POE
    (unencrypted)
•   3G/4G or wired
Software Security Solutions
• Policy – Examine existing – augment
• Process – Vetting, updates, malware
• 3rd party agreements – where possible
• Data classification/labeling
• PIE – pre-Internet encryption
CoIT Nirvana
•   Any, Any, Any – work, device, where
•   Be nimble
•   Data stays “home”++
•   Situational awareness
Key Points
•   Business Need – Partner internally
•   BYOD, Consumer apps, or both?
•   Policy, Technical, Financial aspects
•   Watch the data
•   Make easy for users
•   Education/Awareness
Embracing the IT Consumerization Imperitive

Embracing the IT Consumerization Imperitive

  • 2.
    Embracing the IT Consumerization Imperative Barry Caplin CISO MN Dept. of Human Services barry.caplin@state.mn.us bc@bjb.org, @bcaplin, +barry caplin
  • 3.
  • 4.
    More About Me •Native New Yorker! • 30 years in IT/ 20 years in InfoSec
  • 6.
    Apr. 3, 2010 300Kipads 1M apps 250K ebooks … day 1!
  • 7.
    2011 – tablet/smartphonesales exceeded PCs
  • 8.
    The real reasonwe need tablets
  • 9.
    Why are wetalking about this? But really, all connected!
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
    5 Stages ofTablet Grief • Surprise • Fear • Concern • Understanding • Evangelism
  • 15.
    Security Challenges Devices: •Exposure ofdata •Leakage of data – sold, donated, tossed, repaired drives •Malware But don’t we have all this now???
  • 16.
    Consumer App Security • “non-standard” software a challenge • Vetting, updates/patches, malware • No real 3rd party agreements • Privacy policies, data ownership • SOPA/PIPA/CISPA
  • 17.
    Legal (IANAL) • Privacy – exposing company data • Litigation hold – on 3rd party services • Separation – what’s on Dropbox? • Copyright, trademark, IP? • How do you?: – Get data from a 3rd party service?
  • 18.
    BYOD Security Solutions •Sync – Network or OTA • VDI – Citrix or similar • Containerization – Sandbox, MAM • Direct Connection – Don’t!
  • 19.
    DHS view -POE • Policy • Guest wireless • Supervisor • FAQs for approval users/sups • Citrix only • Metrics • No Gov't records • $ - not yet on POE (unencrypted) • 3G/4G or wired
  • 20.
    Software Security Solutions •Policy – Examine existing – augment • Process – Vetting, updates, malware • 3rd party agreements – where possible • Data classification/labeling • PIE – pre-Internet encryption
  • 21.
    CoIT Nirvana • Any, Any, Any – work, device, where • Be nimble • Data stays “home”++ • Situational awareness
  • 22.
    Key Points • Business Need – Partner internally • BYOD, Consumer apps, or both? • Policy, Technical, Financial aspects • Watch the data • Make easy for users • Education/Awareness

Editor's Notes

  • #3 IT Consumerization is a major buzz-phrase
  • #4 1. Check out my about.me, with links to twitter feed and Security and Coffee blog. 2. More about me… including the most important thing…
  • #6 Mobile/portable devices are not new. Then an event occurred that changed the game… IBM “Portable” 5155, $4225, 30 lbs, 4.77MHz 8088; Apple Newton; AppleBook; original ThinkPad; 1 st gen android; Palm III; early Blackberry
  • #7 1 st iPad, 4/3/2010. 300K iPads sold, 1M apps, 250K ebooks downloaded on the first day. Features, form factor, intuitive use made it the people’s choice.
  • #8 1. mid-2011 tipping point 2. By early 2012, 50% of US mobile users use a smartphone
  • #10 2012 survey of IT leaders – Mobile is #1 tech impact But Cloud is 2, CoIT 3 and Social 4 – all connected
  • #11 The devices are hot and driving the space, but it’s really about the ability to have mobility – to bring the product or service to the consumer/customer. Not just “flavor of the week”.
  • #12 Just say no is not a viable IT or Security strategy or response. We must partner with the business/user to provide what is needed. Just say no is an…
  • #13 If your organization is saying “just say no” to consumer devices and apps, then they are already in your environment Take opportunity to partner, lead and add value.
  • #14 2.5 years ago Story of call from lawyer about iPads in a meeting This lead to…
  • #15 Quickly moved to last stage – evangelism Now security is dragging other groups kicking and screaming into the present. Security is leading and adding value.
  • #16 Exposure is device in hand – eavesdropping, MitM Leakage is device is gone. We have all this already. Datalossdb.org and Accidental Insider. 10% of 2 nd -hand drives bought had company/private data. StarTrib malware.
  • #17 1. Similarly, we have had software issues – local admin, devs, etc. can’t enumerate badness. If the service is free, we are the product not the customer.
  • #18 Be sure to include legal Information Discovery, Litigation Hold are big issues.
  • #19 Now for solutions – 4 general categories for devices Containerization includes Enterprise App Store
  • #20 Extensible policy; Citrix (no remnants); looking at containerization; guest wireless/wired; not yet considering $ (reimbursement/stipend) Gartner says at least 3-5 years for financial payoff.
  • #21 Policy already mentioned Working on process to more seamlessly allow consumer apps Know your data classifications PIE great for online storage, file sharing.
  • #23 Partner; Lead; Add value Good user experience is key
  • #24 Users are changing; expectations are changing; keep “eyes on the prize”; partner, solve problems, and add value