SlideShare a Scribd company logo
Mobile – Adoption and Adaption in 2012




Greg Day
Security CTO & Director of strategy
Mobile data usage up 4,000%




                              2
Business Drivers
•   Fast route to market (quick app development)
•   User productivity (familiarity & use in personal time)
•   Cost saving (capex, support costs, contract/data costs)
•   Employee satisfaction
•   Staff attraction and retention
•   Easier to use?
Do you ever text and walk?   Ever walk into something?
What if your camera was on and showed where you were going?
“There’s an app for that…$1.54”
• Found on 3rd party sites and torrents


                         95054




It does two things:
 1. Sends info to a remote location
 2. Sends an SMS to all your contacts
Android.Walkinwat           7
Typical Mobile Malware




          8
Apple vulnerabilities – iOS5 – Access to last used app




        Hold down the power button
Mobile threat history across major platforms.


                         Symbian
                         requires
140                       signing
120
                                                                    20
100                                                              Families
                                                Ikee
 80                                           worms on
                                                                41 Variants
  60                                           rooted
                                              iPhones
  40
  20
   0                                                                   Android
                                                                     iPhone
   2004    2005   2006   2007
                                                                    Symbian

                                    2008     2009        2010   2011


                     Symbian        iPhone   Android
What Is Driving Security?
Industry trends driving security challenges
  • Mobile computing
  • Social media
  • Consumerization of IT




                          11
Business concerns
• Data on the device
• Social networking (blurring personal/business identities)
• Accountability for the device
  (responsible/liable when managing)
• Data privacy regulations
• Malware (HTML5 adoption)
• Location controls – social engineering
• Device physical loss
BYOD concerns
•   3rd party use of the device (family access to data)
•   Basic security controls vs user lockdown
•   Apps installed
•   Blending of data and identities
•   Jail broken devices
•   Damaged devices
•   Lost/stolen devices
•   Privacy of devices in public places
•   Other business users devices
Symantec research

Top three Mobile Security Practice “Must Haves”

To successfully enable and manage mobile technology, CISOs rated
their top practices and related technologies:

1. Protecting information on devices (90%)
2. Authentication to the network and applications (89%)
3. Setting and maintaining security policies (88%)
Source: 2011 IDG/CSO Quick Poll Survey of 124 Qualified respondents.
Business decisions
• Business or user owned
• In-house or managed                           Data
                                             Protection
                               Identity
  Service                       Mgmt

• Managed device or managed
  applications                            Security
                                          baseline
• What controls
  – What the longer term use
    case?

                               Mobile Security
Smart device = Cloud enabled
                                     • Manage
• Enable new devices                   entitlements
• Consistently govern
  cloud services                     • Hyper-distributed
                                       information




                        CIO

                              CISO
03 - The Rise of Cloud Security Brokers

                                           Managed Devices                Unmanaged Devices

               Governance
                                             Security/protection agents

                Protection                SYMANTEC O3



                  Visibility
                                             Security/protection agents
                                          Datacenter/Private-Cloud        Public Cloud Services


Consistent identity & information security policy setting & auditing across all cloud services

Context and content aware security gateway enforcing enterprise policies above the clouds

Complete cloud audit trail of who (identity), what (information, services) , how (devices) , when (time)
2011 Trends

Mobile Threats




        19
Thank You!
Greg Day
Security CTO & Director of Strategy
Greg_Day@Symantec.com
07714 388998

                  GregDaySecurity
Mobile – Adoption and Adaption in 2012
Discussions on “Mobile” are everywhere right now, from the
street to the boardroom, and it provides a two-sided challenge
for forward-thinking businesses. On one side, how can the
organisation open up new ways of generating engagement and
revenue from its customer base? On the other, how can it open
up new ways of working for its employees that increase their
productivity and improve retention of the best and brightest?
Both of these potentially positive changes must be held up
against increasing expectations of the protection of both
customer and employee information and identity. Derek
O’Carroll from Symantec will host this workshop by first
presenting a viewpoint and leading a discussion into how this is
being addressed today and possible forward-looking strategies.

More Related Content

What's hot

BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
Patrick Angel - MBA, CISSP(c) CISM(c) CRISC(c) CISA(c)
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
HP Enterprise Security
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
Plain Concepts
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
IBM Security
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
AGILLY
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
David J Rosenthal
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
Andris Soroka
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
IBM Security
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
CloudIDSummit
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAM
Abhinaw Kumar
 
2011 Sales Presentation V6
2011 Sales Presentation V62011 Sales Presentation V6
2011 Sales Presentation V6tina_williams
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White PaperSybase Türkiye
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
SHOLOVE INTERNATIONAL LLC
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
Denim Group
 
MobileIrn Presentation
MobileIrn PresentationMobileIrn Presentation
MobileIrn Presentation
Wing Venture Capital
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
MobileIron
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
Entrust Datacard
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
IBM Security
 

What's hot (20)

BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
Enterprise Mobile Security
Enterprise Mobile SecurityEnterprise Mobile Security
Enterprise Mobile Security
 
Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa Microsoft Intune y Gestión de Identidad Corporativa
Microsoft Intune y Gestión de Identidad Corporativa
 
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest LinkSecuring Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
DSS ITSEC Webinars 2013 - Network Access Control + Mobile Security (MobileIron)
 
How to Hack a Cryptographic Key
How to Hack a Cryptographic KeyHow to Hack a Cryptographic Key
How to Hack a Cryptographic Key
 
CIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First WorldCIS14: Providing Security and Identity for a Mobile-First World
CIS14: Providing Security and Identity for a Mobile-First World
 
Mobile's influence on IAM
Mobile's influence on IAMMobile's influence on IAM
Mobile's influence on IAM
 
2011 Sales Presentation V6
2011 Sales Presentation V62011 Sales Presentation V6
2011 Sales Presentation V6
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White Paper
 
Ascure session
Ascure sessionAscure session
Ascure session
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Designing Secure Mobile Apps
Designing Secure Mobile AppsDesigning Secure Mobile Apps
Designing Secure Mobile Apps
 
MobileIrn Presentation
MobileIrn PresentationMobileIrn Presentation
MobileIrn Presentation
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
Entrust Enterprise Authentication
Entrust Enterprise AuthenticationEntrust Enterprise Authentication
Entrust Enterprise Authentication
 
IBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the DayIBM Mobile Analyzer Saves the Day
IBM Mobile Analyzer Saves the Day
 

Similar to Mobile – Adoption and Adaption in 2012

Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)AP DealFlow
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
Symantec
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
Avinash Birnale
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
Symantec
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
Chris Pepin
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
IBM Danmark
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Security
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
IBM Security
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
Symantec
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
Santosh Satam
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
Sophos
 
Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...
Insight UK
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
IBM Security
 
Securing mobile population for White Hats
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White Hats
Vladimir Jirasek
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite Launch
Juniper Networks
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
EnclaveSecurity
 

Similar to Mobile – Adoption and Adaption in 2012 (20)

Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
 
Symantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility EnhancementsSymantec Enterprise Mobility Enhancements
Symantec Enterprise Mobility Enhancements
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
 
Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012Symantec Enterprise Mobility Vision May 2012
Symantec Enterprise Mobility Vision May 2012
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBMStyr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
Styr mobile enheder med Mobile Device Management, Martin Vittrup, IBM
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012Symantec Enterprise Mobility - Mobile World Congress February 2012
Symantec Enterprise Mobility - Mobile World Congress February 2012
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Symantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility StrategySymantec Advances Enterprise Mobility Strategy
Symantec Advances Enterprise Mobility Strategy
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
WSO2Con Asia 2014 - Embracing BYOD Trend Without Compromising Security, Emplo...
 
Sophos Mobile Control - Product Overview
Sophos Mobile Control - Product OverviewSophos Mobile Control - Product Overview
Sophos Mobile Control - Product Overview
 
Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...Information Security, Cybercrime and technology futures allowing you to get a...
Information Security, Cybercrime and technology futures allowing you to get a...
 
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
Surviving the Mobile Phenomenon: Protecting Devices without Disrupting the Us...
 
Securing mobile population for White Hats
Securing mobile population for White HatsSecuring mobile population for White Hats
Securing mobile population for White Hats
 
Junos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite LaunchJunos Pulse Mobile Security Suite Launch
Junos Pulse Mobile Security Suite Launch
 
The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 

More from Global Business Events - the Heart of your Network.

Event Website template
Event Website templateEvent Website template
IBM Case Study CIO Event
IBM Case Study CIO Event IBM Case Study CIO Event
CIO Event Global Whitepaper
CIO Event Global WhitepaperCIO Event Global Whitepaper
Why physical security just isn’t enough, Sending the heavies into virtualized...
Why physical security just isn’t enough, Sending the heavies into virtualized...Why physical security just isn’t enough, Sending the heavies into virtualized...
Why physical security just isn’t enough, Sending the heavies into virtualized...
Global Business Events - the Heart of your Network.
 
CIO / CMO Convergence
CIO / CMO ConvergenceCIO / CMO Convergence
Graham Benson - CIO - M&M Direct presentation
Graham Benson - CIO - M&M Direct presentationGraham Benson - CIO - M&M Direct presentation
Graham Benson - CIO - M&M Direct presentation
Global Business Events - the Heart of your Network.
 
The Communicating Information Officer
The Communicating Information OfficerThe Communicating Information Officer
The Communicating Information Officer
Global Business Events - the Heart of your Network.
 
Role of the Cio
Role of the CioRole of the Cio
Intelligent Customer
Intelligent CustomerIntelligent Customer
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
Global Business Events - the Heart of your Network.
 
ICT in developing world
ICT in developing worldICT in developing world
Greening DECC - The CIO as Champion
Greening DECC - The CIO as ChampionGreening DECC - The CIO as Champion
Greening DECC - The CIO as Champion
Global Business Events - the Heart of your Network.
 

More from Global Business Events - the Heart of your Network. (20)

CMO BROCHURE NEWdesign
CMO BROCHURE NEWdesignCMO BROCHURE NEWdesign
CMO BROCHURE NEWdesign
 
CIO Speakers Welcome pack
CIO Speakers Welcome packCIO Speakers Welcome pack
CIO Speakers Welcome pack
 
CIO BROCHURE DELEGATES (1)
CIO BROCHURE DELEGATES (1)CIO BROCHURE DELEGATES (1)
CIO BROCHURE DELEGATES (1)
 
IFB PREZ
IFB PREZIFB PREZ
IFB PREZ
 
ppt (1)
ppt (1)ppt (1)
ppt (1)
 
CIO Agenda_Booklet John Funnell (2)
CIO Agenda_Booklet John Funnell (2)CIO Agenda_Booklet John Funnell (2)
CIO Agenda_Booklet John Funnell (2)
 
Event Website template
Event Website templateEvent Website template
Event Website template
 
IBM Case Study CIO Event
IBM Case Study CIO Event IBM Case Study CIO Event
IBM Case Study CIO Event
 
CIO Event Global Whitepaper
CIO Event Global WhitepaperCIO Event Global Whitepaper
CIO Event Global Whitepaper
 
Richard Davies CIO Deutsche Post DHL
Richard Davies CIO Deutsche Post DHL   Richard Davies CIO Deutsche Post DHL
Richard Davies CIO Deutsche Post DHL
 
Why physical security just isn’t enough, Sending the heavies into virtualized...
Why physical security just isn’t enough, Sending the heavies into virtualized...Why physical security just isn’t enough, Sending the heavies into virtualized...
Why physical security just isn’t enough, Sending the heavies into virtualized...
 
CIO / CMO Convergence
CIO / CMO ConvergenceCIO / CMO Convergence
CIO / CMO Convergence
 
Graham Benson - CIO - M&M Direct presentation
Graham Benson - CIO - M&M Direct presentationGraham Benson - CIO - M&M Direct presentation
Graham Benson - CIO - M&M Direct presentation
 
The Communicating Information Officer
The Communicating Information OfficerThe Communicating Information Officer
The Communicating Information Officer
 
Role of the Cio
Role of the CioRole of the Cio
Role of the Cio
 
Tecom role of the cio
Tecom role of the cioTecom role of the cio
Tecom role of the cio
 
Intelligent Customer
Intelligent CustomerIntelligent Customer
Intelligent Customer
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
ICT in developing world
ICT in developing worldICT in developing world
ICT in developing world
 
Greening DECC - The CIO as Champion
Greening DECC - The CIO as ChampionGreening DECC - The CIO as Champion
Greening DECC - The CIO as Champion
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Mobile – Adoption and Adaption in 2012

  • 1. Mobile – Adoption and Adaption in 2012 Greg Day Security CTO & Director of strategy
  • 2. Mobile data usage up 4,000% 2
  • 3. Business Drivers • Fast route to market (quick app development) • User productivity (familiarity & use in personal time) • Cost saving (capex, support costs, contract/data costs) • Employee satisfaction • Staff attraction and retention • Easier to use?
  • 4. Do you ever text and walk? Ever walk into something?
  • 5. What if your camera was on and showed where you were going?
  • 6. “There’s an app for that…$1.54”
  • 7. • Found on 3rd party sites and torrents 95054 It does two things: 1. Sends info to a remote location 2. Sends an SMS to all your contacts Android.Walkinwat 7
  • 9. Apple vulnerabilities – iOS5 – Access to last used app Hold down the power button
  • 10. Mobile threat history across major platforms. Symbian requires 140 signing 120 20 100 Families Ikee 80 worms on 41 Variants 60 rooted iPhones 40 20 0 Android iPhone 2004 2005 2006 2007 Symbian 2008 2009 2010 2011 Symbian iPhone Android
  • 11. What Is Driving Security? Industry trends driving security challenges • Mobile computing • Social media • Consumerization of IT 11
  • 12. Business concerns • Data on the device • Social networking (blurring personal/business identities) • Accountability for the device (responsible/liable when managing) • Data privacy regulations • Malware (HTML5 adoption) • Location controls – social engineering • Device physical loss
  • 13. BYOD concerns • 3rd party use of the device (family access to data) • Basic security controls vs user lockdown • Apps installed • Blending of data and identities • Jail broken devices • Damaged devices • Lost/stolen devices • Privacy of devices in public places • Other business users devices
  • 14. Symantec research Top three Mobile Security Practice “Must Haves” To successfully enable and manage mobile technology, CISOs rated their top practices and related technologies: 1. Protecting information on devices (90%) 2. Authentication to the network and applications (89%) 3. Setting and maintaining security policies (88%) Source: 2011 IDG/CSO Quick Poll Survey of 124 Qualified respondents.
  • 15.
  • 16. Business decisions • Business or user owned • In-house or managed Data Protection Identity Service Mgmt • Managed device or managed applications Security baseline • What controls – What the longer term use case? Mobile Security
  • 17. Smart device = Cloud enabled • Manage • Enable new devices entitlements • Consistently govern cloud services • Hyper-distributed information CIO CISO
  • 18. 03 - The Rise of Cloud Security Brokers Managed Devices Unmanaged Devices Governance Security/protection agents Protection SYMANTEC O3 Visibility Security/protection agents Datacenter/Private-Cloud Public Cloud Services Consistent identity & information security policy setting & auditing across all cloud services Context and content aware security gateway enforcing enterprise policies above the clouds Complete cloud audit trail of who (identity), what (information, services) , how (devices) , when (time)
  • 20. Thank You! Greg Day Security CTO & Director of Strategy Greg_Day@Symantec.com 07714 388998 GregDaySecurity
  • 21. Mobile – Adoption and Adaption in 2012 Discussions on “Mobile” are everywhere right now, from the street to the boardroom, and it provides a two-sided challenge for forward-thinking businesses. On one side, how can the organisation open up new ways of generating engagement and revenue from its customer base? On the other, how can it open up new ways of working for its employees that increase their productivity and improve retention of the best and brightest? Both of these potentially positive changes must be held up against increasing expectations of the protection of both customer and employee information and identity. Derek O’Carroll from Symantec will host this workshop by first presenting a viewpoint and leading a discussion into how this is being addressed today and possible forward-looking strategies.

Editor's Notes

  1. GartnerAccording to Gartner, sales of smartphones will exceed 461 million by the end of the year, surpassing PC shipments in the process. In fact, combined sales of smartphones and tablets will be 44 percent greater than the PC market by the end of 2011.  Oracle mobile data report 201116% of mobile customers have purchased a tablet computer and another 41% plan to purchase one in the next 12 months 55% report having downloaded a free mobile application (app), up significantly from 42% in 2010  47% of mobile customers say their data use has increased in the past 12 months (4Gb-64Gb)
  2. Lets look back at some of the moments in Mobile Malware History:I am sure many of you may remember threats like the skulls trojan targeting Symbian that was being carried by many taxidrivers here in Sydney, who were given the gift from their passengers. Ref : http://www.zdnet.com.au/sydney-taxis-infested-with-worms-139182408.htmCode Signing introduced by Symbian started the decline targeting that platform.Rick Rolling Iphone users in 2009Android seems to be where the action is right now <click>
  3. Applied Research fielded this survey by telephone in April and May 2011. These results are based on 3,300 responses.Of the organizations surveyed in April and May, respondents came from companies with a range of 5 to more than 5,000 employees. Of the total responses, 1,225 were from companies with 1,000 employees or greater.This survey has a reliability of 95% confidence with +/- 1.8% margin of error.When we asked companies that question, the top three industry trends they saw affecting the difficulty of providing cybersecurity were: - Mobile computing (47%) - Social media (46%) - Consumerization of IT (45%)
  4. Symantec is spending a lot of time monitoring the mobile threat landscape and you an read in more detail many of our findings