SlideShare a Scribd company logo
1 of 11
Security as a Business Enabler
The Mobile
Aware
CISO
Sam Phillips
September, 2015
3
The Mobile Aware CISO: Security as a Business Enabler
SIMPLIFY CONNECT INNOVATE TRANSFORM
Identify, Characterize
Risk and Stabilize
Connected-Life without
Complexity
Reach and Deliver
Great Experiences
Secure Anywhere,
Anytime Access
Security Enabling Future and
the Possibilities
Customer-Driven Business
Model
Driving Opportunities
and Growth
Deliver innovation and
confidence through
Security
4
Secure Mobility Driving Innovation
SIMPLIFY CONNECT INNOVATE TRANSFORM
• Bank balances
• Account transfers
• Check deposits
• Online Stock Trading
› Card-less ATM
› Photo bill pay
• Mobile check-in
• Mobile boarding passes
• Inflight point of sale
• Electronic flight bags
• In-flight monitoring &
maintenance
• In-flight Entertainment
• Mobile payments
• Point of sale terminals
• Loyalty / in-store promotions
• Location Awareness
• Interactive Display
• Real-time transactions
(Uber, Hailo)
• Tele-healthcare
› Diagnosis
› Treatment
› Follow-up care
• Wearable medical devices
Banking Airline Industry Retail Healthcare
5
1990’s 2020’s2000’s1980’s1970’s 2010’s
Data Rate: 2400 24k 24 M 2.4G?
Keyboard Touchscreen Intuitive Typing Contextual Response
Voice Voice over Data Voice over WiFi
Text Ubiquitous Texting
First Secure Phones Non-Govt Secure Phones Global Secure Phones
SIMPLIFY
CONNECT
Gaming Music General Purpose Apps App-based Productivity Business
Service Apps
Camera’s Bluetooth Wearables Embedables
Peripherals / Injectables
INNOVATE
Cloud-Service Reliance
Enterprise of Things
TRANSFORM
Evolving Mobile Capability
6
Evolving Information Assets and Business Processes
Integration
Basic email
& Calendar
Connect
Applications to
existing back-end
systems
Develop custom
applications
aggregating back
end systems
Create purposeful
applications focused
on the user need
Business Value
SIMPLIFY CONNECT INNOVATE TRANSFORM
SecurityNeed
Each new capability requires
the CIO
- and the enterprise to
think differently about
both:
The Business and Security
Vendors may need prodding,
integration, and process
help before a solution is
Enterprise Ready
7
Samsung Business Services Supporting the CIO/CISO
Application Support Services
• Application Development and
Migration
• Application Development
Consulting & Training
• Enterprise Applications
• Application Platforms
Technical Support
Services
• Flexible Support Options
• Tech-to-Site
• Device Repair
• Extended Warranty
Mobile Management
Services
• Device Provisioning
• EMM Assessments
• EMM License Sourcing
• EMM Migration Services
Security Services
• Mobile Security Policy
Review
• Mobile Security Architecture
Review
• Comprehensive Mobile
Security Assessment
Samsung Business Services
offers a comprehensive suite
of services to fully support
the enterprise mobile
ecosystem
8
Mobile Strategy
Elements
Platform Tools Applications Services
Business Goals &
Capabilities
Establish Clear Roles &
Ownership
Focus on User Experience
Establish a Roadmap
Manage what matters
Communicate
End-to-End Security
Plan for Internet of Things
Employees, Customers, & Metrics
Native, Cross Platform, Container, & Virtualized – Secure APIs
LOBs, IT, Insourcing, Outsourcing
Govern Mobility Globally, but Empower Your Business Departments Locally
Architectural guidelines to allow innovation and transformation
Automate IT Functions, Build in compliance, Establish Governance,
Strategy, Roadmap, Mobile Security Awareness
Wearables, Data Management, Analytics, Value Chains
Protect (sensitive) Information, Measure & Manage Risk
- security, financial and competitive risks
Pulling it all Together – the Enterprise Mobile Strategy
9
• User experience is critical for mobile applications as they are enabled in the palm of a hand
• Many of the great devices’ security and productivity features work within Application APIs
(e.g. multi-tasking, fingerprint scanner, stylus, keyboard case accessories)
• Mobile Applications need to be secure from initial deployment
Securing Applications
10
• Hardware to Application level security
• Real-time device protection from the moment you turn it on
• Management Tools
• Corporate data security to keep strict isolation of personal and
corporate apps and data
Hardware Root of Trust
Bootloader
TrustZone
Kernel
Android Framework
• Build a strong foundation where
ever you are
• Pick and chose components to
meet and manage your risk
• Ensure that you have the levels
of security available when and
where you need it
• Without the solid core, your risk
stays high - everything above
the foundation is at risk with
weak foundation
Device Security
11
• Understand what the business really wants to do with
mobile
• Establish a Business Council or Center of Excellence to
focus on the Demand Side – what are the business
drivers and value from enabling/adding mobility?
• Identify clear roles, responsibility, and ownership
• Clearly Identify what needs to be protected and the
tradeoffs with user experience that will keep people
inside the lines - understand your threat horizon
• Build out tools and implementation strategies
• Help drive Innovation and Transformation of your
Business
Summary/Next Steps for the CIO / CISO
The Mobile Aware CISO: Security as a Business Enabler

More Related Content

What's hot

Cyber warfare update 2016
Cyber warfare update 2016 Cyber warfare update 2016
Cyber warfare update 2016 Kevin Murphy
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)IoT613
 
Orange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakoutOrange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakoutOrange Business Services
 
Put your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstPut your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstEd Brill
 
iSecureCyber - Short Pitch Deck
iSecureCyber - Short Pitch DeckiSecureCyber - Short Pitch Deck
iSecureCyber - Short Pitch DeckPrabir Saha
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...Michael Jacobsen
 
IBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesIBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesChris Pepin
 
Businessday okt 2016 - HP - The Office of the future
Businessday okt 2016 - HP - The Office of the futureBusinessday okt 2016 - HP - The Office of the future
Businessday okt 2016 - HP - The Office of the futureMarketing Team
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation MATT ALEXANDER
 
Transformationplus Corporate Profile
Transformationplus Corporate ProfileTransformationplus Corporate Profile
Transformationplus Corporate ProfilePrabir Saha
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics BlackBerry
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersAjay Chebbi
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Prabir Saha
 
iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)Prabir Saha
 
Cloud Computing Flyer - Mobiloitte
Cloud Computing Flyer - MobiloitteCloud Computing Flyer - Mobiloitte
Cloud Computing Flyer - MobiloitteMobiloitte
 
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM Events
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOPDevConFu
 
Armor5 Presents at Under the Radar 2013
Armor5 Presents at Under the Radar 2013Armor5 Presents at Under the Radar 2013
Armor5 Presents at Under the Radar 2013Dealmaker Media
 

What's hot (20)

Cyber warfare update 2016
Cyber warfare update 2016 Cyber warfare update 2016
Cyber warfare update 2016
 
Samsung KNOX for Dummies
Samsung KNOX for DummiesSamsung KNOX for Dummies
Samsung KNOX for Dummies
 
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
Innovation and the Internet of Things - Emeka Nwafor (Wind River Systems)
 
Orange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakoutOrange Business Live 2013 new workspace breakout
Orange Business Live 2013 new workspace breakout
 
Put your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirstPut your business in motion with IBM MobileFirst
Put your business in motion with IBM MobileFirst
 
iSecureCyber - Short Pitch Deck
iSecureCyber - Short Pitch DeckiSecureCyber - Short Pitch Deck
iSecureCyber - Short Pitch Deck
 
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
How Meritage Homes Drove More Mobile Business Using IBM MobileFirst Platform ...
 
IBM Mobile Enterprise Services
IBM Mobile Enterprise ServicesIBM Mobile Enterprise Services
IBM Mobile Enterprise Services
 
Businessday okt 2016 - HP - The Office of the future
Businessday okt 2016 - HP - The Office of the futureBusinessday okt 2016 - HP - The Office of the future
Businessday okt 2016 - HP - The Office of the future
 
IBM Mobile First Client Presentation
IBM Mobile First Client Presentation IBM Mobile First Client Presentation
IBM Mobile First Client Presentation
 
Transformationplus Corporate Profile
Transformationplus Corporate ProfileTransformationplus Corporate Profile
Transformationplus Corporate Profile
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
 
Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10Transformationplus Cyber Security Offering v10
Transformationplus Cyber Security Offering v10
 
iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)iSecureCyber (Long Pitch Deck)
iSecureCyber (Long Pitch Deck)
 
Cloud Computing Flyer - Mobiloitte
Cloud Computing Flyer - MobiloitteCloud Computing Flyer - Mobiloitte
Cloud Computing Flyer - Mobiloitte
 
Pitch Deck
Pitch DeckPitch Deck
Pitch Deck
 
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie WieckIBM InterConnect 2013 Mobile Keynote: Marie Wieck
IBM InterConnect 2013 Mobile Keynote: Marie Wieck
 
Kaspars Petersons - BYOD - more like BYOP
Kaspars Petersons -  BYOD - more like BYOPKaspars Petersons -  BYOD - more like BYOP
Kaspars Petersons - BYOD - more like BYOP
 
Armor5 Presents at Under the Radar 2013
Armor5 Presents at Under the Radar 2013Armor5 Presents at Under the Radar 2013
Armor5 Presents at Under the Radar 2013
 

Viewers also liked

Strata Hadoop - Hadoop enabler of Data Driven Strategy - 20160601 vF
Strata Hadoop - Hadoop enabler of Data Driven Strategy - 20160601 vFStrata Hadoop - Hadoop enabler of Data Driven Strategy - 20160601 vF
Strata Hadoop - Hadoop enabler of Data Driven Strategy - 20160601 vFAbed Ajraou
 
Western Region Municipality Presentation at CISO Asia Summit 2014
Western Region Municipality Presentation at CISO Asia Summit 2014Western Region Municipality Presentation at CISO Asia Summit 2014
Western Region Municipality Presentation at CISO Asia Summit 2014Western Region Municipality
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderAccenture Insurance
 
Trust and Ethics in Leadership.
Trust and Ethics in Leadership.Trust and Ethics in Leadership.
Trust and Ethics in Leadership.Abhishek Singh
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROPriyanka Aash
 
Cyber Security Expect the Unexpected
Cyber Security Expect the UnexpectedCyber Security Expect the Unexpected
Cyber Security Expect the Unexpectedisc2-hellenic
 
Pesticide Research & the Politics of Poisoning for Profits
Pesticide Research & the Politics of Poisoning for Profits Pesticide Research & the Politics of Poisoning for Profits
Pesticide Research & the Politics of Poisoning for Profits v2zq
 
Direct Mail Design
Direct Mail DesignDirect Mail Design
Direct Mail Designunderwoodco
 
Reunión en grupo .tecnicas cualitativas
Reunión en grupo .tecnicas cualitativasReunión en grupo .tecnicas cualitativas
Reunión en grupo .tecnicas cualitativasLaura Lacuna
 
New summary interlaboratory & summary instrument group reports mar15 pol
New summary interlaboratory & summary instrument group reports mar15 polNew summary interlaboratory & summary instrument group reports mar15 pol
New summary interlaboratory & summary instrument group reports mar15 polRandox
 
Herramientas wep 2.0 informatica
Herramientas wep 2.0 informaticaHerramientas wep 2.0 informatica
Herramientas wep 2.0 informaticaOswaldox
 
Guía de playas en Boiro 2013
Guía de playas en Boiro 2013Guía de playas en Boiro 2013
Guía de playas en Boiro 2013Arousa Norte
 
Il lavoro di Seth
Il lavoro di SethIl lavoro di Seth
Il lavoro di SethprofSV
 
Bodas invitaciones
Bodas invitacionesBodas invitaciones
Bodas invitacionesAyyelen
 

Viewers also liked (20)

Strata Hadoop - Hadoop enabler of Data Driven Strategy - 20160601 vF
Strata Hadoop - Hadoop enabler of Data Driven Strategy - 20160601 vFStrata Hadoop - Hadoop enabler of Data Driven Strategy - 20160601 vF
Strata Hadoop - Hadoop enabler of Data Driven Strategy - 20160601 vF
 
Western Region Municipality Presentation at CISO Asia Summit 2014
Western Region Municipality Presentation at CISO Asia Summit 2014Western Region Municipality Presentation at CISO Asia Summit 2014
Western Region Municipality Presentation at CISO Asia Summit 2014
 
The Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to LeaderThe Cyber Security Leap: From Laggard to Leader
The Cyber Security Leap: From Laggard to Leader
 
Trust and Ethics in Leadership.
Trust and Ethics in Leadership.Trust and Ethics in Leadership.
Trust and Ethics in Leadership.
 
From Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIROFrom Cave Man to Business Man, the Evolution of the CISO to CIRO
From Cave Man to Business Man, the Evolution of the CISO to CIRO
 
Cyber Security Expect the Unexpected
Cyber Security Expect the UnexpectedCyber Security Expect the Unexpected
Cyber Security Expect the Unexpected
 
MANUAL OPENOFFICE DRAW
MANUAL OPENOFFICE DRAWMANUAL OPENOFFICE DRAW
MANUAL OPENOFFICE DRAW
 
Pesticide Research & the Politics of Poisoning for Profits
Pesticide Research & the Politics of Poisoning for Profits Pesticide Research & the Politics of Poisoning for Profits
Pesticide Research & the Politics of Poisoning for Profits
 
Presentacion
PresentacionPresentacion
Presentacion
 
Direct Mail Design
Direct Mail DesignDirect Mail Design
Direct Mail Design
 
Reunión en grupo .tecnicas cualitativas
Reunión en grupo .tecnicas cualitativasReunión en grupo .tecnicas cualitativas
Reunión en grupo .tecnicas cualitativas
 
New summary interlaboratory & summary instrument group reports mar15 pol
New summary interlaboratory & summary instrument group reports mar15 polNew summary interlaboratory & summary instrument group reports mar15 pol
New summary interlaboratory & summary instrument group reports mar15 pol
 
Herramientas wep 2.0 informatica
Herramientas wep 2.0 informaticaHerramientas wep 2.0 informatica
Herramientas wep 2.0 informatica
 
Guía de playas en Boiro 2013
Guía de playas en Boiro 2013Guía de playas en Boiro 2013
Guía de playas en Boiro 2013
 
La cultura del hampa
La cultura del hampa La cultura del hampa
La cultura del hampa
 
Il lavoro di Seth
Il lavoro di SethIl lavoro di Seth
Il lavoro di Seth
 
Conservus Brochure_1p
Conservus Brochure_1pConservus Brochure_1p
Conservus Brochure_1p
 
Pedro rocha
Pedro rochaPedro rocha
Pedro rocha
 
Bodas invitaciones
Bodas invitacionesBodas invitaciones
Bodas invitaciones
 
Wiesbaden Magazin Ausgabe Juni 2009
Wiesbaden Magazin Ausgabe Juni 2009Wiesbaden Magazin Ausgabe Juni 2009
Wiesbaden Magazin Ausgabe Juni 2009
 

Similar to The Mobile Aware CISO: Security as a Business Enabler

Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security William John Todd
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Webinar - Empower Your Organization with Enterprise Mobility
Webinar - Empower Your Organization with Enterprise MobilityWebinar - Empower Your Organization with Enterprise Mobility
Webinar - Empower Your Organization with Enterprise MobilitySynoptek (previously Indusa)
 
Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility Euro IT Group
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protectionxband
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLogicalis Australia
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015Sreeni Pamidala
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersJeremy Siewert
 
Webinar on Proven Strategies for Powerful B2E Mobile Apps
Webinar on Proven Strategies for Powerful B2E Mobile AppsWebinar on Proven Strategies for Powerful B2E Mobile Apps
Webinar on Proven Strategies for Powerful B2E Mobile AppsSynoptek (previously Indusa)
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business CollateralVikram Sareen
 
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...Michael Antinozzi
 

Similar to The Mobile Aware CISO: Security as a Business Enabler (20)

Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security MTL Australia 2016 - The 3rd Wave of Security
MTL Australia 2016 - The 3rd Wave of Security
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Mobile Security
Mobile Security Mobile Security
Mobile Security
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Webinar - Empower Your Organization with Enterprise Mobility
Webinar - Empower Your Organization with Enterprise MobilityWebinar - Empower Your Organization with Enterprise Mobility
Webinar - Empower Your Organization with Enterprise Mobility
 
Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility Insurance Industry Trends in 2015: #2 Mobility
Insurance Industry Trends in 2015: #2 Mobility
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Information Risk and Protection
Information Risk and ProtectionInformation Risk and Protection
Information Risk and Protection
 
Leveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enablerLeveraging mobility - turning enterprise wireless into a business enabler
Leveraging mobility - turning enterprise wireless into a business enabler
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Unisys Mobility Solutions
Unisys Mobility SolutionsUnisys Mobility Solutions
Unisys Mobility Solutions
 
IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015IBM MobileFirst Reference Architecture 1512 v3 2015
IBM MobileFirst Reference Architecture 1512 v3 2015
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
IBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem PartnersIBM Mobile Overview for Ecosystem Partners
IBM Mobile Overview for Ecosystem Partners
 
Webinar on Proven Strategies for Powerful B2E Mobile Apps
Webinar on Proven Strategies for Powerful B2E Mobile AppsWebinar on Proven Strategies for Powerful B2E Mobile Apps
Webinar on Proven Strategies for Powerful B2E Mobile Apps
 
Blue Bricks Business Collateral
Blue Bricks Business CollateralBlue Bricks Business Collateral
Blue Bricks Business Collateral
 
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
SOTI Enterprise Mobility Management - Michael Antinozzi - VP Global Business ...
 

More from Samsung Business USA

13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S Pen13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S PenSamsung Business USA
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroomSamsung Business USA
 
10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the go10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the goSamsung Business USA
 
10 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S2310 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S23Samsung Business USA
 
13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S Pen13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S PenSamsung Business USA
 
8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionals8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionalsSamsung Business USA
 
10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 Pro10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 ProSamsung Business USA
 
5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient Experience5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient ExperienceSamsung Business USA
 
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdfINFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdfSamsung Business USA
 
10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy Book10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy BookSamsung Business USA
 
The best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needsThe best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needsSamsung Business USA
 
6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroom6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroomSamsung Business USA
 
13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S Pen13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S PenSamsung Business USA
 
10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the go10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the goSamsung Business USA
 
10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 Ultra10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 UltraSamsung Business USA
 
9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technology9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technologySamsung Business USA
 
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solutionSamsung Business USA
 
7 ways displays create a connected campus
7 ways displays create a connected campus7 ways displays create a connected campus
7 ways displays create a connected campusSamsung Business USA
 

More from Samsung Business USA (20)

13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S Pen13 tricks to get the most out of the S Pen
13 tricks to get the most out of the S Pen
 
6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom6 ways Samsung’s Interactive Display powered by Android changes the classroom
6 ways Samsung’s Interactive Display powered by Android changes the classroom
 
10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the go10 reasons to choose Galaxy Tab S9 for work on the go
10 reasons to choose Galaxy Tab S9 for work on the go
 
10 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S2310 reasons to upgrade to Samsung’s Galaxy S23
10 reasons to upgrade to Samsung’s Galaxy S23
 
13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S Pen13 things you didn’t know you could do with the S Pen
13 things you didn’t know you could do with the S Pen
 
10 ways to fuel productivity
10 ways to fuel productivity10 ways to fuel productivity
10 ways to fuel productivity
 
8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionals8 ways ViewFinity monitors set the standard for professionals
8 ways ViewFinity monitors set the standard for professionals
 
10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 Pro10 field-ready features of Galaxy XCover6 Pro
10 field-ready features of Galaxy XCover6 Pro
 
5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient Experience5 Ways Smart Hospital Rooms Can Improve The Patient Experience
5 Ways Smart Hospital Rooms Can Improve The Patient Experience
 
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdfINFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
INFOGRAPHIC_10-field-ready-features-of-the-Tab-Active4_FINAL.pdf
 
10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy Book10 ways to fuel productivity with Galaxy Book
10 ways to fuel productivity with Galaxy Book
 
The best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needsThe best monitors for teachers: 5 features every educator needs
The best monitors for teachers: 5 features every educator needs
 
To BYOD or not to BYOD?
To BYOD or not to BYOD?To BYOD or not to BYOD?
To BYOD or not to BYOD?
 
6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroom6 smart ways Samsung's 85-inch Interactive Display changes the classroom
6 smart ways Samsung's 85-inch Interactive Display changes the classroom
 
13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S Pen13 things you didn't know you could do with the S Pen
13 things you didn't know you could do with the S Pen
 
10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the go10 reasons to choose Galaxy Tab S8 for work on the go
10 reasons to choose Galaxy Tab S8 for work on the go
 
10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 Ultra10 reasons to upgrade to Galaxy S22 Ultra
10 reasons to upgrade to Galaxy S22 Ultra
 
9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technology9 benefits of mobilizing patient care with hospital technology
9 benefits of mobilizing patient care with hospital technology
 
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
6 ways Samsung Kiosk gives retailers an all-in-one self-service solution
 
7 ways displays create a connected campus
7 ways displays create a connected campus7 ways displays create a connected campus
7 ways displays create a connected campus
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

The Mobile Aware CISO: Security as a Business Enabler

  • 1. Security as a Business Enabler The Mobile Aware CISO Sam Phillips September, 2015
  • 2. 3 The Mobile Aware CISO: Security as a Business Enabler SIMPLIFY CONNECT INNOVATE TRANSFORM Identify, Characterize Risk and Stabilize Connected-Life without Complexity Reach and Deliver Great Experiences Secure Anywhere, Anytime Access Security Enabling Future and the Possibilities Customer-Driven Business Model Driving Opportunities and Growth Deliver innovation and confidence through Security
  • 3. 4 Secure Mobility Driving Innovation SIMPLIFY CONNECT INNOVATE TRANSFORM • Bank balances • Account transfers • Check deposits • Online Stock Trading › Card-less ATM › Photo bill pay • Mobile check-in • Mobile boarding passes • Inflight point of sale • Electronic flight bags • In-flight monitoring & maintenance • In-flight Entertainment • Mobile payments • Point of sale terminals • Loyalty / in-store promotions • Location Awareness • Interactive Display • Real-time transactions (Uber, Hailo) • Tele-healthcare › Diagnosis › Treatment › Follow-up care • Wearable medical devices Banking Airline Industry Retail Healthcare
  • 4. 5 1990’s 2020’s2000’s1980’s1970’s 2010’s Data Rate: 2400 24k 24 M 2.4G? Keyboard Touchscreen Intuitive Typing Contextual Response Voice Voice over Data Voice over WiFi Text Ubiquitous Texting First Secure Phones Non-Govt Secure Phones Global Secure Phones SIMPLIFY CONNECT Gaming Music General Purpose Apps App-based Productivity Business Service Apps Camera’s Bluetooth Wearables Embedables Peripherals / Injectables INNOVATE Cloud-Service Reliance Enterprise of Things TRANSFORM Evolving Mobile Capability
  • 5. 6 Evolving Information Assets and Business Processes Integration Basic email & Calendar Connect Applications to existing back-end systems Develop custom applications aggregating back end systems Create purposeful applications focused on the user need Business Value SIMPLIFY CONNECT INNOVATE TRANSFORM SecurityNeed Each new capability requires the CIO - and the enterprise to think differently about both: The Business and Security Vendors may need prodding, integration, and process help before a solution is Enterprise Ready
  • 6. 7 Samsung Business Services Supporting the CIO/CISO Application Support Services • Application Development and Migration • Application Development Consulting & Training • Enterprise Applications • Application Platforms Technical Support Services • Flexible Support Options • Tech-to-Site • Device Repair • Extended Warranty Mobile Management Services • Device Provisioning • EMM Assessments • EMM License Sourcing • EMM Migration Services Security Services • Mobile Security Policy Review • Mobile Security Architecture Review • Comprehensive Mobile Security Assessment Samsung Business Services offers a comprehensive suite of services to fully support the enterprise mobile ecosystem
  • 7. 8 Mobile Strategy Elements Platform Tools Applications Services Business Goals & Capabilities Establish Clear Roles & Ownership Focus on User Experience Establish a Roadmap Manage what matters Communicate End-to-End Security Plan for Internet of Things Employees, Customers, & Metrics Native, Cross Platform, Container, & Virtualized – Secure APIs LOBs, IT, Insourcing, Outsourcing Govern Mobility Globally, but Empower Your Business Departments Locally Architectural guidelines to allow innovation and transformation Automate IT Functions, Build in compliance, Establish Governance, Strategy, Roadmap, Mobile Security Awareness Wearables, Data Management, Analytics, Value Chains Protect (sensitive) Information, Measure & Manage Risk - security, financial and competitive risks Pulling it all Together – the Enterprise Mobile Strategy
  • 8. 9 • User experience is critical for mobile applications as they are enabled in the palm of a hand • Many of the great devices’ security and productivity features work within Application APIs (e.g. multi-tasking, fingerprint scanner, stylus, keyboard case accessories) • Mobile Applications need to be secure from initial deployment Securing Applications
  • 9. 10 • Hardware to Application level security • Real-time device protection from the moment you turn it on • Management Tools • Corporate data security to keep strict isolation of personal and corporate apps and data Hardware Root of Trust Bootloader TrustZone Kernel Android Framework • Build a strong foundation where ever you are • Pick and chose components to meet and manage your risk • Ensure that you have the levels of security available when and where you need it • Without the solid core, your risk stays high - everything above the foundation is at risk with weak foundation Device Security
  • 10. 11 • Understand what the business really wants to do with mobile • Establish a Business Council or Center of Excellence to focus on the Demand Side – what are the business drivers and value from enabling/adding mobility? • Identify clear roles, responsibility, and ownership • Clearly Identify what needs to be protected and the tradeoffs with user experience that will keep people inside the lines - understand your threat horizon • Build out tools and implementation strategies • Help drive Innovation and Transformation of your Business Summary/Next Steps for the CIO / CISO

Editor's Notes

  1. Abstract: Business adoption of Mobile has gotten ahead of CISOs and the CIOs they work with. Aligning efforts with mobile business strategy and value strategy helps CISOs regain influence and drive value and security for the business as more activity get driven by the mobile applications and opportunities business units explore every day.
  2. Security Enabled just some examples: from the 4 highlighted sectors Banking / airline / retail / healthcare Transport??!? Each of these directly relates to: simplify / connect / innovate / transform
  3. Green – 0, 86,32 – 0,127,51 – 0, 153, 63 Dk Purple – 47,41,94 – 71,63,137 – 87, 76, 164 Pink/Purple - 110, 25, 94 – 159, 40, 137 – 190, 50, 164 - purple Blue – 0, 102, 140 – 0, 148,202 - - 0, 178, 241  
  4. Green – 0, 86,32 – 0,127,51 – 0, 153, 63 Dk Purple – 47,41,94 – 71,63,137 – 87, 76, 164 Pink/Purple - 110, 25, 94 – 159, 40, 137 – 190, 50, 164 - purple Blue – 0, 102, 140 – 0, 148,202 - - 0, 178, 241  
  5. Building Mobile Application Security in to SDLC Threat Analysis Potentially harmful apps (PHA) Google Play Verify Apps SafetyNet Static/Dynamic application security testing Comprehensive Security Assessment Efficient and Consistent Methodology/Framework Lower Security Control Cost Implement security measures based on risk appetite
  6. Sources: Citrix White Paper on Mobile Security - http://www.structured.com/wp-content/uploads/2015/06/Enterprise-Mobility-Management.pdf Citrix EMM – and XenMobile solutions - https://www.citrix.com/content/dam/citrix/en_us/documents/oth/how-four-citrix-customers-solved-the-enterprise-mobility-challenge.pdf?accessmode=direct Complete copy/cut/paste from Citrix - http://www.builtinla.com/blog/8-key-elements-successful-enterprise-mobility-strategy http://mlabs.boston-technology.com/blog/7-crucial-elements-of-a-successful-enterprise-mobile-strategy