Trevor Iverach<br />Principal Consultant, CA Technologies<br />iPad-style mobility in the age of Wikileaks <br />
agenda<br />address the ‘mobilution’ challenge<br />3 layered security approach<br />establish a position<br />
the ‘mobilution’ challenge?<br />
why now?<br />
understand the threat<br />
contrasting mobile devices<br />
Mitigating the risk<br />
where to secure the risk?<br />device<br />data<br />10111001100010111111010111<br />enterprise<br />
Securing the device<br />passcodes/passwords<br />remote wipe<br />hardware based encryption<br />policies<br />device typ...
 securing the data?<br />information protection and control<br /> non-public information<br /> personally identifiable inf...
Demonstration<br />
securing the enterprise<br />device authenticity is crucial<br />device dna<br />strong authentication<br />two factor aut...
demonstration<br />
putting it all together<br />securethe enterprise<br /><ul><li>device authenticity
 user authenticity</li></ul>securethe device<br />passwords<br /><ul><li> restrictions
config</li></ul>securethe data<br />control points data in use, motion, rest<br />
these devices are inevitable<br />Summary<br />secure the device, data & enterprise<br />establish a position<br />
Upcoming SlideShare
Loading in …5
×

iPad-style mobility in the age of Wikileaks

913 views

Published on

This is the presentation I delivered on securing mobile tablet style devices. An emerging technology area with the assoicated risks.

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
913
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
31
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Summary…
  • iPad-style mobility in the age of Wikileaks

    1. 1. Trevor Iverach<br />Principal Consultant, CA Technologies<br />iPad-style mobility in the age of Wikileaks <br />
    2. 2. agenda<br />address the ‘mobilution’ challenge<br />3 layered security approach<br />establish a position<br />
    3. 3. the ‘mobilution’ challenge?<br />
    4. 4. why now?<br />
    5. 5. understand the threat<br />
    6. 6. contrasting mobile devices<br />
    7. 7. Mitigating the risk<br />
    8. 8. where to secure the risk?<br />device<br />data<br />10111001100010111111010111<br />enterprise<br />
    9. 9. Securing the device<br />passcodes/passwords<br />remote wipe<br />hardware based encryption<br />policies<br />device type, configuration<br />restrictions<br />
    10. 10. securing the data?<br />information protection and control<br /> non-public information<br /> personally identifiable information<br /> intellectual property<br />identity aware data loss prevention<br />
    11. 11. Demonstration<br />
    12. 12. securing the enterprise<br />device authenticity is crucial<br />device dna<br />strong authentication<br />two factor authentication<br />different needs for different usercommunities<br />client virtualisation<br />greater control<br />
    13. 13. demonstration<br />
    14. 14. putting it all together<br />securethe enterprise<br /><ul><li>device authenticity
    15. 15. user authenticity</li></ul>securethe device<br />passwords<br /><ul><li> restrictions
    16. 16. config</li></ul>securethe data<br />control points data in use, motion, rest<br />
    17. 17. these devices are inevitable<br />Summary<br />secure the device, data & enterprise<br />establish a position<br />
    18. 18. moving forward<br />Mobilution Offer<br />
    19. 19. thank youtwitter.com/thesecureid<br />

    ×