Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

IT Hot Topics - Mobile Security Threats at Every Layer

492 views

Published on

Published in: Technology
  • Be the first to comment

IT Hot Topics - Mobile Security Threats at Every Layer

  1. 1. Risk - noun `riskThe possibility of loss or injury
  2. 2. • •• •• •• •• •• •• • • • • • • • •
  3. 3. • •• •• •• •• •• ••••••
  4. 4. •••••
  5. 5. ••••••
  6. 6. ••••••
  7. 7. ••••• •
  8. 8. ••••••
  9. 9. •••••
  10. 10. ••••••
  11. 11. •••••••
  12. 12. • ‣ ‣•
  13. 13. ••
  14. 14. ••
  15. 15. • • • • • •
  16. 16. ••••
  17. 17. Crowd Sourced Current Solutions Inadequate Internal Teams DevelopersDev Site A Dev Site B Security Consultants • Very expensive • In short supply iPhone • Time to results too long Dev Site C Apps Crowd Internal Sourcing Tools • Do not scale across sites Open 3rd Party • Very high noise ratio Source Open Software Software Vendors • Can not test 3rd party code Source SYMC MSFT • Separation of duties issue Outsourced Developers Offshore • Do not know how to write Oracle secure code Provider • Prioritize time-to-ship, functionality over security Processes • Difficult to implement Eastern China • Years to fine tune Europe India • Low adoption (< 1% of US Contractors companies CMMI Level 5 certified) Unknown Skills
  18. 18. •• ‣••
  19. 19. •••
  20. 20. Whitelisting• Conduct static analysis of candidate applications• Create a whitelist• Use an unbiased 3rd party• Enforcement via mobile policy

×