The enemy in your pocket

357 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
357
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

The enemy in your pocket

  1. 1. The enemy in your pocket Securing smartphones in the enterprise Vicente Diaz, Senior Security Analyst, GReAT Gartner Symposium/ITxpo 2012, BarcelonaPAGE 1 |
  2. 2. BYOD will come regardless you have a policy or not Human behavior has shifted, BYOD is a response to that My CEO heard we can save money through BYODPAGE 2 |
  3. 3. PAGE 3 |
  4. 4. 1. The problemPAGE 4 |
  5. 5. BYOD reanalyzed Where? What devices?PAGE 5 | 1 2
  6. 6. What´s the problem? Problem 1: InfectionPAGE 6 | 1 2
  7. 7. Can this happen?PAGE 7 | 1 2
  8. 8. What are we really afraid of?PAGE 8 | 1 2
  9. 9. Bad PR is worse than bad ITPAGE 9 | 1 2
  10. 10. What´s new then?PAGE 10 | 1 2
  11. 11. Are they vulnerable? !   Highlights from 2012: !   NFC Vulnerability by Charlie Miller !   iPhone 4S and Samsung Galaxy S3 ownedPAGE 11 | 1 2
  12. 12. Do you like chocolates?PAGE 12 | 1 2
  13. 13. Who else wants to spy on you?PAGE 13 | 1 2
  14. 14. FinSpyPAGE 14 | 1 2
  15. 15. Protection Sure, I have swipe gesture passwordPAGE 15 | 1 2
  16. 16. PAGE 16 | 1 2
  17. 17. BYOD ≠ Data LeakPAGE 17 | 1 2
  18. 18. 2. PerspectivePAGE 18 | 1 2
  19. 19. PerspectivePAGE 19 | 1 2
  20. 20. PerspectivePAGE 20 | 1 2
  21. 21. PAGE 21 | 1 2
  22. 22. PerspectivePAGE 22 | 1 2
  23. 23. Abusing Consumerization - Mobile devices Are they dangerous? It depends on what you do with it! Facebook Twitter Gmail Corporate e-mail Reading corporate documents Writing confidential e-mails?PAGE 23 | 1 2
  24. 24. Where is the data?PAGE 24 | 1 2
  25. 25. DemoPAGE 25 | 1 2
  26. 26. Using the cloudPAGE 26 | 1 2
  27. 27. Some toolsPAGE 27 | 1 2
  28. 28. 3. What now?PAGE 28 | 1 2
  29. 29. Kim StevensonPAGE 29 | 1 2
  30. 30. Reality for most companies is differentPAGE 30 | 1 2
  31. 31. Reality for most companies is differentPAGE 31 | 1 2
  32. 32. Conclusions !   BYOD: Myth vs Reality !   Policies are necessary, but they are not enough !   Is the problem in the device or in educating users? !   Who is responsible for the security of the device? !   We all love chocolates!PAGE 32 | 1 2
  33. 33. Thank You Questions? Vicente Diaz, Senior Security Researcher, Global Research and Analysis Team @trompi vicente.diaz@kaspersky.comPAGE 33 |

×