SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Best practice security for the mobile enterprise A review of the challenges and approaches Jon Collins, Service Director Freeform Dynamics Ltd [email_address] July 2007 www.freeformdynamics.com
AGENDA ,[object Object],[object Object],[object Object]
Does mobile email create a business advantage?
Do you permit employees to access your systems from any of the following?
How prominent are the following threats to IT security? A net increase is expected in the level of threat across the board
The issues are exacerbated by a conspiracy of circumstances… ,[object Object],[object Object],[object Object],[object Object],[object Object]
FREQUENTLY OVERLOOKED OR ILL-CONSIDERED RISKS Handheld devices Notebook  PCs Public/home terminals Inadvertent publishing Careless mobile phone conversations allowing eavesdropping by those within earshot in public places Displaying confidential data on planes, trains and in other places where people can look over your shoulder Displaying confidential data in internet cafes and other places where people can look over your shoulder Electronic snooping/theft Leaving Bluetooth device in discoverable mode risking high jacking or theft of on board data Connecting to unknown or insecure WiFi networks or irresponsible use of ad hoc WiFi networks Use of insecure connections from public terminals or saving data/login information on home/public PCs Physical loss  or theft Pick pocketing, snatching, burglary, leaving devices on public transport, client sites, in public places Snatching, theft from car, theft from desk, burglary, leaving PC on public transport, client sites, in public places Burglary, loss or theft of removable storage devices (USB keys, SD cards) used to move data between PCs
How easy is it to control the security risk arising from the proliferation of confidential data across workgroup servers, PCs, mobile devices, remote sites, etc? Just the way in which technology use grows organically in a distributed manner represents a threat to security in itself
How prominent is the risk from security breaches or exposures via employees acting carelessly or deliberately? Larger organisations in general are more concerned about the threat from employees, reflecting the “depersonalised”  corporate culture.
Have concerns of risk exposure specifically held you back from taking full advantage of any of the following? The opportunity cost associated with risk related concerns is clear
Considering IT security measures, what is the status of your capability in the following areas?
RIGHT SUPPLIERS Try to select vendors who understand your type of business and are willing to provide help and advice RIGHT TECHNOLOGY Ensure that selected technologies are securable as well as functional SMART DEPLOYMENT Implement technology in a controlled and structured manner and strive for consistency wherever possible SMART USE Ensure that users are properly trained, appreciate the risks and know how to deal with them KEYS TO SECURE MOBILE WORKING
What does this mean in practice? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How would you rate your employees' attitude towards mobile data security? There’s no substitute for proactive training when it comes to security
Thank You Jon Collins, Service Director Freeform Dynamics Ltd [email_address] July 2007 www.freeformdynamics.com

Weitere ähnliche Inhalte

Was ist angesagt?

Ignorance is not Bliss
Ignorance is not BlissIgnorance is not Bliss
Ignorance is not Blissjfitzell
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
Blue Iron Network Overview
Blue Iron Network OverviewBlue Iron Network Overview
Blue Iron Network OverviewTom Simmons
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Devendra kashyap
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESIJNSA Journal
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOsIBM Security
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Unified threat management
Unified threat managementUnified threat management
Unified threat managementYabibo
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemAustin Eppstein
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOsMorten Bjørklund
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Companydanielblander
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
Is the IT security gap a threat to SMBS?
Is the IT security gap a threat to SMBS?Is the IT security gap a threat to SMBS?
Is the IT security gap a threat to SMBS?Globizzcon
 
Governance of the internet of things
Governance of the internet of thingsGovernance of the internet of things
Governance of the internet of thingsAkib B. Momin
 
DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013
DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013
DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013Andris Soroka
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key FindingsSymantec
 

Was ist angesagt? (20)

Ignorance is not Bliss
Ignorance is not BlissIgnorance is not Bliss
Ignorance is not Bliss
 
Presentación AMIB Los Cabos
Presentación AMIB Los CabosPresentación AMIB Los Cabos
Presentación AMIB Los Cabos
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
Blue Iron Network Overview
Blue Iron Network OverviewBlue Iron Network Overview
Blue Iron Network Overview
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Unified threat management
Unified threat managementUnified threat management
Unified threat management
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 
Pace IT - Secure Mobile Devices
Pace IT - Secure Mobile DevicesPace IT - Secure Mobile Devices
Pace IT - Secure Mobile Devices
 
Security Principles for CEOs
Security Principles for CEOsSecurity Principles for CEOs
Security Principles for CEOs
 
Certificate PASE
Certificate PASECertificate PASE
Certificate PASE
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
Is the IT security gap a threat to SMBS?
Is the IT security gap a threat to SMBS?Is the IT security gap a threat to SMBS?
Is the IT security gap a threat to SMBS?
 
Governance of the internet of things
Governance of the internet of thingsGovernance of the internet of things
Governance of the internet of things
 
Justen's Resume
Justen's ResumeJusten's Resume
Justen's Resume
 
DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013
DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013
DSS @CERT.LV_ISACA_2013_Conference - IBM X Force Report 2013
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 

Andere mochten auch

Driving value from IT
Driving value from ITDriving value from IT
Driving value from ITJon Collins
 
Securing the Un-securable?
Securing the Un-securable?Securing the Un-securable?
Securing the Un-securable?Jon Collins
 
Social And Collaborative Aspects Of Virtual Worlds
Social And Collaborative Aspects Of Virtual WorldsSocial And Collaborative Aspects Of Virtual Worlds
Social And Collaborative Aspects Of Virtual WorldsJon Collins
 
Gerrit & Wyatt's Powerpoint
Gerrit & Wyatt's PowerpointGerrit & Wyatt's Powerpoint
Gerrit & Wyatt's Powerpointserms_student
 
Content Management and Business Intelligence
Content Management and Business IntelligenceContent Management and Business Intelligence
Content Management and Business IntelligenceJon Collins
 
IT Support and workforce productivity
IT Support and workforce productivityIT Support and workforce productivity
IT Support and workforce productivityJon Collins
 
We’ve created a monster! Truth and fiction in SOA
We’ve created a monster! Truth and fiction in SOAWe’ve created a monster! Truth and fiction in SOA
We’ve created a monster! Truth and fiction in SOAJon Collins
 
Virtualisation - The State of Play in 2009
Virtualisation - The State of Play in 2009Virtualisation - The State of Play in 2009
Virtualisation - The State of Play in 2009Jon Collins
 

Andere mochten auch (20)

Driving value from IT
Driving value from ITDriving value from IT
Driving value from IT
 
Securing the Un-securable?
Securing the Un-securable?Securing the Un-securable?
Securing the Un-securable?
 
Metaphors
MetaphorsMetaphors
Metaphors
 
Similies
SimiliesSimilies
Similies
 
Similes
SimilesSimiles
Similes
 
Social And Collaborative Aspects Of Virtual Worlds
Social And Collaborative Aspects Of Virtual WorldsSocial And Collaborative Aspects Of Virtual Worlds
Social And Collaborative Aspects Of Virtual Worlds
 
Similes
SimilesSimiles
Similes
 
Gerrit & Wyatt's Powerpoint
Gerrit & Wyatt's PowerpointGerrit & Wyatt's Powerpoint
Gerrit & Wyatt's Powerpoint
 
Similes
SimilesSimiles
Similes
 
Metaphors
MetaphorsMetaphors
Metaphors
 
My Similes
My  SimilesMy  Similes
My Similes
 
Maia & Paige
Maia & PaigeMaia & Paige
Maia & Paige
 
Similes
SimilesSimiles
Similes
 
Metaphors
MetaphorsMetaphors
Metaphors
 
Similies
SimiliesSimilies
Similies
 
Similes
SimilesSimiles
Similes
 
Content Management and Business Intelligence
Content Management and Business IntelligenceContent Management and Business Intelligence
Content Management and Business Intelligence
 
IT Support and workforce productivity
IT Support and workforce productivityIT Support and workforce productivity
IT Support and workforce productivity
 
We’ve created a monster! Truth and fiction in SOA
We’ve created a monster! Truth and fiction in SOAWe’ve created a monster! Truth and fiction in SOA
We’ve created a monster! Truth and fiction in SOA
 
Virtualisation - The State of Play in 2009
Virtualisation - The State of Play in 2009Virtualisation - The State of Play in 2009
Virtualisation - The State of Play in 2009
 

Ähnlich wie Secure Mobile Working 1.0

Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devicesUmer Saeed
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environmentIBM Software India
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementCisco Mobility
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: YamanaSoftweb Solutions
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devicessunnay
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptx4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptxromawoodz
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.pptAnuraagAwasthi3
 

Ähnlich wie Secure Mobile Working 1.0 (20)

Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Cyber security and mobile devices
Cyber security and mobile devicesCyber security and mobile devices
Cyber security and mobile devices
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
Securing mobile devices in the business environment
Securing mobile devices in the business environmentSecuring mobile devices in the business environment
Securing mobile devices in the business environment
 
Byod
ByodByod
Byod
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Mobile Device Management Service: Yamana
Mobile Device Management Service: YamanaMobile Device Management Service: Yamana
Mobile Device Management Service: Yamana
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Control Issues and Mobile Devices
Control Issues and Mobile DevicesControl Issues and Mobile Devices
Control Issues and Mobile Devices
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptx4b - Security Management - Cyber Security Mgt (1).pptx
4b - Security Management - Cyber Security Mgt (1).pptx
 
Ensuring Mobile Device Security
Ensuring Mobile Device SecurityEnsuring Mobile Device Security
Ensuring Mobile Device Security
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
 
Cn35499502
Cn35499502Cn35499502
Cn35499502
 

Mehr von Jon Collins

Boundaries of mobile
Boundaries of mobileBoundaries of mobile
Boundaries of mobileJon Collins
 
It looking forward
It looking forwardIt looking forward
It looking forwardJon Collins
 
Cloud Computing - from myth to reality
Cloud Computing - from myth to realityCloud Computing - from myth to reality
Cloud Computing - from myth to realityJon Collins
 
Managing Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the EnvironmentManaging Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the EnvironmentJon Collins
 
IT trends and their impact on software licensing
IT trends and their impact on software licensingIT trends and their impact on software licensing
IT trends and their impact on software licensingJon Collins
 
Six principles of The Technology Garden
Six principles of The Technology GardenSix principles of The Technology Garden
Six principles of The Technology GardenJon Collins
 
Testing Governance And Data Management
Testing Governance And Data ManagementTesting Governance And Data Management
Testing Governance And Data ManagementJon Collins
 

Mehr von Jon Collins (7)

Boundaries of mobile
Boundaries of mobileBoundaries of mobile
Boundaries of mobile
 
It looking forward
It looking forwardIt looking forward
It looking forward
 
Cloud Computing - from myth to reality
Cloud Computing - from myth to realityCloud Computing - from myth to reality
Cloud Computing - from myth to reality
 
Managing Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the EnvironmentManaging Storage - Cost, Governance, Risk and the Environment
Managing Storage - Cost, Governance, Risk and the Environment
 
IT trends and their impact on software licensing
IT trends and their impact on software licensingIT trends and their impact on software licensing
IT trends and their impact on software licensing
 
Six principles of The Technology Garden
Six principles of The Technology GardenSix principles of The Technology Garden
Six principles of The Technology Garden
 
Testing Governance And Data Management
Testing Governance And Data ManagementTesting Governance And Data Management
Testing Governance And Data Management
 

Kürzlich hochgeladen

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

Secure Mobile Working 1.0

  • 1. Best practice security for the mobile enterprise A review of the challenges and approaches Jon Collins, Service Director Freeform Dynamics Ltd [email_address] July 2007 www.freeformdynamics.com
  • 2.
  • 3. Does mobile email create a business advantage?
  • 4. Do you permit employees to access your systems from any of the following?
  • 5. How prominent are the following threats to IT security? A net increase is expected in the level of threat across the board
  • 6.
  • 7. FREQUENTLY OVERLOOKED OR ILL-CONSIDERED RISKS Handheld devices Notebook PCs Public/home terminals Inadvertent publishing Careless mobile phone conversations allowing eavesdropping by those within earshot in public places Displaying confidential data on planes, trains and in other places where people can look over your shoulder Displaying confidential data in internet cafes and other places where people can look over your shoulder Electronic snooping/theft Leaving Bluetooth device in discoverable mode risking high jacking or theft of on board data Connecting to unknown or insecure WiFi networks or irresponsible use of ad hoc WiFi networks Use of insecure connections from public terminals or saving data/login information on home/public PCs Physical loss or theft Pick pocketing, snatching, burglary, leaving devices on public transport, client sites, in public places Snatching, theft from car, theft from desk, burglary, leaving PC on public transport, client sites, in public places Burglary, loss or theft of removable storage devices (USB keys, SD cards) used to move data between PCs
  • 8. How easy is it to control the security risk arising from the proliferation of confidential data across workgroup servers, PCs, mobile devices, remote sites, etc? Just the way in which technology use grows organically in a distributed manner represents a threat to security in itself
  • 9. How prominent is the risk from security breaches or exposures via employees acting carelessly or deliberately? Larger organisations in general are more concerned about the threat from employees, reflecting the “depersonalised” corporate culture.
  • 10. Have concerns of risk exposure specifically held you back from taking full advantage of any of the following? The opportunity cost associated with risk related concerns is clear
  • 11. Considering IT security measures, what is the status of your capability in the following areas?
  • 12. RIGHT SUPPLIERS Try to select vendors who understand your type of business and are willing to provide help and advice RIGHT TECHNOLOGY Ensure that selected technologies are securable as well as functional SMART DEPLOYMENT Implement technology in a controlled and structured manner and strive for consistency wherever possible SMART USE Ensure that users are properly trained, appreciate the risks and know how to deal with them KEYS TO SECURE MOBILE WORKING
  • 13.
  • 14. How would you rate your employees' attitude towards mobile data security? There’s no substitute for proactive training when it comes to security
  • 15. Thank You Jon Collins, Service Director Freeform Dynamics Ltd [email_address] July 2007 www.freeformdynamics.com