Mobile Working Group Session

Slides:



Advertisements
Similar presentations
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
Advertisements

User Authentication on Mobile Devices Google Two Factor Authentication OTP (One Time Password)
Confluence Wiki Implementation? 14 June Agenda What? Why? Wow! How? When? 2.
1Copyright © 2011, Printer Working Group. All rights reserved. PWG Plenary Status Report IDS Working Group February 2, 2011 Wailea-Makena, HI PWG F2F Meeting.
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Security for Mobile Devices
November 14, 2012 Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Detroit.
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Securing Emerging Mobile Technology JOHN G. LEVINE PH.D. D/CHIEF ARCHITECTURE GROUP 13 SEP
Khammar Mrabit Director Office of Nuclear Security
Sales Call Plans Set Objectives Design Sales Call Flow
ARMA International 2012 Region Leadership ARMA HQ and Your Chapter: Resources for Success.
This time it’s personal: consumerising records management
Cloud Security Alliance Research & Roadmap June 2012
Microsoft ® System Center Configuration Manager 2007 R3 and Forefront ® Endpoint Protection Infrastructure Planning and Design Published: October 2008.
Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
© 2009 VMware Inc. All rights reserved VMware Horizon Mobile Intro - NetHope Deepak Puri Director Mobile Business Development +1 (415)
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
© Copyright Ovum. All rights reserved. Ovum is a subsidiary of Informa plc. 1 Addressing the BYOD Management Gap: the evolution of enterprise mobility.
BYOD: Privacy and Security Andrew Paterson, Senior Technology Officer.
© 2012 Citrix | Confidential – Do Not Distribute BYOD Champion Presentation CIO How-To Kit: Bring-Your-Own Devices © 2014.
Maximizing Data and Data Services Monday, October 14, 2013 Location: Denver CO© 2013 Child Care Aware ® of America.
Copyright © 2012 Cloud Security Alliance Conference Announcements.
Top 10 Strategic Technology Trends for 2013 A Channel Partners Slide Show … as highlighted at.
Cloud Usability Framework
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
The 22 nd meeting of the INTOSAI Working Group on IT Audit (WGITA) KPI Project Final Report — Key Performance Indicators Methodology for Auditing IT Programs.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Rapid Mobile Development Enterprises are having a tough time keeping up with the demand for mobile apps. With these growing demands, businesses are expecting.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
2011 / 9/11/ S V E Security for Virtualized Environments The first comprehensive security solution for.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Geneva, Switzerland, September 2014 Considerations for implementing secure enterprise mobility Eileen Bridges Aetna GIS Director.
Cloud Security: Critical Threats and Global Initiatives Jim Reavis, Executive Director July, 2010.
Mobilize employees, field workers, and business partners with layered security infrastructure for mobile apps, Fiori apps, content, and devices Andreas.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
IoT Trust Framework leading to self regulation code of conduct and certification models Craig Spiezle Executive Director & President Online.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
NCBFAA Annual Conference 2015 Orlando Converging Logistics: Realities vs. Possibilities Cyber Insurance Bernie Cissek, Chairman.
© Cloud Security Alliance, 2015 March 2, Agenda © Cloud Security Alliance, 2015 The SecaaS Working Group Recent Activity Charter Category outline/templates.
Technical and organisational measures for protecting data and ensuring data security Simon Rice Group Manager (Technology) 29 May 2014.
Moving to BYOD Gary Audin 1.
Workshifting Transform your business – empower your people.
Total Enterprise Mobility Comprehensive Management and Security
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
Digital Campus: Foundation Projects
Mobile Devices in the Corporate World
Barracuda Mobile Device Manager
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Top 10 Strategic Technology Trends for 2013
Mobile Data Solutions Inc
Cloud-First, Modern Windows Management and Security
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
Call AVG Antivirus Support | Fix Your PC
Cloud Access Security Broker Lets Enterprises Enforce Security and Compliance in Office 365 Partner Logo “Skyhigh helps us securely enable high-impact.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Top 10 Strategic Technology Trends for 2013
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Microsoft 365 Business Technical Fundamentals Series
Chapter 10. Mobile Device Security
Presentation transcript:

Mobile Working Group Session

Thank You Co-chairs CSA Staff Initiative Leads/Contributors David Lingenfelter Cesare Garlati Freddy Kasprzykowski CSA Staff Luciano Santos John Yeoh Aaron Alva Evan Scoboria Kendall Scoboria Initiative Leads/Contributors Dan Hubbard Guido Sanchidrian Mark Cunningham Nadeem Bhukari Alice Decker Satheesh Sudarsan Matt Broda Randy Bunnell Megan Bell Jim Hunter Pam Fusco Tyler Shields Jeff Shaffer Govind Tatachari Ken Huang Mats Näslund Giles Hogben Eric Fisher Sam Wilke Steven Michalove Allen Lum Girish Bhat Warren Tsai Jay Munsterman

Critical Areas of Mobile Computing Mobile Guidance v1.0 Security Guidance for Critical Areas of Mobile Computing Published Nov. 2012 Mobile Computing Definition Threats to Mobile Computing Maturity of the Mobile Landscape BYOD Policies Mobile Authentication App Stores Mobile Device Management

Mobile Guidance Defined Authentication Apps MDM BYOD What we used to limit the scope of mobile for the purposes of this initial guidance. One of the biggest reasons is because smartphones and tablets are currently the popular items. The guidance is open to adding or expanding the scope of mobile, but we feel the major components we cover now will remain relevant going forward.

Threats and Maturity

Top Mobile Threats – Evil 8 Data loss from lost, stolen or decommissioned devices. Information-stealing mobile malware. Data loss and data leakage through poorly written third-party apps. Vulnerabilities within devices, OS, design and third-party applications. Unsecured Wi-Fi, network access and rogue access points. Unsecured or rogue marketplaces. Insufficient management tools, capabilities and access to APIs (includes personas). NFC and proximity-based hacking. High level overview of the top mobile threats findings – basic discussions around these…not spending too much time.

Have Security Controls Maturity 78% Have Mobile Policy 86% Allow BYOD 47% Utilize MDM 36% Have App Restriction 41% Have Security Controls A few highlights from the mobile maturity questionnaire, basically showing that from a standard maturity model there is still a lot of room for mobile to mature in the enterprise space. This will continue to happen as the mobile industry (hardware, OS, app developers, management) continue to mature. …there’s room for improvement

BYOD Jay Munsterman

BYOD Charter Analyze new challenges of: Policy Privacy Device and Data Segmentation Delivered Policy Guidance for v1 Guidance

Next Steps for BYOD Need more team members!! Help us out! Conference call late March Decide on next steps, consider: Policy Templates Policy Examples Evaluation of emerging containerization options

MDM David Lingenfelter

MDM Opportunities Beyond Simple MDM Increase security and compliance enforcement Reduce the cost of supporting mobile assets Enhance application and performance management Ensure better business continuity Increase productivity and employee satisfaction Beyond Simple MDM

Mobile Authentication Mark Cunningham

Mobile Authentication Guidance

Mobile Authentication Guidance

Mobile Authentication Guidance

Mobile Authentication Guidance

Mobile Authentication Guidance Ease of Use Future Authentication Technologies

What you download may be compromised! App Stores security James Hunter

State of the App Market Apple and Google control 80% of the App Market By the end of 2013 an estimated 50 Billion downloads There are over 1 million different Apps The summary doesn't consider Amazon and Samsung. Corporate sites offering downloads for their flavor Apps, Developers, in all sizes and Apps Distributors. We have a chaotic marketplace depending on the participants "best efforts", to insure the end user privacy and security, as well as that of others (Companies who employ them, even ones they visit and use WiFi service).

What are the areas of concern? How trustworthy is the App Store? How trustworthy is the Developer? Can the user report issues found in the App? Who should get the report? Does the App use more permissions than needed? Does the App make connections to the Internet? Does the user need anti-virus, malware, etc.? Will this be an issue with BYOD? 

The status of the working group? Initial draft of the policy guideline submitted in late October-early November 2012, for Orlando. November 2012 decision made to develop a stand-alone document. December 2012 received updated peer review info from J. Yeoh. January 2013 started efforts to recruit more volunteers for App Store Security working group? February 2013 re-started efforts to make contact with App Store Management at Microsoft.

The status of the working group? March 2013 start update of draft guideline to a stand alone document. March 2013 continue efforts to recruit several volunteers to work on the stand alone document. March 2013 request CSA Global support for contacts with Apple, Google, Amazon, Samsung Appstore contacts. April-June 2013 pursue App Store management contacts, involvement and support.

App Store Security Initiative Thanks to the following individuals: John Yeoh, Research Analyst, Global CSAAuthors/Contributors Group Lead James Hunter, Net Effects Inc. Peer Reviewers Tom Jones; Ionnis Kounelis; Sandeep Mahajan; Henry St. Andre, InContact Co Chair, Mobile Security, Cesare Garlati Trend Micro

Moving at the speed of mobile!

Where do we go from here? Charter review Cooperation Between Working Groups New Mobile Controls In CCM Maturity questionnaire v2.0 Top Threats Review Stand Alone App Store Document Stand Alone Authentication Document New Section On Data Protection

Mobile Working Group Charter Securing public and private application stores Analysis of mobile security features of key mobile operating systems Mobile device management, provisioning, policy, and data management Guidelines for the mobile device security framework Scalable authentication for mobile Best practices for secure mobile application Identification of primary risks related BYOD – Bring Your Own Device Solutions for resolving multiple usage roles related to BYOD Charter – as per Mobile Initiative Charter-V3.docx Feb 2012: 1) Securing public and private application stores and other public entities deploying software to mobile devices 2) Analysis of mobile security capabilities and features of key mobile operating systems 3) Cloud-based mobile device management, provisioning, policy, and data management of mobile devices to achieve security objectives 4) Guidelines for the mobile device security framework and mobile cloud architectures 5) Scalable authentication from mobile devices to multiple, heterogeneous cloud providers and enterprise. 6) Best practices for secure mobile application development and securely enabling existing applications on mobile platforms 7) Identification of primary risks related to individually owned devices accessing organizational systems (commonly known as BYOD – Bring Your Own Device) 8) Solutions for resolving multiple usage roles related to BYOD, e.g. personal and business use of a common device

Chapter Cooperation Information sharing across working groups Already working with CCM More guidance and input from Corporate, GRC and SME Timeframes/Deadlines/Review Periods

Reference Materials Create more material people will want to use to develop their mobile business plans Baseline Controls Policy Templates App Security Guidelines Threats and Risks

CSA 2013 Events BlackHat (July 27-Aug1) EMEA Congress (September) ASIAPAC Events (Congress, May 14-17) CSA Congress Orlando (November) https://cloudsecurityalliance.org/events/

Thank you Chapter meetings every other Thursday @ 9:00am PST LinkedIn: Cloud Security Alliance: Mobile Working Group Basecamp Thank you