By Matthew Witten, MBA, CISA, CISSP, CRISC, MCSA, ACE MOBILE SECURITY AND THE CHANGING WORKFORCE.

Slides:



Advertisements
Similar presentations
Paying for Care Coordination Gerard Anderson, PhD Johns Hopkins University.
Advertisements

Add Governors Discretionary (1G) Grants Chapter 6.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 BYOD: Security, Policy.
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
SOCIAL MEDIA FOR BUSINESS Effectively leveraging this powerful marketing tool. Eric D. Schulz Co-Director of Strategic Marketing and Brand Management.
Security for Mobile Devices
Securely connecting users and applications from anywhere to anywhere in todays global economy MY-ARRAY DesktopDirect Bring.
1 1 March 20, 2014 A SIMPLE APPROACH TO BYOD. WHAT THEY DONT WANT IS: Company monitoring of their personal activities or restriction of the apps they.
Presented by: Your Name Your Phone Number Your Website Address How Your Local Business Can ATTRACT and KEEP Customers Through Mobile Marketing.
Help File For User Creation Click the “Course” button for Creating/Add User.
Welcome to Ms. McNamara’s Math & Science Classroom!
Welcome to Online HRS All your Human Resources needs in one easy to follow database system.
The Latest Stats about computer use ONS – Internet Access – Households and Individuals Ofcom – The Communications Market Report.
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
The Aidmatrix Foundation Governor Scott McCallum President & CEO.
The Excel Quizzes There are a number of Excel assignments These assignments are in the syllabus Rather than hand in this assignment, you will take an Excel.
© 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Ville Norpo Hewlett-Packard Oy
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
BYOD Charter Purpose and Scope
System Basics and Structure. NOTE: Not Rostered – refers to team assignment in club tab only. It DOES NOT mean the player is officially.
1 Expose – Acquire - Engage. 2 Would you agree that technology has changed the way you do business?
Information Systems in Organizations 3.2 Systems Management.
IT ISSUES & TRENDS, 2015 Faculty Technology Day Wednesday, August 19, 2025.
Parent Middle School Technology Meeting WEDNESDAY, 9/9/2015.
This presentation is designed to help assist you in registering and creating an account to do online homework using the MyMathLab program via CourseCompass.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
BARRY JINKS President & CEO March 22, 2011 President & CEO March 22, 2011.
Digital Citizenship Lesson 3. Does it Matter who has your Data What kinds of information about yourself do you share online? What else do you do online.
Elbert Guintivano Manager – Presales Consulting BMC Software Trend/Strategy in IT Service Management.
1 Moodle Login Professional Development Training.
Today’s Literacies LRC 320 Bryn Siegelman. New Literacies DEFINITION: Generally refers to new forms of literacy made possible by digital technology developments,
Get identities to the cloud Mix on-premises and cloud identity for improved PC, mobile, and web productivity Cloud identities help you run your business.
@ BCHS. The School Policy is your guide to ensuring you and your students are safe. It is your responsibility to make yourself aware and familiar with.
Society & Computers PowerPoint
Information Systems in Organizations 3.2 Systems Management.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
The Claromentis Digital Workplace An Introduction
SU Technology Seminar Slutzker Center for International Services.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
1 Turnitin in BUMoodle - Quick Reference Guide for Staff (This quick guide is a modified version of the one prepared by ITO/ITSC.) Turnitin Standard online.
IT Security vs Office Administration Efficiency Office Administration Efficiency Date: João Stott.
CM202 Class Hints. Use a heading on all your papers. No cover (title) page. Following instructions counts on your grade. The heading should include: Name,
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Scott Musgrove Senior Business Systems Analyst Water Corporation of Western Australia Developing for an Evolving Mobility Landscape: How Do You Hit a Moving.
Using Time Wisely. Time Is of the Essence Use a planner. Planning will relieve stress. Using a planner leaves less room for error. Keeping track. If you.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Vodafone Business Cloud
Federal CIO Council’s BYOD Toolkit. Reduce Costs Increase program productivity and effectiveness Adapt to changing workforce Improve user experience Drivers.
Sarah B. Zahl, Ph.D. and Sherry A. Jimenez, Ed.D. Using iPads Exclusively at a Start Up Medical School: Accomplishments and Challenges.
For More Best A+ Tutorials CMGT 400 Entire Courses (UOP Course) CMGT 400 Week 1 DQ 1 (UOP Course)  CMGT 400 Week 1 Individual Assignments.
Mobile Devices in the Corporate World
The time to address enterprise mobility is now
Fuel Cap Reinvented Fueloyal Presents Smart Fuelcap
Impact of IT Consumerisation on Enterprise Security
CYB 110 Competitive Success/snaptutorial.com
CMGT 245 Possible Is Everything/snaptutorial.com
CMGT 245 Education for Service-- snaptutorial.com.
INF 103 Education for Service-- snaptutorial.com.
CMGT 245 Teaching Effectively-- snaptutorial.com.
INF 103 Teaching Effectively-- snaptutorial.com
CYB 110 Education for Service-- tutorialrank.com
INF 103 Education for Service-- tutorialrank.com
Content Management lifecycle
Download the Mobile App Now!
Navigating Security Seas in a Small Ship with a Limited Crew
SPO Demos to Business Value Discussion Pillar Mapping
Download the Mobile App Now!
Microsoft 365 Business Technical Fundamentals Series
Presentation transcript:

By Matthew Witten, MBA, CISA, CISSP, CRISC, MCSA, ACE MOBILE SECURITY AND THE CHANGING WORKFORCE

WHO KNOWS THIS GUY?

WHERE DID THIS COME FROM?

WHERE IS MOBILE HEADED? 4 Billion mobile devices by Billion devices by 2020

WRAPPING OUR HEAD AROUND IT Do we allow personal devices on the network? (BYOD) Do we only allow company purchased devices? Are we entering a Perfect Storm?

BYOD – FORGET THE PAST Cannot vet apps Traditional admin vs user roles do not exist Traditional policies may not be effective

BYOD Personal and corporate data intertwined (Sandboxing) Geo-location policy Do you really save money?

BYOD – IS THERE A HAPPY MEDIUM?

BYOD – THINGS TO PONDER

* Visage Mobile study

BYOD – MOVING TO THE CLOUD Risk vs. Rewards Loss of Control?

BYOD – MOVING TO THE CLOUD

MOBILE - THE NEXT (CURRENT) GENERATION

MOBILE IN EDUCATION

MOBILE IN EDUCATION - RESEARCH CourseSmart and Wakefield Research: 67% cannot go more than 1 hour without digital technology and 40% cannot last more than 10 minutes 79% use mobile technology for quick knowledge checks before a test 68% believe they are saving more than 2 hours a day using their devices

MOBILE IN EDUCATION - RESEARCH CourseSmart and Wakefield Research: (cont.) 51% prefer digital textbooks on eReaders to print textbooks 58% have taken an online course Even with traditional courses, 79% have submitted papers and assignments online and 71% have taken tests and quizzes online

MOBILE IN EDUCATION - RESEARCH CourseSmart and Wakefield Research: (cont.) 18% report receiving materials via Facebook 58% have taken an online course 84% can access their syllabus and 78% of students receive class updates and news via online learning systems

MOBILE IN RESEARCH Innovations and advances Data collected onsite With new development comes new risks

GPS May 2, 2000 GPS Dot

GPS No more Big Brother, but Big Neighbor Wave Bubble (be careful… not good like on the surface) GPS Spoofing

GPS

What are you going to do when this new cool asset tracking is shown to your CIO? What are the protections and countermeasures that can be put into place?

WHERE DO WE GO FROM HERE? Developing a mobile and cloud security policy Who is going to be the first liability case? Sure Headed IT hits the fan Remember: MDM Security

WHERE DO WE GO FROM HERE? Examine the risk and reward How do we prevent users from bypassing controls?

I LEAVE YOU WITH DILBERT… ©2007, Dilbert Cartoon

THANK YOU!