Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?

Slides:



Advertisements
Similar presentations
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Advertisements

Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
NCATS REDESIGN METHODOLOGY A Menu of Redesign Options Six Models for Course Redesign Five Principles of Successful Course Redesign Four Models for Assessing.
UNITED NATIONS Shipment Details Report – January 2006.
The Managing Authority –Keystone of the Control System
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
STUDENT MANAGEMENT School Bus Driver Inservice.
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
Create an Application Title 1A - Adult Chapter 3.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 10 second questions
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Customer Experience Solutions. Delivered. 1 BANK 2.0 Making Banks Successful in the Era of Engagement Banking.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
EU market situation for eggs and poultry Management Committee 20 October 2011.
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
2 |SharePoint Saturday New York City
Green Eggs and Ham.
IP Multicast Information management 2 Groep T Leuven – Information department 2/14 Agenda •Why IP Multicast ? •Multicast fundamentals •Intradomain.
VOORBLAD.
Copyright © 2013, 2009, 2006 Pearson Education, Inc.
Copyright © AIIM | All rights reserved. #AIIM The Global Community of Information Professionals aiim.org Information Management and Social Media Jesse.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
The printing drain… 60% of SMBs rely on printing 50% say colour volumes growing 60% say consumables expenditure growing.
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
© 2012 National Heart Foundation of Australia. Slide 2.
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 2 Networking Fundamentals.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Model and Relationships 6 M 1 M M M M M M M M M M M M M M M M
25 seconds left…...
What’s New in WatchGuard Dimension v1.2
Januar MDMDFSSMDMDFSSS
Analyzing Genes and Genomes
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Impact of Information Technology on the Audit Process Chapter 12.
Essential Cell Biology
Database Administration
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
Energy Generation in Mitochondria and Chlorplasts
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
The tool that could change everything 1 The Tool that could for Employees Change Everything.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Presentation transcript:

Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?

The way we were Hardware, software, and not much more. 2

Change began in 2007 Business risk increased significantly Social Media encouraged sharing of confidential information The way we are Mobile technology and social media have changed everything. 3

4 The love affair employees have with mobile devices assures that they are here to stay. Blurring of the lines Work anytime, anywhere.

40% of devices are consumer owned 80% of professionals will use 2 or more devices Corporate systems and data are more accessible than ever Do the benefits of BYOD outweigh the risks? More security challenges and less control

The benefits of adopting a BYOD strategy Do the pluses outweigh the minuses? Mobile devices are less expensive than old-school IT assets Less provisioning and managing means less cost Increased productivity 6

BYOD Challenges !

You cant protect what you dont know Understanding and managing risks associated with BYOD. ! 8

9 ! Risking data loss The consequences can be extreme. One office data breach can incur – legal fees – disclosure expenses – consulting fees – remediation expenses One retail data breach can incur – credit monitoring expenses – legal settlements – information control audits

Risky viruses & malware Mobile devices offer little protection. 10 !

Uninvited guests Enter workplace via consumer devices Access to other devices and data Potential for company-wide infections The risk from hackers and intrusions. 11 !

12 ! The arrival of browser zombies Trouble at every turn. Man-in-the-Browser (MitB) attacks will escalate Traditional malware runs every time a computing device is turned on Browser malware only takes control of the web browser

13 ! Policy enforcement IT is challenged by a BYOD workplace. Creating device-specific policies is difficult Weve given up some direct control Solutions for these mobile platforms are immature

Challenges to productivity Adopting & enforcing a BYOD strategy. Younger employees collaborate in new ways Employees want freedom to use mobile devices at work Secure access solutions are necessary for empowering employees to work anywhere 14 !

BYOD Missteps 15

Failure to know what employees are doing on the network prevents successful planning 1. Not knowing what devices and applications are being used. BYOD missteps 16

Employees accessing social networks and social applications are not always wasting time 2. Not knowing how your social media strategy works with your BYOD policies. BYOD missteps 17

passwor User-generated passwords are often weak and can compromise IT systems 3. Weak password management. BYOD missteps 18

BYOD Strategies

Determine which devices are allowed to access the network Determine which devices you will support Focusing on policy is the first step. Policy = Simplicity 20

Separate work from fun Make sure employees understand the rules and the risks. Work life and personal life should be kept separate To get network access, employees must agree to acceptable use policies IT should monitor activity 21

Enforce minimal access controls Access only for approved devices, applications, and users One size doesnt fit all What is acceptable use? Clear security policies 22

Protect corporate data For high-level protection, limit access to devices that support VPN connectivity and require a secure connection Limit access using VPN. 23

Application control strategies make BYOD policies more secure Decide which applications are acceptable, and which are not Segment networks for additional protection Applications should not be ignored. Controls that go beyond mobile devices 24

Consider additional risks Are you subject to controls such as HIPAA or PCI DSS? If a device is lost, can you wipe the data? Do employees know what rights they give up when using a mobile device? Best practices and policy enforcement are essential 25

BYOD & WatchGuard

Manage BYOD with WatchGuard WatchGuard makes managing BYOD easy by designing all products with easy-to-use policy tools. Administrators can enforce policies for small businesses or large enterprises Easy-to-use security services for IT administrators. 27

Control the network and the applications Easily and quickly set up network segments Maintain compliance and high-security Monitor over 1,800 types of applications WatchGuard products give you control over how devices are used. 28

Protect all connected devices from mobile malware. WatchGuard utilizes a best-in-class approach, ensuring network connected devices are shielded with an antivirus umbrella. The network perimeter is the first line of defense. 29 d

Safe surfing solution Resides at the gateway Device agnostic Easy for IT to set up WatchGuards WebBlocker protects users in hostile environments. 30

Protect corporate data For high-level protection, limit access to devices that support VPN connectivity and require a secure connection Limit access using VPN. 31

Whats connected? Whats being used? Logging and reporting are one of the most valuable resources that IT can leverage for a BYOD strategy. This insight helps protect resources and address areas of concern WatchGuard illuminates trouble spots and potential 32

Summary

34 A major trend that is changing IT. BYOD is here to stay Will grow in size and scope Presents new challenges and opportunities A BYOD strategy is critical for data security

Thank You 35