Imation Mobile Security Research Presentation August 2013 What is happening with our data?

Slides:



Advertisements
Similar presentations
Security for Mobile Devices
Advertisements

MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
8/25/20141 Portable/mobile devices and privacy in Local Government Dr Anthony Bendall Acting Victorian Privacy Commissioner.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Indicator 3.02 Use communication skills to foster open, honest communications.
IT. Why have a 5 year plan? How can get to where we want/need to be without a plan? Just like students plan out their educational path to a degree, we.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
BYOD Guide Created using iThoughts [...] [...]. BYOD Guide.
Best Practices: Provisioning, Encryption and Decommission of storage in the enterprise.
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
IT Security is Everyone’s Responsibility Presented by Hooman Moayyed IT Security Awareness Program Manager.
True or False 1. One advantage of using removable storage media is transportability. 2. Hard drives store data optically, with lasers. 3. CDs store data.
Sponsored by Lumension Ponemon Institute© Private & Confidential Document Page Security Mega Trends Survey Independently conducted by Ponemon Institute.
© 2011 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobilize your Enterprise Today.
Study conducted on behalf of Microsoft by Harris Interactive Inc. Study conducted on behalf of Microsoft by Harris Interactive, Inc. Study conducted on.
© 2015 BROCADE COMMUNICATIONS SYSTEMS, INC. Taking up the Task of Business Transformation Global CIO Study 2015.
SAM for Mobile Device Management Presenter Name. of employees spend at least some portion of their time working outside their office. Mobility is the.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
The research for GFI Software was carried out between: 27 / 03 / 2014 and 04 / 04 / 2014 Sample: 202 IT decision makers in the USA employing up to 250.
New Data Regulation Law 201 CMR TJX Video.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
INFORMATION SECURITY THE NEXT GENERATION 13 th World Electronics Forum Israel Christopher Joscelyne Board Member & Membership Chairman AEEMA November 2007.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
TEMPLATE DESIGN © Android Data Confidentiality Alex Mayer University of Houston Abstract Employees are increasingly relying.
Security considerations for mobile devices in GoRTT
BYOD- Bring Your Own Device Understanding the benefits and the risks. Phillys Yang Alex Verblen Aaron Chung Michael Lyons.
Blancco – Data Erasure Management
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
Mobile Device Security Drew Hayes Christ Liechty November 27, 2007.
BARRY JINKS President & CEO March 22, 2011 President & CEO March 22, 2011.
© MISHCON DE REYA MAY 2014 RECRUITMENT INTERNATIONAL FINANCIAL DIRECTORS’ FORUM Protecting your business from unlawful competition.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
The State of Computer & Data Security in Corporations Independent Survey.
Travelling Australia Travel plans for 2005 and the impact of discount airlines Hotel Motel and Accommodation Association Conference July 2005.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Information Systems Services How to Protect Yourself On-Line (Keeping Safe At Work) Kevin Darley, IT Security Co-ordinator 7 th March 2013.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
INNOVATE THROUGH MOTIVATION Mobile Computing & Your Business KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Cyber Security in the Mobile Era KEEPING ENTERPRISE DATA SAFE IN THE BYOD ERA.
Your Cyber Security: The scope of your risk is broad and growing To understand the nature of the risk landscape look at the presentations here today-begin.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
What lessons can we learn from other data breaches? Target Sentry Insurance Dynacare Laboratories 1 INTRODUCTION.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Headlines July 2015 saw a 10% increase in general manager enquiries from July 2014 with 122 enquiries Looking further back 53% increase from July 2013.
Moving to BYOD Gary Audin 1.
Mobile Device Security Management Leyna Belinsky.
THE CONSUMERIZATION OF IT By Patricia Coonelly, Anthony Dipoalo, Tom Stagliano.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
BYOD Security Risks Presentation by Ravi Namboori Visit
The information that is stored on business computer and hard drives needs to be securely destroyed and is important part of managing the information security.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Bring Your Own Device Market share to hit $366.95bn by 2022: Fractovia.org.
Fourth ICT Security Conference 2017
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Mobilize your Enterprise Today Enterprise Mobile Device Management
E&O Risk Management: Meeting the Challenge of Change
Mobilize your Enterprise Today Enterprise Mobile Device Management
Mobilize your Enterprise Today Enterprise Mobile Device Management
Introduction to BYOD EIT, Author Gay Robertson, 2017.
12 STEPS TO A GDPR AWARE NETWORK
Cyber Security Do’s & Don’ts
Presentation transcript:

Imation Mobile Security Research Presentation August 2013 What is happening with our data?

2 How are Australian companies managing data?

Approach and methodology

4 Sample  Senior IT decision makers  I am the sole decision maker for IT  I have a major influence in decisions regarding IT  Business size  No small-small business  Business size classification  25 to 245 ─ medium  250 to 2,499 staff ─ large  more than 2,500 staff ─ enterprise  All states and territories  207 interviews  Compared to 500 (combined) interviews from USA, Canada, Germany and UK

Key findings

6 Remote working  Many Australians work remotely  77% of companies have between 1% to 30% who work remotely  71% of overseas companies have between 1% and 30% who work remotely  Only 23% of Australian companies have more than 30% who work remotely  27% of overseas companies have more than 30% who work remotely  Australia is similar to overseas

7 Mobile device policy in 2012  Policy enforcement  63% of companies have a mobile policy that is enforced  26% have a mobile policy that is not enforced  11% do not have a mobile policy at all  Australia falls behind the rest of the world – 77% have a mobile policy that is enforced  But we’re better than Germany where only 53% have a mobile policy that enforced  How is the policy enforced?  77% have devices that are company approved  21% only have devices owned by the company  Overseas are more strict and less flexible with 38% only allowing company approved devices  More potential for BYOD in Australia

8 What about a policy in 2013 and the future?  A mobile policy  4% have a policy in place in 2013  43% don’t have a policy but plan to in the next year  52% do not plan to implement in a policy in the next year  Business size  The larger the business the more likely they are to have implemented a plan since One quarter (25%) of enterprise businesses have implemented a plan since  Overseas  8% have a policy in place in 2013  56% plan to have a policy in the next year  43% don’t have a policy nor plan to Base: those that did not have a policy in 2012’

9 What is allowed on the network? Allowed, Company Issued Overseas Allowed, Company Issued Diff AU - OS Allowed, Employee Owned Overseas Allowed, Employee Owned Diff AU - OS Not Allowed or not used Laptops Smart phones Tablets USB flash drives Memory cards External hard drives Optical media Other

10 Confidence that data is protected from loss or theft Top 2 ‘extremely confident’ and ‘very confident’

11 Confidence that data is protected from loss or theft Top 2 ‘extremely confident’ and ‘very confident’

12 Consequences of a data breach

13 Biggest corporate concern about loss of data? % Negative impact on the company's reputation60 Potential exposure of the company's proprietary information to a competitor 54 Monetary costs associated with data loss and associated breach notification 57 Increased internal workload required to clean up the problem45 Other3

14 USBs in your draw/desk right now % to to 107 More than 106 % Extremely35 Very36 Moderately20 Slightly7 Not at all2 How many USBs are in your draw or on your desk right now? How well do you know what is on each USB?

Neil Stollznow PO Box 16 Level 2/156 Military Rd Neutral Bay NSW 2089 T F M