SANS Technology Institute - Candidate for Master of Science Degree Design Phase 1 of an iPhone Rollout Mark Baggett, Jim Horwath June 2010.

Slides:



Advertisements
Similar presentations
Laptop Security in the current IT world W3 group.
Advertisements

!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
MANAGING AND SECURING BYOD Legal ITs Next Great Challenge.
Security for Mobile Devices
Bring Your Own Device (BYOD) Security By Josh Bennett & Travis Miller.
City of Boroondara Mobile Device Management
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Protection Overview
Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Impact of the Recent UC Denver Remote Computing Audit May, 2010.
Windows 8.1 Device Management With Windows Intune Mark O’Shea MVP Windows Expert – IT Pro 30 June 2014.
Mobile Security 310KM Lab 4 Group Presentation NG KING TUNG MA HO YIN CHE CHUN KIT WOO SHUN CHAK.
Medical University of South Carolina Office of the CIO – Information Services Endpoint Security Team Mobile Device Management March 8, 2012.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Deployment of iPads Lessons from the Trenches Jim Horwath March 2012 GIAC GSE, GCUX,
Sophos Mobile Control. Tablets on the rise 2 Trends 3 75% of 157 polled companies encourage employee owned smart phones and tablets to access corporate.
The Natural way for Secure Mobile v.1.4
Meraki Mobile Device Management
U N C L A S S I F I E D LA-UR LANL Exchange / Blackberry Deployment June 2, 2009 Anil Karmel Solutions Architect Network and Infrastructure Engineering.
© Copyright RES Software. v2012-Mar30. RES HyperDrive Patrik Zander, Product Manager 1.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.
IPhone SDK and Enterprise Peter Wood. Enterprise Upcoming iPhone support for Microsoft Exchange ActiveSync and industry-standard corporate security measures.
IPhone Security: Understanding the KeyChain Nicholis Bufmack and Ryan Thomas CS 691 Summer 2009.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Sybase Confidential Propriety.iAnywhere ConfidentialiAnywhere Confidential Proprietary.Sybase Confidential Propriety. Addressing the Challenges of Device.
Telenet for Business Mobile & Security? Brice Mees Security Services Operations Manager.
Exchange Exchange Connecter with Configuration Manager Configuration Manager with Intune Protect and Manage Devices and Infrastructure.
Securing Exchange Server Session Goals: Introduce you to the concepts and mechanisms for securing Exchange Examine the techniques and tools.
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Mobile Device Management Overview Information Security Office.
IT RISK IT Managers Roundtable event – 06/24/15 Presentation by Simon Cousins.
Initial Tiger Team Briefing New Dells with TPM Peter Leight Richard Hammer May 2006.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Remote Access Tools Policy John Jarocki May 2010 GIAC GSEC, GCIA, GCIH, GCFW, GPEN.
Good MDM IOS Overview Presented by: Jerry Wen 02/09/2012.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Mobile Device Security Threats Christina Blakley Host Computer Security.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Outlook Mobile App for iOS
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
DATA SECURITY FOR MEDICAL RESEARCH
Transforming business
Outlook Mobile App for Android
Securing a mobile, omni-channel strategy
Microsoft Virtual Academy
Deployment Planning Services
BYOD Enterprise Mobile Security for IOS Devices
Staying Austin College
Microsoft Intune MAM without Device Enrollment
APPLE TWO STEP VERIFICATION CHANGE PHONE NUMBER Please read the following presentation on any help on Apple two step verification change phone number.
Keno Kozie Associates -
Microsoft Data Insights Summit
Personal Mobile Device Acceptable Use Policy Training Slideshow
2019 Thales Global Cloud Security Study
Microsoft Virtual Academy
Presentation transcript:

SANS Technology Institute - Candidate for Master of Science Degree Design Phase 1 of an iPhone Rollout Mark Baggett, Jim Horwath June 2010

SANS Technology Institute - Candidate for Master of Science Degree Overview Business benefits of iPhone Biggest risk of iPhone usage Risk in current infrastructure Options to mitigate risks Recommendations

SANS Technology Institute - Candidate for Master of Science Degree Business Benefits Company viewed as an innovator and leader Allow the organization to respond to an increasing mobile world Faster response to market information

SANS Technology Institute - Candidate for Master of Science Degree Risk of Mobile Devices RiskMitigation Sensitive data on lost or stolen devices -Device on data is encrypted -Password protect devices -Remote wipe of device Malware (Viruses, worms, & backdoors) Control the installation of software from untrusted sources Rouge or untrusted devices connecting to, and storing company data Device authentication

SANS Technology Institute - Candidate for Master of Science Degree Risks in Current Infrastructure By default Microsoft Exchange 2003 and later allows any “ActiveSync” enabled mobile device to download Recommend immediate action be taken Open issue regarding the handling of devices that currently have company data on them

SANS Technology Institute - Candidate for Master of Science Degree Mitigation Strategies Apple iPhone Configuration Utility implements most password controls Microsoft Exchange Mobile Device Manager implements the ability to “Wipe” a device remotely 3rd Party products are available to implement the remaining controls

SANS Technology Institute - Candidate for Master of Science Degree Recommendations Current BlackBerry level of security is not achievable using manufacturer provided software GIAC should evaluate 3rd Party software options We have a short list of products that claim to fully mitigate those risk