© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Emerging Risks in a Mobile.

Slides:



Advertisements
Similar presentations
Property Inventory Valuation Replacement Cost Value The amount it would take to replace property with like property of the same quality and construction.
Advertisements

Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Security for Mobile Devices
Insurance in the Cloud Ben Hunter, Canadian Underwriting Specialist Technology Insurance Specialty Chubb Insurance Company of Canada.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
Driving change in information risk within the financial services industry Subtitle Date.
Travelers CyberRisk for Insurance Companies
Topics Changes Risk Assessments Cloud Data Security / Data Protection Licenses, Copies, Instances Limits of Liability and Indemnification Requests for.
AFM INTERNAL AUDIT NETWORK MEETING MUTUAL ONE GROVE PARK, LEICESTER Current ‘Hot Topics’ in Information Security Governance Auditing David Tattersall 03.
Bring Your Own Device (BYOD) Understanding BYOD June 27, 2013 © 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
© 2015 Sherman & Howard L.L.C. TO B OR NOT TO B YOD Emily Keimig, Esq
BYOD: Privacy and Security Andrew Paterson, Senior Technology Officer.
Steps to Compliance: Bring Your Own Device PRESENTED BY.
© 2011 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobilize your Enterprise Today.
Security Controls – What Works
Obstacles & Opportunities in Mobile Forensic Collections October 2, 2014 Evidence Collection in the Mobile Age.
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
Ettalong Public School Parent Information Session
Managing BYOD Legal IT’s Next Great Challenge. Agenda  The BYOD Trend – benefits and risks  Best practices for managing mobile device usage  Overview.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
New Data Regulation Law 201 CMR TJX Video.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobile Application Ecosystem.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Android in the Cloud Chromebooks, BYOD and Wearables Joel Isaacson Copyright 2014 Joel Isaacson
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
WHAT EVERY RISK MANAGER NEEDS TO KNOW ABOUT DATA SECURITY RIMS Rocky Mountain Chapter Meeting Thursday, July 25, :30 am – 12:30 pm.
Delivering Security for Mobile Device and Mobile Application Management INSERT MSP LOGO HERE.
2 September 2015 Building Scalable Insurance Programs For Each Growth Stage of a Entrepreneurial Company.
AUGUST 25, 2015 Cyber Insurance:
Security considerations for mobile devices in GoRTT
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
© Copyright 2011, Vorys, Sater, Seymour and Pease LLP. All Rights Reserved. Higher standards make better lawyers. ® CISO Executive Network Executive Breakfast.
Kacper Rams, Matt Starr, Megan Stephens. Overview BYOD Introduction Risks Controls.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
Negotiating Software as a Service Contracts Guidance for Corporate and Technology Counsel for Structuring Effective SaaS Agreements Presented by Kristie.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Mobile Technology and Insurance Employee Benefit Programs By Scott Warner.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
Moving to BYOD Gary Audin 1.
AppulateConnect April, 2016 The Power of Innovation
Cyber Security and how to safeguard data in the ‘Cloud’ Claire Jacques 21 April 2016.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Workshifting Transform your business – empower your people.
Total Enterprise Mobility Comprehensive Management and Security
Cyber Liability: New Exposures Presented by: Henriott Group © 2007, , Zywave Inc. All rights reserved.
Cyber Risk Management and Insurance
An Information Security Management System
The time to address enterprise mobility is now
Mobile Operating Systems
Mobile Devices, BYOD, and the Workforce: Responsible Mobile Computing,
Decrypting Data Compliance in China
Impact of IT Consumerisation on Enterprise Security
Current ‘Hot Topics’ in Information Security Governance Auditing
Lecture 14: Business Information Systems - ICT Security
LEGAL & ETHICAL ISSUES InsurTech & Health Insurance Providers
Krannert’s Global Supply Chain Business Continuity Planning Discussion
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Cyber Exposures The Importance of Risk Identification and Transfer
INFRASTRUCTURE & ACCESS 4TH JULY 2018
Presentation transcript:

© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Emerging Risks in a Mobile Environment Shared Assessments Roundtable November 6, 2012 Art Kirchoffer Executive Director – Risk Management AT&T

© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.  Distracted driving  Employee injury  3 rd party claim  Electromagnetic Fields (EMF) / Radiofrequency (RF)  Numerous studies; no definitive opinion  FCC re-examining standards  Limited insurance availability  Wildfire  Aerial cable exceeding capacity of poles  Limited insurance availability  Natural catastrophe  COWS, SOWS and COLTS 2 Traditional Risks

© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.  Consumerization of IT & BYOD/A/C  Near-field communication (NFC)  Mobile payments (ISIS, MCX, Google Wallet)  Connected homes, cars & cities  mHealth  M2M (The Internet of Everything)  Cloud  Big data 3 Industry Trends (and emerging exposures)

© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.  Smartphones, notebooks, laptops, tablets, other  Data and privacy risk  Device theft / loss  iOS v. Android  Abundant availability of applications  Malware increasingly targeting mobile devices  Social networks  Intellectual property  Short life cycle + constant change 4 Device and Application Risks (BYOD)

© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.  Legal and privacy issues more complex than security challenges  Lack of case law and legal precedence  PCI Security Standards & HIPAA  Logistical challenges of e-Discovery and ability to search for, collect and preserve data  Device ownership and the right to seize  Data / content / ownership  Employee privacy  Liability for employee personal activities  Copyright / IP risk  FLSA and wage & hour lawsuits 5 Legal & HR Considerations (BYOD)

© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.  Externalization of business  Line between organization and supplier is blurred  Many of the risks are the same, but with less control  Robust contract and supplier GRC program are best tools  Burden of oversight rests with the organiza tion  Supplier information security requirements should address mobile  Insurance is good backstop 6 Supplier Considerations

© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.  Management and security around mobile lags  Exposure evaluation requires enhanced skill set  Technology constantly changing  No clear rules  Untested insurance solutions  Traditional P&C policies exclude losses related to intangible data  Specialty cyber and E&O coverages have emerged  Should address data breach and privacy issues for cloud and mobile  Can extend coverage to suppliers  Coverage cases and large claims have not tested these policies 7 Risk Management Challenges

© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property.  Establish policy around the RM process  Training and reinforcement  Not all data / users are created equal  Policy should include / address:  Employee agreement  Expectation of privacy; personal content; usage monitoring  Security (sign-on, encryption, back-up)  Device / OS options and limitation  Application access & controls  Device disable, wipe and confiscation  Stipend or reimbursement  Records and information management  Policy not airtight, but a step in the right direction  Consider MDM & MAM tools 8 Mobile Device Risk Management

© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. 9 Itcanwait.com