Top of Content Box Line Subtitle Line Title Line Right Margin Line Wearables: Panacea or Pandora’s Box – A Security Perspective Gary Davis | Chief Consumer.

Slides:



Advertisements
Similar presentations
Innovation Towards a next generation secure internet Private Application Ecosystems Sanjay Deshpande CEO and Chief Innovation Officer Center.
Advertisements

Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Security for Mobile Devices
Smartphone and Mobile Device Security IT Communication Liaisons Meeting October 11, 2012 Theresa Semmens, CITSO.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Identify risks with mobile devices: Portable data storage Wireless connections 3 rd party applications Data integrity Data availability 2.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
Mobile Access: BYOD Trends SCOTT DUMORE - DIRECTOR, TECHNOLOGY, CHANNELS & ALLIANCES AUTONOMY, HP SOFTWARE.
MOBILE DEVICES & THEIR IMPACT IN THE ENTERPRISE Michael Balik Assistant Director of Technology Perkiomen Valley School District.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA.
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Outcomes By the end of this session, participants will be able to:
Western Australian Emergency Medicine Research Online WAEMRO Dis-integrating healthcare information systems Professor Peter Sprivulis MBBS PhD FACEM FACHI.
MY SMART PHONE DOES WHAT WITH MY BLOOD PRESSURE DATA ??? Anita Fineberg, LL.B. CIPP/C Barrister & Solicitor President, Anita Fineberg & Associates Inc.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
Payment Card Industry (PCI) Data Security Standard
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Information Security for Managers (Master MIS)
Information Security Technological Security Implementation and Privacy Protection.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Looking to Build a Secure Enterprise Mobile Application? Here’s How! Mush Hakhinian Chief Security Architect Intralinks Mush Hakhinian Chief Security Architect.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
THREATS TO MOBILE NETWORK SECURITY
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
 Security and Smartphones By Parker Moore. The Smartphone Takeover  Half of mobile phone subscribers in the United States have a smartphone.  An estimated.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Dr Lloyd Humphreys. Third sector providers Apps and software Health and social care Consumer tech Mental health Hospices Substance Misuse Charities Advocacy.
IT security By Tilly Gerlack.
INTEROP 2014 Mobile Issues in the Network. Mobile Issues Data loss – Hardware theft or failure – Data corruption Data theft – Hardware theft – Spyware,
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Data Security: Steps to Improved Information Security September 22, 2015 Presented by: Alex Henderson General Counsel and Chief Administrative Officer.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Convenience product security Collin Busch. What is a convenience product? A convenience product is a device or application that makes your life easier.
ISPAB Panel on Usable Security Mary Frances Theofanos - NIST Ellen Cram Kowalczyk - Microsoft.
2015 Security Conference Dave Gill Intel Security.
 Android OS: Java  iOS: Objective C NSArray * foo = [[NSArray alloc]
Staying ahead of the storm: know your role in information security before a crisis hits Jason Testart, IST Karen Jack, Secretariat.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Panel: Engineering Discipline in Cyber Security Steve Orrin, Chief Technologist, Intel Federal, Intel Coporation.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Android and IOS Permissions Why are they here and what do they want from me?
Mobile Device Security Management Leyna Belinsky.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Secure Software Confidentiality Integrity Data Security Authentication
Topic 6: Issues Press F5 to view!
Internet of Things
Internet of Things (IoT)
Internet of Things Vulnerabilities
Home Internet Vulnerabilities
Digital $$ Quiz Test your knowledge.
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Protecting Your Information Assets
Security in mobile technologies
Modern benefits administration and HR software, supported by us.
IoT: Privacy and Security
Presentation transcript:

Top of Content Box Line Subtitle Line Title Line Right Margin Line Wearables: Panacea or Pandora’s Box – A Security Perspective Gary Davis | Chief Consumer Security Evangelist

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line Why this is important Source: Reuters

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line What’s being collected 3 Types of data: Spatial Physical activity Physiological statistics Consumption Medical symptoms Bodily functions Mental health Smart watch Smart glasses Fitness wristband Pain management Heart monitor Risks: Identity theft or fraud Insurance fraud Stalking Extortion & exploitation Robbery

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line Hypergrowth 4 Source: ABi Research 780 Million by 2019 GAGR 39 % Units in Millions

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line Now2020 The wild west 5

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line The wild west 6 Average of 25 vulnerabilities per device Source: HP

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line Data flows & what’s at risk 7 Wearable Mobile device Cloud server

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line The weakest link – your smartphone 8 36% of mobile devices not PIN protected. Source: Consumer Reports

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line 22% install software that can find phone when lost. The weakest link – your smartphone 9

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line 14% install third party security app. The weakest link – your smartphone 10

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line 8% install software that can erase phone’s data. The weakest link – your smartphone 11

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line 7% use security features other than screen lock, such as encryption. The weakest link – your smartphone 12

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line Weakest link exacerbated 13 Source: FCC 40% of robberies in major US cities involve mobile devices

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line Attack of the Flappy Bird clones Making calls without user permission Installing additional apps Sending, recording, and receiving SMS messages Extracting contact data Tracking geo-location Establishing root access, allowing uninhibited control of anything on device 14 A malicious Flappy Bird clone Source: McAfee Labs Threat Report, Jun 2014 The original Flappy Bird game Flappy Bird clones contained malware

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line So what do we do…wearables Do your homework when considering purchase Change default passwords Turn Bluetooth off when not required Limit amount of information to only what’s required Be careful when using social sharing features Read and understand privacy policies 15

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line So what do we do…mobile devices 16 Turn non-essential antennas off Install security software Use full device encryption Stick with trusted app stores PIN or password protect your device Use biometrics when possible Be mindful of permissions Apply OS and app patches Turn on locate and lock capability

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line So what do we do…cloud service Connect using encrypted communications (ie, Use multi-factor authentication Only collect data necessary to deliver service Require strong passwords Implement secure session management Follow best practices for password handling (only store salted hashes and encrypted passwords) 17

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line So what do we do…ecosystem Build security in from start, not as an afterthought Ensure privacy and security policies are easy to understand, well documented and adhered to 18

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line Ultimate wearable hack Off-the-shelf technology Total control of device 19

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line Call to action 20 Stay engaged and be an evangelist Focus on education Develop industry standards that work across ecosystem Collaborate on ways to ensure security evolves

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line “It’s time to insure there is a clear set of ground rules for the security of Internet- connected products — before the marketplace and our homes fill with exploitable devices.” -- Terrell McSweeny, Commissioner, Federal Trade Commission, Jan

Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle Line Title Line Right Margin LineLeft Margin Line Follow me on Twitter