Should We Believe the Hype? Stephen Fast Lead, Cyber Innovation Strategy Cyber Innovation Division Applied Research Laboratory The Pennsylvania State University.

Slides:



Advertisements
Similar presentations
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Advertisements

310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
Drivers of Change in Higher Ed Common Solutions Group The Future IT Organization September 13, 2012.
© 2011 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Mobilize your Enterprise Today.
New Marketing Strategy:
YOUR INTERNET EXPERIENCE
Emerging Trends in Business. Outsourcing Contracting out of a business function, which was previously performed in-house, to an external provider. Contracting.
Rapid Mobile Development Enterprises are having a tough time keeping up with the demand for mobile apps. With these growing demands, businesses are expecting.
UniCredit Group at glance
CS 153 Design of Operating Systems Spring 2015 Lecture 24: Android OS.
1 ZIXCORP The Criticality of Security Dena Bauckman Director Product Management April 2015.
AFRALTI1 The Impact of the Mobile Money Revolution in Africa The Impact of the Mobile Money Revolution in Africa.
Contribution since August,2008 National MSME Conclave 19 November, 2014 Use of ICT to make MSME more competitive and sustainable Tapan K. Patra Director.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Company Confidential | ©2013 Good Technology, Inc. All Rights Reserved. Mobile Work Exchange Spring Town Hall April 30, 2013 Planning for Tomorrow’s Mobile.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Why Mobile Bill Payment is Thriving and How Utilities are Responding
Mobile data. Introduction Wireless (cellular) communications has experienced a tremendous growth in this decade. Most of the wireless users also access.
Confidential The Power to Connect. On-the-go presentations in client’s office and outside meeting locations are made professional and worry free. CircleMobile.
Apple Inc..
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Banking Security in a Digital Age Trevor LaFleche, IDC Financial Insights.
Using Mobile Technology to Improve the Bill Payment Process
Strategy Apple Inc.. Strategy development Advantage against competitors Being innovative in IT/consumer electronics means a lot of financial input in.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
THE MOBILE CHANNEL IN FINANCIAL SERVICES TARIK HUSAIN BUSINESS DEVELOPMENT DIRECTOR ASIAN BANKER SUMMIT APRIL 2011.
C 3 : A Formula For Success Coverage, Customization & Collaboration Pete Peterson SVP, U.S. Sales, Tech Data.
Seamless Mobility: Michael Wehrs Director of Technology & Standards Mobile Device Division, Microsoft Corp. Wireless Software Innovations Spurring User.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
An agreement between two or more individuals or entities stating that the involved parties will act in a certain way in order to achieve a common goal.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Question #3:   WHY IS IT NECESSARY TO PERFORM AN EXTERNAL AND INTERNAL ANALYSIS BEFORE THE FIRM CAN IDENTIFY ITS TRUE CORE COMPETENCIES? Group #2: M981Y207:
Group 12: Onelio Francisco Maduabuchi Nkwodinma Adrian Reyes Amanda Rodriguez.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Basics of testing mobile apps
Business Plan NAME OF YOUR BUSINESS – create a name or re-evaluate the name of your business. Does it integrate well with what you are selling?
What is Lenovo Goal Mission & Vision Business Groups SWOT Analysis
What is Lenovo Goal Mission & Vision Business Groups SWOT Analysis
Iphone vs. Smartphone Why initially negative reviews had little effect on iPhone desirability By: Ryan Grainger.
Hype or The Real Deal? Eric Leiserson Mobile Billing and Payment: Utility Benchmarking and Latest Consumer Trends Utility Payment Conference.
Rotterdam, March 31, 2004 Group 8 - Section B Oscar Bernaldez / Pablo Franzini / Masa Kijima Alessandro Piloni / Nikolaos Platis / Iris Tang.
© DataCard Corporation. All rights reserved. TRENDS IN eGOVERNMENT Drivers, applications and technologies.
Mobile E-Commerce in Asia Issues and Strategies for the New Information Age Business Wong Jeat Shyan CYBERSOURCE PTE LTD SINGAPORE.
La Salle University – Fall 2013 INL 880 – Capstone Presentation Presented by: Loc Nguyen & Shweta Somalwar December 18, 2013.
AppulateConnect April, 2016 The Power of Innovation
MarketsandMarkets Presents Global Smartphone Security Market to be worth $ Million in 2016
Latest Technology News Presented by… Tropicalpost
Identity and Access Management Market to Global Analysis and Forecasts by Industries, Services No of Pages: 150 Publishing Date: Feb 2017 Single.
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Feb 2017 Single User PDF: US$
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: Apr 2017 Single User PDF: US$
Private Cloud Market to Global Analysis and Forecasts by Services, Applications No of Pages: 150 Publishing Date: May 2017 Single User PDF: US$
© 2016 Global Market Insights, Inc. USA. All Rights Reserved IoT in Manufacturing Market grow at 20% CAGR from 2017 to 2024: Global.
The Smart Phone Industry
The time to address enterprise mobility is now
For Retailers and Their Consumers
Mobilize your Enterprise Today Enterprise Mobile Device Management
PRECISE BIOMETRICS CORPORATE PRESENTATION
Mobilize your Enterprise Today Enterprise Mobile Device Management
CHAPTER 3: STRATEGIC PLANNING.
Mobile Application Development
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Page 1 Fundamentals of Information Systems.
Impact of IT Consumerisation on Enterprise Security
Customer Centric Organizations
Mobilize your Enterprise Today Enterprise Mobile Device Management
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Beacon Technology Market to grow at 80% CAGR from 2017 to 2024: Global.
Top Emerging E-commerce Magento trends. The progress of E-commerce industry is changing year by year, this evolution has made super easy for the online.
Hype or The Real Deal? Eric Leiserson
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Can Corporate Social Responsibility Build Your Brand Reputation?
How Is Digital Transformation Accelerating The Banking Industry?
Presentation transcript:

Should We Believe the Hype? Stephen Fast Lead, Cyber Innovation Strategy Cyber Innovation Division Applied Research Laboratory The Pennsylvania State University

Backdrop Much discussion and hype – Real danger or paranoia – Follow the money Vulnerability in antivirus software “Worry-free experience”: Director of Cyber Security Technology and Initiatives, Intel Corporation The customer is always right

PC trends Capability ↗ Complexity ↗ Vulnerability ↗ Attacks ↗ HW costs ↗ Exploits ↘? PCs have become more complex, more costly, expensive with unimproved security→ opportunity for mobile devices

Trends Smart phones outsold PCs beginning in Q Smart phones, tablets, mobile devices + cloud = more utility and advantage for most customer applications Strong brand loyalty (84% Apple, 60% Android) Battery longevity #1 customer complaint

Can the promise be fulfilled? Consumers prefer convenience over security – 32% believe smartphone is secure, 21% believe secure enough to make a purchase Mobile device attacks increasing Publicity war about threat Are we going to make the same mistake we made for PCs for mobile?

Stakeholders Consumers – 38% use mobile for payments, 18% for banking – Fast adoption of mobile credit card readers (1000% growth) – Low adoption of security protection adoption for mobile devices – Pervasive belief mobile devices are more secure than PCs Lacking awareness Low personal experience (except marketing) – $0 liability protection for credit cards

Stakeholders Banks – $0 liability protection for credit cards → its really the credit card companies and vendors problem – Financial loss and liability Business – Mostly driven by sensitive data leaks and business IP concerns – Primary drivers Early adopters of BYOD driven by productivity gains and competitiveness Others will segregate, control or deny devices Competition will decide

Reasons for pessimism Financial incentives for carriers (managers of the devices) – Short duration support – Infrequent updates – Renew every two Limited resources – Battery – Bandwidth May drive knowledgeable consumers to jailbreak devices – Large malware exploit concern Some researchers believe mobile device security is significantly behind PC

Reasons for Optimism Devices built with understanding of previous security issues Wide adoption for IT cost savings Productivity promise for adopters of BYOD Financial sector to meet consumer and business demand Stabilization of iOS and Android OS Growing awareness

Conclusions Unclear whether security within technological reach – If so, it requires serious commitment Align incentives Identify market proponents willing to invest – Vested interest in outcome – Compelling business case – Proponent may not b e obvious