iPad-style mobility in the age of Wikileaks

Post on 13-Dec-2014

658 views 1 download

Tags:

description

This is the presentation I delivered on securing mobile tablet style devices. An emerging technology area with the assoicated risks.

Transcript of iPad-style mobility in the age of Wikileaks

Trevor Iverach Principal Consultant, CA Technologies

iPad-style mobility in the age of Wikileaks

agenda

address the ‘mobilution’ challenge

3 layered security approach

establish a position

the ‘mobilution’ challenge?

why now?

contrasting mobile devices

Mitigating the risk

where to secure the risk?

device

data

enterprise

10111001100010111111010111

—passcodes/passwords

—remote wipe

—hardware based encryption

—policies−device type,

configuration

—restrictions

Securing the device

—information protection and control

— non-public information

— personally identifiable information

— intellectual property

—identity aware data loss prevention

securing the data?

Demonstration

—device authenticity is crucial−device dna

—strong authentication−two factor authentication

—different needs for different usercommunities

—client virtualisation −greater control

securing the enterprise

demonstration

putting it all together

secure the device

passwords- restrictions

- config

securethe enterprise

- device authenticity- user authenticity

secure the data

control points data in use, motion, rest

these devices are inevitableestablish a position

secure the device, data & enterprise

Summary

moving forward

Mobilution Offer

thank youtwitter.com/thesecureid