“SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER...

22
ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device (BYOD) Security Challenges in Enterprises Presenter: Ibrahim Juma

Transcript of “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER...

Page 1: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

ISACA Kenya Annual Conference

“SECURE KENYA II- CYBER SECURITY & DATA

GOVERNANCE IN A GROWING

ECONOMY”

29th - 31st July 2015

Bring-Your-Own-Device (BYOD) Security

Challenges in Enterprises

Presenter: Ibrahim Juma

Page 2: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

AGENDA

Key Trends in Enterprise Mobility and BYOD

Information Security and Risk Management in the New World of

Enterprise Mobility

Mobile Enterprise Evolution

Threats, Vulnerabilities and Risk factors for consideration

Common Myths of BYOD Security

Mobile Security Framework, Risk Management and Compliance

Objective:

Provide a better understanding of the Security Risks related to

Mobile Devices (BYOD )and the Key considerations for an effective

Mobile Security Risk Management Strategy

Risk-based Information Security for Enterprise Mobility

Page 3: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 4: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 5: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 6: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 7: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 8: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

MOBILE ENTERPRISE EVOLUTION

Page 9: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

MOBILE SECURITY MATURITY MODEL

Page 10: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 11: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 12: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 13: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 14: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 15: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 16: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 17: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 18: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 19: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 20: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 21: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

Page 22: “SECURE KENYA II- CYBER SECURITY & DATA ...ISACA Kenya Annual Conference “SECURE KENYA II- CYBER SECURITY & DATA GOVERNANCE IN A GROWING ECONOMY” 29th - 31st July 2015 Bring-Your-Own-Device

Risk-based Information Security for Enterprise Mobility

THE END