Empower Your Workforce - Amazon Web Services · •BYOD •MDM CONNECTIVITY •App-driven...
Transcript of Empower Your Workforce - Amazon Web Services · •BYOD •MDM CONNECTIVITY •App-driven...
Empower Your Workforce Securing Mobile Technology
Otavio FreirePresident & CTO
Introduction by way of bots & bad actors
I’m really popular with bots & imposters
Mobile Revolution: A Tale of Two Tracks
PORTABILITY
• Device-driven
• Always-on access
• Concerns:
• BYOD
• MDM
CONNECTIVITY
• App-driven
• Always-open path
around perimeter
• Concerns:
• Productivity vs risks
Peace with the first,
living in throes of the second
• Ability to reach customers 1:1
• New channels & tools emerge
• Communication patterns change rapidly
• Enterprise business often playing catch-
up
• Ex: WhatsApp in emerging markets
Connectivity Unleashed New Potential, New Risks
Are Security Policies Holding Your Organization Back or Driving
Business Forward?
• Attacks are evolving to match
users’ technological adoption
• Targeting has shifted from the
general to the specific
• Bad actors leverage 1:1 targeting
via social and digital channels
CONNECTIVITY
Digital RisksAre Cross-
Channel
CONNECTIVITY
Classified Assets
Disseminatedon Social
Securing Your Enterprise Means Protecting Your People
Protect & Empower Your
Workforce
• Create human-centered policies
that secure every interaction
• Scalable security to seize new
business opportunities or channels
• Adapt and evolve to new threats
Build Human-Centered Policies
• How does your company measure
success? What motivates your
workforce?
• Know the core processes &
workflows
• Incorporate ongoing discovery &
threat modeling
Scale with Opportunity
• Get out of the server room:
Cybersecurity must evolve beyond
a technical implementation
• Solutions must operationalize
security across entire organization
• Optimized for a mobile workforce
that is always on
Adapt to New Threats
• Redefine risks with input across
C-suite; bad actors don’t think in
silos
• Machine-learning to enable
proactive defense
• Ability to take corrective action –
alerts alone are useless and will
overwhelm your teams
Secure Every Interaction
• Security should be a catalyst for business
transformation, not simply a cost center
• To secure your enterprise, protect your people
with policies that empower them to use the best
tools available to succeed
Thank you@OtavioFreire