31
PAGE 1 | The enemy in your pocket Securing smartphones in the enterprise Vicente Diaz, Senior Security Analyst, GReAT Gartner Symposium/ITxpo 2012, Barcelona

The enemy in your pocket

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: The enemy in your pocket

PAGE 1 |

The enemy in your pocket

Securing smartphones in the enterprise

Vicente Diaz, Senior Security Analyst, GReAT

Gartner Symposium/ITxpo 2012, Barcelona

Page 2: The enemy in your pocket

PAGE 2 |

BYOD will come regardless you have a policy or not

Human behavior has shifted, BYOD is a response to that

My CEO heard we can save money through BYOD

Page 3: The enemy in your pocket

PAGE 3 |

1. The problem

Page 4: The enemy in your pocket

1 2PAGE 4 |

BYOD reanalyzed

Where?

What devices?

Page 5: The enemy in your pocket

1 2PAGE 5 |

What´s the problem?Problem 1: Infection

Page 6: The enemy in your pocket

1 2PAGE 6 |

Can this happen?

Page 7: The enemy in your pocket

1 2PAGE 7 |

What are we really afraid of?

Page 8: The enemy in your pocket

1 2PAGE 8 |

Bad PR is worse than bad IT

Page 9: The enemy in your pocket

1 2PAGE 9 |

What´s new then?

Page 10: The enemy in your pocket

1 2PAGE 10 |

Are they vulnerable?

Highlights from 2012:

NFC Vulnerability by Charlie Miller

iPhone 4S and Samsung Galaxy S3 owned

Page 11: The enemy in your pocket

1 2PAGE 11 |

Do you like chocolates?

Page 12: The enemy in your pocket

1 2PAGE 12 |

Who else wants to spy on you?

Page 13: The enemy in your pocket

1 2PAGE 13 |

FinSpy

Page 14: The enemy in your pocket

1 2PAGE 14 |

ProtectionSure, I have swipe gesture password

Page 15: The enemy in your pocket

1 2PAGE 15 |

Page 16: The enemy in your pocket

1 2PAGE 16 |

BYOD ≠ Data Leak

Page 17: The enemy in your pocket

1 2PAGE 17 |

2. Perspective

Page 18: The enemy in your pocket

1 2PAGE 18 |

Perspective

Page 19: The enemy in your pocket

1 2PAGE 19 |

Perspective

Page 20: The enemy in your pocket

1 2PAGE 20 |

Perspective

Page 21: The enemy in your pocket

1 2PAGE 21 |

Abusing Consumerization - Mobile devicesAre they dangerous?

It depends on what you do with it!

FacebookTwitterGmail

Corporate e-mailReading corporate documentsWriting confidential e-mails?

Page 22: The enemy in your pocket

1 2PAGE 22 |

Where is the data?

Page 23: The enemy in your pocket

1 2PAGE 23 |

Demo

Page 24: The enemy in your pocket

1 2PAGE 24 |

Using the cloud

Page 25: The enemy in your pocket

1 2PAGE 25 |

Some tools

Page 26: The enemy in your pocket

1 2PAGE 26 |

3. What now?

Page 27: The enemy in your pocket

1 2PAGE 27 |

Kim Stevenson

Page 28: The enemy in your pocket

1 2PAGE 28 |

Reality for most companies is different

Page 29: The enemy in your pocket

1 2PAGE 29 |

Reality for most companies is different

Page 30: The enemy in your pocket

1 2PAGE 30 |

Conclusions

BYOD: Myth vs Reality

Policies are necessary, but they are not enough

Is the problem in the device or in educating users?

Who is responsible for the security of the device?

We all love chocolates!

Page 31: The enemy in your pocket

PAGE 31 |

Thank You

Vicente Diaz, Senior Security Researcher, Global Research and Analysis Team

@trompi

[email protected]

Questions?