23

Embracing the IT Consumerization Imperitive

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Embracing the IT Consumerization Imperitive
Page 2: Embracing the IT Consumerization Imperitive

Embracing the IT Consumerization Imperative

Barry CaplinCISO

MN Dept. of Human [email protected]@bjb.org, @bcaplin, +barry caplin

Page 3: Embracing the IT Consumerization Imperitive

http://about.me/barrycaplin

Page 4: Embracing the IT Consumerization Imperitive

More About Me

• Native New Yorker!

• 30 years in IT/ 20 years in InfoSec

Page 5: Embracing the IT Consumerization Imperitive
Page 6: Embracing the IT Consumerization Imperitive

Apr. 3, 2010

300K ipads1M apps250K ebooks… day 1!

Page 7: Embracing the IT Consumerization Imperitive

2011 – tablet/smartphone sales exceeded PCs

Page 8: Embracing the IT Consumerization Imperitive

The real reason we need tablets

Page 9: Embracing the IT Consumerization Imperitive

Why are we talking about this?

But really, all connected!

Page 10: Embracing the IT Consumerization Imperitive

Business Driver?

Page 11: Embracing the IT Consumerization Imperitive

What about…

Page 12: Embracing the IT Consumerization Imperitive

Ineffective Controls

Page 13: Embracing the IT Consumerization Imperitive

1 Day

Page 14: Embracing the IT Consumerization Imperitive

5 Stages of Tablet Grief

• Surprise• Fear• Concern• Understanding• Evangelism

Page 15: Embracing the IT Consumerization Imperitive

Security ChallengesDevices:•Exposure of data•Leakage of data – sold, donated, tossed, repaired drives•Malware

But don’t we have all this now???

Page 16: Embracing the IT Consumerization Imperitive

Consumer App Security• “non-standard” software a challenge• Vetting, updates/patches, malware• No real 3rd party agreements• Privacy policies, data ownership• SOPA/PIPA/CISPA

Page 17: Embracing the IT Consumerization Imperitive

Legal (IANAL)• Privacy – exposing company data• Litigation hold – on 3rd party services• Separation – what’s on Dropbox?• Copyright, trademark, IP?• How do you?:–Get data from a 3rd party service?

Page 18: Embracing the IT Consumerization Imperitive

BYOD Security Solutions• Sync – Network or OTA

• VDI – Citrix or similar

• Containerization – Sandbox, MAM

• Direct Connection – Don’t!

Page 19: Embracing the IT Consumerization Imperitive

DHS view - POE• Policy• Supervisor

approval• Citrix only• No Gov't records

on POE (unencrypted)

• 3G/4G or wired

• Guest wireless• FAQs for

users/sups• Metrics• $ - not yet

Page 20: Embracing the IT Consumerization Imperitive

• Policy – Examine existing – augment• Process – Vetting, updates, malware• 3rd party agreements – where possible• Data classification/labeling• PIE – pre-Internet encryption

Software Security Solutions

Page 21: Embracing the IT Consumerization Imperitive

CoIT Nirvana• Any, Any, Any – work, device, where• Be nimble• Data stays “home”++• Situational awareness

Page 22: Embracing the IT Consumerization Imperitive

Key Points• Business Need – Partner internally• BYOD, Consumer apps, or both?• Policy, Technical, Financial aspects• Watch the data• Make easy for users• Education/Awareness

Page 23: Embracing the IT Consumerization Imperitive