Digital Edition

SYS-CON.TV
Understanding the Risks and Value of Mobility to Your Stakeholders
It’s important to understand what your stakeholders are looking for out of mobility

The key to securing your mobility is to understand how it is being used in your environment and what is potentially at risk. Taking stock of the mobile devices, applications and traffic in your network is critical to identifying how your data and resources are potentially vulnerable.

Since mobile devices are being used to do more and more -the devices being carried around today are 3000 times more powerful than the compute power on the original space shuttle6 - the potential risks continue to increase. Once an attacker is "in" - tricking a user into downloading malware or a malicious app, infecting a Wi-Fi hot spot, exploiting a device vulnerability, in the operating system, hardware, configurations, etc. - they can do almost anything on the device and apps, including:

  • Intercept emails and text messages
  • Steal application data, including content within secure containers and wrappers
  • Capture browsing activity, including any usernames and passwords entered into sites
  • Extract contact lists, call and text logs
  • Activate the microphone (to listen in on private conversations and meetings)
  • Use the camera to take pictures or videos (white boards, manufacturing plant layouts, etc.)
  • Track location (where an executive is going could provide insights into potential customer deals or merger/acquisition plans, etc.) Stakeholders across your organization will likely view these risks differently and have different expectations around what is needed to effectively secure your data and resources. Since security is always a balancing act, requiring decisions on when and how to allow or shut down access, it's important to understand what your stakeholders are looking for out of mobility and what they are willing to accept in terms of security.

Stakeholders across your organization will likely view these risks differently and have different expectations around what is needed to effectively secure your data and resources. Since security is always a balancing act, requiring decisions on when and how to allow or shut down access, it's important to understand what your stakeholders are looking for out of mobility and what they are willing to accept in terms of security.

Role

What Mobility Represents to Them

Their Mobile Security Priorities

CISO

Business-level objective to improve agility and overall productivity.

Getting ahead of the evolving mobile threat landscape to prevent intellectual property loss, tough board-level discussions and lawsuits that:

  • Erode customer confidence
  • Tarnish brand reputation
  • Reduce competitive advantage

Audit & Risk Managers

An initiative that introduces risks that need to be quantified and managed.

Meeting compliance goals by adhering to security best practices and putting measures in place that reduce the attack surface.

Audit & Risk Managers

An initiative with a lot of moving parts out of their control. Need to support:

  • BYOD
  • New mobile application roll outs
  • Ongoing management and maintenance of mobile policies

Improving visibility to better manage mobile devices and applications and reduce risks to ensure alignment with overall security policies and practices.

Security Team

An initiative that opens up a lot of new threat vectors that need to be managed and mitigated to keep resources safe and prevent data leakage.

Effectively assessing mobile risks, integrating mobile intelligence into security information and event management (SIEM) and network access control (NAC) systems, and consistently applying policies, regardless of how or where a user accesses resources.

Employees

The convenience of being able to work whenever and wherever they are located.

Protecting their privacy and preserving a simple, good user experience.

About Michael Shaulov
Michael Shaulov is CEO and co-founder of Lacoon Mobile Security. He’s responsible for the direction of the company, with a maniacal focus on adding the security organizations need to effectively leverage mobility. He is a recognized industry speaker, delivering talks at BlackHat EU, BlackHat USA and Infosec.

Prior to founding Lacoon, Michael co-founded BlueRidge Storage Systems and founded and led the Mobile Intrusive Interception team for the security division of NICE Systems LTD. Before his commercial endeavors, he pioneered the mobile security field in an elite military technological unit, where he received the Israeli Presidential Excellency Honor for his contributions. He holds a BSc in Computer Sciences and Physics from Ben-Gurion University, Israel.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical ...
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, m...
The standardization of container runtimes and images has sparked the creation of an almost overwhelm...
Enterprises are striving to become digital businesses for differentiated innovation and customer-cen...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As au...
David Friend is the co-founder and CEO of Wasabi, the hot cloud storage company that delivers fast, ...
The now mainstream platform changes stemming from the first Internet boom brought many changes but d...
Everyone wants the rainbow - reduced IT costs, scalability, continuity, flexibility, manageability, ...
In this presentation, you will learn first hand what works and what doesn't while architecting and d...
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Ser...
When building large, cloud-based applications that operate at a high scale, it’s important to mainta...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitori...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the c...
Technological progress can be expressed as layers of abstraction - higher layers are built on top of...
DX WorldExpo LLC Leased space at the hotel to present its 22nd International event on November 12-13...
SUSE is a German-based, multinational, open-source software company that develops and sells Linux pr...
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience w...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, disc...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are rep...
Dynatrace is an application performance management software company with products for the informatio...