Digital Edition

SYS-CON.TV
Understanding the Risks and Value of Mobility to Your Stakeholders
It’s important to understand what your stakeholders are looking for out of mobility

The key to securing your mobility is to understand how it is being used in your environment and what is potentially at risk. Taking stock of the mobile devices, applications and traffic in your network is critical to identifying how your data and resources are potentially vulnerable.

Since mobile devices are being used to do more and more -the devices being carried around today are 3000 times more powerful than the compute power on the original space shuttle6 - the potential risks continue to increase. Once an attacker is "in" - tricking a user into downloading malware or a malicious app, infecting a Wi-Fi hot spot, exploiting a device vulnerability, in the operating system, hardware, configurations, etc. - they can do almost anything on the device and apps, including:

  • Intercept emails and text messages
  • Steal application data, including content within secure containers and wrappers
  • Capture browsing activity, including any usernames and passwords entered into sites
  • Extract contact lists, call and text logs
  • Activate the microphone (to listen in on private conversations and meetings)
  • Use the camera to take pictures or videos (white boards, manufacturing plant layouts, etc.)
  • Track location (where an executive is going could provide insights into potential customer deals or merger/acquisition plans, etc.) Stakeholders across your organization will likely view these risks differently and have different expectations around what is needed to effectively secure your data and resources. Since security is always a balancing act, requiring decisions on when and how to allow or shut down access, it's important to understand what your stakeholders are looking for out of mobility and what they are willing to accept in terms of security.

Stakeholders across your organization will likely view these risks differently and have different expectations around what is needed to effectively secure your data and resources. Since security is always a balancing act, requiring decisions on when and how to allow or shut down access, it's important to understand what your stakeholders are looking for out of mobility and what they are willing to accept in terms of security.

Role

What Mobility Represents to Them

Their Mobile Security Priorities

CISO

Business-level objective to improve agility and overall productivity.

Getting ahead of the evolving mobile threat landscape to prevent intellectual property loss, tough board-level discussions and lawsuits that:

  • Erode customer confidence
  • Tarnish brand reputation
  • Reduce competitive advantage

Audit & Risk Managers

An initiative that introduces risks that need to be quantified and managed.

Meeting compliance goals by adhering to security best practices and putting measures in place that reduce the attack surface.

Audit & Risk Managers

An initiative with a lot of moving parts out of their control. Need to support:

  • BYOD
  • New mobile application roll outs
  • Ongoing management and maintenance of mobile policies

Improving visibility to better manage mobile devices and applications and reduce risks to ensure alignment with overall security policies and practices.

Security Team

An initiative that opens up a lot of new threat vectors that need to be managed and mitigated to keep resources safe and prevent data leakage.

Effectively assessing mobile risks, integrating mobile intelligence into security information and event management (SIEM) and network access control (NAC) systems, and consistently applying policies, regardless of how or where a user accesses resources.

Employees

The convenience of being able to work whenever and wherever they are located.

Protecting their privacy and preserving a simple, good user experience.

About Michael Shaulov
Michael Shaulov is CEO and co-founder of Lacoon Mobile Security. He’s responsible for the direction of the company, with a maniacal focus on adding the security organizations need to effectively leverage mobility. He is a recognized industry speaker, delivering talks at BlackHat EU, BlackHat USA and Infosec.

Prior to founding Lacoon, Michael co-founded BlueRidge Storage Systems and founded and led the Mobile Intrusive Interception team for the security division of NICE Systems LTD. Before his commercial endeavors, he pioneered the mobile security field in an elite military technological unit, where he received the Israeli Presidential Excellency Honor for his contributions. He holds a BSc in Computer Sciences and Physics from Ben-Gurion University, Israel.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1



ADS BY GOOGLE
Subscribe to the World's Most Powerful Newsletters

ADS BY GOOGLE

Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism...
Dynatrace is an application performance management software company with products for the informatio...
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Ser...
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience w...
NanoVMs is the only production ready unikernel infrastructure solution on the market today. Unikerne...
All in Mobile is a mobile app agency that helps enterprise companies and next generation startups bu...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO Silicon Valley 2019 will cover all of these tools, with the m...
SUSE is a German-based, multinational, open-source software company that develops and sells Linux pr...
Yottabyte is a software-defined data center (SDDC) company headquartered in Bloomfield Township, Oak...
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are rep...
Serveless Architectures brings the ability to independently scale, deploy and heal based on workload...
Technological progress can be expressed as layers of abstraction - higher layers are built on top of...
When building large, cloud-based applications that operate at a high scale, it’s important to mainta...
Whenever a new technology hits the high points of hype, everyone starts talking about it like it wil...
Big Switch's mission is to disrupt the status quo of networking with order of magnitude improvements...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the c...
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical ...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, disc...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (No...
Chris Matthieu is the President & CEO of Computes, inc. He brings 30 years of experience in developm...