SlideShare uma empresa Scribd logo
1 de 41
Developing and
                                     Enforcing a Bring-Your-
                                      Own-Device (BYOD)
                                             Policy

SANS Analysts:
Tony DeLaGrange, Senior Security Consultant
Secure Ideas                                  Lee Howarth, Senior Product Manager
Ben Wright, SANS Instructor, Attorney,        Oracle Corporation
Technology Law Expert/Author



              © 2012 The SANS™ Institute - www.sans.org
Tony DeLaGrange


• Security Consultant at Secure Ideas
• Over 25 Years IT Experience
   – 15 Years in financial services
   – Over decade in IT Security
• Co-author of SEC571
   – Mobile Device Security
• Open Source Project Lead
   – MobiSec & SH5ARK
• Co-chair of SANS first Mobile
  Device Security Summit

 © 2012 The SANS™ Institute - www.sans.org   2
Topics Today


  • Mobility Security Survey

  • Mobile Security Policies

  • Top 3 Security Practices

  • Conclusions




                                            3
© 2012 The SANS™ Institute - www.sans.org
Mobility Survey


• Full results here:
  www.sans.org/reading_room/anal
  ysts_program
• Focused on policies and controls
• Survey ran in the 3rd quarter
  of 2012
• More than 650 people responded
   – From a wide range of organizations




                                            4
© 2012 The SANS™ Institute - www.sans.org
Criticality of Mobile Policies


• It starts with
  the policies
   – 97% believe
     it's important
• Yet so many don't
  have mobile policies
   – Improvement from
     last year (58%)




                                              5
  © 2012 The SANS™ Institute - www.sans.org
Ends of the Spectrum


• Most stringent
   – 24% do not permit personal devices to
     access company resources
• Most lenient
   – Besides no policy at all 
   – 14% let employees secure their own
     mobile devices
• Somewhere in between
   – 21% manage employees' devices
   – 27% use mobile sync with minimal
     device management controls
                                             6
 © 2012 The SANS™ Institute - www.sans.org
Top 3 Mobile Security Practices




• Authentication to corporate resources
• Access to corporate information
• Protect corporate data on devices

                                              7
  © 2012 The SANS™ Institute - www.sans.org
Authenticating Mobile Users




                                            8
© 2012 The SANS™ Institute - www.sans.org
Controlling Access to Resources




                                            9
© 2012 The SANS™ Institute - www.sans.org
Challenges


• How should companies implement
  authentication and access controls?
   – User credentials?
   – Location?
   – Device type?
   – Applications?

• Where should organizations "touch"
  employee devices?
   – Device?
   – Applications?
                                             10
 © 2012 The SANS™ Institute - www.sans.org
Protecting Corporate Data




                                            11
© 2012 The SANS™ Institute - www.sans.org
Challenges



• How should employers ensure
  protection of data on lost/stolen
  devices?
   – Wipe sensitive data?
   – Wipe entire device?
   – Locate the device?
   – Lock/Disable the device?

• How should fraud controls be
  implemented?

                                             12
 © 2012 The SANS™ Institute - www.sans.org
Conclusions


• Policies are important
   – 37% still don't have them
   – Many are developing policies after
     building their controls
• Companies are most interested in
   – Authentication
   – Access to resources
   – Data protection
• Challenges with BYOD
   – Finding a balance in controls
   – While not upsetting employees too much 
                                                13
    © 2012 The SANS™ Institute - www.sans.org
Tony DeLaGrange
                 tony@secureideas.com
                     904-639-6709


                        Q@SANS.org




© 2012 The SANS™ Institute - www.sans.org
Bring Your Own Device
                                   (BYOD) Policy




Benjamin Wright
Attorney & SANS Institute Instructor
benjaminwright.us
This is education, not legal advice.
Bring Your Own Device (BYOD)


• Rules for employees using own
  laptop, tablet, smartphone,
  webmail services for business
• Controversial topic; no perfect
  policy exists
• See discussions:
  http://goo.gl/txlCU,
  http://goo.gl/7bEAQ,
  http://goo.gl/QX6Uz,
  http://goo.gl/edSFF
Subpoena for Employee’s
      Home Hard Drive

• Local government employment
  dispute
• Plaintiff able to subpoena hard
  drive of manager’s home
  computer
• Wood v. Town of Warsaw, N.C.,
  No. 7:10-CV-00219-D, 2011 WL
  6748797 (E.D.N.C. Dec. 22, 2011)
Employer Liability for Security


• Massachusetts 201 CMR 17.00:
  PII on mobile devices must be
  encrypted
• Cal SB 1386 - many breach
  notices because of stolen,
  unencrypted laptops (e.g. Guin v.
  Brazos Higher Education)
$1.5 Million Fine +
          Costly Security Upgrades

  • Unencrypted patient data
  • stolen laptop
  • Massachusetts Eye and Ear
    Infirmary (hospital)
  • HIPAA penalties imposed by Dept.
    Health and Human Service
  • http://goo.gl/acnRE




                                            19
© 2012 The SANS™ Institute - www.sans.org
Employer Incentives


• Device and service monitoring
• Data wiping (selective or whole
  device)
• Encryption
• Confiscation if monitoring
  identifies device or service as a
  risk or threat
Policy/Agreement Challenges


•   Warning employees
•   Getting employee consent
•   Employee privacy
•   Liability for damage to employee
    data, device or service
BYOD Policy – Sample Language


• http://goo.gl/19idt
• Workable policy will come from
  negotiations among stakeholders
• This language tilts toward needs
  of employer
BYOD Policy



"Employees are informed that when they
create electronic records or work product in
the course of their work for the Company,
the records and work product belong to the
Company."
BYOD Policy Continued




"When an employee uses his or her own device,
such as a computer, a digital tablet or a
smartphone, to connect to Company information
resources, then the Company reserves the right
to take security measures relative to the device,
including but not limited to inspect the device and
. . ."
BYOD Continued




Employees are informed, and employees agree, as follows: If the
Company takes control or possession of a Device or Service, or
takes security measures relative to it, then:

(a) the Company might not return the Device or Service;

(b) the employee is entitled to no compensation for loss of use,
control or possession of the Device or Service;

(c) the Device or Service could be damaged, the employee could
lose data and the employee’s data could be disclosed to others.
The Company will not be liable or responsible for such damage,
loss or disclosure.
BYOD Policy Continued




"As a matter of honor and reputation -- but not as
a matter of legal liability or obligation – the
Company aspires to be forthcoming with
employees as a whole about the practical impact
of this Policy on employees over time."
Blogs:
                                 benjaminwright.us

This presentation is not legal advice for any particular situation. If you
need legal advice, you should consult the lawyer who advises your
organization.
Any person may reuse this material freely.
Enforcing your BYOD
                             Mobile Access Policies
                              with Oracle Access
                                 Management



Lee Howarth
Senior Principal Product Manager
Oracle
Mobile Access Roadmap


• Establish Mobile Access Policies
   – Monitor and Enforce usage
• Extend Enterprise Access to Mobile
  Devices
   – Integrates native mobile apps, mobile web with
     corporate systems & information
   – Access management, authorizations, API
     security, and fraud detection
   – Device context based fine-grained authorization
• Enable Mobile Device Security
  Elements
   – Support for native security
   – Device security – jailbreak detection at login
   – Device lifecycle – white-list/blacklist/lost device
     management
   – Device fingerprinting
Mobile device connection methods


• The native web
  browser on the
  device

• Native mobile device
  clients acting as a
  web browser



• Native mobile device
  clients connecting to
  gateways or
  applications



      Copyright © 2011, Oracle. All rights reserved
Extend Enterprise Access



    Mobile Requirements

• Mobile Security Platform
   – Authentication and SSO
   – Strong authentication, device
     fingerprinting and risk-based
     access
   – Mobile SDK
• Internet / Social
  Integration
• REST/Cloud interfaces
Mobile Authentication
Flexible options for devices, applications and users
Mobile Single Sign-on
Many applications, one sign-on, global logout
Mobile Security Architecture


     Mobile Device           Mobile Interfaces            IDM Infrastructure               Features

                                                                                   Device Fingerprinting &
                                                     Access Management             Tracking
                               Authorization
                                                                                   Device Registration
                                               API    OAM Service

Oracle   Native App                                                                Lost & Stolen Devices
SDK                                                                 OAAM Service

                                                                                   GPS/WIFI Location Awareness

                                                                                   Risk-based KBA & OTP
                               Authentication         OPSS Service
         Web App
                                                     Platform Security Services    Transactional risk analysis
                                               API   (OPSS)
                                                                                   White & Black Lists



                               User Profile          Directory Services            User Self Registration/Self
         Security     REST                                                         Service
         App                                   API    User Profile Services
                                                                                   White Pages applications
Context Aware Access Management
          Account Detail Request
                                                          Has he accessed between 00:00 –
                                                           03:00 in the last two months?

                           Behavioral Patterns
                                                 Has he used this device more than
                                                  20% in the last three months?



                                                     Does subject live in same
                                                      geography as requestor?



                                                 Does he usually perform
                                                  account lookups?



                                                     Valid Credentials given from
Get Account Information:                              outside network, but already
                                                      logged in from inside network.
John, Doe
Irvine, CA 92602                                     Which session is really who we
                                                      think it is?
Mobile Authorization & Data Redaction

                                     isAuthorized(user     = Bob Doe, Acme Corp
                                                  Device   = iOS 5.0, non-registered
                                                  Location = 37.53043790,-122.26648800
                                                  customerId = 99999
                                                  action      = getCustomerDetail)
HTTP / REST / SOAP / OAuth Clients




                                                                                      Customer Service



                                                                                       - getCustomerDetail
                                        Request
                                                                                       - updateCustomer




                                                                                       - deleteCustomer…




                                                     Oracle Enterprise     Response
                                                         Gateway
                                                                             { “CustomerDetailResponse“:
                                                                                  { “customerID”:   “99999”
                                                                                    “name”:         “Sally Smith”
                                                                                    “phone”:        “555-1234567”
                                                                                    “SSN”:          “***********“
                                                                                    “creditCardNo”: ”@^*%&@$#%!“
                                                     Oracle Entitlements            “purchaseHistory”: “…”
                                                           Server                 }
                                                                             }



                                                                                                                    36
Detailed Mobile Visibility



Realtime and historic device and user access attempts and risk scores




Device characteristics analysis, including OS and SDK versions
Oracle Mobile Access Technology


•   Oracle Enterprise Gateway
     – Enables Mobile Application REST API’s and protects API’s,
       webservices, and SOA infrastructure from external threats and
       invalid / suspicious requests
     – Extends Access Management with authentication, authorization,
       audit to REST API’s, web services
•   Oracle Access Management Suite+
     – Mobile Identity and Access
     – Authentication, Registration, and User Profile Services for
       Mobile
     – Last mile security for an organizations backend web services
       and SOA infrastructure
     – Device Fingerprinting and Registration Database
     – Risk-Based Authentication that Factors Mobile Context
     – Make Authorization Decisions and Redact Data based on User,
       Mobile, or any other Context
     – Externalize Authorization Policies from Application Code
                                                                  38
     © 2012 The SANS™ Institute - www.sans.org
Oracle Mobile Access Management
      Summary

 Bridges the gap between
  mobile devices and                       REST-ful
  enterprise IDM systems                  Interfaces

 Provides context-driven,     Device                    Device
                               Context                 Registration
  risk-aware access
  management
 Simplifies developer Location                               Single
                          Data           MANAGEMENT           Sign-on
  access to IDM
 Supports BYOD
 Provides visibility and
  control
Q&A
If we don’t answer your question
during the webcast, we will post a
follow up on:

http://blogs.oracle.com/oracleidm
Thank You!

Associated Paper:
http://www.sans.org/reading_room/
analysts_program/SANS-survey-
mobility.pdf

Mais conteúdo relacionado

Mais procurados

BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsModis
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices Troy C. Fulton
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013 Troy C. Fulton
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesHarsh Kishore Mishra
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanNetIQ
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramNetIQ
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)k33a
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iotCaston Thomas
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)Michael W. Chitwa
 
Applied mobile chaos theory
Applied mobile chaos theoryApplied mobile chaos theory
Applied mobile chaos theorySecureITExperts
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the CloudGaryArdito
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationTroy C. Fulton
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODCaston Thomas
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 

Mais procurados (20)

BYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And BenefitsBYOD (Bring Your Own Device) Risks And Benefits
BYOD (Bring Your Own Device) Risks And Benefits
 
BYOD
BYODBYOD
BYOD
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
BYOD risk management best practices
BYOD risk management best practices  BYOD risk management best practices
BYOD risk management best practices
 
Mobile Security in 2013
Mobile Security in 2013 Mobile Security in 2013
Mobile Security in 2013
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot7.5 steps to overlaying byod & iot
7.5 steps to overlaying byod & iot
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)
 
Applied mobile chaos theory
Applied mobile chaos theoryApplied mobile chaos theory
Applied mobile chaos theory
 
Security Management in the Cloud
Security Management in the CloudSecurity Management in the Cloud
Security Management in the Cloud
 
How to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry MigrationHow to Manage the Great BlackBerry Migration
How to Manage the Great BlackBerry Migration
 
How I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYODHow I learned to stop worrying & love the BYOD
How I learned to stop worrying & love the BYOD
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
Feroot Smart Technology Privacy Summit: Privacy, Facial Recognition & Intelli...
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 

Destaque

Fast Detection of New Malicious Domains using DNS
Fast Detection of New Malicious Domains using DNSFast Detection of New Malicious Domains using DNS
Fast Detection of New Malicious Domains using DNSOpenDNS
 
Avalanche Disclosure
Avalanche DisclosureAvalanche Disclosure
Avalanche DisclosureHackApp
 
オリエンテーション
オリエンテーションオリエンテーション
オリエンテーションMasaru Kimura
 
Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014
Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014
Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014Tanya Madjarova
 
Wayne Dunn presents to World Bank Development Marketplace on the South Africa...
Wayne Dunn presents to World Bank Development Marketplace on the South Africa...Wayne Dunn presents to World Bank Development Marketplace on the South Africa...
Wayne Dunn presents to World Bank Development Marketplace on the South Africa...Wayne Dunn
 
Dealing with growing social demands in the mining industry
Dealing with growing social demands in the mining industryDealing with growing social demands in the mining industry
Dealing with growing social demands in the mining industryWayne Dunn
 
Desejo sexual com mais de 45 anos
Desejo sexual com mais de 45 anosDesejo sexual com mais de 45 anos
Desejo sexual com mais de 45 anosJosé Roberto Sousa
 
Nilesh Deshmukh-Testing,Oracle,C,Java,Unix
Nilesh Deshmukh-Testing,Oracle,C,Java,UnixNilesh Deshmukh-Testing,Oracle,C,Java,Unix
Nilesh Deshmukh-Testing,Oracle,C,Java,UnixNilesh Deshmukh
 
19286 eae b39a-4e42-beeae9d8b3f22fc7
19286 eae b39a-4e42-beeae9d8b3f22fc719286 eae b39a-4e42-beeae9d8b3f22fc7
19286 eae b39a-4e42-beeae9d8b3f22fc7Carlos Carvalho
 
Multimedia05
Multimedia05Multimedia05
Multimedia05Les Davy
 
Elements, Compounds & Mixtures Day 3
Elements, Compounds & Mixtures Day 3Elements, Compounds & Mixtures Day 3
Elements, Compounds & Mixtures Day 3jmori1
 
Web担当者forumミーティング2011 autumn参加レポート
Web担当者forumミーティング2011 autumn参加レポートWeb担当者forumミーティング2011 autumn参加レポート
Web担当者forumミーティング2011 autumn参加レポートMasaru Kimura
 
Мой город - Кострома, №15
Мой город - Кострома, №15Мой город - Кострома, №15
Мой город - Кострома, №15Мой город
 

Destaque (19)

Fast Detection of New Malicious Domains using DNS
Fast Detection of New Malicious Domains using DNSFast Detection of New Malicious Domains using DNS
Fast Detection of New Malicious Domains using DNS
 
Avalanche Disclosure
Avalanche DisclosureAvalanche Disclosure
Avalanche Disclosure
 
Assets models seminar
Assets models seminarAssets models seminar
Assets models seminar
 
Informator oswiatowy
Informator oswiatowyInformator oswiatowy
Informator oswiatowy
 
オリエンテーション
オリエンテーションオリエンテーション
オリエンテーション
 
Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014
Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014
Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014
 
Wayne Dunn presents to World Bank Development Marketplace on the South Africa...
Wayne Dunn presents to World Bank Development Marketplace on the South Africa...Wayne Dunn presents to World Bank Development Marketplace on the South Africa...
Wayne Dunn presents to World Bank Development Marketplace on the South Africa...
 
Dealing with growing social demands in the mining industry
Dealing with growing social demands in the mining industryDealing with growing social demands in the mining industry
Dealing with growing social demands in the mining industry
 
PNY Power Bank Series for Smart Devices
PNY Power Bank Series for Smart DevicesPNY Power Bank Series for Smart Devices
PNY Power Bank Series for Smart Devices
 
Desejo sexual com mais de 45 anos
Desejo sexual com mais de 45 anosDesejo sexual com mais de 45 anos
Desejo sexual com mais de 45 anos
 
Nilesh Deshmukh-Testing,Oracle,C,Java,Unix
Nilesh Deshmukh-Testing,Oracle,C,Java,UnixNilesh Deshmukh-Testing,Oracle,C,Java,Unix
Nilesh Deshmukh-Testing,Oracle,C,Java,Unix
 
19286 eae b39a-4e42-beeae9d8b3f22fc7
19286 eae b39a-4e42-beeae9d8b3f22fc719286 eae b39a-4e42-beeae9d8b3f22fc7
19286 eae b39a-4e42-beeae9d8b3f22fc7
 
Multimedia05
Multimedia05Multimedia05
Multimedia05
 
Elements, Compounds & Mixtures Day 3
Elements, Compounds & Mixtures Day 3Elements, Compounds & Mixtures Day 3
Elements, Compounds & Mixtures Day 3
 
Petaluma Wetlands
Petaluma WetlandsPetaluma Wetlands
Petaluma Wetlands
 
Business Analyst Training
Business Analyst TrainingBusiness Analyst Training
Business Analyst Training
 
Web担当者forumミーティング2011 autumn参加レポート
Web担当者forumミーティング2011 autumn参加レポートWeb担当者forumミーティング2011 autumn参加レポート
Web担当者forumミーティング2011 autumn参加レポート
 
Мой город - Кострома, №15
Мой город - Кострома, №15Мой город - Кострома, №15
Мой город - Кострома, №15
 
Aef4 06
Aef4 06Aef4 06
Aef4 06
 

Semelhante a Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy

IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DeviceWaterstons Ltd
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifySumana Mehta
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom BainEC-Council
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020tmbainjr131
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsDenim Group
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...CA API Management
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Huntsman Security
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAvinash Birnale
 

Semelhante a Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy (20)

Mobile Security
Mobile Security Mobile Security
Mobile Security
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Preparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own DevicePreparing for Mobile Device Management & Bring your Own Device
Preparing for Mobile Device Management & Bring your Own Device
 
Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Android Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon IndiaAndroid Camp 2011 @ Silicon India
Android Camp 2011 @ Silicon India
 

Mais de OracleIDM

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 

Mais de OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy

  • 1. Developing and Enforcing a Bring-Your- Own-Device (BYOD) Policy SANS Analysts: Tony DeLaGrange, Senior Security Consultant Secure Ideas Lee Howarth, Senior Product Manager Ben Wright, SANS Instructor, Attorney, Oracle Corporation Technology Law Expert/Author © 2012 The SANS™ Institute - www.sans.org
  • 2. Tony DeLaGrange • Security Consultant at Secure Ideas • Over 25 Years IT Experience – 15 Years in financial services – Over decade in IT Security • Co-author of SEC571 – Mobile Device Security • Open Source Project Lead – MobiSec & SH5ARK • Co-chair of SANS first Mobile Device Security Summit © 2012 The SANS™ Institute - www.sans.org 2
  • 3. Topics Today • Mobility Security Survey • Mobile Security Policies • Top 3 Security Practices • Conclusions 3 © 2012 The SANS™ Institute - www.sans.org
  • 4. Mobility Survey • Full results here: www.sans.org/reading_room/anal ysts_program • Focused on policies and controls • Survey ran in the 3rd quarter of 2012 • More than 650 people responded – From a wide range of organizations 4 © 2012 The SANS™ Institute - www.sans.org
  • 5. Criticality of Mobile Policies • It starts with the policies – 97% believe it's important • Yet so many don't have mobile policies – Improvement from last year (58%) 5 © 2012 The SANS™ Institute - www.sans.org
  • 6. Ends of the Spectrum • Most stringent – 24% do not permit personal devices to access company resources • Most lenient – Besides no policy at all  – 14% let employees secure their own mobile devices • Somewhere in between – 21% manage employees' devices – 27% use mobile sync with minimal device management controls 6 © 2012 The SANS™ Institute - www.sans.org
  • 7. Top 3 Mobile Security Practices • Authentication to corporate resources • Access to corporate information • Protect corporate data on devices 7 © 2012 The SANS™ Institute - www.sans.org
  • 8. Authenticating Mobile Users 8 © 2012 The SANS™ Institute - www.sans.org
  • 9. Controlling Access to Resources 9 © 2012 The SANS™ Institute - www.sans.org
  • 10. Challenges • How should companies implement authentication and access controls? – User credentials? – Location? – Device type? – Applications? • Where should organizations "touch" employee devices? – Device? – Applications? 10 © 2012 The SANS™ Institute - www.sans.org
  • 11. Protecting Corporate Data 11 © 2012 The SANS™ Institute - www.sans.org
  • 12. Challenges • How should employers ensure protection of data on lost/stolen devices? – Wipe sensitive data? – Wipe entire device? – Locate the device? – Lock/Disable the device? • How should fraud controls be implemented? 12 © 2012 The SANS™ Institute - www.sans.org
  • 13. Conclusions • Policies are important – 37% still don't have them – Many are developing policies after building their controls • Companies are most interested in – Authentication – Access to resources – Data protection • Challenges with BYOD – Finding a balance in controls – While not upsetting employees too much  13 © 2012 The SANS™ Institute - www.sans.org
  • 14. Tony DeLaGrange tony@secureideas.com 904-639-6709 Q@SANS.org © 2012 The SANS™ Institute - www.sans.org
  • 15. Bring Your Own Device (BYOD) Policy Benjamin Wright Attorney & SANS Institute Instructor benjaminwright.us This is education, not legal advice.
  • 16. Bring Your Own Device (BYOD) • Rules for employees using own laptop, tablet, smartphone, webmail services for business • Controversial topic; no perfect policy exists • See discussions: http://goo.gl/txlCU, http://goo.gl/7bEAQ, http://goo.gl/QX6Uz, http://goo.gl/edSFF
  • 17. Subpoena for Employee’s Home Hard Drive • Local government employment dispute • Plaintiff able to subpoena hard drive of manager’s home computer • Wood v. Town of Warsaw, N.C., No. 7:10-CV-00219-D, 2011 WL 6748797 (E.D.N.C. Dec. 22, 2011)
  • 18. Employer Liability for Security • Massachusetts 201 CMR 17.00: PII on mobile devices must be encrypted • Cal SB 1386 - many breach notices because of stolen, unencrypted laptops (e.g. Guin v. Brazos Higher Education)
  • 19. $1.5 Million Fine + Costly Security Upgrades • Unencrypted patient data • stolen laptop • Massachusetts Eye and Ear Infirmary (hospital) • HIPAA penalties imposed by Dept. Health and Human Service • http://goo.gl/acnRE 19 © 2012 The SANS™ Institute - www.sans.org
  • 20. Employer Incentives • Device and service monitoring • Data wiping (selective or whole device) • Encryption • Confiscation if monitoring identifies device or service as a risk or threat
  • 21. Policy/Agreement Challenges • Warning employees • Getting employee consent • Employee privacy • Liability for damage to employee data, device or service
  • 22. BYOD Policy – Sample Language • http://goo.gl/19idt • Workable policy will come from negotiations among stakeholders • This language tilts toward needs of employer
  • 23. BYOD Policy "Employees are informed that when they create electronic records or work product in the course of their work for the Company, the records and work product belong to the Company."
  • 24. BYOD Policy Continued "When an employee uses his or her own device, such as a computer, a digital tablet or a smartphone, to connect to Company information resources, then the Company reserves the right to take security measures relative to the device, including but not limited to inspect the device and . . ."
  • 25. BYOD Continued Employees are informed, and employees agree, as follows: If the Company takes control or possession of a Device or Service, or takes security measures relative to it, then: (a) the Company might not return the Device or Service; (b) the employee is entitled to no compensation for loss of use, control or possession of the Device or Service; (c) the Device or Service could be damaged, the employee could lose data and the employee’s data could be disclosed to others. The Company will not be liable or responsible for such damage, loss or disclosure.
  • 26. BYOD Policy Continued "As a matter of honor and reputation -- but not as a matter of legal liability or obligation – the Company aspires to be forthcoming with employees as a whole about the practical impact of this Policy on employees over time."
  • 27. Blogs: benjaminwright.us This presentation is not legal advice for any particular situation. If you need legal advice, you should consult the lawyer who advises your organization. Any person may reuse this material freely.
  • 28. Enforcing your BYOD Mobile Access Policies with Oracle Access Management Lee Howarth Senior Principal Product Manager Oracle
  • 29. Mobile Access Roadmap • Establish Mobile Access Policies – Monitor and Enforce usage • Extend Enterprise Access to Mobile Devices – Integrates native mobile apps, mobile web with corporate systems & information – Access management, authorizations, API security, and fraud detection – Device context based fine-grained authorization • Enable Mobile Device Security Elements – Support for native security – Device security – jailbreak detection at login – Device lifecycle – white-list/blacklist/lost device management – Device fingerprinting
  • 30. Mobile device connection methods • The native web browser on the device • Native mobile device clients acting as a web browser • Native mobile device clients connecting to gateways or applications Copyright © 2011, Oracle. All rights reserved
  • 31. Extend Enterprise Access Mobile Requirements • Mobile Security Platform – Authentication and SSO – Strong authentication, device fingerprinting and risk-based access – Mobile SDK • Internet / Social Integration • REST/Cloud interfaces
  • 32. Mobile Authentication Flexible options for devices, applications and users
  • 33. Mobile Single Sign-on Many applications, one sign-on, global logout
  • 34. Mobile Security Architecture Mobile Device Mobile Interfaces IDM Infrastructure Features Device Fingerprinting & Access Management Tracking Authorization Device Registration API OAM Service Oracle Native App Lost & Stolen Devices SDK OAAM Service GPS/WIFI Location Awareness Risk-based KBA & OTP Authentication OPSS Service Web App Platform Security Services Transactional risk analysis API (OPSS) White & Black Lists User Profile Directory Services User Self Registration/Self Security REST Service App API User Profile Services White Pages applications
  • 35. Context Aware Access Management Account Detail Request Has he accessed between 00:00 – 03:00 in the last two months? Behavioral Patterns Has he used this device more than 20% in the last three months? Does subject live in same geography as requestor? Does he usually perform account lookups? Valid Credentials given from Get Account Information: outside network, but already logged in from inside network. John, Doe Irvine, CA 92602 Which session is really who we think it is?
  • 36. Mobile Authorization & Data Redaction isAuthorized(user = Bob Doe, Acme Corp Device = iOS 5.0, non-registered Location = 37.53043790,-122.26648800 customerId = 99999 action = getCustomerDetail) HTTP / REST / SOAP / OAuth Clients Customer Service - getCustomerDetail Request - updateCustomer - deleteCustomer… Oracle Enterprise Response Gateway { “CustomerDetailResponse“: { “customerID”: “99999” “name”: “Sally Smith” “phone”: “555-1234567” “SSN”: “***********“ “creditCardNo”: ”@^*%&@$#%!“ Oracle Entitlements “purchaseHistory”: “…” Server } } 36
  • 37. Detailed Mobile Visibility Realtime and historic device and user access attempts and risk scores Device characteristics analysis, including OS and SDK versions
  • 38. Oracle Mobile Access Technology • Oracle Enterprise Gateway – Enables Mobile Application REST API’s and protects API’s, webservices, and SOA infrastructure from external threats and invalid / suspicious requests – Extends Access Management with authentication, authorization, audit to REST API’s, web services • Oracle Access Management Suite+ – Mobile Identity and Access – Authentication, Registration, and User Profile Services for Mobile – Last mile security for an organizations backend web services and SOA infrastructure – Device Fingerprinting and Registration Database – Risk-Based Authentication that Factors Mobile Context – Make Authorization Decisions and Redact Data based on User, Mobile, or any other Context – Externalize Authorization Policies from Application Code 38 © 2012 The SANS™ Institute - www.sans.org
  • 39. Oracle Mobile Access Management Summary  Bridges the gap between mobile devices and REST-ful enterprise IDM systems Interfaces  Provides context-driven, Device Device Context Registration risk-aware access management  Simplifies developer Location Single Data MANAGEMENT Sign-on access to IDM  Supports BYOD  Provides visibility and control
  • 40. Q&A If we don’t answer your question during the webcast, we will post a follow up on: http://blogs.oracle.com/oracleidm

Notas do Editor

  1. Companies managing employee devices cut in half, down from 40% to 21%.
  2. If you were to authenticate users through location, device, and applications being requested, where does the organization need to touch the device?
  3. How do organizations apply common fraud controls against these new devices without angering the employees who own their devices •    And what if the employer needs to locate devices, or wipe sensitive access and data off devices that are infected, lost or stolen?
  4. Internet/Social Integration – Desktop Browser or Mobile – easy add on to existing OAM
  5. LocalUsername and Password-or-Social Logon(can be user choice)Step up Auth and OTP, can be applied:-first time with this device (device registration)-sensitive application-high risk score-user with high level of access to application
  6. Single Sign on between native applications, and also with mobile browser based applications
  7. Mobile Security – web and mobile appDevice registration and fingerprintLost & stolen device securityGPS/WIFI based location awareness
  8. Once secure access is setup, you can enforce mobile access policy
  9. Risk analysis to determine whether to allow, flag, challenge or blockEnforce unjailbroken status, check VPN statusDetailed reporting on device attributes like OS version, GPS/WIFI geolocation, MAC/IP address