1 / 16

Data Security in a Mobile World

Data Security in a Mobile World. Emmitt Wells – Getronics. Hitting Close to Home.

zanna
Download Presentation

Data Security in a Mobile World

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Security in a Mobile World Emmitt Wells – Getronics

  2. Hitting Close to Home If you think mobile security isn’t a real subject, just consider the possibility that there is someone out there right now with your name, email, phone number, and birth date and more stored on a digital device that was just left in a taxi cab – not a comforting thought.

  3. View of Endpoint Security… http://www.jacobsen.no/anders/blog/archives/images/project.jpg

  4. Compliance Demands are Mounting • All Sectors • SOX, Combined Code, Companies Bill, IAS • Privacy, Data Protection, Human Rights • Finance Sector • Basel II, FSA, SEC Act 17a-3/4, NASD Rules 3010/3110 • Retail Sector • Payment Card Industry (PCI) Security Standard • Health Sector • HIPAA • Interception legislation • RIPA, European Data Retention Directive • Local legislation with Global consequences • Californian Law SB 1386

  5. Securing Data in Motion

  6. Ensuring Data Integrity

  7. Data Theft

  8. Measure Manage Educate Establish Policy

  9. Technology Available • Endpoint Products • Anti-virus, anti-spam, Message Cleaning, HIDS for the desktop • Controlling Access • Identity Management and Authentication • External Protection • Firewalls and NIDS • Data Protection • Policy Enforcement Tools • Backup and Retrieval • Secure Archival • Stolen Equipment • Data low-jack

  10. What if I do nothing? • “Gartner estimates cleanup costs for any data loss to be $90 per customer record when you calculate notification, legal expenses, and the damage done to a corporate brand." = = +

  11. Discuss Business Impact Discuss Technology How do I convince my executives of the need?

  12. Balanced Security

  13. Requirements for Mobile Endpoint Security • Policy • Define rules, promote best practices and minimize risks • Technology • Enforce policies, detect violations of policy, and deliver evidence of compliance with corporate policy and regulatory requirements • Education • Equip employees to recognize potential sources of risk and to safeguard information and transactions in hostile environments • Management • Setup reactive and proactive management to help measure how your endpoints are performing against the policy you have established

  14. Keep it Simple "Aye sir, the more they over-tech the plumbing, the easier it is to stop up the drain." – Mr. Scot, Star Trek III: The Search For Spock

  15. Thank you

More Related