Securing Mobile:
A Business-Centric
Approach
Omar Khawaja
February 2013
Mobility this week…
@smallersecurity
Borderless networks
RCS, Joyn
SIP, IP
MDM
Monetization
Means vs. End
Mobile
is no longer
optional
@smallersecurity
1980 19901970 20102000
Difference?
Have a closer look:
its really not that
different.
@smallersecurity
Top Business
Technology
Trends Video
Social Enterprise
Big Data
Enterprise
Clouds
High-IQ Networks
M2M2P
Compliance
Energy Efficiency
Consumerization
of IT
Personalization
of Service
@smallersecurity
What’s
the common
theme across top
technology trends?
@smallersecurity
Video
Big Data
Enterprise Clouds
High-IQ Networks
M2M2P
Compliance
Social Enterprise Energy Efficiency
Consumerization of IT
Personalization of
Service
DATA
@smallersecurity
Mobility
and Cloud
fuel each
of these trends.
@smallersecurity
Security is about Risk
ThreatsVulnerabilitiesAssets‘Risk’
@smallersecurity
How do we
secure
mobile
today?
@smallersecurity
10
Programs and Technologies
@smallersecurity
11
Programs and Technologies
Risk Assessment Security Policy Organization of Info Security
Asset Management Human Resources Management Physical & Environment Security
Communication & Ops Mgmt Access Control
Info Systems Acquisition, Dev, &
Maintenance
Info Security Incident
Management
Business Continuity
Management
Compliance
@smallersecurity
12
Programs and Technologies
App Security Anti-X Configuration Management
DLP Encryption IAM, NAC
Patching Policy Management Threat Management
VPN Vulnerability Management …
@smallersecurity
13
Multiple Approaches
@smallersecurity
MultipleSingle
Security Technology Sets
Single
Multiple
Security
Programs
App
Security
Anti-X
Config
Mgmt
DLP Encryption IAM, NAC
Patching
Policy
Mgmt
Threat
Mgmt
VPN
Vuln.
Mgmt
…
App
Security
Anti-X
Config
Mgmt
DLP Encryption IAM, NAC
Patching
Policy
Mgmt
Threat
Mgmt
VPN
Vuln.
Mgmt
…
App
Security
Anti-X
Config
Mgmt
DLP Encryption IAM, NAC
Patching
Policy
Mgmt
Threat
Mgmt
VPN
Vuln.
Mgmt
…
Risk
Assessment
Security
Policy
Organization
of Info
Security
Asset
Management
Human
Resources
Management
Physical&
Environment
Security
Comms&
OpsMgmt
Access
Control
Info Systems
Acquisition,
Dev, & Maint.
Info Security
Incident
Management
Business
Continuity
Management
Compliance
Risk
Assessment
Security
Policy
Organization
of Info
Security
Asset
Management
Human
Resources
Management
Physical&
Environment
Security
Comms&
OpsMgmt
Access
Control
Info Systems
Acquisition,
Dev, & Maint.
Info Security
Incident
Management
Business
Continuity
Management
Compliance
Risk
Assessment
Security
Policy
Organization
of Info
Security
Asset
Management
Human
Resources
Management
Physical&
Environment
Security
Comms&
OpsMgmt
Access
Control
Info Systems
Acquisition,
Dev, & Maint.
Info Security
Incident
Management
Business
Continuity
Management
Compliance
App
Security
Anti-X
Config
Mgmt
DLP Encryption IAM, NAC
Patching
Policy
Mgmt
Threat
Mgmt
VPN
Vuln.
Mgmt
…
Risk
Assessment
Security
Policy
Organization
of Info
Security
Asset
Management
Human
Resources
Management
Physical&
Environment
Security
Comms&
OpsMgmt
Access
Control
Info Systems
Acquisition,
Dev, & Maint.
Info Security
Incident
Management
Business
Continuity
Management
Compliance
Risk
Assessment
Security
Policy
Organization
of Info
Security
Asset
Management
Human
Resources
Management
Physical&
Environment
Security
Comms&
OpsMgmt
Access
Control
Info Systems
Acquisition,
Dev, & Maint.
Info Security
Incident
Management
Business
Continuity
Management
Compliance
Risk
Assessment
Security
Policy
Organization
of Info
Security
Asset
Management
Human
Resources
Management
Physical&
Environment
Security
Comms&
OpsMgmt
Access
Control
Info Systems
Acquisition,
Dev, & Maint.
Info Security
Incident
Management
Business
Continuity
Management
Compliance
App
Security
Anti-X
Config
Mgmt
DLP Encryption IAM, NAC
Patching
Policy
Mgmt
Threat
Mgmt
VPN
Vuln.
Mgmt
…
Risk
Assessment
Security
Policy
Organization
of Info
Security
Asset
Management
Human
Resources
Management
Physical&
Environment
Security
Comms&
OpsMgmt
Access
Control
Info Systems
Acquisition,
Dev, & Maint.
Info Security
Incident
Management
Business
Continuity
Management
Compliance
App
Security
Anti-X
Config
Mgmt
DLP Encryption IAM, NAC
Patching
Policy
Mgmt
Threat
Mgmt
VPN
Vuln.
Mgmt
…
App
Security
Anti-X
Config
Mgmt
DLP Encryption IAM, NAC
Patching
Policy
Mgmt
Threat
Mgmt
VPN
Vuln.
Mgmt
…
App
Security
Anti-X
Config
Mgmt
DLP Encryption IAM, NAC
Patching
Policy
Mgmt
Threat
Mgmt
VPN
Vuln.
Mgmt
…
Risk
Assessment
Security
Policy
Organization
of Info
Security
Asset
Management
Human
Resources
Management
Physical&
Environment
Security
Comms&
OpsMgmt
Access
Control
Info Systems
Acquisition,
Dev, & Maint.
Info Security
Incident
Management
Business
Continuity
Management
Compliance
Multiple Approaches
Worst Case
Nirvana Good
Really?
@smallersecurity
Here’s an approach…
@smallersecurity
Data-Centric
Approach
(Follow the data)
Inventory (must)
Classify (must)
Destroy* (ideal)
Protect
Monitor
@smallersecurity
Data-Centric Security Model
Data-centric
security is
business-centric
security
@smallersecurity
To protect the
data, protect
what’s around it
too
Data-Centric Security Model
@smallersecurity
GRC and
Intelligence
define security
program
Data-Centric Security Model
@smallersecurity
Start with
assets,
end with the
controls
Data-Centric Security Model
@smallersecurity
How do we execute?
@smallersecurity
Data-Centric
Security:
A Recipe
Implement Control Requirements
Monitor Control Effectiveness
Entitlement Definition
Mobile Environment Definition
Inventory Users
Define Business Processes
Destroy Data
Inventory Data
Categorize Data
@smallersecurity
What about Apps?
@smallersecurity
What about Apps?
Can’t impede app
proliferation, but
how do you know
which to trust?
30 billion app downloads
from Apple's App Store
Apps have overtaken
browsing
@smallersecurity
What about the Network?
(It’s not just for transport)
@smallersecurity
Key security imperatives:
1) Data Governance
2) Application Governance
@smallersecurity
Doing things right
↓
Doing the right things
Business
Context
Follow the data
Network can
help
Simplify security
program
Apps matter
@smallersecurity
Question
and
Answers
@smallersecurity
Thank You
omar.khawaja@
verizon.com
This document and any attached materials are the sole
property of Verizon and are not to be used by you other than
to evaluate Verizon’s service.
This document and any attached materials are not to be
disseminated, distributed, or otherwise conveyed throughout
your organization to employees without a need for this
information or to any third parties without the express written
permission of Verizon.
© 2011 Verizon. All Rights Reserved. The Verizon and
Verizon Business names and logos and all other names,
logos,
and slogans identifying Verizon’s products and services are
trademarks and service marks or registered trademarks and
service marks of Verizon Trademark Services LLC or its
affiliates in the United States and/or other countries. All
other trademarks and service marks are the property of their
respective owners.
PROPRIETAR
Y
STATEMENT
@smallersecurity
Security Leadership
Why Verizon?
Industry Recognition
 Largest & highly rated MSSP (Frost & Sullivan, Gartner, Forrester)
 Founding and Executive Member of Open Identity Exchange
 Security Consulting practice recognized as a Strong Performer (Forrester)
 ICSA Labs is the industry standard for certifying security products (started in 1991)
Credentials
 More PCI auditors (140+ QSAs) than any other firm in the world
 HITRUST Qualified CSF Assessor
 Actively participate in 30+ standards / certification bodies, professional
organizations and vertical specific consortia
 Personnel hold 40+ unique industry, technology and vendor certifications
Global Reach
 550+ dedicated security consultants in 28 countries speak 28 languages
 Investigated breaches in 36 countries in 2011
 7 SOCs on 4 continents manage security devices in 45+ countries
 Serve 77% of Forbes Global 2000
Experience
 Verizon’s SMP is the oldest security certification program in the industry
 Analyzed 2000+ breaches involving 1+ Billion records
 Manage identities in 50+ countries and for 25+ national governments
 Delivered 2000+ security consulting engagements in 2011
ISO 9001
ISO 17025

More Related Content

PDF
Security - A Digital Transformation Enabler
PDF
Digital Transformation and Security for the Modern Business Part 1 – Finance
PDF
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
PDF
Total Digital Security Introduction 4.2
PPTX
Two Peas in a Pod: Cloud Security and Mobile Security
PPT
Oasys Stonesoft Aligned with ITIL
PPTX
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
 
PPTX
A Smarter, More Secure Internet of Things
Security - A Digital Transformation Enabler
Digital Transformation and Security for the Modern Business Part 1 – Finance
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Total Digital Security Introduction 4.2
Two Peas in a Pod: Cloud Security and Mobile Security
Oasys Stonesoft Aligned with ITIL
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
 
A Smarter, More Secure Internet of Things

What's hot (20)

PPTX
From reactive to automated reducing costs through mature security processes i...
PPTX
Cyber security
PDF
Kista watson summit final public version
PDF
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
PPTX
MCGlobalTech Consulting Service Presentation
PPTX
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
PDF
Aujas Cyber Security
PPTX
Threat Intelligence Market
PDF
Why Executives Underinvest In Cybersecurity
PDF
5 Steps to Securing Your Company's Crown Jewels
PPTX
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
PPTX
What affects security program confidence? - may2014 - bill burns
PDF
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
PDF
"Thinking diffrent" about your information security strategy
PDF
Cloud Identity
PDF
Implementing a Security Management Framework
PPTX
Are You Ready to Move Your IAM to the Cloud?
PPTX
DSS and Security Intelligence @IBM_Connect_2014_April
PDF
The State of Cyber
PPTX
Security Trend Report, 2017
From reactive to automated reducing costs through mature security processes i...
Cyber security
Kista watson summit final public version
Network Access Control Market Trends, Technological Analysis and Forecast Rep...
MCGlobalTech Consulting Service Presentation
Protecting the "Crown Jewels" by Henrik Bodskov, IBM
Aujas Cyber Security
Threat Intelligence Market
Why Executives Underinvest In Cybersecurity
5 Steps to Securing Your Company's Crown Jewels
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
What affects security program confidence? - may2014 - bill burns
PAS: Leveraging IT/OT - Convergence and Developing Effective OT Cybersecurity
"Thinking diffrent" about your information security strategy
Cloud Identity
Implementing a Security Management Framework
Are You Ready to Move Your IAM to the Cloud?
DSS and Security Intelligence @IBM_Connect_2014_April
The State of Cyber
Security Trend Report, 2017
Ad

Similar to Mobility Security - A Business-Centric Approach (20)

PDF
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
PPTX
Cloud Security: A Business-Centric Approach in 12 Steps
PDF
Mobile Security
PDF
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
PPTX
Outside the Office: Mobile Security
PDF
Mobile Security: 5 Steps to Mobile Risk Management
PDF
Security in the App Economy: How to Ride the Wave Without Wiping Out!
PDF
Manage risk by protecting apps, data and usage
PDF
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
PDF
Why You'll Care More About Mobile Security in 2020
PPTX
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
PDF
A Business-Driven Approach to Mobile Enterprise Security
PPTX
The Mobile Aware CISO: Security as a Business Enabler
PPTX
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
PDF
Andrew Jaquith SOURCE Boston 2011
PPTX
Securing Mobile - A Business Centric Approach
PDF
5 Steps to Mobile Risk Management
PDF
Reference Security Architecture for Mobility- Insurance
PDF
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
PPTX
כנס אבטחת מידע מוטו תקשורת V2
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Cloud Security: A Business-Centric Approach in 12 Steps
Mobile Security
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Outside the Office: Mobile Security
Mobile Security: 5 Steps to Mobile Risk Management
Security in the App Economy: How to Ride the Wave Without Wiping Out!
Manage risk by protecting apps, data and usage
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You'll Care More About Mobile Security in 2020
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
A Business-Driven Approach to Mobile Enterprise Security
The Mobile Aware CISO: Security as a Business Enabler
Mojave Networks Webinar: A Three-Pronged Approach to Mobile Security
Andrew Jaquith SOURCE Boston 2011
Securing Mobile - A Business Centric Approach
5 Steps to Mobile Risk Management
Reference Security Architecture for Mobility- Insurance
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
כנס אבטחת מידע מוטו תקשורת V2
Ad

Mobility Security - A Business-Centric Approach

  • 2. Mobility this week… @smallersecurity Borderless networks RCS, Joyn SIP, IP MDM Monetization Means vs. End
  • 4. 1980 19901970 20102000 Difference? Have a closer look: its really not that different. @smallersecurity
  • 5. Top Business Technology Trends Video Social Enterprise Big Data Enterprise Clouds High-IQ Networks M2M2P Compliance Energy Efficiency Consumerization of IT Personalization of Service @smallersecurity
  • 6. What’s the common theme across top technology trends? @smallersecurity
  • 7. Video Big Data Enterprise Clouds High-IQ Networks M2M2P Compliance Social Enterprise Energy Efficiency Consumerization of IT Personalization of Service DATA @smallersecurity
  • 8. Mobility and Cloud fuel each of these trends. @smallersecurity
  • 9. Security is about Risk ThreatsVulnerabilitiesAssets‘Risk’ @smallersecurity
  • 12. 11 Programs and Technologies Risk Assessment Security Policy Organization of Info Security Asset Management Human Resources Management Physical & Environment Security Communication & Ops Mgmt Access Control Info Systems Acquisition, Dev, & Maintenance Info Security Incident Management Business Continuity Management Compliance @smallersecurity
  • 13. 12 Programs and Technologies App Security Anti-X Configuration Management DLP Encryption IAM, NAC Patching Policy Management Threat Management VPN Vulnerability Management … @smallersecurity
  • 15. MultipleSingle Security Technology Sets Single Multiple Security Programs App Security Anti-X Config Mgmt DLP Encryption IAM, NAC Patching Policy Mgmt Threat Mgmt VPN Vuln. Mgmt … App Security Anti-X Config Mgmt DLP Encryption IAM, NAC Patching Policy Mgmt Threat Mgmt VPN Vuln. Mgmt … App Security Anti-X Config Mgmt DLP Encryption IAM, NAC Patching Policy Mgmt Threat Mgmt VPN Vuln. Mgmt … Risk Assessment Security Policy Organization of Info Security Asset Management Human Resources Management Physical& Environment Security Comms& OpsMgmt Access Control Info Systems Acquisition, Dev, & Maint. Info Security Incident Management Business Continuity Management Compliance Risk Assessment Security Policy Organization of Info Security Asset Management Human Resources Management Physical& Environment Security Comms& OpsMgmt Access Control Info Systems Acquisition, Dev, & Maint. Info Security Incident Management Business Continuity Management Compliance Risk Assessment Security Policy Organization of Info Security Asset Management Human Resources Management Physical& Environment Security Comms& OpsMgmt Access Control Info Systems Acquisition, Dev, & Maint. Info Security Incident Management Business Continuity Management Compliance App Security Anti-X Config Mgmt DLP Encryption IAM, NAC Patching Policy Mgmt Threat Mgmt VPN Vuln. Mgmt … Risk Assessment Security Policy Organization of Info Security Asset Management Human Resources Management Physical& Environment Security Comms& OpsMgmt Access Control Info Systems Acquisition, Dev, & Maint. Info Security Incident Management Business Continuity Management Compliance Risk Assessment Security Policy Organization of Info Security Asset Management Human Resources Management Physical& Environment Security Comms& OpsMgmt Access Control Info Systems Acquisition, Dev, & Maint. Info Security Incident Management Business Continuity Management Compliance Risk Assessment Security Policy Organization of Info Security Asset Management Human Resources Management Physical& Environment Security Comms& OpsMgmt Access Control Info Systems Acquisition, Dev, & Maint. Info Security Incident Management Business Continuity Management Compliance App Security Anti-X Config Mgmt DLP Encryption IAM, NAC Patching Policy Mgmt Threat Mgmt VPN Vuln. Mgmt … Risk Assessment Security Policy Organization of Info Security Asset Management Human Resources Management Physical& Environment Security Comms& OpsMgmt Access Control Info Systems Acquisition, Dev, & Maint. Info Security Incident Management Business Continuity Management Compliance App Security Anti-X Config Mgmt DLP Encryption IAM, NAC Patching Policy Mgmt Threat Mgmt VPN Vuln. Mgmt … App Security Anti-X Config Mgmt DLP Encryption IAM, NAC Patching Policy Mgmt Threat Mgmt VPN Vuln. Mgmt … App Security Anti-X Config Mgmt DLP Encryption IAM, NAC Patching Policy Mgmt Threat Mgmt VPN Vuln. Mgmt … Risk Assessment Security Policy Organization of Info Security Asset Management Human Resources Management Physical& Environment Security Comms& OpsMgmt Access Control Info Systems Acquisition, Dev, & Maint. Info Security Incident Management Business Continuity Management Compliance Multiple Approaches Worst Case Nirvana Good Really? @smallersecurity
  • 17. Data-Centric Approach (Follow the data) Inventory (must) Classify (must) Destroy* (ideal) Protect Monitor @smallersecurity
  • 18. Data-Centric Security Model Data-centric security is business-centric security @smallersecurity
  • 19. To protect the data, protect what’s around it too Data-Centric Security Model @smallersecurity
  • 21. Start with assets, end with the controls Data-Centric Security Model @smallersecurity
  • 22. How do we execute? @smallersecurity
  • 23. Data-Centric Security: A Recipe Implement Control Requirements Monitor Control Effectiveness Entitlement Definition Mobile Environment Definition Inventory Users Define Business Processes Destroy Data Inventory Data Categorize Data @smallersecurity
  • 25. What about Apps? Can’t impede app proliferation, but how do you know which to trust? 30 billion app downloads from Apple's App Store Apps have overtaken browsing @smallersecurity
  • 26. What about the Network? (It’s not just for transport) @smallersecurity
  • 27. Key security imperatives: 1) Data Governance 2) Application Governance @smallersecurity
  • 28. Doing things right ↓ Doing the right things Business Context Follow the data Network can help Simplify security program Apps matter @smallersecurity
  • 31. This document and any attached materials are the sole property of Verizon and are not to be used by you other than to evaluate Verizon’s service. This document and any attached materials are not to be disseminated, distributed, or otherwise conveyed throughout your organization to employees without a need for this information or to any third parties without the express written permission of Verizon. © 2011 Verizon. All Rights Reserved. The Verizon and Verizon Business names and logos and all other names, logos, and slogans identifying Verizon’s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. PROPRIETAR Y STATEMENT @smallersecurity
  • 32. Security Leadership Why Verizon? Industry Recognition  Largest & highly rated MSSP (Frost & Sullivan, Gartner, Forrester)  Founding and Executive Member of Open Identity Exchange  Security Consulting practice recognized as a Strong Performer (Forrester)  ICSA Labs is the industry standard for certifying security products (started in 1991) Credentials  More PCI auditors (140+ QSAs) than any other firm in the world  HITRUST Qualified CSF Assessor  Actively participate in 30+ standards / certification bodies, professional organizations and vertical specific consortia  Personnel hold 40+ unique industry, technology and vendor certifications Global Reach  550+ dedicated security consultants in 28 countries speak 28 languages  Investigated breaches in 36 countries in 2011  7 SOCs on 4 continents manage security devices in 45+ countries  Serve 77% of Forbes Global 2000 Experience  Verizon’s SMP is the oldest security certification program in the industry  Analyzed 2000+ breaches involving 1+ Billion records  Manage identities in 50+ countries and for 25+ national governments  Delivered 2000+ security consulting engagements in 2011 ISO 9001 ISO 17025

Editor's Notes

  • #2: http://gsourceg.com/images/products/product-010.jpg