data security in a mobile world emmitt wells – getronics

16

Upload: lester-phillips

Post on 03-Jan-2016

221 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Data Security in a Mobile World Emmitt Wells – Getronics
Page 2: Data Security in a Mobile World Emmitt Wells – Getronics

Data Security in a Mobile World

Emmitt Wells – Getronics

Page 3: Data Security in a Mobile World Emmitt Wells – Getronics

3

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

Hitting Close to Home

If you think mobile security isn’t a real subject, just consider the possibility that there is someone out there right now with your name, email, phone number, and birth date and more stored on a digital device that was just left in a taxi cab – not a comforting thought.

Page 4: Data Security in a Mobile World Emmitt Wells – Getronics

4

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

View of Endpoint Security…

http://www.jacobsen.no/anders/blog/archives/images/project.jpghttp://www.jacobsen.no/anders/blog/archives/images/project.jpg

Page 5: Data Security in a Mobile World Emmitt Wells – Getronics

5

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

• All Sectors

– SOX, Combined Code, Companies Bill, IAS

– Privacy, Data Protection, Human Rights • Finance Sector

– Basel II, FSA, SEC Act 17a-3/4, NASD Rules 3010/3110• Retail Sector

– Payment Card Industry (PCI) Security Standard

• Health Sector

– HIPAA

• Interception legislation

– RIPA, European Data Retention Directive

• Local legislation with Global consequences

– Californian Law SB 1386

Compliance Demands are Mounting

Page 6: Data Security in a Mobile World Emmitt Wells – Getronics

6

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

Securing Data in Motion

Page 7: Data Security in a Mobile World Emmitt Wells – Getronics

7

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

Ensuring Data Integrity

Page 8: Data Security in a Mobile World Emmitt Wells – Getronics

8

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

Data Theft

Page 9: Data Security in a Mobile World Emmitt Wells – Getronics

9

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

Policy

Establish

Page 10: Data Security in a Mobile World Emmitt Wells – Getronics

10

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

Technology Available

• Endpoint Products– Anti-virus, anti-spam, Message

Cleaning, HIDS for the desktop

• Controlling Access– Identity Management and

Authentication

• External Protection– Firewalls and NIDS

• Data Protection– Policy Enforcement Tools

• Backup and Retrieval– Secure Archival

• Stolen Equipment– Data low-jack

Page 11: Data Security in a Mobile World Emmitt Wells – Getronics

11

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

What if I do nothing?

• “Gartner estimates cleanup costs for any data loss to be $90 per customer record when you calculate notification, legal expenses, and the damage done to a corporate brand."

= =+

Page 12: Data Security in a Mobile World Emmitt Wells – Getronics

12

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

How do I convince my executives of the need?

DiscussTechnology

DiscussBusinessImpact

Page 13: Data Security in a Mobile World Emmitt Wells – Getronics

13

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

Balanced Security

Page 14: Data Security in a Mobile World Emmitt Wells – Getronics

14

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

• Policy – Define rules, promote best practices and minimize risks

• Technology – Enforce policies, detect violations of policy, and deliver evidence

of compliance with corporate policy and regulatory requirements

• Education – Equip employees to recognize potential sources of risk and to

safeguard information and transactions in hostile environments

• Management– Setup reactive and proactive management to help measure how

your endpoints are performing against the policy you have established

Requirements for Mobile Endpoint Security

Page 15: Data Security in a Mobile World Emmitt Wells – Getronics

15

September 10-12, 2007 • Los Angeles Convention Center • Los Angeles, California

www.ITEXPO.com

Keep it Simple

"Aye sir, the more they over-tech "Aye sir, the more they over-tech the plumbing, the easier it is to the plumbing, the easier it is to stop up the drain." – Mr. Scot, stop up the drain." – Mr. Scot, Star Trek III: The Search For Star Trek III: The Search For SpockSpock

Page 16: Data Security in a Mobile World Emmitt Wells – Getronics

Thank you