securing a mobile oriented enterprise...securing a mobile oriented enterprise. presenter –...
TRANSCRIPT
![Page 1: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/1.jpg)
IT Professional Wi-Fi Trek 2016
Securing a mobile oriented enterprise
Presenter – Adedoyin AdewoduPrincipal Engineer
Infrastructure Solutions International
![Page 2: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/2.jpg)
Agenda• Clarifying a secure mobile oriented enterprise
• Mobile vector in a data breach
• WLAN’s strategic role – aligning capabilities
• Consensus building to achieve mobility
![Page 3: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/3.jpg)
“1 in 5 employees will be the cause of a company network breach through either malware or malicious wi-fi"
Source: Checkpoint - 2016 Security Report
![Page 4: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/4.jpg)
Clarifying a secure mobile oriented enterprise
![Page 5: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/5.jpg)
Sample mobile project requirements• Platform: iOS and Android
• Device Management: 1000
• Applications: unsure
• Managed Enterprise Configurations: Email and Wi-fi*
![Page 6: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/6.jpg)
Security Headlines• MobiHealthNews
“Survey finds most hospitals concerned about cybersecurity in mobile technology”
• IT Business Edge “The Struggle to Protect Mobile Devices from Malware”
• Tech Pro Research“Companies fear mobile devices as massive cybersecurity threat”
• Frost and Sullivan “New Cybersecurity Threats: Enterprise Must Raise the Security Bar Higher”
![Page 7: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/7.jpg)
A secure mobile oriented enterprise consists of the following characteristics: • Applications that enhance productivity
• Simple user interfaces
• Device flexibility
• Security end to end
• Reliable wireless experience
![Page 8: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/8.jpg)
Mobile vector in a data breachExample with confidential data
![Page 9: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/9.jpg)
![Page 10: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/10.jpg)
Mobile vector breakdown
Application DataDeviceUser
Connectivity
Security
![Page 11: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/11.jpg)
The user impact on a breach• Borderless user that can operate numerous ways.
Incident data
Risks
Outsider Threat
Insider Threat
![Page 12: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/12.jpg)
Devices impact on a breach
• Point in time threat and vulnerabilities
• Mobile device policy
• Device behavior
![Page 13: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/13.jpg)
Application data processing impact on a breach
App Developer OS/OEM App store Internal /
Third Party
![Page 14: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/14.jpg)
WLAN’s strategic role –aligning capabilities
![Page 15: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/15.jpg)
The WLAN baseline to meet goals and objectives.
• Understand your network (users, rf, applications, traffic and etc.)
• Value the “cloud” and features it provides• Segmentation is your friend • Coverage and Capacity
![Page 16: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/16.jpg)
Incorporating trust with mobility • Certificate based authentication
• Role-based access control (RBAC)
• Device ownership (BYOD and COPE)
![Page 17: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/17.jpg)
Location information provides insight
• Establish data boundaries
• Leverage geofence controls
• User activity profile
Source: https://developer.android.com/training/location/geofencing.html
![Page 18: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/18.jpg)
Mobile Threat Defense
• Emerging tool that helps mitigate mobile threats
• Rogue access point detection capabilities
• Automation of mobile policy enforcement with EMM
![Page 19: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/19.jpg)
Consensus building to achieve mobility
![Page 20: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/20.jpg)
Personalize mobility to secure you data
• Move to a strategic approach to technology and tools adoption
• Incident management ownership
• Establish mobile processes that are effective
![Page 21: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/21.jpg)
![Page 22: Securing a mobile oriented enterprise...Securing a mobile oriented enterprise. Presenter – Adedoyin Adewodu. Principal Engineer. Infrastructure Solutions International. Agenda •](https://reader034.vdocuments.net/reader034/viewer/2022050411/5f884f633020e61ded6d7fb7/html5/thumbnails/22.jpg)
Where to find me• Email: [email protected]
• Twitter: @dadewodu or @infra_si
• Web: www.infra-si.com