SlideShare a Scribd company logo
Enterprise Mobile Security – App Challenges
November 2014
@AtchisonFrazer
40%
Vertical
Use Case
Data Level
Encryption
Required
35%
BYOD
1.8 Billion Devices under Enterprise Management
Gartner Forecast: PCs, Ultramobiles and Mobile Phones
Worldwide, 2010-2017, 4Q13 Update (Dec 2013)
81%
Mobile
Mobile Security top 2014 spend priority
Gartner Security Summits surveys, 2014
Mobile phising dominated by social media exposure
Impressions reported by SmartScreen Filter on Windows Phone
8 for each type of phishing site, January–June 2014
Web App Attacks – Highest Frequency Breaches
Source: Verizon 2014 Data Breach Investigations Report
Distribution of mobile malware by attack vector
Source: Securelist, 2013
2014 Projections: App Messaging overtaking SMS
• vs. 21 billion text messages sent
50 billion mobile chat messages sent
• What’sApp, Blackberry Messenger, Viber,
Nimbuzz, iMessage, KakaoTalk
587 million mobile chat app users
1 billion Android mobile chat apps
used UNENCRYPTED
Source: Informa Research, CNET, 2013
Data Leakage: 13GB of photos and videos (1 month)
Apple Malware: WireLurker infected 400 iOS apps
I.D. pasting: 100 million FB/Adobe credentials breached
5 minutes: time to hack Blackphone at DefCon14
How to Steal from WhatsApp: Exploit Open Encryption Key
http://bas.bosschert.nl/steal-whatsapp-update/
Are your web/mobile messaging apps truly secure?
https://www.eff.org/secure-messaging-scorecard
@AtchisonFrazer

More Related Content

PPTX
Mobile security
PPTX
T.A.S.C - mobile device secuirty
DOCX
Research in progress defending android smartphones from malware attacks
PDF
Adaptive Mobile Malware Detection Model Based on CBR
PDF
Droidcon2013 security genes_trendmicro
PPTX
Ms810 assignment viruses and malware affecting moblie devices
PPTX
Mobile Security
DOCX
ANDROID PROJECTS 2014
Mobile security
T.A.S.C - mobile device secuirty
Research in progress defending android smartphones from malware attacks
Adaptive Mobile Malware Detection Model Based on CBR
Droidcon2013 security genes_trendmicro
Ms810 assignment viruses and malware affecting moblie devices
Mobile Security
ANDROID PROJECTS 2014

What's hot (20)

PDF
Mobile Security 101
PDF
Top Seven Risks of Enterprise Mobility - How to protect your business
PDF
Article on Mobile Security
PPTX
How to Gather Global Mobile Threat Intelligence
PPTX
Mobile Protect Pro - Powered by Zimperium
PDF
Security and Your Business
PDF
Mobile Security
PPTX
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
PDF
Emerging web security threats
PDF
Top 6-Security-Threats-on-iOS
PDF
The state of mobile app security
PPTX
Mobile security
PDF
Malicious malware breaches - eScan
PDF
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
PPTX
Ppt crc nazir_seeds
PPT
Cell Phone Viruses & Security
PPTX
Mobile Security: Perceptions vs Device-harvested Reality
PDF
State ofmobilesecurity
DOCX
PhD Thesis Writing Assistance - Manuscript
PPTX
Transforming any apps into self-defending apps
Mobile Security 101
Top Seven Risks of Enterprise Mobility - How to protect your business
Article on Mobile Security
How to Gather Global Mobile Threat Intelligence
Mobile Protect Pro - Powered by Zimperium
Security and Your Business
Mobile Security
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Emerging web security threats
Top 6-Security-Threats-on-iOS
The state of mobile app security
Mobile security
Malicious malware breaches - eScan
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Ppt crc nazir_seeds
Cell Phone Viruses & Security
Mobile Security: Perceptions vs Device-harvested Reality
State ofmobilesecurity
PhD Thesis Writing Assistance - Manuscript
Transforming any apps into self-defending apps
Ad

Viewers also liked (7)

PPTX
Mobile Security Trends in the Workplace
PPTX
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
PDF
2015 Mobile Security Trends: Are You Ready?
PPTX
Trends in Enterprise Mobility
PDF
Cyber Security trends and tactics for 2015
PDF
IBM - IAM Security and Trends
PDF
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Mobile Security Trends in the Workplace
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
2015 Mobile Security Trends: Are You Ready?
Trends in Enterprise Mobility
Cyber Security trends and tactics for 2015
IBM - IAM Security and Trends
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Ad

Similar to @AtchisonFrazer Enterprise Mobile Security Trends, Challenges (20)

PDF
Secon_2017_Chemerkin_Yury_-_final_-_Clean.pdf
PDF
Безопасность данных мобильных приложений. Мифы и реальность.
PDF
Unicom Conference - Mobile Application Security
PDF
HackMiami_2017_Chemerkin_Yury_for_website.pdf
PDF
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
PDF
Securing Mobile Apps - Appfest Version
PDF
Can You Steal From Me Now? Mobile and BYOD Security Risks
PPTX
Appsecurity, win or loose
PDF
Challenges in Testing Mobile App Security
PDF
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
PDF
Why You'll Care More About Mobile Security in 2020
PDF
How to Build Secure Mobile Apps.pdf
PDF
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
PDF
Mobile security chess board - attacks & defense
PDF
Five mobile security challenges facing the enterprise
PDF
Menofia UN -Mobile Security
PDF
Mobile security article
PDF
Securing Your Mobile Applications
PPTX
Building a Mobile Security Program
PDF
Evolutionand impactofhiddenmobilethreats wandera
Secon_2017_Chemerkin_Yury_-_final_-_Clean.pdf
Безопасность данных мобильных приложений. Мифы и реальность.
Unicom Conference - Mobile Application Security
HackMiami_2017_Chemerkin_Yury_for_website.pdf
Mobile Application Security Testing, Testing for Mobility App | www.idexcel.com
Securing Mobile Apps - Appfest Version
Can You Steal From Me Now? Mobile and BYOD Security Risks
Appsecurity, win or loose
Challenges in Testing Mobile App Security
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You'll Care More About Mobile Security in 2020
How to Build Secure Mobile Apps.pdf
SECON'2017, Чемёркин Юрий, Безопасность данных мобильных приложений
Mobile security chess board - attacks & defense
Five mobile security challenges facing the enterprise
Menofia UN -Mobile Security
Mobile security article
Securing Your Mobile Applications
Building a Mobile Security Program
Evolutionand impactofhiddenmobilethreats wandera

@AtchisonFrazer Enterprise Mobile Security Trends, Challenges

Editor's Notes

  • #2: This template can be used as a starter file to give updates for project milestones. Sections Sections can help to organize your slides or facilitate collaboration between multiple authors. On the Home tab, under Slides, click Section, and then click Add Section. Notes Use the Notes pane for delivery notes or to provide additional details for the audience. You can see these notes in Presenter View during your presentation. Keep in mind the font size (important for accessibility, visibility, videotaping, and online production) Coordinated colors Pay particular attention to the graphs, charts, and text boxes. Consider that attendees will print in black and white or grayscale. Run a test print to make sure your colors work when printed in pure black and white and grayscale. Graphics, tables, and graphs Keep it simple: If possible, use consistent, non-distracting styles and colors. Label all graphs and tables.
  • #3: What is the project about? Define the goal of this project Is it similar to projects in the past or is it a new effort? Define the scope of this project Is it an independent project or is it related to other projects? * Note that this slide is not necessary for weekly status meetings
  • #4: * If any of these issues caused a schedule delay or need to be discussed further, include details in next slide.
  • #5: Duplicate this slide as necessary if there is more than one issue. This and related slides can be moved to the appendix or hidden if necessary.
  • #14: The following slides show several examples of timelines using SmartArt graphics. Include a timeline for the project, clearly marking milestones, important dates, and highlight where the project is now.
  • #15: Prepare slides for the appendix in the event that more details or supplemental slides are needed. The appendix is also useful if the presentation is distributed later.