SlideShare a Scribd company logo
Barry Caplin
                                          CISO
                     MN Dept. of Human Services
NG Security Summit
barry.caplin@state.mn.us
bc@bjb.org, @bcaplin, +barry caplin
securityandcoffee.blogspot.com
http://about.me/barrycaplin
Embracing the IT Consumerization Imperative NG Security
Apr. 3, 2010

300K ipads
1M apps
250K ebooks
… day 1!
2011 – tablet/smartphone sales exceeded PCs
Embracing the IT Consumerization Imperative NG Security
Why are we talking about this?



  But really, all
  connected!
Business Driver?
What about…
Ineffective
Controls
1 Day
5 Stages of Tablet Grief
•    Surprise
•    Fear
•    Concern
•    Understanding
•    Evangelism
Security Challenges
Devices:
Exposure of data
Leakage of data – sold, donated,
tossed, repaired drives
Malware

    But don’t we have all this now???
Consumer App Security
“non-standard” software a challenge
Vetting, updates/patches, malware
No real 3rd party agreements
Privacy policies, data ownership
SOPA/PIPA/CISPA
Legal (IANAL)
Privacy – exposing company data
Litigation hold – on 3rd party services
Separation – what’s on Dropbox?
Copyright, trademark, IP?
How do you?:
  Get data from a 3rd party service?
BYOD Security Solutions
• Sync/MDM – Network or OTA

• VDI – Citrix or similar

• Containerization – Sandbox, MAM

• Direct Connection – Don’t!
DHS view - POE
•   Policy             •   Guest wireless
•   Supervisor         •   FAQs for
    approval               users/sups
•   Citrix only        •   Metrics
•   No Gov't records   •   $ - not yet
    on POE
    (unencrypted)
•   3G/4G or wired
Software Security Solutions
Policy – Examine existing –
 augment
Process – Vetting, updates,
 malware
3rd party agreements – where possible
Data classification/labeling
PIE – pre-Internet encryption
CoIT Nirvana
Any, Any, Any – work, device,
 where
Be nimble
Data stays “home”++
Situational awareness
Key Points
Business Need – Partner internally
BYOD, Consumer apps, or both?
Policy, Technical, Financial aspects
Watch the data
Make easy for users
Education/Awareness
Embracing the IT Consumerization Imperative NG Security
Discussion…
Slides at http://slideshare.net/bcaplin
       barry.caplin@state.mn.us
 bc@bjb.org, @bcaplin, +barry caplin
     securityandcoffee.blogspot.com
Topics
Policy
Compliance/Consequences
Regulatory – IRS, HIPAA, MARS-E
Data Leakage
Remote wipe issues
DLP/DRM
Reimbursement
The “Non-Standard” Software issue
Non-Standard Software


                   New
                  Request

More Related Content

PPT
Embracing the IT Consumerization Imperitive
PPT
Wearing Your Heart On Your Sleeve - Literally!
PPTX
IoT & Big Data - A privacy-oriented view of the future
PPTX
Top Ten IT Legal Issues for the Enterprise
PPTX
Mobile Practice Management
PPTX
Krishna kumar singh
PPTX
Com 300 dl
PPTX
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...
Embracing the IT Consumerization Imperitive
Wearing Your Heart On Your Sleeve - Literally!
IoT & Big Data - A privacy-oriented view of the future
Top Ten IT Legal Issues for the Enterprise
Mobile Practice Management
Krishna kumar singh
Com 300 dl
From Privacy Impact Assessment to Social Impact Assessment: Preserving TRrus...

What's hot (20)

PPTX
Digital Accessibility - Section 508 Refresh: Now What?
PDF
Cyber and Data Risks
PDF
Mobile Technologies, BYOD and the Law
PPTX
Security For Business: Are You And Your Customers Safe
PPTX
Privacy by design for startups: legal and technology
PPTX
Divorce in the Digital Era
PDF
How to safe your company from having a security breach
PPTX
04 privacy
PPTX
A Case Study on Issues and Violations on Information Technology
PDF
Chp 05 anonymity, security, privacy and civil liberties (shared)
PDF
Wake up, Enterprise IT
PDF
How To Enable a Remote Workforce & Stay Productive
PPTX
Privacy by design for peerlyst meetup
PPTX
What to expect at the 2015 Information Assurance for Forum
PDF
The Data Ethical Company
PPTX
Steal This Data - Email Security and DLP
PPTX
BYOD: D for Device or D for Disaster?
PDF
piiLabsSeattleWorkshop_ChristinaGagnier
PDF
Symantec Webinar: GDPR 1 Year On
PPTX
Trending Topics in Data Collection & Targeted Marketing
Digital Accessibility - Section 508 Refresh: Now What?
Cyber and Data Risks
Mobile Technologies, BYOD and the Law
Security For Business: Are You And Your Customers Safe
Privacy by design for startups: legal and technology
Divorce in the Digital Era
How to safe your company from having a security breach
04 privacy
A Case Study on Issues and Violations on Information Technology
Chp 05 anonymity, security, privacy and civil liberties (shared)
Wake up, Enterprise IT
How To Enable a Remote Workforce & Stay Productive
Privacy by design for peerlyst meetup
What to expect at the 2015 Information Assurance for Forum
The Data Ethical Company
Steal This Data - Email Security and DLP
BYOD: D for Device or D for Disaster?
piiLabsSeattleWorkshop_ChristinaGagnier
Symantec Webinar: GDPR 1 Year On
Trending Topics in Data Collection & Targeted Marketing
Ad

Similar to Embracing the IT Consumerization Imperative NG Security (20)

PPT
Embracing the IT Consumerization Imperitive
PPT
Toys in the office 11
PPTX
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
PPT
Wipo smes ge_08_topic07
PPTX
Digital Forensics, eDiscovery & Technology Risks for HR Executives
PDF
Where security and privacy meet partnering tips for CSOs and privacy/complian...
PDF
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
PPT
5 Myths About Data Loss Prevention
PPTX
From Near to Maturity - Presentation to European Data Forum
PPTX
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
PPTX
Isc(2) eastbay-lenin aboagye
PDF
IT Security Presentation - IIMC 2014 Conference
PPTX
Impact of data science in financial reporting
PPTX
CBC GDPR The Physics
PPTX
Data Security for Nonprofits
PDF
Dean carey - data loss-prevention - atlseccon2011
PDF
A Global Marketer's Guide to Privacy
PPTX
Perspectives on Ethical Big Data Governance
PPT
Kevin Wharram Security Summit
PPTX
Privacy Implications of Biometric Data - Kevin Nevias
Embracing the IT Consumerization Imperitive
Toys in the office 11
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Wipo smes ge_08_topic07
Digital Forensics, eDiscovery & Technology Risks for HR Executives
Where security and privacy meet partnering tips for CSOs and privacy/complian...
Falcon.io | 2021 Trends Virtual Summit - Data Privacy
5 Myths About Data Loss Prevention
From Near to Maturity - Presentation to European Data Forum
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Isc(2) eastbay-lenin aboagye
IT Security Presentation - IIMC 2014 Conference
Impact of data science in financial reporting
CBC GDPR The Physics
Data Security for Nonprofits
Dean carey - data loss-prevention - atlseccon2011
A Global Marketer's Guide to Privacy
Perspectives on Ethical Big Data Governance
Kevin Wharram Security Summit
Privacy Implications of Biometric Data - Kevin Nevias
Ad

More from Barry Caplin (20)

PPTX
Healing healthcare security
PPTX
It’s not If but When 20160503
PPTX
Dreaded Embedded sec360 5-17-16
PPTX
It’s not if but when 20160503
PPTX
CISOs are from Mars, CIOs are from Venus
PPTX
Online Self Defense - Passwords
PPT
The CISO Guide – How Do You Spell CISO?
PPT
Bullying and Cyberbullying
PPT
3 factors of fail sec360 5-15-13
PPT
Tech smart preschool parent 2 13
PPT
Online Self Defense
PPTX
Stuff my ciso says
PPT
Accidental Insider
PPT
Teens 2.0 - Teens and Social Networks
PPT
Laws of the Game For Valley United Soccer Club travel soccer refs
PPT
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
PPTX
How to be a Tech-Smart Parent
PPT
Internet Safety for Families and Children
PPT
Security Lifecycle Management
PPT
Elements of an Information Security Awareness Program
Healing healthcare security
It’s not If but When 20160503
Dreaded Embedded sec360 5-17-16
It’s not if but when 20160503
CISOs are from Mars, CIOs are from Venus
Online Self Defense - Passwords
The CISO Guide – How Do You Spell CISO?
Bullying and Cyberbullying
3 factors of fail sec360 5-15-13
Tech smart preschool parent 2 13
Online Self Defense
Stuff my ciso says
Accidental Insider
Teens 2.0 - Teens and Social Networks
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
How to be a Tech-Smart Parent
Internet Safety for Families and Children
Security Lifecycle Management
Elements of an Information Security Awareness Program

Recently uploaded (20)

PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Electronic commerce courselecture one. Pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Encapsulation theory and applications.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Encapsulation_ Review paper, used for researhc scholars
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Spectroscopy.pptx food analysis technology
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Electronic commerce courselecture one. Pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
SOPHOS-XG Firewall Administrator PPT.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Network Security Unit 5.pdf for BCA BBA.
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Unlocking AI with Model Context Protocol (MCP)
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Building Integrated photovoltaic BIPV_UPV.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Encapsulation theory and applications.pdf
MYSQL Presentation for SQL database connectivity
Assigned Numbers - 2025 - Bluetooth® Document
Encapsulation_ Review paper, used for researhc scholars

Embracing the IT Consumerization Imperative NG Security

Editor's Notes

  • #2: IT Consumerization is a major buzz-phrase
  • #3: Check out my about.me, with links to twitter feed and Security and Coffee blog.
  • #4: Mobile/portable devices are not new. Then an event occurred that changed the game… IBM “Portable” 5155, $4225, 30 lbs, 4.77MHz 8088; Apple Newton; AppleBook; original ThinkPad; 1 st gen android; Palm III; early Blackberry
  • #5: 1 st iPad, 4/3/2010. 300K iPads sold, 1M apps, 250K ebooks downloaded on the first day. Features, form factor, intuitive use made it the people’s choice.
  • #6: 1. mid-2011 tipping point 2. By early 2012, 50% of US mobile users use a smartphone
  • #8: 2012 survey of IT leaders – Mobile is #1 tech impact But Cloud is 2, CoIT 3 and Social 4 – all connected
  • #9: The devices are hot and driving the space, but it’s really about the ability to have mobility – to bring the product or service to the consumer/customer. Not just “flavor of the week”.
  • #10: Just say no is not a viable IT or Security strategy or response. We must partner with the business/user to provide what is needed. Just say no is an…
  • #11: If your organization is saying “just say no” to consumer devices and apps, then they are already in your environment Take opportunity to partner, lead and add value.
  • #12: 2.5 years ago Story of call from lawyer about iPads in a meeting This lead to…
  • #13: Quickly moved to last stage – evangelism Now security is dragging other groups kicking and screaming into the present. Security is leading and adding value.
  • #14: Exposure is device in hand – eavesdropping, MitM Leakage is device is gone. We have all this already. Datalossdb.org and Accidental Insider. 10% of 2 nd -hand drives bought had company/private data. StarTrib malware.
  • #15: 1. Similarly, we have had software issues – local admin, devs, etc. can’t enumerate badness. If the service is free, we are the product not the customer.
  • #16: Be sure to include legal Information Discovery, Litigation Hold are big issues.
  • #17: Now for solutions – 4 general categories for devices Containerization includes Enterprise App Store
  • #18: Extensible policy; Citrix (no remnants); looking at containerization; guest wireless/wired; not yet considering $ (reimbursement/stipend) Gartner says at least 3-5 years for financial payoff.
  • #19: Policy already mentioned Working on process to more seamlessly allow consumer apps Know your data classifications PIE great for online storage, file sharing.
  • #21: Partner; Lead; Add value Good user experience is key
  • #22: Users are changing; expectations are changing; keep “eyes on the prize”; partner, solve problems, and add value