SlideShare a Scribd company logo
Embracing the IT Consumerization Imperitive
Embracing the IT
       Consumerization Imperative
                    Barry Caplin
                         CISO
              MN Dept. of Human Services
barry.caplin@state.mn.us
bc@bjb.org, @bcaplin, +barry caplin
http://about.me/barrycaplin
More About Me
• Native New Yorker!

• 30 years in IT/
  20 years in InfoSec
Embracing the IT Consumerization Imperitive
Apr. 3, 2010

300K ipads
1M apps
250K ebooks
… day 1!
2011 – tablet/smartphone sales exceeded PCs
The real reason we need tablets
Why are we talking about this?



But really, all
connected!
Business Driver?
What about…
Ineffective
 Controls
1 Day
5 Stages of Tablet Grief
•    Surprise
•    Fear
•    Concern
•    Understanding
•    Evangelism
Security Challenges
Devices:
•Exposure of data
•Leakage of data – sold, donated, tossed,
repaired drives
•Malware

    But don’t we have all this now???
Consumer App Security
•   “non-standard” software a challenge
•   Vetting, updates/patches, malware
•   No real 3rd party agreements
•   Privacy policies, data ownership
•   SOPA/PIPA/CISPA
Legal (IANAL)
•   Privacy – exposing company data
•   Litigation hold – on 3rd party services
•   Separation – what’s on Dropbox?
•   Copyright, trademark, IP?
•   How do you?:
    – Get data from a 3rd party service?
BYOD Security Solutions
• Sync – Network or OTA

• VDI – Citrix or similar

• Containerization – Sandbox, MAM

• Direct Connection – Don’t!
DHS view - POE
•   Policy             •   Guest wireless
•   Supervisor         •   FAQs for
    approval               users/sups
•   Citrix only        •   Metrics
•   No Gov't records   •   $ - not yet
    on POE
    (unencrypted)
•   3G/4G or wired
Software Security Solutions
• Policy – Examine existing – augment
• Process – Vetting, updates, malware
• 3rd party agreements – where possible
• Data classification/labeling
• PIE – pre-Internet encryption
CoIT Nirvana
•   Any, Any, Any – work, device, where
•   Be nimble
•   Data stays “home”++
•   Situational awareness
Key Points
•   Business Need – Partner internally
•   BYOD, Consumer apps, or both?
•   Policy, Technical, Financial aspects
•   Watch the data
•   Make easy for users
•   Education/Awareness
Embracing the IT Consumerization Imperitive

More Related Content

PPT
Embracing the IT Consumerization Imperative NG Security
PPT
Wearing Your Heart On Your Sleeve - Literally!
PPTX
How to keep women safe, online?
PPTX
IoT & Big Data - A privacy-oriented view of the future
PPTX
Top Ten IT Legal Issues for the Enterprise
PPTX
Mobile Practice Management
PPTX
Krishna kumar singh
PPTX
Com 300 dl
Embracing the IT Consumerization Imperative NG Security
Wearing Your Heart On Your Sleeve - Literally!
How to keep women safe, online?
IoT & Big Data - A privacy-oriented view of the future
Top Ten IT Legal Issues for the Enterprise
Mobile Practice Management
Krishna kumar singh
Com 300 dl

What's hot (20)

PPTX
Digital Accessibility - Section 508 Refresh: Now What?
PDF
Cyber and Data Risks
PDF
Mobile Technologies, BYOD and the Law
PPTX
A Case Study on Issues and Violations on Information Technology
PPTX
Privacy by design for startups: legal and technology
PPTX
Divorce in the Digital Era
PDF
Chp 05 anonymity, security, privacy and civil liberties (shared)
PDF
Data ethics for developers
PDF
How to safe your company from having a security breach
PPTX
04 privacy
PDF
How To Enable a Remote Workforce & Stay Productive
PDF
Service goes accessible_2013_sh
PPTX
Everything You Need to Know About Enterprise IT in Three Slides
PDF
Wake up, Enterprise IT
PDF
The Data Ethical Company
PPTX
IoTMeetupGuildford#12: Tirath Bansal - Independent Private Collaboration - myOrb
PDF
IS and the Innovator's Dilemma DCass_Final
PPTX
What is Information Security and why you should care ...
PPSX
Gdpr demystified - making sense of the regulation
PPTX
Privacy by design for peerlyst meetup
Digital Accessibility - Section 508 Refresh: Now What?
Cyber and Data Risks
Mobile Technologies, BYOD and the Law
A Case Study on Issues and Violations on Information Technology
Privacy by design for startups: legal and technology
Divorce in the Digital Era
Chp 05 anonymity, security, privacy and civil liberties (shared)
Data ethics for developers
How to safe your company from having a security breach
04 privacy
How To Enable a Remote Workforce & Stay Productive
Service goes accessible_2013_sh
Everything You Need to Know About Enterprise IT in Three Slides
Wake up, Enterprise IT
The Data Ethical Company
IoTMeetupGuildford#12: Tirath Bansal - Independent Private Collaboration - myOrb
IS and the Innovator's Dilemma DCass_Final
What is Information Security and why you should care ...
Gdpr demystified - making sense of the regulation
Privacy by design for peerlyst meetup
Ad

Similar to Embracing the IT Consumerization Imperitive (20)

PPTX
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
PDF
Is Your Network Ready for BYOD?
PPTX
iPads on your network? Take Control with Unified Policy and Management
PPTX
Information Security, Cybercrime and technology futures allowing you to get a...
PDF
Re-Thinking BYOD Policy.pptx
PPTX
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
PPT
Csop 2011 Al Raymond
PDF
110307 cloud security requirements gourley
PPTX
WatchGuard: Bring Your Own Device or Bring Your Own Danger
PDF
Andrew Jaquith SOURCE Boston 2011
PDF
Protecting Data on Laptops
PDF
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
PDF
BYOD: Device Control in the Wild, Wild, West
PPTX
2012 DBIR
PDF
IT Security Trends 2013
PDF
7.5 steps to overlaying BYoD & IoT on Existing Investments
PDF
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
PPTX
Embracing secure, scalable BYOD with Sencha and Centrify
PDF
The Future of Software Security Assurance
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
Is Your Network Ready for BYOD?
iPads on your network? Take Control with Unified Policy and Management
Information Security, Cybercrime and technology futures allowing you to get a...
Re-Thinking BYOD Policy.pptx
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Csop 2011 Al Raymond
110307 cloud security requirements gourley
WatchGuard: Bring Your Own Device or Bring Your Own Danger
Andrew Jaquith SOURCE Boston 2011
Protecting Data on Laptops
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
BYOD: Device Control in the Wild, Wild, West
2012 DBIR
IT Security Trends 2013
7.5 steps to overlaying BYoD & IoT on Existing Investments
Introducing New Kaspersky Endpoint Security for Business - ENGLISH
Embracing secure, scalable BYOD with Sencha and Centrify
The Future of Software Security Assurance
PCTY 2012, IBM Security and Strategy v. Fabio Panada
Ad

More from Barry Caplin (20)

PPTX
Healing healthcare security
PPTX
It’s not If but When 20160503
PPTX
Dreaded Embedded sec360 5-17-16
PPTX
It’s not if but when 20160503
PPTX
CISOs are from Mars, CIOs are from Venus
PPTX
Online Self Defense - Passwords
PPT
The CISO Guide – How Do You Spell CISO?
PPT
Bullying and Cyberbullying
PPT
3 factors of fail sec360 5-15-13
PPT
Tech smart preschool parent 2 13
PPT
Online Self Defense
PPT
Embracing the IT Consumerization Imperitive
PPTX
Stuff my ciso says
PPT
Toys in the office 11
PPT
Accidental Insider
PPT
Teens 2.0 - Teens and Social Networks
PPT
Laws of the Game For Valley United Soccer Club travel soccer refs
PPT
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
PPTX
How to be a Tech-Smart Parent
PPT
Internet Safety for Families and Children
Healing healthcare security
It’s not If but When 20160503
Dreaded Embedded sec360 5-17-16
It’s not if but when 20160503
CISOs are from Mars, CIOs are from Venus
Online Self Defense - Passwords
The CISO Guide – How Do You Spell CISO?
Bullying and Cyberbullying
3 factors of fail sec360 5-15-13
Tech smart preschool parent 2 13
Online Self Defense
Embracing the IT Consumerization Imperitive
Stuff my ciso says
Toys in the office 11
Accidental Insider
Teens 2.0 - Teens and Social Networks
Laws of the Game For Valley United Soccer Club travel soccer refs
Laws of the Game for Valley Athletic Assn (VAA) Community Soccer refs
How to be a Tech-Smart Parent
Internet Safety for Families and Children

Recently uploaded (20)

PPTX
OMC Textile Division Presentation 2021.pptx
PDF
August Patch Tuesday
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
1. Introduction to Computer Programming.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Hybrid model detection and classification of lung cancer
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
A Presentation on Artificial Intelligence
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
1 - Historical Antecedents, Social Consideration.pdf
OMC Textile Division Presentation 2021.pptx
August Patch Tuesday
Building Integrated photovoltaic BIPV_UPV.pdf
Programs and apps: productivity, graphics, security and other tools
1. Introduction to Computer Programming.pptx
Enhancing emotion recognition model for a student engagement use case through...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
MIND Revenue Release Quarter 2 2025 Press Release
WOOl fibre morphology and structure.pdf for textiles
Hybrid model detection and classification of lung cancer
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Tartificialntelligence_presentation.pptx
Group 1 Presentation -Planning and Decision Making .pptx
TLE Review Electricity (Electricity).pptx
Zenith AI: Advanced Artificial Intelligence
A Presentation on Artificial Intelligence
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Getting Started with Data Integration: FME Form 101
Assigned Numbers - 2025 - Bluetooth® Document
1 - Historical Antecedents, Social Consideration.pdf

Embracing the IT Consumerization Imperitive

  • 2. Embracing the IT Consumerization Imperative Barry Caplin CISO MN Dept. of Human Services barry.caplin@state.mn.us bc@bjb.org, @bcaplin, +barry caplin
  • 4. More About Me • Native New Yorker! • 30 years in IT/ 20 years in InfoSec
  • 6. Apr. 3, 2010 300K ipads 1M apps 250K ebooks … day 1!
  • 7. 2011 – tablet/smartphone sales exceeded PCs
  • 8. The real reason we need tablets
  • 9. Why are we talking about this? But really, all connected!
  • 13. 1 Day
  • 14. 5 Stages of Tablet Grief • Surprise • Fear • Concern • Understanding • Evangelism
  • 15. Security Challenges Devices: •Exposure of data •Leakage of data – sold, donated, tossed, repaired drives •Malware But don’t we have all this now???
  • 16. Consumer App Security • “non-standard” software a challenge • Vetting, updates/patches, malware • No real 3rd party agreements • Privacy policies, data ownership • SOPA/PIPA/CISPA
  • 17. Legal (IANAL) • Privacy – exposing company data • Litigation hold – on 3rd party services • Separation – what’s on Dropbox? • Copyright, trademark, IP? • How do you?: – Get data from a 3rd party service?
  • 18. BYOD Security Solutions • Sync – Network or OTA • VDI – Citrix or similar • Containerization – Sandbox, MAM • Direct Connection – Don’t!
  • 19. DHS view - POE • Policy • Guest wireless • Supervisor • FAQs for approval users/sups • Citrix only • Metrics • No Gov't records • $ - not yet on POE (unencrypted) • 3G/4G or wired
  • 20. Software Security Solutions • Policy – Examine existing – augment • Process – Vetting, updates, malware • 3rd party agreements – where possible • Data classification/labeling • PIE – pre-Internet encryption
  • 21. CoIT Nirvana • Any, Any, Any – work, device, where • Be nimble • Data stays “home”++ • Situational awareness
  • 22. Key Points • Business Need – Partner internally • BYOD, Consumer apps, or both? • Policy, Technical, Financial aspects • Watch the data • Make easy for users • Education/Awareness

Editor's Notes

  • #3: IT Consumerization is a major buzz-phrase
  • #4: 1. Check out my about.me, with links to twitter feed and Security and Coffee blog. 2. More about me… including the most important thing…
  • #6: Mobile/portable devices are not new. Then an event occurred that changed the game… IBM “Portable” 5155, $4225, 30 lbs, 4.77MHz 8088; Apple Newton; AppleBook; original ThinkPad; 1 st gen android; Palm III; early Blackberry
  • #7: 1 st iPad, 4/3/2010. 300K iPads sold, 1M apps, 250K ebooks downloaded on the first day. Features, form factor, intuitive use made it the people’s choice.
  • #8: 1. mid-2011 tipping point 2. By early 2012, 50% of US mobile users use a smartphone
  • #10: 2012 survey of IT leaders – Mobile is #1 tech impact But Cloud is 2, CoIT 3 and Social 4 – all connected
  • #11: The devices are hot and driving the space, but it’s really about the ability to have mobility – to bring the product or service to the consumer/customer. Not just “flavor of the week”.
  • #12: Just say no is not a viable IT or Security strategy or response. We must partner with the business/user to provide what is needed. Just say no is an…
  • #13: If your organization is saying “just say no” to consumer devices and apps, then they are already in your environment Take opportunity to partner, lead and add value.
  • #14: 2.5 years ago Story of call from lawyer about iPads in a meeting This lead to…
  • #15: Quickly moved to last stage – evangelism Now security is dragging other groups kicking and screaming into the present. Security is leading and adding value.
  • #16: Exposure is device in hand – eavesdropping, MitM Leakage is device is gone. We have all this already. Datalossdb.org and Accidental Insider. 10% of 2 nd -hand drives bought had company/private data. StarTrib malware.
  • #17: 1. Similarly, we have had software issues – local admin, devs, etc. can’t enumerate badness. If the service is free, we are the product not the customer.
  • #18: Be sure to include legal Information Discovery, Litigation Hold are big issues.
  • #19: Now for solutions – 4 general categories for devices Containerization includes Enterprise App Store
  • #20: Extensible policy; Citrix (no remnants); looking at containerization; guest wireless/wired; not yet considering $ (reimbursement/stipend) Gartner says at least 3-5 years for financial payoff.
  • #21: Policy already mentioned Working on process to more seamlessly allow consumer apps Know your data classifications PIE great for online storage, file sharing.
  • #23: Partner; Lead; Add value Good user experience is key
  • #24: Users are changing; expectations are changing; keep “eyes on the prize”; partner, solve problems, and add value