SlideShare a Scribd company logo
Smart Security
        for
Smart Mobile Devices



           Marc Vael
      International Vice-President
Smart Mobile Device Definition

An electronic device that is
• cordless (unless while being charged),
• mobile (easily transportable),
• always connected (via WiFi, 3G, 4G etc.)
• capable of voice/video communication,
  internet browsing, "geo-location"
  (for search purposes)
and that can operate to some extent
autonomously.
ISACA smart security for smart devices
ISACA smart security for smart devices
ISACA smart security for smart devices
Smart Mobile Device Business Benefits
1. Increased workforce productivity—facilitates completion of work offsite (+40%).
2. Improved customer service—sales person or account manager can access the
   CRM system while at a customer site + provide ad hoc solutions & current
   customer account information.
3. Response to customer problems or questions at any time—35% improvement in
   customer satisfaction in best-in-business enterprises.
4. Improved turnaround times for problem resolution—more flexibility facing the
   challenges of time zones or office hours.
5. Increased business process efficiency—shortened & more efficient business
   processes. SCM+ by providing employees with information to speed the capture
   of inbound supply chain data + shortening feedback loop between supply chain
   and production planning.
6. Employee security & safety—one of the first reasons for mobile device adoption:
   allow employees to travel to/from remote locations while staying in touch.
7. Employee retention—management creates positives for business & employees.
   Using mobile devices can improve work-life balance by facilitating the ability of
   employees to work remotely: increase employee retention by up to 25%
Smart Mobile Device Business Benefits
ISACA smart security for smart devices
ISACA smart security for smart devices
ISACA smart security for smart devices
Impact of an attack on the business
Smart Mobile Device Risks




ISACA, Business Risks & Security Assessment for Mobile Devices, January 2008
Smart Mobile Device Risks




ISACA, Secure Mobile Devices, 20 July 2010, page 6
Smart Mobile Device Risks
ISACA smart security for smart devices
ISACA smart security for smart devices
Mobile Device Security Issues
• Threats differ by industry (e.g. intelligence/security/ police
  forces, fuel and energy, health and disease control,
  transportation, media, financial, food, retail, etc.); thus
  countermeasures must appropriately match the threat.
• Cost-benefit case for mobile devices depends solely on the
  value of corporate data at risk. Thus, critical data must be
  inventoried + appropriate security solutions implemented.
• Businesses can not manage what they can not identify, track or
  measure. Critical information is not always inventoried and
  proactively secured.
• Some companies outsource network security. When the third
  party employees leave, what customer data leave with them?
  Business data are available to providers with different business
  goals and objectives.
Mobile Device Security Issues
• Network security issues include:
   ‣ Conventional firewall and VPN security systems are inadequate.
   ‣ Lack of integration with evolving WAN network security solutions.
   ‣ A blurred network perimeter can cause the boundary between the
     “private and locally managed and owned” side of a network and the
     “public and usually provider-managed” side of a network to be less
     clear.
   ‣ If communication can be intercepted, piggybacked, impersonated or
     rerouted to “bad” people, “good” people can look “bad” and “bad”
     people can look “good” from any location.
   ‣ Encrypted remote connections are assumed to be secure. Little
     consideration is given to securing the end point. E-mail and other
     communications are encrypted only from phone to phone, or mobile
     device to server. Beyond that point, e-mail, instant messages and file
     transfers may be transmitted unencrypted over the Internet.
   ‣ Ad hoc service provisioning: requesting and receiving application
     service on demand wherever one is located.
Mobile Device Security Issues
ISACA smart security for smart devices
ISACA smart security for smart devices
Business Model for Information Security
ISACA smart security for smart devices
ISACA, Business Risks & Security Assessment for Mobile Devices, January 2008
ISACA, Business Risks & Security Assessment for Mobile Devices, January 2008
ISACA smart security for smart devices
Smart device security
strategies




           Policies & Standards
Smart device security
strategies
Smart device security strategies

              EDUCATION!
Smart device security
strategies


     Measuring performance
Smart device security metrics
Most common security metrics used in evaluating the adequacy of
mobile device security include:
• Number of breaches or successful attacks
• Virus protection and frequency of virus definition updates
• Currency of patch management on the servers
• Compliance with federal regulations
• Cost of security solutions
• Cost of loss
• Evaluation of risk
Are these metrics sufficient? Do you factor total cost of ownership? How
do you measure the benefit & value of mobile devices and the security
solutions?
So, how can CISOs explain the value of incorporating adequate
security?
Smart device security
strategies




            Review / Audit
ISACA smart security for smart devices
Auditing Mobile Device Security
1. PLANNING & SCOPING THE AUDIT
1.1   Define audit/assurance objectives.
1.2   Define boundaries of review.
1.3   Identify & document risks.
1.4   Define assignment success.
1.5   Define audit/assurance resources required.
1.6   Define deliverables.
1.7   Communicate the process.
2. MOBILE DEVICE SECURITY
2.1 Mobile Device Security Policy
2.2 Risk Management
2.3 Device Management
2.4 Access Control
2.5 Stored Data
2.6 Malware Avoidance
2.7 Secure Transmission
2.8 Awareness Training
Conclusion
s
Conclusion
Business executives rarely know where to start. While mobile
technology is burgeoning with new innovations, time-tested
mitigation techniques and evolving tool sets are available and
highly effective. Organizations need to:
• Recognize mobile technology risks + commit resources to take
   decisive actions to control their vulnerabilities
• Inventory high-value data & most serious exposures
• Evaluate which countermeasures directly & cost-effectively reduce
   their highest risks
• Implement reasonable strategy that phases in improvements in
   information security commensurate with risk & resources
• Commit ongoing resources to revise & refine over time as
   circumstances evolve
For business leaders who fail to implement sufficient safeguards, the
costs can be catastrophic. With the integration of an increasingly
networked world, their problems become everyone’s.
ISACA smart security for smart devices
ISACA smart security for smart devices
Your (device) security solution
        is as strong …




                   … as its weakest link
“I don’t care how many millions
     of dollars you spend on
      security technology.
If you don’t have people trained
   properly, I’m going to get in
       if I want to get in.”
                 Susie Thunder,
                     Cyberpunk
Contact information

   Marc Vael
   CISA, CISM, CISSP, CRISC, CGEIT, ITIL Service Manager
   International Vice-President

   ISACA
   3701 Algonquin Road, Suite 1010
   Rolling Meadows
   IL 60008 USA
   http://www.isaca.org/

   marc@vael.net
   http://www.linkedin.com/in/marcvael
   http://twitter.com/marcvael
ISACA smart security for smart devices

More Related Content

PDF
2014 the future evolution of cybersecurity
PDF
Cybersecurity Roadmap Development for Executives
PDF
The Future of Cyber Security - Matthew Rosenquist
PDF
Chapter 12 iso 27001 awareness
PPTX
Your cyber security webinar
PDF
IBM Security Strategy Overview
PDF
Securing the Cloud by Matthew Rosenquist 2016
PDF
Pivotal Role of HR in Cybersecurity
2014 the future evolution of cybersecurity
Cybersecurity Roadmap Development for Executives
The Future of Cyber Security - Matthew Rosenquist
Chapter 12 iso 27001 awareness
Your cyber security webinar
IBM Security Strategy Overview
Securing the Cloud by Matthew Rosenquist 2016
Pivotal Role of HR in Cybersecurity

What's hot (19)

PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PDF
Strategy considerations for building a security operations center
PDF
System of security controls
PDF
True Cost of Data Breaches
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PDF
Mergers and Acquisition Security - Areas of Interest
PDF
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
PDF
Cybersecurity for Energy: Moving Beyond Compliance
PPTX
SAM05_Barber PW (7-9-15)
PDF
Security Transformation Services
PDF
"Thinking diffrent" about your information security strategy
PPTX
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
PPTX
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
PPTX
IT Security and Management - Prelim Lessons by Mark John Lado
PPTX
Practical steps for assessing tablet & mobile device security
PDF
Security operations center 5 security controls
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
PPTX
Your cyber security webinar
Dealing with Information Security, Risk Management & Cyber Resilience
Strategy considerations for building a security operations center
System of security controls
True Cost of Data Breaches
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Mergers and Acquisition Security - Areas of Interest
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Cybersecurity for Energy: Moving Beyond Compliance
SAM05_Barber PW (7-9-15)
Security Transformation Services
"Thinking diffrent" about your information security strategy
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
IT Security and Management - Prelim Lessons by Mark John Lado
Practical steps for assessing tablet & mobile device security
Security operations center 5 security controls
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Your cyber security webinar
Ad

Similar to ISACA smart security for smart devices (20)

PDF
6 Ways to Fight the Data Loss Gremlins
PDF
5 Steps to Mobile Risk Management
DOC
report on Mobile security
PDF
Protect your hybrid workforce across the attack chain
PDF
DigaCore _ Why Senior Living Staff Need Strong Mobile Device Security.pdf
PDF
Mobile Security: 5 Steps to Mobile Risk Management
PDF
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
PDF
Why Cybersecurity Services Are Non-Negotiable in Today’s Digital World.pdf
PDF
ZS Infotech v1.0
PDF
The Role Of Data Analytics In Cybersecurity
PDF
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
PPTX
Best Data Security Management: A Complete Guide for 2025
PPTX
Strengthening Data Rooms Amidst Rising Cyber Threats
PDF
Delve Labs - Upcoming Security Challenges for the Internet of Things
PPTX
What every executive needs to know about information technology security
PPT
Cognitive security
PDF
AGEOS Infrastructure Cyber Security White Paper
PDF
Security White Paper
PDF
Safeguard Your Business
PDF
Exploring Cybersecurity Services: Types, Relevance, and Becoming a Pro
6 Ways to Fight the Data Loss Gremlins
5 Steps to Mobile Risk Management
report on Mobile security
Protect your hybrid workforce across the attack chain
DigaCore _ Why Senior Living Staff Need Strong Mobile Device Security.pdf
Mobile Security: 5 Steps to Mobile Risk Management
5 steps-to-mobile-risk-management-whitepaper-golden-gekko
 
Why Cybersecurity Services Are Non-Negotiable in Today’s Digital World.pdf
ZS Infotech v1.0
The Role Of Data Analytics In Cybersecurity
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Best Data Security Management: A Complete Guide for 2025
Strengthening Data Rooms Amidst Rising Cyber Threats
Delve Labs - Upcoming Security Challenges for the Internet of Things
What every executive needs to know about information technology security
Cognitive security
AGEOS Infrastructure Cyber Security White Paper
Security White Paper
Safeguard Your Business
Exploring Cybersecurity Services: Types, Relevance, and Becoming a Pro
Ad

More from Marc Vael (20)

PDF
How secure are chat and webconf tools
PDF
my experience as ciso
PDF
Advantages of privacy by design in IoE
PDF
Cybersecurity governance existing frameworks (nov 2015)
PDF
Cybersecurity nexus vision
PDF
ISACA Reporting relevant IT risks to stakeholders
PDF
Cloud security lessons learned and audit
PDF
Value-added it auditing
PDF
ISACA Internet of Things open forum presentation
PDF
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
PDF
The value of big data analytics
PDF
Social media risks and controls
PDF
The view of auditor on cybercrime
PDF
ISACA Mobile Payments Forum presentation
PDF
Belgian Data Protection Commission's new audit programme
PDF
ISACA Cloud Computing Risks
PDF
Information security awareness (sept 2012) bis handout
PPTX
Securing big data (july 2012)
PDF
Valuendo cyberwar and security (jan 2012) handout
PDF
How to handle multilayered IT security today
How secure are chat and webconf tools
my experience as ciso
Advantages of privacy by design in IoE
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity nexus vision
ISACA Reporting relevant IT risks to stakeholders
Cloud security lessons learned and audit
Value-added it auditing
ISACA Internet of Things open forum presentation
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
The value of big data analytics
Social media risks and controls
The view of auditor on cybercrime
ISACA Mobile Payments Forum presentation
Belgian Data Protection Commission's new audit programme
ISACA Cloud Computing Risks
Information security awareness (sept 2012) bis handout
Securing big data (july 2012)
Valuendo cyberwar and security (jan 2012) handout
How to handle multilayered IT security today

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Cloud computing and distributed systems.
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Understanding_Digital_Forensics_Presentation.pptx
Approach and Philosophy of On baking technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Digital-Transformation-Roadmap-for-Companies.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Advanced methodologies resolving dimensionality complications for autism neur...
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
MYSQL Presentation for SQL database connectivity
Network Security Unit 5.pdf for BCA BBA.
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The AUB Centre for AI in Media Proposal.docx
Cloud computing and distributed systems.
cuic standard and advanced reporting.pdf
Encapsulation_ Review paper, used for researhc scholars
20250228 LYD VKU AI Blended-Learning.pptx

ISACA smart security for smart devices

  • 1. Smart Security for Smart Mobile Devices Marc Vael International Vice-President
  • 2. Smart Mobile Device Definition An electronic device that is • cordless (unless while being charged), • mobile (easily transportable), • always connected (via WiFi, 3G, 4G etc.) • capable of voice/video communication, internet browsing, "geo-location" (for search purposes) and that can operate to some extent autonomously.
  • 6. Smart Mobile Device Business Benefits 1. Increased workforce productivity—facilitates completion of work offsite (+40%). 2. Improved customer service—sales person or account manager can access the CRM system while at a customer site + provide ad hoc solutions & current customer account information. 3. Response to customer problems or questions at any time—35% improvement in customer satisfaction in best-in-business enterprises. 4. Improved turnaround times for problem resolution—more flexibility facing the challenges of time zones or office hours. 5. Increased business process efficiency—shortened & more efficient business processes. SCM+ by providing employees with information to speed the capture of inbound supply chain data + shortening feedback loop between supply chain and production planning. 6. Employee security & safety—one of the first reasons for mobile device adoption: allow employees to travel to/from remote locations while staying in touch. 7. Employee retention—management creates positives for business & employees. Using mobile devices can improve work-life balance by facilitating the ability of employees to work remotely: increase employee retention by up to 25%
  • 7. Smart Mobile Device Business Benefits
  • 11. Impact of an attack on the business
  • 12. Smart Mobile Device Risks ISACA, Business Risks & Security Assessment for Mobile Devices, January 2008
  • 13. Smart Mobile Device Risks ISACA, Secure Mobile Devices, 20 July 2010, page 6
  • 17. Mobile Device Security Issues • Threats differ by industry (e.g. intelligence/security/ police forces, fuel and energy, health and disease control, transportation, media, financial, food, retail, etc.); thus countermeasures must appropriately match the threat. • Cost-benefit case for mobile devices depends solely on the value of corporate data at risk. Thus, critical data must be inventoried + appropriate security solutions implemented. • Businesses can not manage what they can not identify, track or measure. Critical information is not always inventoried and proactively secured. • Some companies outsource network security. When the third party employees leave, what customer data leave with them? Business data are available to providers with different business goals and objectives.
  • 18. Mobile Device Security Issues • Network security issues include: ‣ Conventional firewall and VPN security systems are inadequate. ‣ Lack of integration with evolving WAN network security solutions. ‣ A blurred network perimeter can cause the boundary between the “private and locally managed and owned” side of a network and the “public and usually provider-managed” side of a network to be less clear. ‣ If communication can be intercepted, piggybacked, impersonated or rerouted to “bad” people, “good” people can look “bad” and “bad” people can look “good” from any location. ‣ Encrypted remote connections are assumed to be secure. Little consideration is given to securing the end point. E-mail and other communications are encrypted only from phone to phone, or mobile device to server. Beyond that point, e-mail, instant messages and file transfers may be transmitted unencrypted over the Internet. ‣ Ad hoc service provisioning: requesting and receiving application service on demand wherever one is located.
  • 22. Business Model for Information Security
  • 24. ISACA, Business Risks & Security Assessment for Mobile Devices, January 2008
  • 25. ISACA, Business Risks & Security Assessment for Mobile Devices, January 2008
  • 27. Smart device security strategies Policies & Standards
  • 29. Smart device security strategies EDUCATION!
  • 30. Smart device security strategies Measuring performance
  • 31. Smart device security metrics Most common security metrics used in evaluating the adequacy of mobile device security include: • Number of breaches or successful attacks • Virus protection and frequency of virus definition updates • Currency of patch management on the servers • Compliance with federal regulations • Cost of security solutions • Cost of loss • Evaluation of risk Are these metrics sufficient? Do you factor total cost of ownership? How do you measure the benefit & value of mobile devices and the security solutions? So, how can CISOs explain the value of incorporating adequate security?
  • 34. Auditing Mobile Device Security 1. PLANNING & SCOPING THE AUDIT 1.1 Define audit/assurance objectives. 1.2 Define boundaries of review. 1.3 Identify & document risks. 1.4 Define assignment success. 1.5 Define audit/assurance resources required. 1.6 Define deliverables. 1.7 Communicate the process. 2. MOBILE DEVICE SECURITY 2.1 Mobile Device Security Policy 2.2 Risk Management 2.3 Device Management 2.4 Access Control 2.5 Stored Data 2.6 Malware Avoidance 2.7 Secure Transmission 2.8 Awareness Training
  • 36. Conclusion Business executives rarely know where to start. While mobile technology is burgeoning with new innovations, time-tested mitigation techniques and evolving tool sets are available and highly effective. Organizations need to: • Recognize mobile technology risks + commit resources to take decisive actions to control their vulnerabilities • Inventory high-value data & most serious exposures • Evaluate which countermeasures directly & cost-effectively reduce their highest risks • Implement reasonable strategy that phases in improvements in information security commensurate with risk & resources • Commit ongoing resources to revise & refine over time as circumstances evolve For business leaders who fail to implement sufficient safeguards, the costs can be catastrophic. With the integration of an increasingly networked world, their problems become everyone’s.
  • 39. Your (device) security solution is as strong … … as its weakest link
  • 40. “I don’t care how many millions of dollars you spend on security technology. If you don’t have people trained properly, I’m going to get in if I want to get in.” Susie Thunder, Cyberpunk
  • 41. Contact information Marc Vael CISA, CISM, CISSP, CRISC, CGEIT, ITIL Service Manager International Vice-President ISACA 3701 Algonquin Road, Suite 1010 Rolling Meadows IL 60008 USA http://www.isaca.org/ marc@vael.net http://www.linkedin.com/in/marcvael http://twitter.com/marcvael