SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
Mobile Security:
Preparing for the 2017
Threat Landscape
ISMG SECURITY EXECUTIVE ROUNDTABLE
SPONSORED BY BLACKBERRY
For years, security researchers and leaders have warned: “The
mobile threat is coming.” Well, in 2016 it arrived in full force.
Attackers are finding new, creative means of stealing user
credentials and penetrating critical systems via the mobile
channel. And healthcare entities—with an increasingly mobile
workforce and patient population—are square in the middle of
this expanding mobile threatscape, as attackers seek to capture
and monetize critical healthcare data.
What are the most prevalent new threats, and what are leading
organizations doing to bolster mobile security as we head into
2017?
Welcome to this exclusive executive roundtable discussion on
Mobile Security: Preparing for the 2017 Threat Landscape.
This invitation-only roundtable will draw upon insight from new
mobile security research developed by BlackBerry Limited,
which finds that 37 percent of healthcare organizations do
not believe their current mobile device security strategies are
sufficient. Through an interactive discussion of threats, strategies
and solutions, attendees will tackle topics such as:
•	 Top mobile threats to healthcare organizations;
•	 The most important elements of an effective mobile security
strategy;
•	 How to overcome resistance by users who view mobile
security controls as an obstruction.
In addition to the peer-to-peer dialogue, benefit from
BlackBerry’s new mobile security research, which reveals:
•	 73 percent of organizations have a mobile security strategy
in place, but only 3 percent say they have implemented the
highest levels of security;
•	 82 percent of executives say mobile security precautions
cause at least some frustration among employees;
•	 44 percent fear that too much mobile security will prevent
employees from doing their jobs.
You’ll have the opportunity to discuss this evolving mobile
threat landscape with a handful of senior executives and market
leaders in an informal, closed-door setting, from which you will
emerge with new strategies and solutions you can immediately
put to work.
Introduction
Key Takeaway: Through interactive dialogue, understand how your peers are
tackling emerging mobile security threats. Walk away with new insights and
ideas about the threat landscape and how to prepare to tackle it in 2017.
Mobile Security: Preparing for the 2017 Threat Landscape 2
Discussion Points
Among the questions to be presented for open discourse:
•	 How do you assess the state of mobile security at your organization today?
•	 What points stand out to you from the mobile security research that was just shared?
•	 What do you see as the top mobile security threats to your organizations heading into 2017?
•	 What level of resistance do you face from your own end users, who see security as an obstruction?
•	 How do you counter this resistance?
•	 What are the key elements of your mobile security strategy for 2017?
•	 What types of investments will you make to fulfill that strategy?
Mobile Security: Preparing for the 2017 Threat Landscape 3
About the Expert
Joining our discussion today, to share the latest insights and
case studies on mobile security, is:
Sinisha Patkovic
VP Government Solutions,
BlackBerry Limited
Patkovic leads a global team with the remit that the BlackBerry security product offering remains
relevant to both commercial and public sector organizations’ evolving set of needs. He has been
working on secure communications projects with many federal governments and has been actively
engaged in the dialog on emerging issues spanning cybersecurity, ecommerce, and privacy.
About BlackBerry
BlackBerry secures, connects and mobilizes the enterprise. For today’s enterprise of things,
BlackBerry provides devices and a software platform that enables and manages security, mobility
and communications between and among hardware, programs, mobile apps and the internet of
things. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates in North America,
Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker
symbols “BB” on the Toronto Stock Exchange and “BBRY” on the NASDAQ.
For more information, visit www.BlackBerry.com.
Mobile Security: Preparing for the 2017 Threat Landscape 4
About the Moderator
Leading our discussion today is:
Mathew Schwartz
Executive Editor,
Information Security Media Group
Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers
and electronic media. He has covered the information security and privacy sector throughout
his career. Before joining Information Security Media Group in 2014, where he now serves as the
Executive Editor, DataBreachToday, and European News Coverage, Schwartz was the information
security beat reporter for InformationWeek and a frequent contributor to DarkReading, amongst
other publications. He lives in Scotland.
About ISMG
Information Security Media Group (ISMG) is the world’s largest media organization devoted solely
to information security and risk management. Each of our 28 media properties provides education,
research and news that is specifically tailored to key vertical sectors including banking, healthcare
and the public sector; geographies from North America to Southeast Asia; and topics such as data
breach prevention, cyber risk assessment and fraud. Our annual global Summit series connects
senior security professionals with industry thought leaders to find actionable solutions for pressing
cybersecurity challenges.
For more information, visit www.ismgcorp.com.
Mobile Security: Preparing for the 2017 Threat Landscape 5
NOTE: In advance of this event, ISMG’s Mathew Schwartz spoke
with BlackBerry’s Sinisha Patkovic about mobile security. Here is
an excerpt of that conversation.
Research Highlights
MATHEW SCHWARTZ: BlackBerry recently conducted some
mobile security research. What would you say are some of the
highlights of this study?
SINISHA PATKOVIC: We do studies as frequently as we can to
understand what the market is asking and what new features,
new products and areas of innovation we need to work on. We’re
currently in a strong innovation cycle, with some of our new
products having to do with mobile security and the internet of
things, as well as helping enterprises in general do more with less
but in a very secure manner.
We’ve found that the threat landscape has been changing over
the past few years. Recently, we’ve seen one of those interesting
new IoT attacks which essentially bridge the omnipresence of
devices connected to the internet. As we have more and more
of these devices connected inside and outside the enterprise,
getting these comprehensive tools put into place by enterprise IT
is more critical than ever. This is pretty much in the center of our
interest.
Mobile Security Threats
SCHWARTZ: What do you see as some of the top mobile security
threats?
PATKOVIC: There is a huge variety of business in the UK, both
public and private sector, from small ones with very small IT
shops to large ones with sophisticated, layered enterprise IT
organizations. And each one deals with mobile security threats
differently.
Two things come to mind when we talk to organizations across
all sectors. One is that all of them actually have a lot of extremely
sensitive information, and they want to do everything in their
power to protect them. At the same time, they need to share
that data. So, they struggle with the challenge of collaborating
effectively while not losing that important control.
Two, organizations have become very conscious of the many
computerized and interconnected tools and devices they use,
all of which generate data. These tools and devices can be
compromised through vulnerabilities in supply chains or while in
operation. Either scenario can take out critical IT systems and put
data at risk.
As you can see, there is a desperate need for better, more secure
workflows during all of these processes.
CONTEXT
Discussion Points
Q&A with Sinisha Patkovic of BlackBerry on Mobile Security
“[H]ealthcare organizations have become
very conscious of the many computerized
and interconnected tools and devices
they use, all of which generate data.”
Mobile Security: Preparing for the 2017 Threat Landscape 6
User Resistance
SCHWARTZ: How can security leaders overcome this resistance
from end users who sometimes see security as an obstruction to
them being able to do their jobs?
PATKOVIC: You’ve just asked one of the most fundamental IT
security questions. And the answer to it is in the transparency
and the ease of use of security. Usability will win over anything
that’s thrown at the users. Users, typically, will go with the least
resistance, no matter what.
When organizations deploy secure file sharing systems, their
employees suddenly start accessing files from their phones,
desktops and laptops and share documents with their internal
colleagues as well as with their peers at other agencies. And they
can do so without fear of losing control. When employees realize
they can provision a document for sharing—or revoke that access
once it’s no longer needed—with a touch or a flick, they are more
effective and productive, and organizations are safer overall.
Mobile Security Strategy
SCHWARTZ: In today’s landscape, what are the key elements of a
mobile security strategy?
PATKOVIC: Organizations want to make sure security is baked in
at both the device and application level and layered in throughout.
That means they want ease of application deployment, and they
want ease of use in both corporate-owned devices, as well as
BYOD. They want simplicity and consistency of interface, but most
importantly, they want a really high level of security.
One of the biggest trends in today’s landscape, therefore,
is supplying easy to use, two-factor authentication over an
application container. This means you can bring your own
device to the enterprise and have it provisioned on the fly. You
can access your corporate apps whether you’re an employee
or coming from the outside as a partner. Your apps are pushed
to you on the fly, via two-factor authentication that’s easy to
revoke once you no longer need that access. Having that ease of
deployment for IT and ease of use for the end user is a win-win
strategy.
SCHWARTZ: Talk to me a little bit about BlackBerry. How are you
helping your customers respond better to today’s mobile threats?
PATKOVIC: Strategic mobility is the primary theme with our
customers today. We’re past the time when MDM or simplistic
EMM is sufficient. Shops that just deploy MDM controls see little
return on investment because their end users are unhappy with
its limited functionality. For instance, if your MDM tooling doesn’t
keep work and personal mailboxes segregated, you could lose
personal data on doctors’ BYOD devices if you have to remove
them or wipe them. Or worse, if your tooling does not allow for
work-specific access control, you will have to enforce a lock
on the entire device. This causes staff to be unable to respond
to personal or other emergencies outside of the organization
whenever their phone is locked, and your Help Desk will get
swamped with high-priority user calls.
We’ve done a tremendous amount of work on bringing together
the most comprehensive portfolio in terms of security and
enterprise mobility. It enables our customers to very quickly
create a secure, strategically protected mobile environment. We
help them devise a strategic path for them to secure their mobile
enterprise. We offer a very comprehensive and layered portfolio
that encompasses EMM, MDM, file sharing, container systems,
and two-factor authentication, all of which can work across all
devices in all modes of operation. They need just one tool set
to run, subscribe to and administer different sets of controls and
strategies to all of their various departments.
And the customers can really go and pick different departments
in their organization and deploy different sets of controls and
strategies for each with only one tool set­­—one tool set to run, one
tool set to subscribe to, and one tool set to administer.
Since January of 2016, we’ve won contracts with 11 out of 43
U.K. law enforcement agencies both in terms of switching from
competitive solutions and in terms of operating their suites with
the latest BlackBerry Enterprise Portfolio, which encompass EMM
tools, file-sharing and real-time secure chat, among other tools.
Our customers realize the opportunity we can provide them
and leverage our portfolio to provide their organization with a
sustainable mobile strategy that protects against threats and
improves productivity for the next several years. n
“Usability will win over anything
that’s thrown at the users. Users,
typically, will go with the least
resistance, no matter what.”
Mobile Security: Preparing for the 2017 Threat Landscape 7
902 Carnegie Center • Princeton, NJ • 08540 • www.ismgcorp.com
About ISMG
Information Security Media Group (ISMG) is the world’s largest media organisation devoted solely to information
security and risk management. Each of our 28 media properties provides education, research and news that is
specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from
North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud.
Our annual global Summit series connects senior security professionals with industry thought leaders to find
actionable solutions for pressing cybersecurity challenges.
Contact
(800) 944-0401 • sales@ismgcorp.com

Weitere ähnliche Inhalte

Was ist angesagt?

Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileNuno Alves
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis CommunicationBlackBerry
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What? Array Networks
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020IBM Security
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperBlackBerry
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityAndris Soroka
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareSatya Harish
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_ukJ
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
Security that works
Security that worksSecurity that works
Security that worksJames1280
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 

Was ist angesagt? (20)

Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis Communication
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
I Brought My Own Device. Now What?
I Brought My Own Device. Now What?I Brought My Own Device. Now What?
I Brought My Own Device. Now What?
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
MobileIron Presentation
MobileIron PresentationMobileIron Presentation
MobileIron Presentation
 
How BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White PaperHow BlackBerry Brings Android Security To Your Enterprise: White Paper
How BlackBerry Brings Android Security To Your Enterprise: White Paper
 
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile SecurityDSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
DSS ITSEC Conference 2012 - MobileIron MDM, MAM & Mobile Security
 
G05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management softwareG05.2012 magic quadrant for mobile device management software
G05.2012 magic quadrant for mobile device management software
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Mti byod wp_uk
Mti byod wp_ukMti byod wp_uk
Mti byod wp_uk
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Security that works
Security that worksSecurity that works
Security that works
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 

Andere mochten auch

BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry SecureBlackBerry
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat PreventionMarketingArrowECS_CZ
 
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APTBYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APTJimmy Shah
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attackerbugcrowd
 
2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the HumanPhishLabs
 
Los simpsons Nerea Vlada Aroa
Los simpsons Nerea Vlada AroaLos simpsons Nerea Vlada Aroa
Los simpsons Nerea Vlada Aroacefeli
 
Reflexion elviolinista
Reflexion elviolinistaReflexion elviolinista
Reflexion elviolinistaPIOLINPCR991
 
SUCCESS - Mobile Health 2012 - Launch and Iterate in Baby Steps
SUCCESS - Mobile Health 2012 - Launch and Iterate in Baby StepsSUCCESS - Mobile Health 2012 - Launch and Iterate in Baby Steps
SUCCESS - Mobile Health 2012 - Launch and Iterate in Baby StepsK9 Ventures
 
Challenge: Science, Technology, and Innovation and the Triple Bottom Line
Challenge: Science, Technology, and Innovation and the Triple Bottom LineChallenge: Science, Technology, and Innovation and the Triple Bottom Line
Challenge: Science, Technology, and Innovation and the Triple Bottom LineOlivier Serrat
 
Developing Great Team Presentations
Developing Great Team PresentationsDeveloping Great Team Presentations
Developing Great Team PresentationsErica Olson
 
Esos Raros Lenguajes Nuevos
Esos Raros Lenguajes NuevosEsos Raros Lenguajes Nuevos
Esos Raros Lenguajes NuevosEduardo Diaz
 
Ramping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for DevelopmentRamping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for DevelopmentOlivier Serrat
 
Las fuerzas de equilibrio en la economía
Las fuerzas de equilibrio en la economíaLas fuerzas de equilibrio en la economía
Las fuerzas de equilibrio en la economíaEmmanuel Aguilar
 

Andere mochten auch (17)

BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way ForwardBlackBerry Is Back: Strategy and Product Updates Point the Way Forward
BlackBerry Is Back: Strategy and Product Updates Point the Way Forward
 
Introducing BlackBerry Secure
Introducing BlackBerry SecureIntroducing BlackBerry Secure
Introducing BlackBerry Secure
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
 
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APTBYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
BYOD is now BYOT (Bring Your Own Threat) – Current Trends in Mobile APT
 
Mobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the AttackerMobile Application Security Threats through the Eyes of the Attacker
Mobile Application Security Threats through the Eyes of the Attacker
 
2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human2017 Phishing Trends & Intelligence Report: Hacking the Human
2017 Phishing Trends & Intelligence Report: Hacking the Human
 
Fuerzas del mercado
Fuerzas del mercadoFuerzas del mercado
Fuerzas del mercado
 
Los simpsons Nerea Vlada Aroa
Los simpsons Nerea Vlada AroaLos simpsons Nerea Vlada Aroa
Los simpsons Nerea Vlada Aroa
 
Reflexion elviolinista
Reflexion elviolinistaReflexion elviolinista
Reflexion elviolinista
 
SUCCESS - Mobile Health 2012 - Launch and Iterate in Baby Steps
SUCCESS - Mobile Health 2012 - Launch and Iterate in Baby StepsSUCCESS - Mobile Health 2012 - Launch and Iterate in Baby Steps
SUCCESS - Mobile Health 2012 - Launch and Iterate in Baby Steps
 
Challenge: Science, Technology, and Innovation and the Triple Bottom Line
Challenge: Science, Technology, and Innovation and the Triple Bottom LineChallenge: Science, Technology, and Innovation and the Triple Bottom Line
Challenge: Science, Technology, and Innovation and the Triple Bottom Line
 
Developing Great Team Presentations
Developing Great Team PresentationsDeveloping Great Team Presentations
Developing Great Team Presentations
 
NESA DC 2017 Action Plan
NESA DC 2017 Action PlanNESA DC 2017 Action Plan
NESA DC 2017 Action Plan
 
Portafolio Modelado 3D
Portafolio Modelado 3DPortafolio Modelado 3D
Portafolio Modelado 3D
 
Esos Raros Lenguajes Nuevos
Esos Raros Lenguajes NuevosEsos Raros Lenguajes Nuevos
Esos Raros Lenguajes Nuevos
 
Ramping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for DevelopmentRamping Up Information and Communications Technology for Development
Ramping Up Information and Communications Technology for Development
 
Las fuerzas de equilibrio en la economía
Las fuerzas de equilibrio en la economíaLas fuerzas de equilibrio en la economía
Las fuerzas de equilibrio en la economía
 

Ähnlich wie Mobile Security: Preparing for the 2017 Threat Landscape

40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazineBradford Sims
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINETopCyberNewsMAGAZINE
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Daniel L. Cruz
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityMighty Guides, Inc.
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!DIGITALCONFEX
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxAhad
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfAhad
 

Ähnlich wie Mobile Security: Preparing for the 2017 Threat Landscape (20)

40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine40 under 40 in cybersecurity. top cyber news magazine
40 under 40 in cybersecurity. top cyber news magazine
 
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
40 under 40 in Cybersecurity 2022. Top Cyber News MAGAZINE
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!Security Redefined - Prevention is the future!!
Security Redefined - Prevention is the future!!
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Challenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber ConfidenceChallenging Insecurity: A Roadmap to Cyber Confidence
Challenging Insecurity: A Roadmap to Cyber Confidence
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
Cyber Immunity Unleashed: Explore the Future with iTech Magazine!
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Cyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptxCyber threat Intelligence Dubai - Ahad.pptx
Cyber threat Intelligence Dubai - Ahad.pptx
 
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdfThe Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
The Unconventional Guide to Cyber Threat Intelligence - Ahad.pdf
 

Mehr von BlackBerry

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner BenefitsBlackBerry
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesBlackBerry
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneBlackBerry
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)BlackBerry
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointBlackBerry
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our LivesBlackBerry
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkBlackBerry
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...BlackBerry
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry
 
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry
 
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry
 
BlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics BlackBerry
 
BlackBerry Docs To Go
BlackBerry Docs To GoBlackBerry Docs To Go
BlackBerry Docs To GoBlackBerry
 

Mehr von BlackBerry (20)

Infographic Partner Benefits
Infographic Partner BenefitsInfographic Partner Benefits
Infographic Partner Benefits
 
File Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial ServicesFile Sharing Use Cases in Financial Services
File Sharing Use Cases in Financial Services
 
Ottawa’s Autonomous Car Scene
Ottawa’s Autonomous Car SceneOttawa’s Autonomous Car Scene
Ottawa’s Autonomous Car Scene
 
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
Canada’s Hub of Autonomous Vehicle Innovation is in Kanatas (Ottawa)
 
The Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting PointThe Endpoint Is Just the Starting Point
The Endpoint Is Just the Starting Point
 
BlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of ThingsBlackBerry Software: Securing the Enterprise of Things
BlackBerry Software: Securing the Enterprise of Things
 
35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives35 Ways QNX Touches Our Lives
35 Ways QNX Touches Our Lives
 
Introducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to WorkIntroducing BlackBerry Work for End Users: A Better Way to Work
Introducing BlackBerry Work for End Users: A Better Way to Work
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
BlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & ManufacturingBlackBerry Workspaces: Solutions for Technology & Manufacturing
BlackBerry Workspaces: Solutions for Technology & Manufacturing
 
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
Make the Most Out of Your Deployment of BlackBerry Workspaces: Solutions for ...
 
BlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile ApplicationsBlackBerry Workspaces Mobile Applications
BlackBerry Workspaces Mobile Applications
 
BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment BlackBerry Workspaces: Solutions for Media & Entertainment
BlackBerry Workspaces: Solutions for Media & Entertainment
 
BlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for HealthcareBlackBerry Workspaces: Solutions for Healthcare
BlackBerry Workspaces: Solutions for Healthcare
 
BlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for GovernmentBlackBerry Workspaces: Solutions for Government
BlackBerry Workspaces: Solutions for Government
 
BlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & UtilitiesBlackBerry Workspaces: Solutions for Energy & Utilities
BlackBerry Workspaces: Solutions for Energy & Utilities
 
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
BlackBerry Workspaces: Integration with Data Loss Prevention (DLP)
 
BlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity ConnectorsBlackBerry Workspaces: Authentication and Identity Connectors
BlackBerry Workspaces: Authentication and Identity Connectors
 
BlackBerry Dynamics
BlackBerry Dynamics BlackBerry Dynamics
BlackBerry Dynamics
 
BlackBerry Docs To Go
BlackBerry Docs To GoBlackBerry Docs To Go
BlackBerry Docs To Go
 

Kürzlich hochgeladen

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfIdiosysTechnologies1
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 

Kürzlich hochgeladen (20)

Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Best Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdfBest Web Development Agency- Idiosys USA.pdf
Best Web Development Agency- Idiosys USA.pdf
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 

Mobile Security: Preparing for the 2017 Threat Landscape

  • 1. Mobile Security: Preparing for the 2017 Threat Landscape ISMG SECURITY EXECUTIVE ROUNDTABLE SPONSORED BY BLACKBERRY
  • 2. For years, security researchers and leaders have warned: “The mobile threat is coming.” Well, in 2016 it arrived in full force. Attackers are finding new, creative means of stealing user credentials and penetrating critical systems via the mobile channel. And healthcare entities—with an increasingly mobile workforce and patient population—are square in the middle of this expanding mobile threatscape, as attackers seek to capture and monetize critical healthcare data. What are the most prevalent new threats, and what are leading organizations doing to bolster mobile security as we head into 2017? Welcome to this exclusive executive roundtable discussion on Mobile Security: Preparing for the 2017 Threat Landscape. This invitation-only roundtable will draw upon insight from new mobile security research developed by BlackBerry Limited, which finds that 37 percent of healthcare organizations do not believe their current mobile device security strategies are sufficient. Through an interactive discussion of threats, strategies and solutions, attendees will tackle topics such as: • Top mobile threats to healthcare organizations; • The most important elements of an effective mobile security strategy; • How to overcome resistance by users who view mobile security controls as an obstruction. In addition to the peer-to-peer dialogue, benefit from BlackBerry’s new mobile security research, which reveals: • 73 percent of organizations have a mobile security strategy in place, but only 3 percent say they have implemented the highest levels of security; • 82 percent of executives say mobile security precautions cause at least some frustration among employees; • 44 percent fear that too much mobile security will prevent employees from doing their jobs. You’ll have the opportunity to discuss this evolving mobile threat landscape with a handful of senior executives and market leaders in an informal, closed-door setting, from which you will emerge with new strategies and solutions you can immediately put to work. Introduction Key Takeaway: Through interactive dialogue, understand how your peers are tackling emerging mobile security threats. Walk away with new insights and ideas about the threat landscape and how to prepare to tackle it in 2017. Mobile Security: Preparing for the 2017 Threat Landscape 2
  • 3. Discussion Points Among the questions to be presented for open discourse: • How do you assess the state of mobile security at your organization today? • What points stand out to you from the mobile security research that was just shared? • What do you see as the top mobile security threats to your organizations heading into 2017? • What level of resistance do you face from your own end users, who see security as an obstruction? • How do you counter this resistance? • What are the key elements of your mobile security strategy for 2017? • What types of investments will you make to fulfill that strategy? Mobile Security: Preparing for the 2017 Threat Landscape 3
  • 4. About the Expert Joining our discussion today, to share the latest insights and case studies on mobile security, is: Sinisha Patkovic VP Government Solutions, BlackBerry Limited Patkovic leads a global team with the remit that the BlackBerry security product offering remains relevant to both commercial and public sector organizations’ evolving set of needs. He has been working on secure communications projects with many federal governments and has been actively engaged in the dialog on emerging issues spanning cybersecurity, ecommerce, and privacy. About BlackBerry BlackBerry secures, connects and mobilizes the enterprise. For today’s enterprise of things, BlackBerry provides devices and a software platform that enables and manages security, mobility and communications between and among hardware, programs, mobile apps and the internet of things. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates in North America, Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols “BB” on the Toronto Stock Exchange and “BBRY” on the NASDAQ. For more information, visit www.BlackBerry.com. Mobile Security: Preparing for the 2017 Threat Landscape 4
  • 5. About the Moderator Leading our discussion today is: Mathew Schwartz Executive Editor, Information Security Media Group Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the Executive Editor, DataBreachToday, and European News Coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, amongst other publications. He lives in Scotland. About ISMG Information Security Media Group (ISMG) is the world’s largest media organization devoted solely to information security and risk management. Each of our 28 media properties provides education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Our annual global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges. For more information, visit www.ismgcorp.com. Mobile Security: Preparing for the 2017 Threat Landscape 5
  • 6. NOTE: In advance of this event, ISMG’s Mathew Schwartz spoke with BlackBerry’s Sinisha Patkovic about mobile security. Here is an excerpt of that conversation. Research Highlights MATHEW SCHWARTZ: BlackBerry recently conducted some mobile security research. What would you say are some of the highlights of this study? SINISHA PATKOVIC: We do studies as frequently as we can to understand what the market is asking and what new features, new products and areas of innovation we need to work on. We’re currently in a strong innovation cycle, with some of our new products having to do with mobile security and the internet of things, as well as helping enterprises in general do more with less but in a very secure manner. We’ve found that the threat landscape has been changing over the past few years. Recently, we’ve seen one of those interesting new IoT attacks which essentially bridge the omnipresence of devices connected to the internet. As we have more and more of these devices connected inside and outside the enterprise, getting these comprehensive tools put into place by enterprise IT is more critical than ever. This is pretty much in the center of our interest. Mobile Security Threats SCHWARTZ: What do you see as some of the top mobile security threats? PATKOVIC: There is a huge variety of business in the UK, both public and private sector, from small ones with very small IT shops to large ones with sophisticated, layered enterprise IT organizations. And each one deals with mobile security threats differently. Two things come to mind when we talk to organizations across all sectors. One is that all of them actually have a lot of extremely sensitive information, and they want to do everything in their power to protect them. At the same time, they need to share that data. So, they struggle with the challenge of collaborating effectively while not losing that important control. Two, organizations have become very conscious of the many computerized and interconnected tools and devices they use, all of which generate data. These tools and devices can be compromised through vulnerabilities in supply chains or while in operation. Either scenario can take out critical IT systems and put data at risk. As you can see, there is a desperate need for better, more secure workflows during all of these processes. CONTEXT Discussion Points Q&A with Sinisha Patkovic of BlackBerry on Mobile Security “[H]ealthcare organizations have become very conscious of the many computerized and interconnected tools and devices they use, all of which generate data.” Mobile Security: Preparing for the 2017 Threat Landscape 6
  • 7. User Resistance SCHWARTZ: How can security leaders overcome this resistance from end users who sometimes see security as an obstruction to them being able to do their jobs? PATKOVIC: You’ve just asked one of the most fundamental IT security questions. And the answer to it is in the transparency and the ease of use of security. Usability will win over anything that’s thrown at the users. Users, typically, will go with the least resistance, no matter what. When organizations deploy secure file sharing systems, their employees suddenly start accessing files from their phones, desktops and laptops and share documents with their internal colleagues as well as with their peers at other agencies. And they can do so without fear of losing control. When employees realize they can provision a document for sharing—or revoke that access once it’s no longer needed—with a touch or a flick, they are more effective and productive, and organizations are safer overall. Mobile Security Strategy SCHWARTZ: In today’s landscape, what are the key elements of a mobile security strategy? PATKOVIC: Organizations want to make sure security is baked in at both the device and application level and layered in throughout. That means they want ease of application deployment, and they want ease of use in both corporate-owned devices, as well as BYOD. They want simplicity and consistency of interface, but most importantly, they want a really high level of security. One of the biggest trends in today’s landscape, therefore, is supplying easy to use, two-factor authentication over an application container. This means you can bring your own device to the enterprise and have it provisioned on the fly. You can access your corporate apps whether you’re an employee or coming from the outside as a partner. Your apps are pushed to you on the fly, via two-factor authentication that’s easy to revoke once you no longer need that access. Having that ease of deployment for IT and ease of use for the end user is a win-win strategy. SCHWARTZ: Talk to me a little bit about BlackBerry. How are you helping your customers respond better to today’s mobile threats? PATKOVIC: Strategic mobility is the primary theme with our customers today. We’re past the time when MDM or simplistic EMM is sufficient. Shops that just deploy MDM controls see little return on investment because their end users are unhappy with its limited functionality. For instance, if your MDM tooling doesn’t keep work and personal mailboxes segregated, you could lose personal data on doctors’ BYOD devices if you have to remove them or wipe them. Or worse, if your tooling does not allow for work-specific access control, you will have to enforce a lock on the entire device. This causes staff to be unable to respond to personal or other emergencies outside of the organization whenever their phone is locked, and your Help Desk will get swamped with high-priority user calls. We’ve done a tremendous amount of work on bringing together the most comprehensive portfolio in terms of security and enterprise mobility. It enables our customers to very quickly create a secure, strategically protected mobile environment. We help them devise a strategic path for them to secure their mobile enterprise. We offer a very comprehensive and layered portfolio that encompasses EMM, MDM, file sharing, container systems, and two-factor authentication, all of which can work across all devices in all modes of operation. They need just one tool set to run, subscribe to and administer different sets of controls and strategies to all of their various departments. And the customers can really go and pick different departments in their organization and deploy different sets of controls and strategies for each with only one tool set­­—one tool set to run, one tool set to subscribe to, and one tool set to administer. Since January of 2016, we’ve won contracts with 11 out of 43 U.K. law enforcement agencies both in terms of switching from competitive solutions and in terms of operating their suites with the latest BlackBerry Enterprise Portfolio, which encompass EMM tools, file-sharing and real-time secure chat, among other tools. Our customers realize the opportunity we can provide them and leverage our portfolio to provide their organization with a sustainable mobile strategy that protects against threats and improves productivity for the next several years. n “Usability will win over anything that’s thrown at the users. Users, typically, will go with the least resistance, no matter what.” Mobile Security: Preparing for the 2017 Threat Landscape 7
  • 8. 902 Carnegie Center • Princeton, NJ • 08540 • www.ismgcorp.com About ISMG Information Security Media Group (ISMG) is the world’s largest media organisation devoted solely to information security and risk management. Each of our 28 media properties provides education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Our annual global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges. Contact (800) 944-0401 • sales@ismgcorp.com