Toys in the office 11

42
You Got Chocolate On My iPad! Barry Caplin Chief Information Security Officer MN Department of Human Services MN Gov’t. IT Symposium Session 100: Thurs. Dec. 8, 2011 [email protected] [email protected], @bcaplin, +barry caplin (Toys in the Office)

description

2011 may be the "year of the handheld". That is unless 2010 was! iPad sales exceeded all expectations in 2010. For the holiday season, many manufacturers came out with (and are coming out with) tablets. iPhones and Android devices can be seen everywhere... including the office. That means that people want to use these personal devices for work for a variety of reasons: they are more convenient; might be more powerful than company-issued gear; easy interfaces; they can carry less equipment, but, perhaps most importantly; these devices are finally like "real" computers. But use of these personally owned devices bring all kinds of security concerns including data leakage and vulnerabilities in these newer operating systems and apps. We'll take a look at the convergence of mobile and desktop computing devices, security concerns and discuss some potential solutions. Session Learning Objectives: 1. Define the convergence of mobile and desktop computing devices. 2. Discuss the tablet phenomenon. 3. Review security concerns with the use of these devices, particularly employee-owned. 4. Discuss possible solutions.

Transcript of Toys in the office 11

Page 1: Toys in the office 11

You Got Chocolate On My iPad!

Barry Caplin

Chief Information Security Officer

MN Department of Human Services

MN Gov’t. IT Symposium

Session 100: Thurs. Dec. 8, 2011

[email protected]

[email protected], @bcaplin, +barry caplin

(Toys in the Office)

Page 2: Toys in the office 11
Page 3: Toys in the office 11

http://about.me/barrycaplin

Page 4: Toys in the office 11
Page 5: Toys in the office 11
Page 6: Toys in the office 11

Apr. 3, 2010

300K ipads1M apps250K ebooks… day 1!

Page 7: Toys in the office 11
Page 8: Toys in the office 11
Page 9: Toys in the office 11

http://www.bbspot.com/News/2010/03/should-i-buy-

an-ipad.html

Page 10: Toys in the office 11
Page 11: Toys in the office 11

Don't Touch!

Pharmaceuticalcoating

Page 12: Toys in the office 11

• 17% have > 1 in their household• 37% - their partner uses it• 14% bought cause their kid has one• 19% considering purchasing another

http://today.yougov.co.uk/sites/today.yougov.co.uk/files/Tablet_ownership_in_households.pdf

Of iPad owners...

Page 13: Toys in the office 11
Page 14: Toys in the office 11
Page 15: Toys in the office 11
Page 16: Toys in the office 11
Page 17: Toys in the office 11
Page 18: Toys in the office 11

Our Story Begins...

Page 19: Toys in the office 11

PEDs

Computers

Device Convergence

Page 20: Toys in the office 11

Example

• The “PED” policy• Personal Electronic Device

• Acceptable use• Connections• Data storage

Page 21: Toys in the office 11

1 Day

Page 22: Toys in the office 11

5 Stages of Tablet Grief

• Surprise• Fear• Concern• Understanding• Evangelism

Page 23: Toys in the office 11

Considerations

Page 24: Toys in the office 11

What needs to change for “local” remote access?

Page 25: Toys in the office 11

BYO

Page 26: Toys in the office 11

BYO

BYOC or BYOD

Page 27: Toys in the office 11

Security Concerns

Page 28: Toys in the office 11

Data Leakage

Page 29: Toys in the office 11

Unauthorized Access

Page 30: Toys in the office 11

“Authorized” Access

Page 31: Toys in the office 11

Risk v Hype

Page 32: Toys in the office 11
Page 33: Toys in the office 11
Page 34: Toys in the office 11

How can we do BYOC?

Page 35: Toys in the office 11

Method 1 - Sync

• Direct or Net ConnectIssues:• Need Controls – a/v, app install control,

filtering, encryption, remote detonation• Authentication – 2-factor?• Leakage!• Support

Page 36: Toys in the office 11

Method 2 – ssl vpn• Citrix or similarPros:• Leakage – no remnants; disable screen

scrape, local save, print• Reduced support needed• Web filtering coveredIssues:• Unauthorized access still an issue; User

experience; Support

Page 37: Toys in the office 11

Method 3 – data/app segregation• Encrypted sandbox• Separate work and home• Many productsPros:• Better user experience• Central management/policy• Many products – local/cloud• Leakage – config separation, encryptionIssues: access ; support; cloud issues

Page 38: Toys in the office 11

DHS view

• Policy• Supervisor

approval• Citrix only• No Gov't records

on POE (unencrypted)

• 3G or wired

• Guest wireless• 802.1x• FAQs for

users/sups• Metrics

Page 39: Toys in the office 11

Other Issues

• Notes or manually entered data• Enterprise email/OWA• Discovery• Voicemail/video

Page 40: Toys in the office 11

The Future

• More tablets/phones/small devices• More “slim” OS's – chrome, android,

ios, etc• Cost savings/stipend?• Cloud• User Experience – Citrix GoldenGate,

Divide, Good• BES Fusion

Page 41: Toys in the office 11

Capabilities to Consider

• Device encryption• Transport encryption• Complex PWs/policy• VPN support• Disable camera• Restrict/block apps• Anti-malware InfoWorld March 2011 MDM Deep

Dive

• Restrict/block networks

• Remote lockout• Remote/selected wipe• Policy enforcement• OTA management• 2-factor/OTP

Page 42: Toys in the office 11

Discussion…

Slides at http://slideshare.net/bcaplin

[email protected]

[email protected], @bcaplin, +barry caplin