+ All Categories
Transcript
Page 1: Toys in the office 11

You Got Chocolate On My iPad!

Barry Caplin

Chief Information Security Officer

MN Department of Human Services

MN Gov’t. IT Symposium

Session 100: Thurs. Dec. 8, 2011

[email protected]

[email protected], @bcaplin, +barry caplin

(Toys in the Office)

Page 2: Toys in the office 11
Page 3: Toys in the office 11

http://about.me/barrycaplin

Page 4: Toys in the office 11
Page 5: Toys in the office 11
Page 6: Toys in the office 11

Apr. 3, 2010

300K ipads1M apps250K ebooks… day 1!

Page 7: Toys in the office 11
Page 8: Toys in the office 11
Page 9: Toys in the office 11

http://www.bbspot.com/News/2010/03/should-i-buy-

an-ipad.html

Page 10: Toys in the office 11
Page 11: Toys in the office 11

Don't Touch!

Pharmaceuticalcoating

Page 12: Toys in the office 11

• 17% have > 1 in their household• 37% - their partner uses it• 14% bought cause their kid has one• 19% considering purchasing another

http://today.yougov.co.uk/sites/today.yougov.co.uk/files/Tablet_ownership_in_households.pdf

Of iPad owners...

Page 13: Toys in the office 11
Page 14: Toys in the office 11
Page 15: Toys in the office 11
Page 16: Toys in the office 11
Page 17: Toys in the office 11
Page 18: Toys in the office 11

Our Story Begins...

Page 19: Toys in the office 11

PEDs

Computers

Device Convergence

Page 20: Toys in the office 11

Example

• The “PED” policy• Personal Electronic Device

• Acceptable use• Connections• Data storage

Page 21: Toys in the office 11

1 Day

Page 22: Toys in the office 11

5 Stages of Tablet Grief

• Surprise• Fear• Concern• Understanding• Evangelism

Page 23: Toys in the office 11

Considerations

Page 24: Toys in the office 11

What needs to change for “local” remote access?

Page 25: Toys in the office 11

BYO

Page 26: Toys in the office 11

BYO

BYOC or BYOD

Page 27: Toys in the office 11

Security Concerns

Page 28: Toys in the office 11

Data Leakage

Page 29: Toys in the office 11

Unauthorized Access

Page 30: Toys in the office 11

“Authorized” Access

Page 31: Toys in the office 11

Risk v Hype

Page 32: Toys in the office 11
Page 33: Toys in the office 11
Page 34: Toys in the office 11

How can we do BYOC?

Page 35: Toys in the office 11

Method 1 - Sync

• Direct or Net ConnectIssues:• Need Controls – a/v, app install control,

filtering, encryption, remote detonation• Authentication – 2-factor?• Leakage!• Support

Page 36: Toys in the office 11

Method 2 – ssl vpn• Citrix or similarPros:• Leakage – no remnants; disable screen

scrape, local save, print• Reduced support needed• Web filtering coveredIssues:• Unauthorized access still an issue; User

experience; Support

Page 37: Toys in the office 11

Method 3 – data/app segregation• Encrypted sandbox• Separate work and home• Many productsPros:• Better user experience• Central management/policy• Many products – local/cloud• Leakage – config separation, encryptionIssues: access ; support; cloud issues

Page 38: Toys in the office 11

DHS view

• Policy• Supervisor

approval• Citrix only• No Gov't records

on POE (unencrypted)

• 3G or wired

• Guest wireless• 802.1x• FAQs for

users/sups• Metrics

Page 39: Toys in the office 11

Other Issues

• Notes or manually entered data• Enterprise email/OWA• Discovery• Voicemail/video

Page 40: Toys in the office 11

The Future

• More tablets/phones/small devices• More “slim” OS's – chrome, android,

ios, etc• Cost savings/stipend?• Cloud• User Experience – Citrix GoldenGate,

Divide, Good• BES Fusion

Page 41: Toys in the office 11

Capabilities to Consider

• Device encryption• Transport encryption• Complex PWs/policy• VPN support• Disable camera• Restrict/block apps• Anti-malware InfoWorld March 2011 MDM Deep

Dive

• Restrict/block networks

• Remote lockout• Remote/selected wipe• Policy enforcement• OTA management• 2-factor/OTP

Page 42: Toys in the office 11

Discussion…

Slides at http://slideshare.net/bcaplin

[email protected]

[email protected], @bcaplin, +barry caplin


Top Related