21
Copyright - 2008 Movidan, Inc. All rights reserved. 1 “Don’t think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion in a single event, if we have been paid appropriately for assuming that risk. We are not willing, though, to take on even very small exposures at prices that don’t reflect our evaluation of loss probabilities…Our behavior here parallels that which we employ in financial markets: Be fearful when others are greedy, and be greedy when others are fearful.” Warren Buffett, 2006 Shareholder Letter3

Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Embed Size (px)

Citation preview

Page 1: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 1

“Don’t think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion in a single event, if we have been paid appropriately for assuming that risk. We are not willing, though, to take on even very small exposures at prices that don’t reflect our evaluation of loss probabilities…Our behavior here parallels that which we employ in financial markets: Be fearful when others are greedy, and be greedy when others are fearful.”

Warren Buffett, 2006 Shareholder Letter3

Page 2: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 2

Risk Management in a Mobile World

Presented by Bruce Christofferson

Page 3: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 3

Agenda

Introduction Definitions Security Program Parts Risk Management Framework Smartphone Risk Evaluation Criteria Smartphone Controls to Implement Now Wrap Up

Page 4: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 4

Introduction

Security Program developer for several wireless telecom providers

Developed the Risk Management program for Cingular

Founded the Mobile Technology Security Center at AT&T

Now consulting at another Seattle area wireless telecom provider

Page 5: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 5

Definitions Feature vs. Smartphones

Feature phone – simple PIM and browser, limited capability Smartphone – full-featured PIM, browser, and other

applications

Mobile Worker Regularly works out of office or on the road

Company-Owned vs. Personally-Owned Smartphones

Defined by who owns the smartphone at the end of the day

Page 6: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 6

Survey Questions

A smartphone with company data – either personally or company owned?

Support mobile workers with smartphones?

Only allow company-owned smartphones to hold sensitive data?

Have clear policies and requirements governing the use of those smartphones?

Know what to do if your smartphone is lost or stolen?

Page 7: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 7

In the News

Good News…

“By 2010, smartphones will be primary tool of mobile workforce…” Ray Kurzweil, 2007 RSA conference

“Size and Growth of Smartphone Market Will Exceed Laptop Market for Next Five Years”

Smartphone OS-based phones will grow at more than a 30% compound annual growth rate for the next five years globally…

Instat.com, 11/13/2007

Not so good news…

“Mobile malware very active in first quarter of 2008” Kaspersky, SC Magazine, 5/12/08

“McAfee warns of mobile-malware threat” ZD Net Asia, 2/13/08

Page 8: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 8

Consider the Smartphone

Device size - a vulnerability

Pointsec Mobile Technologies, Taxi Study 2005 6 month period 85,619 mobile phones 21,460 PDAs

Pointsec Mobile Technologies, London Taxi Study 2006 6 Months 54,874 mobile phones 4,718 handheld PDAs

British Crime Survey, 2006 800,000 people were the victim of mobile phone theft 90 percent of these phones are generally barred from active use within 48 hours

Page 9: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 9

“Don’t think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion in a single event, if we have been paid appropriately for assuming that risk. We are not willing, though, to take on even very small exposures at prices that don’t reflect our evaluation of loss probabilities…Our behavior here parallels that which we employ in financial markets: Be fearful when others are greedy, and be greedy when others are fearful.”

-Warren Buffett, 2006 Shareholder Letter3

Page 10: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 10

A Security Program’s Parts

Metrics (Risk, Domain, Enterprise)

Business Needs and

Requirements

Processes

Defense

Reporting

Security Architecture

Risk ManagementPolicy and Standards

Data

Applications

Endpoints

Hosts

Network

SDLC

I dentity Management

Vulnerability Management

Threat Management

Security Assurance

whose eff orts lead to

Security Services

determine engagement of

Page 11: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 11

A Security Program’s Parts

Metrics (Risk, Domain, Enterprise)

Business Needs and

Requirements

Processes

Defense

Reporting

Security Architecture

Risk ManagementPolicy and Standards

Data

Applications

Endpoints

Hosts

Network

SDLC

I dentity Management

Vulnerability Management

Threat Management

Security Assurance

whose eff orts lead to

Security Services

determine engagement of

Page 12: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 12

Risk Management FrameworkRisk

I dentified?RMP & Risk Accepted?

Appeal Accepted?

No

Yes

Yes

Notifi cations; End

TerminateProject

No

Yes

Risk Assessment

Request (I ntake)

Risk AssessmentPerf ormed

Risk Mitigation Plan (RMP) Developed (iterative)

MitigationTracking

Risk and RMP Review

By Management

Page 13: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 13

Risk Management Framework

Risk I dentified?

RMP & Risk Accepted?

Appeal Accepted?

No

Yes

Yes

Notifi cations; End

TerminateProject

No

Yes

Risk Assessment

Request (I ntake)

Risk AssessmentPerf ormed

Risk Mitigation Plan (RMP) Developed (iterative)

MitigationTracking

Risk and RMP Review

By Management

Page 14: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 14

Definitions

Risk Management Risk Vulnerability Exploit Threat Likelihood Impact Security Control

Page 15: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 15

Smartphone Risk Evaluation OS/platform security Bypassing security features Remote “lock-down” Security Management Malware attacks Apps certified, signed, and/or verified Policy setting granularity Easily wiped or killed OS extensibility Peripheral protection Device security implementation Over-The-Air (OTA) or hardwired management

Page 16: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 16

Risk Calculations

Page 17: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 17

Risk Management Framework

Risk I dentified?

RMP & Risk Accepted?

Appeal Accepted?

No

Yes

Yes

Notifi cations; End

TerminateProject

No

Yes

Risk Assessment

Request (I ntake)

Risk AssessmentPerf ormed

Risk Mitigation Plan (RMP) Developed (iterative)

MitigationTracking

Risk and RMP Review

By Management

Page 18: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 18

Risk/Reward Equation

Page 19: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 19

Basic Smartphone Security Controls Strong passwords Device lock after period of inactivity Device wipe after X number invalid login attempt Data store encryption that supports eDiscovery

regulations Assess, control, and audit the download of third-party

applications Implement and enforce written smartphone security

policies Develop a lost/stolen device process Create awareness program to help users understand

their responsibilities in protecting sensitive company information

Page 20: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 20

Other Security Control Considerations Anti-Malware Software Everyone should play by the same rules A Mobile VPN and your perimeter Regulatory and contractual requirements Location based services (LBS) Personally owned vs. company owned phones

Page 21: Copyright - 2008 Movidan, Inc. All rights reserved. 1 Dont think, however, that we have lost our taste for risk. We remain prepared to lose $6 billion

Copyright - 2008 Movidan, Inc. All rights reserved. 21

Wrap Up

Bruce Christofferson, CISSP, CISA, [email protected]

425-239-9184