SAINTCON 2016 Keynote - Georgia Weidman - Nine years into mobility, has security caught up?

Discover the evolving security landscape as mobile devices become an integral part of the enterprise, and learn how to evaluate and mitigate the risks of mobile devices, devices that are always-on, always-connected, and always-vulnerable.

Key takeaways
  • The concept of security is evolving to encompass mobility, with devices becoming an integral part of the enterprise.
  • The traditional perimeter-based security model is no longer sufficient, as devices can attach to networks from anywhere.
  • Mobile devices are not just phones, but also tablets, smartwatches, and other connected devices.
  • Mobile security products are not mature yet, and enterprises are not doing enough to address the risk of mobile devices.
  • Phishing and social engineering are becoming more prevalent, and mobile devices make it easier for attackers to target users.
  • Enterprises need to evaluate their risk of mobile devices and develop a plan to address it.
  • The key to securing mobile devices is understanding how they behave and how they can be compromised.
  • Mobile devices are always-on, always-connected, and always-vulnerable, making them a prime target for attack.
  • The risk of mobile devices is not just limited to smartphones, but also applies to other devices like smartwatches and wearables.
  • To secure mobile devices, enterprises need to adopt a layered approach that includes device-level security, network-level security, and application-level security.
  • Mobile devices are not just consumer devices, but also enterprise devices, and should be treated as such.
  • Enterprises need to educate employees on mobile security best practices and provide them with the tools and resources they need to stay secure.
  • The importance of mobile security cannot be overstated, as it is becoming increasingly common for devices to be compromised and used in attacks.