SlideShare a Scribd company logo
1 of 32
1Wearable Technology – Security Considerations
Paula E. Skokowski, CMO, Accellion
The European Information Security Summit,
London, Feb 2015
Wearable Technology - Security
Considerations
2Wearable Technology – Security Considerations
Introduction – Accellion Background
2,000+ 12M+Enterprise customers Users Customers in more than countries renewal rate
115%
57
100,000+users at Verizon
Headquarters
Palo Alto, California
Regional Headquarters
London, Australia
Largest deployment
Securely Connecting Today’s Mobile Workforce with Enterprise Content
3Wearable Technology – Security Considerations
Introudction - Accellion Customer Highlights
4Wearable Technology – Security Considerations
kiteworks by Accellion – Secure Mobile Content Platform
Securely Connecting Today’s Mobile Workforce
With Enterprise Content
Secure Mobile Content Platform
Enabling Employees to
Work Securely Wherever on Any Device,
Smartphone, Tablet, Laptop, Wearable
5Wearable Technology – Security Considerations
Wearables - What Are We Talking About?
6Wearable Technology – Security Considerations
Types of Wearable Devices
Fitness Trackers
Smart Clothing Google Glass
Virtual RealitySmart Watches
Not Just for Humans
7Wearable Technology – Security Considerations
Wearables and the Premier League - Viper
8Wearable Technology – Security Considerations
Wearables in the Enterprise – Improving Productivity
9Wearable Technology – Security Considerations
Use Case: Google Glass Emergency Room App
10Wearable Technology – Security Considerations
“Working From Home”
11Wearable Technology – Security Considerations
Working – “Away From My Desk”
12Wearable Technology – Security Considerations
Working - “Out of Office”
13Wearable Technology – Security Considerations
“Out of Office” - But Still Productive
14Wearable Technology – Security Considerations
Smart Wearable Electronics Projected Growth
Gartner
Over 200 Million Wearable Units by 2018
15Wearable Technology – Security Considerations
Wearables – Leveraging New Mobile Features
New Mobile Features
• Accelerometer
• Ambient light sensor
• Barcode scanning
• Bluetooth
• Camera
• Compass
• Face recognition
• Gestures
• GPS
• Gyroscope
• Multi-touch interaction
• Near-field communication
• Proximity sensor
• Speech recognition
• Touch interface
• Video in/out
• Voice output
New Applications
• Secure Image Capture
• Hands-free workflow
• Signature Capture
• Field Measurements
• Geo-location
• Telemedicine
• Field Troubleshooting
• ….
16Wearable Technology – Security Considerations
Wearables – Introducing New Security Risks
 Enable unauthorized access and misuse of sensitive information
 Misuse of video and image capture for invasion of privacy
 Use of personal data (PHI) to determine health coverage, credit or
employment decisions
 Facilitate attacks on other systems
 A compromised device could launch a denial of service attack, or send
malicious emails
 Create risks to personal safety
 An attacker could hack into a medical device that delivers insulin and
change the settings for delivery of medicine.
 Unauthorized access to video or internet connected cameras could
jeopardize individual safety
17Wearable Technology – Security Considerations
Wearables – Introducing New Privacy Risks
Direct Collection of Sensitive Personal Information
 Precise geo-location
 Financial account numbers
 Health information (PHI)
Collection of Inferred Personal Information & Behavior
 Habits
 Stress Levels
 Location
 Personality Type
 Sleep patterns
 Happiness
18Wearable Technology – Security Considerations
Data Minimization
Wearables and IoT pose additional risk from expansive
collection and retention of data.
Just because you can collect data doesn’t mean you
should
 Collect “just enough” data
 Limit collection of data
 Retain data for only a set period of time
 De-identify data collected
 Reveal Data Sharing
19Wearable Technology – Security Considerations
Wearables Information Data Leakage
Common Sources
 No IT Management or Oversight
 Lost/Stolen Devices
 No PIN Protection
 No Encryption
 Use of Unapproved Apps
 Use of Public Cloud File Sharing Services
20Wearable Technology – Security Considerations
Wearables – Information Security
21 43 5
Wearable
Devices
Bluetooth
Communication
Cloud
Services
Mobile
Apps
Wifi
Communication
Image Source: Gartner
21Wearable Technology – Security Considerations
Wearables Information Security
1. Wearable Devices
2. Bluetooth Communication
3. Mobile App
4. Wifi communication
5. Cloud services
Security Concerns
 Unauthorized Video and Image Capture
 Mis-use of Lost and Stolen Devices
1 1
22Wearable Technology – Security Considerations
Wearables Information Security
1. Wearable Devices
2. Bluetooth Communication
3. Mobile App
4. Wifi communication
5. Cloud services
Security Concerns
 Many wearables use BTLE (Bluetooth Low Energy)
 Bluetooth 4.0 includes encryption
22
23Wearable Technology – Security Considerations
Wearables Information Security
1. Wearable Devices
2. Bluetooth Communication
3. Mobile Device and App
4. Wifi communication
5. Cloud services
Security Concerns
 Does the mobile app include a secure container for stored data?
 Is data stored encrypted?
 Can the mobile device be remote wiped?
 Is the device PIN password protected?
 Is MDM in place?
3
3
24Wearable Technology – Security Considerations
Wearables Information Security
1. Wearable Devices
2. Bluetooth Communication
3. Mobile Device and App
4. Wifi communication
5. Cloud services
Security Concerns
 Is data encrypted in transit?
 Does the app communicate over https?
4
4
25Wearable Technology – Security Considerations
Wearables Information Security
1. Wearable Devices
2. Bluetooth Communication
3. Mobile Device and App
4. Wifi communication
5. Cloud services
Security Concerns
 Is data stored in multiple clouds?
 Is data stored encrypted?
 Who is data shared with?
 Does the user opt-in for use of services?
5
5
26Wearable Technology – Security Considerations
4 Best Practices for Wearable Information Security
1Design in
Security
2 Provide
Security
Training
3Employ
Defense-in-
Depth
4 Monitor
Security
27Wearable Technology – Security Considerations
Best Practice 1 – Design in Security
 Minimize the data collected and retained
 Use smart defaults
 Secure the backend data storage
 Test security measures
Secure Mobile
Container
 Image upload directly from the camera – bypass camera roll
 Store data in the secure container for offline access
 6 digit PIN to access downloaded files/data for offline access
28Wearable Technology – Security Considerations
Best Practice 2 – Security Training
 Employees are unaware of security risks
 Incorporate BYOW into BYOD policy
 Train all employees
 Retain service providers that meet security standards
29Wearable Technology – Security Considerations
Best Practices 3 – Implement Defense-in-Depth
 Implement security at multiple levels
 Encrypt data in transit and at rest
 Require user authentication – including 2FA
Enterprise Grade
Encryption
 256-bit AES encryption for data-at-rest.
 SSL encryption for data-in-motion and file upload/download
 Authenticate via LDAP, SSO with SAML/OAuth/Kerberos
30Wearable Technology – Security Considerations
Best Practice 4 – Monitor Devices
 Track and report all activities in auditable logs
 Consider information security over lifetime of the device
 Be cognizant of industry and government regulations ie HIPAA
Admin Controls
 Whitelist Apps - control which apps can open data.
 Selective Remote Wipe – for lost/stolen devices.
 Control View/Edit mode for users based on security policy.
 Activity Logs - for full audit trail.
31Wearable Technology – Security Considerations
Regulations In the Works
Europe’s Article 29 Working Group (September 2014)
 Data protection authorities of EU member countries issued an
Opinion on Recent Developments on the Internet of Things
“user must remain in complete control of their personal data throughout
the product lifecycle, and when organizations rely on consent as a
basis for processing, the consent should be fully informed, freely given
and specific.”
oneM2M global standards body (August 2014)
 Released a proposed security standard for IoT devices
 Addresses authentication, identity management and access control
EU General Data Protection Regulation
32Wearable Technology – Security Considerations
Thank You
For more information
www.accellion.com

More Related Content

What's hot

Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryChristian Glover Wilson
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business InsecuritiesPing Identity
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?Ping Identity
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanIndus Khaitan
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoTExosite
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021Heidelberg India
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityIBM Security
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman Security
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODCamilo Fandiño Gómez
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsHuntsman Security
 
Threats & Benefits of Internet of Things
Threats & Benefits of Internet of ThingsThreats & Benefits of Internet of Things
Threats & Benefits of Internet of ThingsTyrone Systems
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?Yasmin AbdelAziz
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityBitglass
 

What's hot (18)

Tigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy IndustryTigerspike - Cybersecurity and Mobility in the Energy Industry
Tigerspike - Cybersecurity and Mobility in the Energy Industry
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 
Managing Mobile Business Insecurities
Managing Mobile Business InsecuritiesManaging Mobile Business Insecurities
Managing Mobile Business Insecurities
 
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
 
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus KhaitanBitzer Mobile TiECON 2013 Pitch Indus Khaitan
Bitzer Mobile TiECON 2013 Pitch Indus Khaitan
 
5 phases of IoT
5 phases of IoT5 phases of IoT
5 phases of IoT
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 
10 hot IoT applications
10 hot IoT applications10 hot IoT applications
10 hot IoT applications
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
 
Threats & Benefits of Internet of Things
Threats & Benefits of Internet of ThingsThreats & Benefits of Internet of Things
Threats & Benefits of Internet of Things
 
The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?The Internet of Things – Good, Bad or Just Plain Ugly?
The Internet of Things – Good, Bad or Just Plain Ugly?
 
Data-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD SecurityData-Centric Protection: The Future of BYOD Security
Data-Centric Protection: The Future of BYOD Security
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 

Similar to Accellion - The European Information Security Summit, London

Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureCalgary Scientific Inc.
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODSierraware
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with securityStephen Cobb
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Omar Khawaja
 
Maloney slides
Maloney slidesMaloney slides
Maloney slidesOnkar Sule
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Otherbradley_g
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdfinfo382133
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learningDebbie Richards
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Rio Valdes
 
Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Walt Maclay
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer ConferenceFabio Pietrosanti
 
DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................ARKARAJSAHA1
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014Andris Soroka
 

Similar to Accellion - The European Information Security Summit, London (20)

Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYODRoadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
Roadmap to Healthcare HIPAA Compliance and Mobile Security for BYOD
 
SIT732 7.2P.pptx
SIT732 7.2P.pptxSIT732 7.2P.pptx
SIT732 7.2P.pptx
 
Security and Wearables: Success starts with security
Security and Wearables: Success starts with securitySecurity and Wearables: Success starts with security
Security and Wearables: Success starts with security
 
Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security Two Peas in a Pod: Cloud Security and Mobile Security
Two Peas in a Pod: Cloud Security and Mobile Security
 
Maloney slides
Maloney slidesMaloney slides
Maloney slides
 
Mobile Solutions and Privacy – Not One at the Expense of the Other
 Mobile Solutions and Privacy – Not One at the Expense of the Other Mobile Solutions and Privacy – Not One at the Expense of the Other
Mobile Solutions and Privacy – Not One at the Expense of the Other
 
Byod
ByodByod
Byod
 
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
1. Pros and Cons of IP CCTVNew threats are introduced to the secu.pdf
 
Portable Biometrics (1)
Portable Biometrics (1)Portable Biometrics (1)
Portable Biometrics (1)
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Exploring byod approaches for mobile learning
Exploring byod approaches for mobile learningExploring byod approaches for mobile learning
Exploring byod approaches for mobile learning
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?
 
Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?
 
3 steps security
3 steps security3 steps security
3 steps security
 
2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference2010: Mobile Security - WHYMCA Developer Conference
2010: Mobile Security - WHYMCA Developer Conference
 
DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................DEBJIT Doira ......... ..................
DEBJIT Doira ......... ..................
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014DSS ITSEC 2013 Conference 07.11.2013  - HeadTechnology - IT security trends 2014
DSS ITSEC 2013 Conference 07.11.2013 - HeadTechnology - IT security trends 2014
 

More from Proofpoint

You can wear it!
You can wear it!You can wear it!
You can wear it!Proofpoint
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Proofpoint
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePointProofpoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File SharingProofpoint
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsProofpoint
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsProofpoint
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Proofpoint
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityProofpoint
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Proofpoint
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Proofpoint
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Proofpoint
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityProofpoint
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseProofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile PrintingProofpoint
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud CollaborationProofpoint
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Proofpoint
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationProofpoint
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepointProofpoint
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationProofpoint
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODProofpoint
 

More from Proofpoint (20)

You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Accellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the EnterpriseAccellion Infographic: The Effects of Mobile on the Enterprise
Accellion Infographic: The Effects of Mobile on the Enterprise
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 
Mind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYODMind the gap: Navigating the Security Challenges of BYOD
Mind the gap: Navigating the Security Challenges of BYOD
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Accellion - The European Information Security Summit, London

  • 1. 1Wearable Technology – Security Considerations Paula E. Skokowski, CMO, Accellion The European Information Security Summit, London, Feb 2015 Wearable Technology - Security Considerations
  • 2. 2Wearable Technology – Security Considerations Introduction – Accellion Background 2,000+ 12M+Enterprise customers Users Customers in more than countries renewal rate 115% 57 100,000+users at Verizon Headquarters Palo Alto, California Regional Headquarters London, Australia Largest deployment Securely Connecting Today’s Mobile Workforce with Enterprise Content
  • 3. 3Wearable Technology – Security Considerations Introudction - Accellion Customer Highlights
  • 4. 4Wearable Technology – Security Considerations kiteworks by Accellion – Secure Mobile Content Platform Securely Connecting Today’s Mobile Workforce With Enterprise Content Secure Mobile Content Platform Enabling Employees to Work Securely Wherever on Any Device, Smartphone, Tablet, Laptop, Wearable
  • 5. 5Wearable Technology – Security Considerations Wearables - What Are We Talking About?
  • 6. 6Wearable Technology – Security Considerations Types of Wearable Devices Fitness Trackers Smart Clothing Google Glass Virtual RealitySmart Watches Not Just for Humans
  • 7. 7Wearable Technology – Security Considerations Wearables and the Premier League - Viper
  • 8. 8Wearable Technology – Security Considerations Wearables in the Enterprise – Improving Productivity
  • 9. 9Wearable Technology – Security Considerations Use Case: Google Glass Emergency Room App
  • 10. 10Wearable Technology – Security Considerations “Working From Home”
  • 11. 11Wearable Technology – Security Considerations Working – “Away From My Desk”
  • 12. 12Wearable Technology – Security Considerations Working - “Out of Office”
  • 13. 13Wearable Technology – Security Considerations “Out of Office” - But Still Productive
  • 14. 14Wearable Technology – Security Considerations Smart Wearable Electronics Projected Growth Gartner Over 200 Million Wearable Units by 2018
  • 15. 15Wearable Technology – Security Considerations Wearables – Leveraging New Mobile Features New Mobile Features • Accelerometer • Ambient light sensor • Barcode scanning • Bluetooth • Camera • Compass • Face recognition • Gestures • GPS • Gyroscope • Multi-touch interaction • Near-field communication • Proximity sensor • Speech recognition • Touch interface • Video in/out • Voice output New Applications • Secure Image Capture • Hands-free workflow • Signature Capture • Field Measurements • Geo-location • Telemedicine • Field Troubleshooting • ….
  • 16. 16Wearable Technology – Security Considerations Wearables – Introducing New Security Risks  Enable unauthorized access and misuse of sensitive information  Misuse of video and image capture for invasion of privacy  Use of personal data (PHI) to determine health coverage, credit or employment decisions  Facilitate attacks on other systems  A compromised device could launch a denial of service attack, or send malicious emails  Create risks to personal safety  An attacker could hack into a medical device that delivers insulin and change the settings for delivery of medicine.  Unauthorized access to video or internet connected cameras could jeopardize individual safety
  • 17. 17Wearable Technology – Security Considerations Wearables – Introducing New Privacy Risks Direct Collection of Sensitive Personal Information  Precise geo-location  Financial account numbers  Health information (PHI) Collection of Inferred Personal Information & Behavior  Habits  Stress Levels  Location  Personality Type  Sleep patterns  Happiness
  • 18. 18Wearable Technology – Security Considerations Data Minimization Wearables and IoT pose additional risk from expansive collection and retention of data. Just because you can collect data doesn’t mean you should  Collect “just enough” data  Limit collection of data  Retain data for only a set period of time  De-identify data collected  Reveal Data Sharing
  • 19. 19Wearable Technology – Security Considerations Wearables Information Data Leakage Common Sources  No IT Management or Oversight  Lost/Stolen Devices  No PIN Protection  No Encryption  Use of Unapproved Apps  Use of Public Cloud File Sharing Services
  • 20. 20Wearable Technology – Security Considerations Wearables – Information Security 21 43 5 Wearable Devices Bluetooth Communication Cloud Services Mobile Apps Wifi Communication Image Source: Gartner
  • 21. 21Wearable Technology – Security Considerations Wearables Information Security 1. Wearable Devices 2. Bluetooth Communication 3. Mobile App 4. Wifi communication 5. Cloud services Security Concerns  Unauthorized Video and Image Capture  Mis-use of Lost and Stolen Devices 1 1
  • 22. 22Wearable Technology – Security Considerations Wearables Information Security 1. Wearable Devices 2. Bluetooth Communication 3. Mobile App 4. Wifi communication 5. Cloud services Security Concerns  Many wearables use BTLE (Bluetooth Low Energy)  Bluetooth 4.0 includes encryption 22
  • 23. 23Wearable Technology – Security Considerations Wearables Information Security 1. Wearable Devices 2. Bluetooth Communication 3. Mobile Device and App 4. Wifi communication 5. Cloud services Security Concerns  Does the mobile app include a secure container for stored data?  Is data stored encrypted?  Can the mobile device be remote wiped?  Is the device PIN password protected?  Is MDM in place? 3 3
  • 24. 24Wearable Technology – Security Considerations Wearables Information Security 1. Wearable Devices 2. Bluetooth Communication 3. Mobile Device and App 4. Wifi communication 5. Cloud services Security Concerns  Is data encrypted in transit?  Does the app communicate over https? 4 4
  • 25. 25Wearable Technology – Security Considerations Wearables Information Security 1. Wearable Devices 2. Bluetooth Communication 3. Mobile Device and App 4. Wifi communication 5. Cloud services Security Concerns  Is data stored in multiple clouds?  Is data stored encrypted?  Who is data shared with?  Does the user opt-in for use of services? 5 5
  • 26. 26Wearable Technology – Security Considerations 4 Best Practices for Wearable Information Security 1Design in Security 2 Provide Security Training 3Employ Defense-in- Depth 4 Monitor Security
  • 27. 27Wearable Technology – Security Considerations Best Practice 1 – Design in Security  Minimize the data collected and retained  Use smart defaults  Secure the backend data storage  Test security measures Secure Mobile Container  Image upload directly from the camera – bypass camera roll  Store data in the secure container for offline access  6 digit PIN to access downloaded files/data for offline access
  • 28. 28Wearable Technology – Security Considerations Best Practice 2 – Security Training  Employees are unaware of security risks  Incorporate BYOW into BYOD policy  Train all employees  Retain service providers that meet security standards
  • 29. 29Wearable Technology – Security Considerations Best Practices 3 – Implement Defense-in-Depth  Implement security at multiple levels  Encrypt data in transit and at rest  Require user authentication – including 2FA Enterprise Grade Encryption  256-bit AES encryption for data-at-rest.  SSL encryption for data-in-motion and file upload/download  Authenticate via LDAP, SSO with SAML/OAuth/Kerberos
  • 30. 30Wearable Technology – Security Considerations Best Practice 4 – Monitor Devices  Track and report all activities in auditable logs  Consider information security over lifetime of the device  Be cognizant of industry and government regulations ie HIPAA Admin Controls  Whitelist Apps - control which apps can open data.  Selective Remote Wipe – for lost/stolen devices.  Control View/Edit mode for users based on security policy.  Activity Logs - for full audit trail.
  • 31. 31Wearable Technology – Security Considerations Regulations In the Works Europe’s Article 29 Working Group (September 2014)  Data protection authorities of EU member countries issued an Opinion on Recent Developments on the Internet of Things “user must remain in complete control of their personal data throughout the product lifecycle, and when organizations rely on consent as a basis for processing, the consent should be fully informed, freely given and specific.” oneM2M global standards body (August 2014)  Released a proposed security standard for IoT devices  Addresses authentication, identity management and access control EU General Data Protection Regulation
  • 32. 32Wearable Technology – Security Considerations Thank You For more information www.accellion.com

Editor's Notes

  1. A little background about Accellion. The company was started in the late 1990s and in the last few years has evolved to become the leader in providing mobile collaboration and online file sharing solutions. We have always been focused on delivering solutions to the enterprise and over 2,000 corporations and government agencies across 57 countries worldwide have selected Accellion as their corporate solution. This represents over 12 million users worldwide. Our customer satisfaction is very high and that’s reflected in our 115%+ renewal rate which means the customers who started using Accellion solutions 3 – 4 years ago are still our customers – even though our solution has evolved considerably during this time. Customers who selected Accellion 3 to 4 years ago are still our customers today, even as our solutions have evolved considerably during that time. The thing that sets Accellion apart is our ability to provide highly scalable and secure enterprise class solutions, Verizon Wireless is one such customer who has deployed Accellion to support their own highly mobile workforce with currently 100,000+ users on the system. While we’re headquartered in Silicon Valley, we operate globally with regional headquarters in EMEA and APAC.
  2. Our customers represent the world’s leading organizations that span across verticals such as Legal, Retail, Healthcare, Government, and Technology. Retailers such as Rolex, Bose, Prada, and Bacardi use our solution to exchange product information securely with their stores, partners, and customers. Large healthcare and pharmas such as Kaiser Permanente and Pfizer use Accellion to securely handle and share medical information while meeting HIPAA and other compliance requirements. The companies mentioned here are just a small sample of our 2,000+ customers but does provide a good representation of the leading brands that trust Accellion.
  3. The kiteworks solution by Accellion provides a secure mobile content solution that securely connects today’s mobile workforce with enterprise content. Mobile workers today need to access enterprise content from a wide variety of devices spanning smartphones, tablets, latops, desktops and most recently wearable devices. With kiteworks organziations can provide employees the ability to access, share, create and edit enterprise content wherever work takes them. Kiteworks seamlessly connects with enterprise content stored on premise in ECM systems such as Sharepoing, OpenText, and Documentum and also provides secure access to Home Drives, and Network File Shares. In addition kiteworks provides connection to content stored in cloud storage systems such as Dropbox, Google, OneDrive and Box providing employees with a single unified window into all their content across all storage systems. For IT this unified approach to content enables all file activities to be tracked and logged for auditing purposes and demonstration of compliance with regulations such as HIPAA.
  4. Wearables - part of the new classification of devices – collectively called the Internet of Things Devices or sensors that connect, store, or transmit information with or between each other via the Internet Wearable devices Introduce new security risks Question for the audience 1. How many people currently own a wearable device? 2. How many people own more than one wearable device? 3. Unsure - What is a wearable device?
  5. Wearable devices come in a number of form factors – most popular to date have been the fitness trackers but for enterprise use the smart watches and augmented reality displays such as Google Glass and also the smart clothing offer the most potential for improving worker productivity. Wearables are not just for humans – many useful pet wearable devices.
  6. For those interested in sports some very interesting work being done using smart clothing to track athlete training and performance in the Premier league. Louis Van Gaal, Manchester United Coach, and Occulus Rift
  7. In 2017 smartglasses may begin to save field service industry $1B per year through improved efficiency 5.4M field workers saving 1 hr per week Diagnosing and fixing problems more quickly Camera on smart glasses will increase usefulness by providing vison-enabled AR apps- with instructions and streaming video – raises employee privacy and enterprise security concerns. Head mounted displays (HMD) headsup displays (HUD) with augmented reality (AR) Smartglasses could help someone who is fairly new to a role perform as well as a worker with years of experience. Provide navigation information, maps and directions – arrows superimposed – emergency workers would have a hands-free way to view maps and floor plans Video collaboration with experts in remote locations results in faster repairs and saves expense of flying out an expert. Smartglasses – heavy industry, manufacturing, oil and gas Currently <1% - expected to increase to 10% in 5 years
  8. Accellion has developed a reference application for Google Glass that demonstrates the use of kiteworks to enable access and sharing of confidential Personal Health Information in an Emergency Room setting. In this reference application an ER doctor is able to scan a bar code to register a patient and is then able to view data from the patient’s health record all in a hands free mode. Also the doctor is notified when MRI results are available and is able to share the results with other experts for assistance in rapid diagnosis for the patient resulting in improved patient care.
  9. Smart watches offer the opportunity to really work “out of the offce”
  10. The form factor of smart watches enables users to easily and discreetly receive notifications and updates to keep work moving forward when outside of the office
  11. Using kiteworks a user can be notified when documents are available and can then share documents and record messages to be delivered along with the docs.
  12. Recent data from Gartner shows that the number of wearable units is expected to rise rapidly with over 200M devices expected by 2018 – with Wrist based devices being dominant followed by body devices and then head mounted devices
  13. The most exciting applications with wearable devices leverage the unique mobile features such as GPS< voice recognitions, video input and output. These new features make possible new types of applications that were not possible before. The opportunity here is not just to deliver email to a watch but to enables work processes that were not possible before
  14. Along with the development of these new wearable/mobile applications come new security and privacy risks. Most obvious is the potential to capture data that could be misused – in particular the unauthorized capture of video and images. Even when used for work purposes there is the potential to capture other unintended information about people in backgrounds for instance.
  15. The privacy concerns regarding wearables come from two sources. The direct collection and handling of sensitive personal information such as recording the location of people and their health information for example Also equally concerning is the collection of inferred personal behavior such as habits, location stress levels
  16. Data Minimization Reduces risk of collecting large store of data that is enticing to data thieves Reduced risk that data will be used in ways contrary to user expectations Flu example – capturing geolocation is very useful – good example Skin rash – capturing geolocation may not be directly relevant – bad example
  17. The common sources of data security risk for wearable devices is similar to those for smartphones and tablets.
  18. Information security for wearable devices can be thought of in 5 discrete segments. For organizations that have addressed BYOD then segments 3, 4 and 5 have already been addressed – wearable devices add in segments 1 and 2 for consideration from a security perspective. Information Security Wearable Device Bluetooth Communication Mobile Devices/Apps Wifi Communication Cloud Services
  19. According to Gartner more than 20% of respondents surveyed in early 2014 said they terminated the relationship with a US provider predominantly because of the surveillance allegations that came to the surface as part of the NSA revelations in June 2013
  20. Here are 4 best practices to consider when thinking about wearable device information security in the enterprise. These best practices are based on recent guidelines published by the Federal Trade Commission (FTC).
  21. Information Security should be designed in. When considering use of wearable devices make sure to do a security review and test of the design. Look for use of a secure mobile container for storing content locally
  22. Security training should be provided to employees on the security implication sand security policy governing the use of wearable devices. Any 3rd party service providers should meet security standard outlined in security policy.
  23. Information security for wearable devices should be considered as a defense in depth ie it is a series of security measures that provide security in layer. Enterprise grade encryption is essential including encryption of data at rest and in transit. Wearables should also authenticate via LDAP and SSO
  24. For information security of wearable devices the use of these devices should be monitored, tracked, logged for auditable purposes. For compliance with HIPAA it is essential that all sharing, access and editing of personal health information (PHI) is tracked and logged ie organizations must be in control of PHI.
  25. In EMEA there are a number of regulations in process governing the Internet of Things and wearable devices. Organizations should keep up to date with development of regulations to ensure the use of wearable devices is in compliance.