SlideShare a Scribd company logo
1 of 26
© 2017 Aetna Inc.
Strategy and
Tactics for Securing
Mobile Devices
in Financial Organizations
© 2017 Aetna Inc.
Quick Housekeeping
• There will be time for Q&A at the end
• Ask questions using the GTW chat pane
• The webinar is being recorded
• All attendees will receive a copy of the slides/recording
Join the discussion #MobileThreatDefense
© 2017 Aetna Inc.
Meet Your Speaker
Brian Heemsoth
Director of Software & Mobile Security
Aetna
© 2017 Aetna Inc.
Mobile Threat Landscape
Physical
Malware
Vulnerabilities
Network
© 2017 Aetna Inc.
Physical Threats
Addressed by MDM, MAM & Containerization PlatformsPhysical
Malware
Vulnerabilities
Network
© 2017 Aetna Inc.
Malware
Got 200+ devices? You probably have malware!Physical
Malware
Vulnerabilities
Network
iOS Malware
Pegasus | Malicious Profiles |
AceDeceiver | YiSpecter | XcodeGhost
Android Malware
Quadrooter | Stagefright |
Hummingbad | Accessibility Clickjacking
Targeted Malware
Exaspy, Ransomware,
Repackaged Apps
Annoying
Malware
Adware
1 in 5 of your devices
allow installation from
third-party app stores
Third-party
stores are
72xmore likely to
deliver malware
Malware as a Percentage
of Downloaded Apps
Google Play Store
Samsung
Amazon
Aptoid
0.06% (1 in 1600 apps)
0.11% (1 in 900 apps)
0.77% (1 in 130 apps)
4.41% (1 in 23 apps)
© 2017 Aetna Inc.
Malware
Got 200+ devices? You probably have malware!Physical
Malware
Vulnerabilities
Network
Man in the Middle
WifigatePineapple
arpspoofdnsspoof
SSL stripping
SSL decryption
Content manipulation
92%
of users click on
“Continue”
compromising their
Exchange identity
(username and password)
Source: Skycure Threat Intelligence
32.5 PERCENT
of executive devices
were exposed to
network attack
within a quarter
© 2017 Aetna Inc.
Vulnerabilities
Organized & directed effort from hackersPhysical
Malware
Vulnerabilities
Network do not have latest OS version installed
33% of Devices with
Stored Sensitive Info
Do you know which of your
devices are upgradable?
- Without relying on Apple or Google?
- How much risk can be averted by simply updating?
?
?
?
© 2017 Aetna Inc.
Pain Points in Regulated Industries
• Data accessed outside corporate firewalls
− Greater use of mobile devices
− Flexible working hours and locations
• Accessing regulated data on unmanaged
devices
− Agents/Doctors manage their own devices
− Better access to customer data means better
service in the field
• New regulations
NEWS ITEM:
New York State
Imposes New
Cybersecurity
Regulation for
Financial Services
New requirements:
1. Employ a CISO
2. Annual reports
© 2017 Aetna Inc.
Customer Data at Risk
Source: Skycure Source: Skycure
1 in 5 organizations
suffered a mobile security breach
8%
of all healthcare
breaches came
from mobile
devices
16%
of all financial
breaches came
from mobile
devices
© 2017 Aetna Inc.
Mobility @ Aetna
• Approximately 10k mobile devices
− 60% BYOD; 40% corporate-owned/managed
− Phones, tablets, iPods
• Use cases:
− Mobile productivity (email, calendar)
− Chat/collaboration
− Enterprise managed third-party applications
− Internally developed employee applications
• Established MDM & MAM Platforms
© 2017 Aetna Inc.
Aetna: Key Risk Factors
Compromise of
data in
containerized
applications by
“screen scraping”
iOS/Android
malware
Compromised
Aetna
Credentials &
Data
(malicious
networks)
Malware
on BYOD &
Corporate
Devices
Unpatched OS
Vulnerabilities
Device
Currency
Pegasus
AceDeceiver
SVPENG
© 2017 Aetna Inc.
Aetna’s Solution
• Implemented Skycure Mobile Threat Platform
• Deployed to all BYOD & Corporate Devices
• Mandated compliance dates
• Integrated monitoring into Security Operations Center
• Phase 2: Integration into MDM platforms to allow for
proactive management of access to Aetna resources from
impacted devices (in progress)
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 14
9,314 Devices
53,612,964 Network Tests Performed
523,143 Access Points
53,458 Networks
9,724 Active Users
4,097,982 Apps Scanned
Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 15
24 High criticality malware infections
mitigated
460 Instances of credentials/data
protected on high risk networks
701 Total malware infections mitigated
23.97 High risk vulnerabilities addressed
per-device
© 2017 Aetna Inc.
Risk Visibility
The Foundation to addressing risk is having Visibility
Source: Screenshots from the Skycure platform at Aetna
© 2017 Aetna Inc.
Malware Security 3,365,558 Android Apps Scanned
Source: Screenshots from the Skycure platform at Aetna
Installed from unknown third party application store
Since implementation 14 critical severity malicious Android applications have been identified.
Unauthorized system setting modification,
process manipulation, audio recording
© 2017 Aetna Inc.
Network Security
30,105,599
Networks Tests Performed on
34,918
Networks, Accessed From
319,338
Access Points
3,607 devices connected to a network which posed a threat (6.4% of the
networks). These network threats include secure traffic description, content
manipulation, suspicious/fake hotspots, and unknown threats (suspicious
network behavior).
Skycure automatically opens a VPN and adds another layer of encryption when applicable.
Source: Screenshots from the Skycure platform at Aetna
61%
39%
39% of Aetna’s devices
were exposed to
network threats
32685
2233
Safe Networks
Threatning Networks
September 2, 2016
3,607 of 9,304 devices were exposed (39%)
© 2017 Aetna Inc.
Network Incidents Map
The above map shows the distribution of tests that concluded with network threats according to the
geolocation associated with the network.
Source: Skycure
© 2017 Aetna Inc.
Vulnerabilities
1,941 devices are running an operating system with high risk. We use CVSS - open
standard for scoring vulnerabilities. You can see the reasoning for each of those in
the system.
Most of Aetna’s devices are iOS, which is
usually better when it comes to security
updates. However, we still see many of
them running OS versions with major
known vulnerabilities
Source: Screenshots from the Skycure platform at Aetna
© 2017 Aetna Inc.
Total & Overall Risk Trends
While we are managing to maintain less than 10 devices at risk at
any given time, we are also constantly improving the overall risk by
decreasing the total number of medium risk devices. In the
following graph you can see that decrease (Medium-risk devices are
marked with Orange).
We constantly collect device risk and at the peak time (April 3rd)
we had 9 devices at high risk – Currently we have 0 devices with
high risk, as we are constantly addressing these.
Source: Screenshots from the Skycure platform at Aetna
Skycure Overview
© 2017 Aetna Inc.
New York Life Testimonial
Steve Johnson
Head of Data Protection & Cybersecurity Services
Enterprise Technology Group
"Our people need access to data and other corporate
resources on mobile devices, but we are mindful of the need
to protect our systems, especially regulated data," said
Johnson.
"Our agents can securely access a client’s information before a meeting,
which allows them to make smarter policy recommendations,"
Johnson explained.
© 2017 Aetna Inc.
Skycure Mobile Threat Defense
• Always ON
protection
• Whole device,
all vectors
• No “Sideloading”
Seamless
experience
Privacy
Minimal
footprint
• Advanced security
• Risk-based mgmnt
• Automation and
integration
Security
Visibility
IT Satisfaction
PUBLIC
APP
CLOUD
SERVER
• Crowd-sourced
• Threat aggregation
from third parties
• Skycure research
1 Million+ Global
Threats Identified
https://maps.skycu
re.com
THREAT
INTELLIGENCE
© 2017 Aetna Inc.
Skycure – High Level Overview
Leading Product & ResearchCustomers
#1 Mobile Threat Defense SolutionStrategic Partners
CONSUMER GOODS RETAIL
MANUFACTURING TECHNOLOGY
FORTUNE 50
PHARMACEUTICAL
COMPANY
250+TV channelsFORTUNE 100
HEALTHCARE
COMPANY
FORTUNE 500
FINANCIAL SERVICES
COMPANIES
© 2017 Aetna Inc.
Q & A

More Related Content

What's hot

How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorKaspersky
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Skycure
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesKaspersky
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Cisco Canada
 
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Skybox Security
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKirill Kertsenbaum
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentationData Unit
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Kyle Lai
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpointsCisco Canada
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurSkybox Security
 
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueThe World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueCisco Canada
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecuritySymantec
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco Canada
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 

What's hot (20)

How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
Supply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy SectorSupply Chain Threats to the US Energy Sector
Supply Chain Threats to the US Energy Sector
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, SolutionsKaspersky Lab's Corporate Presentation - our Values, Business, Solutions
Kaspersky Lab's Corporate Presentation - our Values, Business, Solutions
 
The Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-AdversariesThe Motives, Means and Methods of Cyber-Adversaries
The Motives, Means and Methods of Cyber-Adversaries
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
 
Kaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISHKaspersky Endpoint Security and Control - ENGLISH
Kaspersky Endpoint Security and Control - ENGLISH
 
Kaspersky endpoint security business presentation
Kaspersky endpoint security business presentationKaspersky endpoint security business presentation
Kaspersky endpoint security business presentation
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
Cisco amp for endpoints
Cisco amp for endpointsCisco amp for endpoints
Cisco amp for endpoints
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
 
The World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the RescueThe World Against the Bad, Cisco AMP Solution to the Rescue
The World Against the Bad, Cisco AMP Solution to the Rescue
 
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud SecurityGet Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
 
Cisco's 2016 Annual Security report
Cisco's 2016 Annual Security reportCisco's 2016 Annual Security report
Cisco's 2016 Annual Security report
 
Kaspersky
KasperskyKaspersky
Kaspersky
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 

Viewers also liked

DataXu: Programmatic Premium Webinar - June 7, 2012
DataXu: Programmatic Premium Webinar - June 7, 2012DataXu: Programmatic Premium Webinar - June 7, 2012
DataXu: Programmatic Premium Webinar - June 7, 2012dataxu
 
Wandera Enterprise Mobile Data Featuring Yankee Group
Wandera Enterprise Mobile Data Featuring Yankee GroupWandera Enterprise Mobile Data Featuring Yankee Group
Wandera Enterprise Mobile Data Featuring Yankee GroupWandera_Mobile_Data
 
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Interoute
 
Scaling DevOps - delivering on the promise of business velocity and quality
Scaling DevOps - delivering on the promise of business velocity and qualityScaling DevOps - delivering on the promise of business velocity and quality
Scaling DevOps - delivering on the promise of business velocity and qualityXebiaLabs
 
1 q18 earnings deck final_ready_for_release
1 q18 earnings deck final_ready_for_release1 q18 earnings deck final_ready_for_release
1 q18 earnings deck final_ready_for_releaseadpinvestors
 
Alteryx investor presentation
Alteryx investor presentationAlteryx investor presentation
Alteryx investor presentationalteryxinvestor
 
Spring 2017 release customer webinar
Spring 2017 release customer webinarSpring 2017 release customer webinar
Spring 2017 release customer webinarSnapLogic
 
Understanding Risk Stratification, Comorbidities, and the Future of Healthcare
Understanding Risk Stratification, Comorbidities, and the Future of HealthcareUnderstanding Risk Stratification, Comorbidities, and the Future of Healthcare
Understanding Risk Stratification, Comorbidities, and the Future of HealthcareHealth Catalyst
 
How Physicians Can Prepare for the Financial Impact of MACRA
How Physicians Can Prepare for the Financial Impact of MACRAHow Physicians Can Prepare for the Financial Impact of MACRA
How Physicians Can Prepare for the Financial Impact of MACRAHealth Catalyst
 
The Modern Care Management Team: Tools and Strategies Evolve, but the Outcome...
The Modern Care Management Team: Tools and Strategies Evolve, but the Outcome...The Modern Care Management Team: Tools and Strategies Evolve, but the Outcome...
The Modern Care Management Team: Tools and Strategies Evolve, but the Outcome...Health Catalyst
 
Why You Need to Understand Value-Based Reimbursement and How to Survive It
Why You Need to Understand Value-Based Reimbursement and How to Survive ItWhy You Need to Understand Value-Based Reimbursement and How to Survive It
Why You Need to Understand Value-Based Reimbursement and How to Survive ItHealth Catalyst
 
How to survive cms's most recent 3% hospital readmissions penalties increase
How to survive cms's most recent 3% hospital readmissions penalties increase   How to survive cms's most recent 3% hospital readmissions penalties increase
How to survive cms's most recent 3% hospital readmissions penalties increase Health Catalyst
 
Demystifying Healthcare Data Governance
Demystifying Healthcare Data GovernanceDemystifying Healthcare Data Governance
Demystifying Healthcare Data GovernanceHealth Catalyst
 
Hospital Readmissions Reduction Program: Keys to Success
Hospital Readmissions Reduction Program: Keys to SuccessHospital Readmissions Reduction Program: Keys to Success
Hospital Readmissions Reduction Program: Keys to SuccessHealth Catalyst
 
6 Steps for Implementing Successful Performance Improvement Initiatives in He...
6 Steps for Implementing Successful Performance Improvement Initiatives in He...6 Steps for Implementing Successful Performance Improvement Initiatives in He...
6 Steps for Implementing Successful Performance Improvement Initiatives in He...Health Catalyst
 
MACRA and the New Quality Payment Program
MACRA and the New Quality Payment ProgramMACRA and the New Quality Payment Program
MACRA and the New Quality Payment ProgramHealth Catalyst
 
Improving Patient Safety and Quality Through Culture, Clinical Analytics, Evi...
Improving Patient Safety and Quality Through Culture, Clinical Analytics, Evi...Improving Patient Safety and Quality Through Culture, Clinical Analytics, Evi...
Improving Patient Safety and Quality Through Culture, Clinical Analytics, Evi...Health Catalyst
 
How to Drive ROI In Your Healthcare Quality Improvement Projects
How to Drive ROI In Your Healthcare Quality Improvement Projects How to Drive ROI In Your Healthcare Quality Improvement Projects
How to Drive ROI In Your Healthcare Quality Improvement Projects Health Catalyst
 
Why Your Healthcare Business Intelligence Strategy Can't Win
Why Your Healthcare Business Intelligence Strategy Can't WinWhy Your Healthcare Business Intelligence Strategy Can't Win
Why Your Healthcare Business Intelligence Strategy Can't WinHealth Catalyst
 
The Key to Transitioning from Fee-for-Service to Value-Based Reimbursements
The Key to Transitioning from Fee-for-Service to Value-Based ReimbursementsThe Key to Transitioning from Fee-for-Service to Value-Based Reimbursements
The Key to Transitioning from Fee-for-Service to Value-Based ReimbursementsHealth Catalyst
 

Viewers also liked (20)

DataXu: Programmatic Premium Webinar - June 7, 2012
DataXu: Programmatic Premium Webinar - June 7, 2012DataXu: Programmatic Premium Webinar - June 7, 2012
DataXu: Programmatic Premium Webinar - June 7, 2012
 
Wandera Enterprise Mobile Data Featuring Yankee Group
Wandera Enterprise Mobile Data Featuring Yankee GroupWandera Enterprise Mobile Data Featuring Yankee Group
Wandera Enterprise Mobile Data Featuring Yankee Group
 
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
Infrastructure Migration from Windows Server 2003 to the Cloud: An Interoute ...
 
Scaling DevOps - delivering on the promise of business velocity and quality
Scaling DevOps - delivering on the promise of business velocity and qualityScaling DevOps - delivering on the promise of business velocity and quality
Scaling DevOps - delivering on the promise of business velocity and quality
 
1 q18 earnings deck final_ready_for_release
1 q18 earnings deck final_ready_for_release1 q18 earnings deck final_ready_for_release
1 q18 earnings deck final_ready_for_release
 
Alteryx investor presentation
Alteryx investor presentationAlteryx investor presentation
Alteryx investor presentation
 
Spring 2017 release customer webinar
Spring 2017 release customer webinarSpring 2017 release customer webinar
Spring 2017 release customer webinar
 
Understanding Risk Stratification, Comorbidities, and the Future of Healthcare
Understanding Risk Stratification, Comorbidities, and the Future of HealthcareUnderstanding Risk Stratification, Comorbidities, and the Future of Healthcare
Understanding Risk Stratification, Comorbidities, and the Future of Healthcare
 
How Physicians Can Prepare for the Financial Impact of MACRA
How Physicians Can Prepare for the Financial Impact of MACRAHow Physicians Can Prepare for the Financial Impact of MACRA
How Physicians Can Prepare for the Financial Impact of MACRA
 
The Modern Care Management Team: Tools and Strategies Evolve, but the Outcome...
The Modern Care Management Team: Tools and Strategies Evolve, but the Outcome...The Modern Care Management Team: Tools and Strategies Evolve, but the Outcome...
The Modern Care Management Team: Tools and Strategies Evolve, but the Outcome...
 
Why You Need to Understand Value-Based Reimbursement and How to Survive It
Why You Need to Understand Value-Based Reimbursement and How to Survive ItWhy You Need to Understand Value-Based Reimbursement and How to Survive It
Why You Need to Understand Value-Based Reimbursement and How to Survive It
 
How to survive cms's most recent 3% hospital readmissions penalties increase
How to survive cms's most recent 3% hospital readmissions penalties increase   How to survive cms's most recent 3% hospital readmissions penalties increase
How to survive cms's most recent 3% hospital readmissions penalties increase
 
Demystifying Healthcare Data Governance
Demystifying Healthcare Data GovernanceDemystifying Healthcare Data Governance
Demystifying Healthcare Data Governance
 
Hospital Readmissions Reduction Program: Keys to Success
Hospital Readmissions Reduction Program: Keys to SuccessHospital Readmissions Reduction Program: Keys to Success
Hospital Readmissions Reduction Program: Keys to Success
 
6 Steps for Implementing Successful Performance Improvement Initiatives in He...
6 Steps for Implementing Successful Performance Improvement Initiatives in He...6 Steps for Implementing Successful Performance Improvement Initiatives in He...
6 Steps for Implementing Successful Performance Improvement Initiatives in He...
 
MACRA and the New Quality Payment Program
MACRA and the New Quality Payment ProgramMACRA and the New Quality Payment Program
MACRA and the New Quality Payment Program
 
Improving Patient Safety and Quality Through Culture, Clinical Analytics, Evi...
Improving Patient Safety and Quality Through Culture, Clinical Analytics, Evi...Improving Patient Safety and Quality Through Culture, Clinical Analytics, Evi...
Improving Patient Safety and Quality Through Culture, Clinical Analytics, Evi...
 
How to Drive ROI In Your Healthcare Quality Improvement Projects
How to Drive ROI In Your Healthcare Quality Improvement Projects How to Drive ROI In Your Healthcare Quality Improvement Projects
How to Drive ROI In Your Healthcare Quality Improvement Projects
 
Why Your Healthcare Business Intelligence Strategy Can't Win
Why Your Healthcare Business Intelligence Strategy Can't WinWhy Your Healthcare Business Intelligence Strategy Can't Win
Why Your Healthcare Business Intelligence Strategy Can't Win
 
The Key to Transitioning from Fee-for-Service to Value-Based Reimbursements
The Key to Transitioning from Fee-for-Service to Value-Based ReimbursementsThe Key to Transitioning from Fee-for-Service to Value-Based Reimbursements
The Key to Transitioning from Fee-for-Service to Value-Based Reimbursements
 

Similar to How Aetna Mitigated 701 Malware Infections on Mobile Devices

Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Internet of Things Security - Trust in the supply chain
Internet of Things Security  - Trust in the supply chainInternet of Things Security  - Trust in the supply chain
Internet of Things Security - Trust in the supply chainDuncan Purves
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyserTim Youm
 
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskMobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskNowSecure
 
Application security as crucial to the modern distributed trust model
Application security as crucial to   the modern distributed trust modelApplication security as crucial to   the modern distributed trust model
Application security as crucial to the modern distributed trust modelLINE Corporation
 
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Arnold Bijlsma
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityZimperium
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsNowSecure
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]AngelGomezRomero
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODCamilo Fandiño Gómez
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceNowSecure
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?IBM Security
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksIBM Security
 
Mobile Security Assessment
Mobile Security AssessmentMobile Security Assessment
Mobile Security AssessmentSylvain Martinez
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
iOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowiOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowNowSecure
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewStephen Bates
 

Similar to How Aetna Mitigated 701 Malware Infections on Mobile Devices (20)

Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Internet of Things Security - Trust in the supply chain
Internet of Things Security  - Trust in the supply chainInternet of Things Security  - Trust in the supply chain
Internet of Things Security - Trust in the supply chain
 
Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
 
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App RiskMobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
Mobile Apps & Connected Healthcare: Managing 3rd-Party Mobile App Risk
 
Application security as crucial to the modern distributed trust model
Application security as crucial to   the modern distributed trust modelApplication security as crucial to   the modern distributed trust model
Application security as crucial to the modern distributed trust model
 
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
 
Vetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security EssentialsVetting Mobile Apps for Corporate Use: Security Essentials
Vetting Mobile Apps for Corporate Use: Security Essentials
 
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
OpenSouthCode '19 - Application Security Fundamentals [2019-May-25]
 
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYODIBM Seguridad Móvil - Acompaña tu estrategia BYOD
IBM Seguridad Móvil - Acompaña tu estrategia BYOD
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Mobile Security Assessment
Mobile Security AssessmentMobile Security Assessment
Mobile Security Assessment
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
iOS and Android security: Differences you need to know
iOS and Android security: Differences you need to knowiOS and Android security: Differences you need to know
iOS and Android security: Differences you need to know
 
SEB Forcepoint Corporate Overview
SEB Forcepoint Corporate OverviewSEB Forcepoint Corporate Overview
SEB Forcepoint Corporate Overview
 

Recently uploaded

FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Servicenishacall1
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfCWS Technology
 

Recently uploaded (6)

FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
 
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdf
 

How Aetna Mitigated 701 Malware Infections on Mobile Devices

  • 1. © 2017 Aetna Inc. Strategy and Tactics for Securing Mobile Devices in Financial Organizations
  • 2. © 2017 Aetna Inc. Quick Housekeeping • There will be time for Q&A at the end • Ask questions using the GTW chat pane • The webinar is being recorded • All attendees will receive a copy of the slides/recording Join the discussion #MobileThreatDefense
  • 3. © 2017 Aetna Inc. Meet Your Speaker Brian Heemsoth Director of Software & Mobile Security Aetna
  • 4. © 2017 Aetna Inc. Mobile Threat Landscape Physical Malware Vulnerabilities Network
  • 5. © 2017 Aetna Inc. Physical Threats Addressed by MDM, MAM & Containerization PlatformsPhysical Malware Vulnerabilities Network
  • 6. © 2017 Aetna Inc. Malware Got 200+ devices? You probably have malware!Physical Malware Vulnerabilities Network iOS Malware Pegasus | Malicious Profiles | AceDeceiver | YiSpecter | XcodeGhost Android Malware Quadrooter | Stagefright | Hummingbad | Accessibility Clickjacking Targeted Malware Exaspy, Ransomware, Repackaged Apps Annoying Malware Adware 1 in 5 of your devices allow installation from third-party app stores Third-party stores are 72xmore likely to deliver malware Malware as a Percentage of Downloaded Apps Google Play Store Samsung Amazon Aptoid 0.06% (1 in 1600 apps) 0.11% (1 in 900 apps) 0.77% (1 in 130 apps) 4.41% (1 in 23 apps)
  • 7. © 2017 Aetna Inc. Malware Got 200+ devices? You probably have malware!Physical Malware Vulnerabilities Network Man in the Middle WifigatePineapple arpspoofdnsspoof SSL stripping SSL decryption Content manipulation 92% of users click on “Continue” compromising their Exchange identity (username and password) Source: Skycure Threat Intelligence 32.5 PERCENT of executive devices were exposed to network attack within a quarter
  • 8. © 2017 Aetna Inc. Vulnerabilities Organized & directed effort from hackersPhysical Malware Vulnerabilities Network do not have latest OS version installed 33% of Devices with Stored Sensitive Info Do you know which of your devices are upgradable? - Without relying on Apple or Google? - How much risk can be averted by simply updating? ? ? ?
  • 9. © 2017 Aetna Inc. Pain Points in Regulated Industries • Data accessed outside corporate firewalls − Greater use of mobile devices − Flexible working hours and locations • Accessing regulated data on unmanaged devices − Agents/Doctors manage their own devices − Better access to customer data means better service in the field • New regulations NEWS ITEM: New York State Imposes New Cybersecurity Regulation for Financial Services New requirements: 1. Employ a CISO 2. Annual reports
  • 10. © 2017 Aetna Inc. Customer Data at Risk Source: Skycure Source: Skycure 1 in 5 organizations suffered a mobile security breach 8% of all healthcare breaches came from mobile devices 16% of all financial breaches came from mobile devices
  • 11. © 2017 Aetna Inc. Mobility @ Aetna • Approximately 10k mobile devices − 60% BYOD; 40% corporate-owned/managed − Phones, tablets, iPods • Use cases: − Mobile productivity (email, calendar) − Chat/collaboration − Enterprise managed third-party applications − Internally developed employee applications • Established MDM & MAM Platforms
  • 12. © 2017 Aetna Inc. Aetna: Key Risk Factors Compromise of data in containerized applications by “screen scraping” iOS/Android malware Compromised Aetna Credentials & Data (malicious networks) Malware on BYOD & Corporate Devices Unpatched OS Vulnerabilities Device Currency Pegasus AceDeceiver SVPENG
  • 13. © 2017 Aetna Inc. Aetna’s Solution • Implemented Skycure Mobile Threat Platform • Deployed to all BYOD & Corporate Devices • Mandated compliance dates • Integrated monitoring into Security Operations Center • Phase 2: Integration into MDM platforms to allow for proactive management of access to Aetna resources from impacted devices (in progress)
  • 14. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 14 9,314 Devices 53,612,964 Network Tests Performed 523,143 Access Points 53,458 Networks 9,724 Active Users 4,097,982 Apps Scanned
  • 15. Title of Presentation DD/MM/YYYY© 2017 Skycure Inc. 15 24 High criticality malware infections mitigated 460 Instances of credentials/data protected on high risk networks 701 Total malware infections mitigated 23.97 High risk vulnerabilities addressed per-device
  • 16. © 2017 Aetna Inc. Risk Visibility The Foundation to addressing risk is having Visibility Source: Screenshots from the Skycure platform at Aetna
  • 17. © 2017 Aetna Inc. Malware Security 3,365,558 Android Apps Scanned Source: Screenshots from the Skycure platform at Aetna Installed from unknown third party application store Since implementation 14 critical severity malicious Android applications have been identified. Unauthorized system setting modification, process manipulation, audio recording
  • 18. © 2017 Aetna Inc. Network Security 30,105,599 Networks Tests Performed on 34,918 Networks, Accessed From 319,338 Access Points 3,607 devices connected to a network which posed a threat (6.4% of the networks). These network threats include secure traffic description, content manipulation, suspicious/fake hotspots, and unknown threats (suspicious network behavior). Skycure automatically opens a VPN and adds another layer of encryption when applicable. Source: Screenshots from the Skycure platform at Aetna 61% 39% 39% of Aetna’s devices were exposed to network threats 32685 2233 Safe Networks Threatning Networks September 2, 2016 3,607 of 9,304 devices were exposed (39%)
  • 19. © 2017 Aetna Inc. Network Incidents Map The above map shows the distribution of tests that concluded with network threats according to the geolocation associated with the network. Source: Skycure
  • 20. © 2017 Aetna Inc. Vulnerabilities 1,941 devices are running an operating system with high risk. We use CVSS - open standard for scoring vulnerabilities. You can see the reasoning for each of those in the system. Most of Aetna’s devices are iOS, which is usually better when it comes to security updates. However, we still see many of them running OS versions with major known vulnerabilities Source: Screenshots from the Skycure platform at Aetna
  • 21. © 2017 Aetna Inc. Total & Overall Risk Trends While we are managing to maintain less than 10 devices at risk at any given time, we are also constantly improving the overall risk by decreasing the total number of medium risk devices. In the following graph you can see that decrease (Medium-risk devices are marked with Orange). We constantly collect device risk and at the peak time (April 3rd) we had 9 devices at high risk – Currently we have 0 devices with high risk, as we are constantly addressing these. Source: Screenshots from the Skycure platform at Aetna
  • 23. © 2017 Aetna Inc. New York Life Testimonial Steve Johnson Head of Data Protection & Cybersecurity Services Enterprise Technology Group "Our people need access to data and other corporate resources on mobile devices, but we are mindful of the need to protect our systems, especially regulated data," said Johnson. "Our agents can securely access a client’s information before a meeting, which allows them to make smarter policy recommendations," Johnson explained.
  • 24. © 2017 Aetna Inc. Skycure Mobile Threat Defense • Always ON protection • Whole device, all vectors • No “Sideloading” Seamless experience Privacy Minimal footprint • Advanced security • Risk-based mgmnt • Automation and integration Security Visibility IT Satisfaction PUBLIC APP CLOUD SERVER • Crowd-sourced • Threat aggregation from third parties • Skycure research 1 Million+ Global Threats Identified https://maps.skycu re.com THREAT INTELLIGENCE
  • 25. © 2017 Aetna Inc. Skycure – High Level Overview Leading Product & ResearchCustomers #1 Mobile Threat Defense SolutionStrategic Partners CONSUMER GOODS RETAIL MANUFACTURING TECHNOLOGY FORTUNE 50 PHARMACEUTICAL COMPANY 250+TV channelsFORTUNE 100 HEALTHCARE COMPANY FORTUNE 500 FINANCIAL SERVICES COMPANIES
  • 26. © 2017 Aetna Inc. Q & A

Editor's Notes

  1. Before I give the solution overview, let me quickly walk you through who Skycure is. We are the leader in Mobile Threat Defense with more Fortune 500 companies as customers than all the other players combined. Given our strength in research, we have been featured in all leading print, digital, and broadcasting media including more than 250 radio and TV channels including the super prestigious NBC’ The TODAY show. We partner with all major EMM market leaders and security VARs. Lastly, Skycure technology constantly gets rated as the #1 Mobile Threat Defense solution by analysts and evaluators.