Western New York Institute of Internal Auditors Conference. Mobile Device Security Enterprise Challenges. December 11 th, 2013



Similar documents
My CEO wants an ipad now what? Mobile Security for the Enterprise

January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director

Chris Boykin VP of Professional Services

Securing the Cloud Infrastructure

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Telecommunications. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Technology. Key findings from The Global State of Information Security Survey 2014

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Hands on, field experiences with BYOD. BYOD Seminar

Defending yesterday. Power & Utilities. Key findings from The Global State of Information Security Survey 2014

Click to edit Master title style

How To Secure Your Store Data With Fortinet

2011 Forrester Research, Inc. Reproduction Prohibited

What Is Cisco Mobile Workspace Solution?

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

WhitePaper. Private Cloud Computing Essentials

EXECUTIVE STRATEGY BRIEF. Securing the Cloud Infrastructure. Cloud. Resources

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

If you can't beat them - secure them

Bring Your Own Device Mobile Security

Building an Effective Mobile Device Management Strategy for a User-centric Mobile Enterprise

Symantec Mobile Management 7.2

The Value of Vulnerability Management*

The BYOD Opportunity. Say Yes to Device Diversity and Enable New Ways to Drive Productivity WHITE PAPER

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Application Security in the Software Development Lifecycle

Symantec Mobile Management 7.1

Mobile and BYOD Strategy

John Essner, CISO Office of Information Technology State of New Jersey

Symantec Mobile Management 7.1

IT Security & Compliance. On Time. On Budget. On Demand.

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Real-World Scale for Mobile IT: Nine Core Performance Requirements

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise)

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

SANS Mobility/BYOD Security Survey

Simplifying the Challenges of Mobile Device Security Three Steps to Reduce Mobile Device Security Risks

BYOD: End-to-End Security

Advanced Threat Protection with Dell SecureWorks Security Services

A NEW APPROACH TO CYBER SECURITY

Defending Against Data Beaches: Internal Controls for Cybersecurity

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

Microsoft Services Premier Support. Security Services Catalogue

"Secure insight, anytime, anywhere."

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Securing the Microsoft Cloud

Readiness Assessments: Vital to Secure Mobility

BEST PRACTICES IN BYOD

trends and audit considerations

NERC CIP VERSION 5 COMPLIANCE

Brainloop Cloud Security

BYOD Policy & Management Part I

Top 10 Reasons Enterprises are Moving Security to the Cloud

ONE DEVICE TO RULE THEM ALL! AUDITING MOBILE DEVICES / BYOD NSAA IT CONFERENCE OCTOBER 2, 2014

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

End-user Security Analytics Strengthens Protection with ArcSight

Symantec Mobile Management 7.2

Vulnerability Management

BYOD: The Threats and the Opportunity for Carriers

Total Protection for Compliance: Unified IT Policy Auditing

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

DOBUS And SBL Cloud Services Brochure

Cloud Computing and Privacy Toolkit. Protecting Privacy Online. May 2016 CLOUD COMPUTING AND PRIVACY TOOLKIT 1

A framework for auditing mobile devices

Device Independence - BYOD -

How To Monitor Your Entire It Environment

INFORMATION PROTECTED

Symantec Mobile Management for Configuration Manager 7.2

BEST PRACTICES IN BYOD

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

Symantec Client Management Suite 8.0

How To Improve Your Business

Guideline on Safe BYOD Management

Insert Partner logo here. Financial Mobility Balancing Security and Success

Cisco Security Optimization Service

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

SANS Mobility/BYOD Security Survey

Payment Card Industry Data Security Standard

Protecting Your Organisation from Targeted Cyber Intrusion

Security and Compliance challenges in Mobile environment

DEPLOYMENT. ASSURED. SEVEN ELEMENTS OF A MOBILE TEST STRATEGY. An Olenick & Associates White Paper

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

10 Smart Ideas for. Keeping Data Safe. From Hackers

FIVE PRACTICAL STEPS

Remote 2014 Monitoring & Control. Securing Mobile Devices November 7 th 2014

Italy. EY s Global Information Security Survey 2013

The Truth About Enterprise Mobile Security Products

Mobility, Security Concerns, and Avoidance

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Operational security for online services overview

Master s STI GDWP. Authors: Mark Baggett, mark.baggett@morris.com Jim Horwath, jim.horwath@rcn.com. Submitted: June 6, 2010

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Transcription:

Western New York Institute of Internal Auditors Conference Mobile Device Security Enterprise Challenges December 11 th, 2013

Agenda I Introduction Mobile Device Security: Expediential Growth in Mobility II Business Drivers for Mobility III Mobile Security Considerations IV V VI Risk Mitigation An Approach to Mobile Security Secure mobile software development - why is this paramount? Wrap-up / Q&A 2

Mobile Device Security I. Introduction - Expediential Growth in Mobility 3

Connected Mobile Devices Expediential Growth It took 22 years to connect 2 Billion people to the internet The next 2 billion will come online in 5 years Gary Kovacs (Mozilla)

The proliferation of mobile devices 3 billion tablets and & smart phones globally by 2015- the Economist the World in 2013 5

Mobile device proliferation has changed the game Computing will shift increasingly to mobile devices. Worldwide Device Shipment (thousands) Device Type PC 2012 2013 2014 (Projected) 2017 (Projected) 341,263 315,263 302,315 271,612 Ultramobile 9,822 315,229 38,687 96,350 Tablet 116,113 197,202 265,731 467,951 Smart Phones 1,748,176 1,875,774 1,949,722 2,127,871 Total 2,213,373 2,411,796 2,556,455 2,964,783 Source: Gartner, April 2013 6

Mobile is an essential channel to gain presence and strengthen consumer and employee engagement Length in Years to Reach 50M Users Mobile is reaching ubiquity very quickly Mobile phone adoption significantly outpaced recent technologies 50 45 40 35 30 25 20 15 10 5 0 38 13 Length in Years to Reach 50M Users 4 3.6 2.5 1.5 is becoming a differentiator 94% Of Fortune 500 firms have deployed or are testing ipads for staff 2 82% Smartphones represent only 12% of total global handsets 82% of traffic. 3 and is changing the way users are engaging with businesses 15,000 Applications released weekly Droid 675K PC 75K ipad 225K iphone 575K 7

Mobility challenges, then vs. now Issue Historical Mobility Challenge ( <2008) Today s Mobility Challenge (2013) Scope of the mobile challenge Ownership & accountability Applications & content Connectivity Cultural adoption Limited to several types of company issued devices. IT led and operated. Primarily email and contacts. Primarily enterprise data center. Primarily a work device. User s demand freedom of choice. Hundreds of devices. IT operated, IT or user owned. Rich content and applications, mobile VPN, a desktop like experience. Enterprise, cloud and hybrid scenarios. Personal entertainment device, social hub, blending of work/life. (Consumerization of IT) 8

Mobile Device Security II. Business Drivers for Mobility 9

Business Drivers User driven change Board Room and Senior Executives driving usage Users demanding enhanced collaboration and productivity Increased consumerization fostering a culture of instant gratification Greater convenience Applications moving beyond Email/Contacts/Calendars Mobile capabilities and applications aligning with the business model Rich content enables quick decisions Impact & Trends Infrastructure to support increased adoption of Smartphones BYOD/approved corporate mobile devices Security, compliance, and legal consideration Mobile/cloud applications, data and services Need for stronger mobile governance and monitoring 10

Why is mobile security complex? Device Diversity/ Complexity Application Explosion Data Explosion Advanced Persistent Threats Data Transference and Inference 11

Primary Mobile Attack Vectors Data Transference and Inference Physical loss or theft of the device Malicious software 12

BYOD Challenges #1 Protecting business information and intellectual property is the number one challenge for organizations implementing BYOD Use of personally owned devices blurs owner responsibilities regarding device support, ownership of data and how much access and control the organization may have to data on the device It s my device! There is still frequent resistance by users to sign acknowledgements or acceptable use agreements Diversity of mobile platforms: Users want the latest, regardless of what operating system or features the organization is able to support 13

Mobile Device Security III. Mobile Security Considerations 14

Why is mobile security a concern? Mobile threats are on the rise according to the Symantec Report of 2012; 31 percent of all mobile users have received an SMS from someone that they didn't know. An example is where the user receives an SMS message that includes a link or phone number.

Mobile Phishing 16

Mobile Security Key Considerations Threat Modeling Does your organization continually review and assess new threats against it s mobile device strategy by assessing relevant security related documentation and configurations? Controls & Technical Assessments How often are controls and the MDM solutions evaluated to identify control deficiencies, security risks and known vulnerabilities? Controls & Technical Remediation Are deficiencies and security gaps acted upon? Are additional controls implemented or existing controls strengthen? 17

Other Mobile Security Considerations 1. How should we govern and manage personally owned devices, and which platforms should we support? 2. What kinds of corporate applications and resources should we open to mobile devices? 3. How will we educate our customers, employers, and partners about mobile risks? 4. How can we balance mobile productivity, opportunity, and risks? 5. How do we increase consumer interaction and satisfaction through mobile devices while protecting the consumer and our brand? 6. How will we evolve processes and tools to accommodate mobile devices? 18

Global State of Information Security Survey Results - A worldwide study The Global State of Information Security Survey 2014, a worldwide study by, CIO Magazine, and CSO Magazine, was conducted online from February 1, 2013 to April 15, 2013. s 15th year conducting the online survey, 10th with CIO and CSO magazines Readers of CIO and CSO magazines and clients of from 128 countries More than 9,300 responses from CEOs, CFOs, CIOs, CISOs, CSOs, VPs, and directors of IT and security More than 40 questions on topics related to privacy and information security safeguards and their alignment with the business Thirty-three percent (33%) of respondents from companies with revenue of $500 million+ Margin of error less than 1% 19

Mobility has generated a deluge of business data, but deployment of mobile security has not kept pace with use Smart phones, tablets, and the bring your own device trend have elevated security risks. Yet efforts to implement mobile security programs do not show significant gains over last year, and continue to trail the proliferating use of mobile devices. Initiatives launched to address mobile security risks Mobile security strategy 40% 42% Mobile device-management software Protect corporate e-mail and calendaring on employee- and user-owned devices Strong authentication on devices 31% 38% 39% 36% 37% 35% Ban of user-owned devices in the workplace/network access 33% 30% 2012 2013 N/A Use of geolocation controls 19% Source: Global Survey of Information Security 2014 Question 16: What initiatives has your organization launched to address mobile security risks? (Not all factors shown.) 20

Security incidents are increasing, with awareness of mobile security issues a key issue The number of incidents detected in the past 12 months increased by 25%, perhaps an indication of today s elevated threat environment. Respondents who do not know the number of incidents doubled over two years. This may be due to continued investments in security products based on outdated models. Mobile device (e.g., smart phone, tablet computer) exploited: All respondents, 21% * A security incident is defined as any adverse incident that threatens some aspect of computer security. Question 18: What is the number of security incidents detected in the past 12 months? 21

Mobile Security IV. Risk Mitigation An Approach to Mobile Security 22

Achieving Mobile Security 23

Mobile Security Deployment Mobile security policy Mobile device standards User-todevice interaction Device management Device protection Policy management 24

Mobile protection technologies Mobile Device Management (MDM) Secures, monitors, and manages enterprise mobile devices and can act as a proxy for device activity (such as web browsing and email), depending on the vendor solution. Device activity is filtered, based on management defined policies. Devices receive and execute management commands from a central server. Vendors: MobileIron, Sybase Afaria, AirWatch, RIM, McAfee,. Secure Application Container Device Virtualization Antivirus Corporate data (email, contacts, internal web sites, etc.) is encrypted within a secure application that is firewalled from the rest of the operating system. Data transfer occurs between the mobile device and a secure application server via an encrypted channel. Vendors: Good for Enterprise, GoodReader, BoardVantage, SAP BusinessObjects. Mobile devices use a hypervisor to create secure separation between underlying hardware and secure software that runs on top of it. Device virtualization enables multiple OSs or virtual machines to segregate personal and corporate information and use. Vendors: VMWare, Citrix. Scanning capabilities depend on the nature of the OS and the server. Some antivirus tools are limited to scanning file attachments on the device and server, while others are capable of scanning applications, settings, data, and media files for malware. Vendors: Lookout (Android), Intego s VirusBarrier (ios), AVG (Android). 25

Mobile Security V. Secure mobile software development - why is this paramount? 26

Secure software development Organizations that embroider security into their mobile software development processes have less internal and external exposure to compromise. 27

Secure software development The Models BSIMM Building Security in Maturity Model Microsoft SDL (Secure Development Lifecycle) Software Assurance Maturity Model NIST 800-64 ISO/IEC 27034-1 28

BSIMM Building Security in Maturity Model Overview BSIMM built BSIMM by gathering real data from nine large-scale software security initiatives (i.e.adobe, EMC, Google, Microsoft, QUALCOMM) only activities observed in the field could be added to the model Framework composed of four domains and over 100 secure SDLC activities Lessons Learned Auditable and defendable framework composed of prescriptive and measurable activities Flexible framework which is used as general guidance i.e. as a trail guide rather than as a cookbook While there are prescriptive domains and objectives the associated activities used to meet the requirements can be customized for the client s environment SDLC process agnostic Model has been validated with data from 67 firms Adopted by major firms such as Google and Sony Can also be used as a yardstick for measuring existing practices against industry peers 29

Microsoft SDL Originally built internally as Microsoft-wide initiative and a mandatory policy since 2004 Overview Later extended and made public for wider adoption Collection of mandatory security activities, presented in the order they should occur and grouped by the phases of the traditional software development life cycle MS-only versions since public release Lessons Learned Can be applied directly to Spiral and Waterfall development models Threat Modeling is the cornerstone of SDL Microsoft has openly stated that all current mandatory application security related policies, standards, and procedures along with their supporting people, processes, and tools meet or exceed the guidance in ISO/IEC 27034-1 as published in 2011 Heavyweight model which has proven difficult for certain shops to adopt - good for experts to use as a guide, but hard for non-security folks to use off the shelf 30

NIST SP 800-64 Guideline developed to assist federal government agencies in integrating security steps into SDLC Overview Guideline applies to all federal IT systems other than national security systems Guide includes general five phased SDLC and each phase includes a minimum set of security steps needed to effectively incorporate security into a system during its development. Lessons Learned NIST publications often viewed as gold standard for security, however, there is little evidence of adoption in the private sector Often viewed as overly complex and unwieldy The NIST model is a process model more related to the SDL/CLASP/TouchPoint type of models NIST model is waterfall-based Focuses much more on deployment, operations and disposal than the other models 31

ISO/IEC 27034-1 Overview Officially released in 2011 and provides an overview of application security concepts as well as the framework and processes that are needed to operate a comprehensive application security program Part one of six-part standard, remaining five parts will provide additional depth, but are not yet published Developed by the same group that developed ISO/IEC 27001 series Lessons Learned Relatively new entrant to the secure software framework discussion little to no insights into reception by marketplace Standard specifically avoids recommending specific security controls within a development lifecycle, and it does not prescribe any specific technology Not dependent upon ISO/IEC 27001 and can be used independently, however it is viewed as a complement to ISO/IEC 27001 Auditable and defendable framework Given track record of ISO 27000 series many view this framework as being accessible to enterprises, IT auditors, regulatory bodies, software producers, and others to incorporate as necessary into their existing initiatives 32

Comparing Microsoft SDL to BSIMM The following criteria was utilized for comparing the strengths and limitations of the Microsoft SDL and BSIMM frameworks. Implementation The delivery of the program must be flexible to allow for an organization to adopt and instill the framework into its unique environment without significant disruption to its existing practices and with available budget and resource. Execution The execution of the program will meet the objectives of the organization s governance obligations in addition to delivering an effective framework for assuring the security posture of software. Sustainability The quality and evolution of the secure software program must be maintained. As the organization changes direction, the framework must be adaptable to fit future business strategy. 33

Comparison Results BSIMM Microsoft SDL Criteria Strengths Limitations Strengths Limitations Implementation Holistic approach to a software security program by incorporating corporate governance and metrics to evaluate controls. BSIMM can be used to plan, structure, and execute the evolution of an organization s software security initiative. The BSIMM, if implemented prescriptively using the highest level of maturity, can requires significant effort to implement. However, by utilizing BSIMM as a framework/basis for identifying and mitigating risks to comply with compliance obligations, the level of effort is greatly reduced. Provides a sequential roadmap for secure software development implementation. Complicated framework to incorporate due to the level of obscurity and complexity. Absence of tangible control activities that can be audited on a recurring basis. Execution The execution of the BSIMM will illustrate pursuit of internal software compliance by requiring governance within the program. The BSIMM encompasses planning and assigning roles and responsibilities, identifying software security goals, determining budgets, and identifying metrics and gates. The success of the program is in direct correlation with the amount of organizational support from management. Microsoft offers tools and templates to assist with the execution of the framework. The execution of the MS SDL is a very rigid approach. Lacks incorporation of organizational goals and compliance obligations. Does not include guidance for law, policy, and procedure compliance into the software program. Sustainability Key performance indicators enable continuous performance and benchmarking progress against previous points in time. Metrics can be leveraged to analyze results in contrast to other peers in industry. The BSIMM requires perpetual monitoring and review to be effective. Note that monitoring and review of the effectiveness of the secure software controls is also a requirement of new compliance regulations. Eliminates redundancies and coordinate processes, thereby streamlining the efficiency of future application development Absence of scalability and limited ability to tie the program with the goals and desires of the business. Lacks ability to measure and gauge performance over course of time. 34

Comparison of secure software frameworks MS SDL versus BSIMM (slide 1 of 3) The following is a detailed comparison of two secure software frameworks: MS SDL and BSIMM. The comparison on this slide includes a summary of pros and cons of each framework based on the following attributes: Acceptability as an audit framework and ongoing maturity assessment. Key Component Areas BSIMM MS SDL Acceptability as an audit framework BSIMM is a vendor agnostic framework that was designed by experts from Independent Software Vendors (ISVs), high tech, and financial services industries. 67 major organizations have validated the BSIMM s practicality for utilization. All of the activities produce artifacts sufficient to allow auditing for compliance adherence. There are 112 auditable control activities within the BSIMM Framework. MS SDL was created and designed by Microsoft, and designed for small to medium sized organizations. Although MS SDL is recognized as a strong secure software development program, there is an absence of tangible control activities that can be audited on a recurring basis. Maturity Assessment BSIMM is a model that allows an organization to assess the current state of the software security program and subsequently measure the improvement of the program over time. Each practice within the framework is supplemented with 3 maturity levels. MS SDL provides a one way road map that lacks in realm of regression to measure current performance metrics to gauge on how the software security program is performing over the course of time. 35

Comparison of secure software frameworks MS SDL versus BSIMM cont (slide 2 of 3) The comparison continues by reviewing the practicality and feasibility of the two software frameworks. Key Component Areas BSIMM MS SDL Practicality Feasibility The BSIMM is an effective framework based on the thoroughness of the intelligence activities. BSIMM provides direction on how to establish organization-wide resources: Attack models to capture the attacker s modus operandi. Security features and design to create usable patterns for major security controls. Standards and requirements practice to elicit explicit security requirements from the organization. BSIMM is sustainable, repeatable, and scalable. Sustainable due to ability to continuously measure performance with key performance indicators allowing comparisons against previous periods of time. Additionally, these metrics can be leveraged to analyze results in contrast to other peers in industry. BSIMM is scalable due to the ability to re-visit the program at periodic intervals to assess the as-is versus desired maturity state. At it s core, MS SDL is practical for a small archetype of organizations. However is not practical for organizations with strict governance programs as it does not include guidance for law, policy, and procedure compliance into the software program. The MS SDL framework was designed for advanced software architects and engineers, it is a complicated framework to incorporate due to the level of obscurity and complexity. There is an absence of scalability as there is not a campaign to tie the program with the goals and desires of the business. 36

Comparison of secure software frameworks MS SDL versus BSIMM cont (slide 3 of 3) The comparison continues by reviewing the flexibility of the two software frameworks. Key Component Areas BSIMM MS SDL Flexibility The core BSIMM framework is very versatile as it allows for the business to tailor fit the program based on the organization s structure, size, and most importantly regulatory compliance obligations. The governance domain incorporates key control activities such as compliance and policy that offers specific guidance for stakeholders on strategies for auditability. The Microsoft framework is rigid in nature as it doesn t take into consideration the current state of the organizations software security program. The MS SDL five phases are, Requirements, Design, Implementation, Verification, and Release. None of these phases incorporate an architectural analysis that constructs a risk assessment and remediation plan. 37

Summary of Comparison of secure software frameworks MS SDL versus BSIMM The following illustrates a summary strengths and weakness of each framework BSIMM MS SDL Strengths Weaknesses Strengths Weaknesses Holistic approach to a software security program by incorporating corporate governance and metrics to evaluate controls. Framework not specifically designed for any industry sector. Provides a good roadmap for secure software development. Lacks incorporation of organizational goals and compliance obligations Versatile can be leveraged by any organization as it is vendor agnostic, regardless of industry or scope. Time and effort If implemented prescriptively and at the highest level of maturity, a significant amount of time is required to build the program. Supported by large firm which continues to invest in the program. Esoteric, designed by Microsoft utilizing their own nomenclature and methodology Control activity driven which makes it very auditable in a precise fashion. Tools are available to test software security. Rigid, one method only approach to secure software development 38

Visibility of mobile configuration Configuration Management Database (CMDB) What is a CMDB? A central database that provides visibility and management of application environments by establishing an inventory of configuration items (CIs). Maintains of inventory of application configuration parameters, including those parameters house or handle sensitive information. Included in change management workflow provides additional layers of controls and monitoring for changes performed to environments that process sensitive information. Assists in the management of complex environments with interconnected heterogeneous systems. 39

Key takeaways Integrate security into the Enterprise Mobile Security Program. Cultivate transparency of mobile security risks by asking key questions: What are the current risks within the mobile environment? What controls are in place today to address mobile security risks? What is the overall risk tolerance of management? Are all risks identified? Does ambiguity exist within mobile security processes and procedures.? Plan to incorporate mobile security safeguards into the infancy stages through completion of all future mobile enterprise projects. 40

References Aiello, B. & Sachs, L. (2011). Configuration Management Best Practices. Upper Saddle River, NJ: Addison-Wesley Professional Anderson, J., & Heiser, M., & Nampalli, J., Nykamp D., Speed, T. (2013) Mobile Security: How to Secure Privatize, and Recover Your Devices. Birmingham, UK: Packt Publishing Cappelli, D.M., & Moore, A.P., & Trzeciak, R.F. (2012). The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes. Boston, MA: Addison-Wesley Professional International Data Group., CIO, CSO, Global State of Information Security Survey Jaquith, A. (2007). Security Metrics: Replacing Fear, Uncertainty, and Doubt. Upper Saddle River, NJ: Addison-Wesley Professional McGraw, G. & Migues, S. & West, J. (2012). Building Security in Maturity Model. Creative Commons Attribution-Share: San Francisco, CA Security Development Lifecycle. (2013). Microsoft. Retrieved from: www.microsoft.com/security/sdl/default.aspx Wheeler, E. (2011). Security Risk Management. Waltham, MA: Syngress 41

Mobile Device Security VI. Wrap-up / Q&A Session 42

Thank you For more information, please contact: TR Kane IT Risk & Security Assurance Partner (216) 875-3038 t.kane@us.pwc.com David Faraone IT Risk & Security Assurance Manager (412) 355-8023 david.a.faraone@us.pwc.com 2013 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved. refers to the United States member firm, and may sometimes refer to the network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details. This content is for general information purposes only, and should not be used as a substitute for consultation with professional advisors. 43