At the outset of the BYOD trend, mobile security was about protecting devices. Today, mature organizations are focused more on protecting data and ensuring proper identity and access management.
In this exclusive session, a sequel to Mobile: Learn from Intel's CISO on Securing Employee-Owned Devices, Malcolm Harkins, Intel's CISO and Chief Privacy Officer, discusses how to deploy advanced mobile security strategies, including:
Data security across the network and across multiple mobile devices supporting diverse platforms - Apple, Google, BlackBerry and more;
New approaches to IAM, including how to use the mobile device to enhance authentication and access;
Responding to mobile malware, which increasingly seeks to infect devices and gain unauthorized access to accounts;
Lessons learned from a global BYOD initiative, including how widespread mobility has helped Intel ensure business continuity during natural disasters.
When the northwestern U.S. was struck recently by a crippling ice storm, thousands of Intel workers were unable to get to their regional office. But through the ubiquity of their personal mobile devices and the secure wireless connections to Intel, these remote staffers were able to continue work without missing a beat.
This story is just one example of how Intel has learned to turn the mobile security challenge into new business opportunities, says Malcolm Harkins, Intel's chief information and privacy officer.
An early proponent of the bring-your-own-device trend, Harkins today oversees a global enterprise that now supports in excess of 30,000 mobile devices - with roughly 700 new devices added each month.
When Intel first opened the floodgates to employee-owned devices in 2010, the immediate security focus was on three elements: Creating a mobile policy, managing the fleet of devices, and employing layered security controls to prevent breach.
Today, Intel is focused on answering a new set of mobile security questions:
Data Protection - How can corporate data be protected on the device, and how can damage be mitigated if a device is lost or stolen?
IAM - How can one not only ensure the identity of the mobile user, but also use the mobile device as a new tool for identity and access management? Against the growing scourge of mobile malware, IAM practices are critical.
Business Continuity - How can mobility be used not just to ensure business continuity during a natural disaster, but how can the devices be used as an element of enhanced authentication to secure systems?
These are among the topics to be addressed in this session, which is geared for leaders whose organizations are advanced along the path of securing enterprise mobility.
Harkins is responsible for all aspects of information risk and security at Cylance as well as public policy and customer outreach to help improve understanding of cyber risks. He spent 23 years with Intel, most recently as its first Chief Security and Privacy Officer. In this role, he was responsible for managing the risk, controls, privacy, security and other related compliance activities for all of Intel's information assets, products and services. Before becoming Intel's first CSPO, he was the chief information security officer (CISO), reporting to the chief information officer. Harkins also held roles in finance, procurement and various business operations.