empower your workforce - amazon web services · •byod •mdm connectivity •app-driven...

Post on 24-Aug-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Empower Your Workforce Securing Mobile Technology

Otavio FreirePresident & CTO

Introduction by way of bots & bad actors

I’m really popular with bots & imposters

Mobile Revolution: A Tale of Two Tracks

PORTABILITY

• Device-driven

• Always-on access

• Concerns:

• BYOD

• MDM

CONNECTIVITY

• App-driven

• Always-open path

around perimeter

• Concerns:

• Productivity vs risks

Peace with the first,

living in throes of the second

• Ability to reach customers 1:1

• New channels & tools emerge

• Communication patterns change rapidly

• Enterprise business often playing catch-

up

• Ex: WhatsApp in emerging markets

Connectivity Unleashed New Potential, New Risks

Are Security Policies Holding Your Organization Back or Driving

Business Forward?

• Attacks are evolving to match

users’ technological adoption

• Targeting has shifted from the

general to the specific

• Bad actors leverage 1:1 targeting

via social and digital channels

CONNECTIVITY

Digital RisksAre Cross-

Channel

CONNECTIVITY

Classified Assets

Disseminatedon Social

Securing Your Enterprise Means Protecting Your People

Protect & Empower Your

Workforce

• Create human-centered policies

that secure every interaction

• Scalable security to seize new

business opportunities or channels

• Adapt and evolve to new threats

Build Human-Centered Policies

• How does your company measure

success? What motivates your

workforce?

• Know the core processes &

workflows

• Incorporate ongoing discovery &

threat modeling

Scale with Opportunity

• Get out of the server room:

Cybersecurity must evolve beyond

a technical implementation

• Solutions must operationalize

security across entire organization

• Optimized for a mobile workforce

that is always on

Adapt to New Threats

• Redefine risks with input across

C-suite; bad actors don’t think in

silos

• Machine-learning to enable

proactive defense

• Ability to take corrective action –

alerts alone are useless and will

overwhelm your teams

Secure Every Interaction

• Security should be a catalyst for business

transformation, not simply a cost center

• To secure your enterprise, protect your people

with policies that empower them to use the best

tools available to succeed

Thank you@OtavioFreire

top related