the future of mobile security
TRANSCRIPT
![Page 1: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/1.jpg)
Beyond Privacy The Future of Mobile Security
Dr. Kimo Quaintance Mobile Convention Paris
5 April 2016 @kimoq
![Page 2: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/2.jpg)
![Page 3: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/3.jpg)
Use iOS
Mobile Security: the easy version
Use a password manager
Have a recovery plan
![Page 4: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/4.jpg)
Source: Ben Evans
Source: Ben Evans, ‘Mobile Has Eaten the World’, 2016
![Page 5: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/5.jpg)
Mobile Security in 2012
![Page 6: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/6.jpg)
![Page 7: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/7.jpg)
Data encryption by default, and no reselling of data
Privacy only exchanged for value added services (machine learning)
![Page 8: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/8.jpg)
We’re at the beginning of something huge…
![Page 9: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/9.jpg)
The ‘Cambrian Explosion’ of the Smartphone Ecosystem
![Page 10: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/10.jpg)
![Page 11: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/11.jpg)
![Page 13: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/13.jpg)
Source: The Verge
![Page 14: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/14.jpg)
![Page 15: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/15.jpg)
The business plans of the next 10,000 startups are easy to forecast: Take X and add AI. This is a big deal, and now it’s here.
— Kevin Kelly, Wired
![Page 16: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/16.jpg)
We’re talking about a living, breathing capability to improve.
— Jen-Hsun Huang, CEO of Nvidia
![Page 17: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/17.jpg)
![Page 18: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/18.jpg)
![Page 19: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/19.jpg)
![Page 20: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/20.jpg)
The ‘Long Tail’
![Page 21: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/21.jpg)
Source: Bloomberg
![Page 22: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/22.jpg)
How do we bring all of this into our organization to create value?
![Page 23: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/23.jpg)
Observing from the sidelines
Two losing strategies:
Outsourcing innovation
![Page 24: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/24.jpg)
How are you currently:
Reimagining your business in the future?
Incubating new ideas for products and services?
Positioning yourself for growth, not just survival?
![Page 25: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/25.jpg)
Security Innovation by Design 1. Understand Trends to Identify
Risks and Opportunities
3. Activate & Enable Your Team
4. Constantly (and quickly)
Prototype & Iterate
2. Connect and Share with Knowledge Networks
![Page 26: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/26.jpg)
Questions?
Kimo Quaintance George C. Marshall European Center for Security Studies Mobile Convention Paris, 5 April 2016 @KimoQ [email protected]
![Page 27: The Future of Mobile Security](https://reader031.vdocument.in/reader031/viewer/2022022413/58a160f11a28abc1708b4fff/html5/thumbnails/27.jpg)
Data Security
Confidentiality
Integrity Availability