Beltug

First rule of security? Know what you need! BELTUG SIG Security on mobile security-Report & Presentations


Date:22/01/2013


Risk mitigation? Company devices vs. BYOD? NO! Know your own needs and values: that’s the starting point for security, concluded the Security SIG at the meeting on Tuesday, 22 January.

Security Expert Xavier Mertens got the interactive discussion moving, with a presentation that raised a broad number of discussion topics, from building awareness, to penetration tests. BELTUG’s Wendy Breviere followed that up with a presentation on DDOS attack mitigation RFPs.

The conclusion was: before taking any other actions, before mitigating risks, before deciding on BYOD, you must first define your own needs and values. Then, and only then, can you investigate the various solutions, such as MDM, firewalls or Active Sync.

Among the other conclusions of the meeting:

  • If you do select a security device like an MDM, don’t forget to review it based on all your security requirements, such as open ports restriction at the network’s border.
  • For mobile device applications, the participants also recommended browsing through the OWASP Mobile Security Project .

Presentations are available at the bottom of this page for our members (just log in).

*********************

BELTUG SIG Security on "mobile security and the BELTUG initiative on DDOS attacks" - Tuesday 22 January.

The following companies registered to participate at VBO-FEB: Bank Degroof Banque, Belgacom, BNP Paribas Fortis, Dexia Bank, European Commission, Exclusive Networks, FOD Financiën, ING België,Johnson & Johnson, KBC ICT Global Services, The Brussels Airport Company, Universiteit Antwerpen.
 

-Introduction of topics and interactive discussion between participants
  • What should we specify in our security policy?
  • How often should we repeat the awareness program?
  • How are the security parameters determined within the MDM software?
  • Should I carry out a penetration test on the mobile devices and how?
  • Do I need to restart everything after a major new release?
  • Etc.

Xavier Mertens, Security Expert (CISSP, CISA, CEH)
Moderator Wendy Breviere, BELTUG Project Manager

-BELTUG initiative on DDOS attacks,  Wendy Breviere, BELTUG Project Manager




 

Dear visitor,

Access to more information about this topic and/or to download the paper is easy and fast, but exclusively for Beltug members (just login to get access).

Beltug gathers a lot of information. Here you find the advantages of Beltug membership

The Beltug Team

Click here to login




>>> Back to overview