Peter (Pete) is the Senior Manager, IT Security and the ITSA for the ACT Government. The role of the IT Security Section is to provide a solid knowledge base across the entire range of IT Security activities plus advice and consultancy services to the whole of ACT Government.
Before joining Shared Service ICT Security in mid 2003, Pete has had a wide and varied career. After many years in the Department of Defence, Pete moved to the private sector heading up the Engineering Service delivery teams of several multinational IT companies. Pete returned to the public sector in 1995 working for a number of Commonwealth departments. His most recent position was heading up the Security Section within the Commonwealth Department of Health.
Pete has formal qualifications in Electrical Engineering from the NSW Institute of Technology and Accountancy and IT qualifications from Charles Sturt University. He maintains a strong interest in security and is a member of the: American Society for Industrial Security, ISACA, ISSA, ACS, as well as a Certified Information Security Manager by ISACA.
IT Security Affecting the Mobile Phone Market OR Is Security in a BYO World an Oxymoron?
I am seeing change in the way government at my local level is moving in the information security and delivery space. The old security maxim of Confidentiality, Integrity, and Availability while still important is moving more towards service delivery by enhancing availability of information to its workforce, anywhere anytime on virtually any platform. This shift away from the confidentiality focus is proving a quandary as ensuring that information that needs to be protected is still available when required to those that need it.
According to the Gartner PC installed base forecast, “by 2013, mobile phones will overtake PCs as the most common web access device worldwide”. Personally I feel they are pessimistic and smartphones and tablet devices will eclipse the conventional market in 2012
Today I’m going to relate my experiences both positive and negative around the rapid advances in mobile devices, the drive to a BYO world and the impact on the security posture and the information management threats they pose to my work environment.
I will approach the presentation via some actual real life scenarios, the risks they posed and still pose, and the treatments I have put in place or I’m still trying to get through the system. I would like this to be interactive as possible as many of you may be experiencing the same issues as I am.
Copyright © 2012 The University of Queensland, authorised by AusCERT Program Committee, maintained by: email@example.com