https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Behind_Enemy_Lines_Practical_Triage_Approaches_to_MobileSecurity_Abroad_2012_Edition&feed=atom&action=historyOWASP AppSec DC 2012/Behind Enemy Lines Practical Triage Approaches to MobileSecurity Abroad 2012 Edition - Revision history2024-03-28T15:44:40ZRevision history for this page on the wikiMediaWiki 1.27.2https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Behind_Enemy_Lines_Practical_Triage_Approaches_to_MobileSecurity_Abroad_2012_Edition&diff=126858&oldid=prevMark.bristow at 18:34, 25 March 20122012-03-25T18:34:04Z<p></p>
<table class="diff diff-contentalign-left" data-mw="interface">
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr style='vertical-align: top;' lang='en'>
<td colspan='2' style="background-color: white; color:black; text-align: center;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black; text-align: center;">Revision as of 18:34, 25 March 2012</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l8" >Line 8:</td>
<td colspan="2" class="diff-lineno">Line 8:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div><td></div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div><td></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>===Justin Morehouse===</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>===Justin Morehouse===</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>[[Image:AppSecDC12-Morehouse.jpg|left]]Justin Morehouse, Founder & Principal @ GuidePoint Security _ Justin has been working in the information security field for over 11 years, primarily focusing on the areas of attack and penetration. He has performed hundreds of security assessments for Fortune 100 companies and Federal government agencies. Before joining GuidePoint, Justin was the assessment lead at one of the <del class="diffchange diffchange-inline">nationÍs </del>largest retailers. He has developed numerous tools including PassiveRecon and GuestStealer, and has spoken at DEF CON, EntNet, ISSA, ISACA, OWASP, ShmooCon and TakeDownCon conferences. He holds a Bachelors degree from The George Washington University and a Masters degree in Information Assurance from Norwich University. Justin is currently an Adjunct Professor at DeVry University, leads the OWASP Tampa Chapter, and recently co-authored the book, "Securing the Smart Grid: Next Generation Power Grid Security."</div></td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>[[Image:AppSecDC12-Morehouse.jpg|left]]Justin Morehouse, Founder & Principal @ GuidePoint Security _ Justin has been working in the information security field for over 11 years, primarily focusing on the areas of attack and penetration. He has performed hundreds of security assessments for Fortune 100 companies and Federal government agencies. Before joining GuidePoint, Justin was the assessment lead at one of the <ins class="diffchange diffchange-inline">nation's </ins>largest retailers. He has developed numerous tools including PassiveRecon and GuestStealer, and has spoken at DEF CON, EntNet, ISSA, ISACA, OWASP, ShmooCon and TakeDownCon conferences. He holds a Bachelors degree from The George Washington University and a Masters degree in Information Assurance from Norwich University. Justin is currently an Adjunct Professor at DeVry University, leads the OWASP Tampa Chapter, and recently co-authored the book, "Securing the Smart Grid: Next Generation Power Grid Security."</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div></td></div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div></td></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div></tr></div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div></tr></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div></table></div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div></table></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div><noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude></div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div><noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude></div></td></tr>
</table>Mark.bristowhttps://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Behind_Enemy_Lines_Practical_Triage_Approaches_to_MobileSecurity_Abroad_2012_Edition&diff=126015&oldid=prevMark.bristow at 01:02, 12 March 20122012-03-12T01:02:44Z<p></p>
<table class="diff diff-contentalign-left" data-mw="interface">
<col class='diff-marker' />
<col class='diff-content' />
<col class='diff-marker' />
<col class='diff-content' />
<tr style='vertical-align: top;' lang='en'>
<td colspan='2' style="background-color: white; color:black; text-align: center;">← Older revision</td>
<td colspan='2' style="background-color: white; color:black; text-align: center;">Revision as of 01:02, 12 March 2012</td>
</tr><tr><td colspan="2" class="diff-lineno" id="mw-diff-left-l2" >Line 2:</td>
<td colspan="2" class="diff-lineno">Line 2:</td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>__NOTOC__</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>__NOTOC__</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>== The Presentation  ==</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>== The Presentation  ==</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div><del class="diffchange diffchange-inline">[[Image:Owasp_logo_normal.jpg|right]]</del>Having travelled over 100K miles internationally during the past 9 months, the topic of mobile security while abroad was on my radar. I took some precautions myself and jotted down some ideas to discuss with my peers. Then one of my clients asked me to come up with a solution for their executives while traveling to locations that would benefit greatly from their intellectual property. This presentation covers the lessons learned while securing mobile devices for both the enterprise and consumer while outside the 50 states. Areas of particular interest will be common threats and attacks and the REALISTIC steps you can take to reduce your attack surface and return your IP home safely. We'll also cover what to do when your primary safeguards fail or end up in a toilet somewhere...<br>(Additional information not in the abstract - This will be a significantly updated version of the presentation from the one I presented at TakeDownCon Las Vegas 2011. I will have traveled extensively in Australia and Asia [24 days in Feb 2012] before giving this presentation and will update it with my research and observations and extend recommendations and areas of further interest)</div></td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div>Having travelled over 100K miles internationally during the past 9 months, the topic of mobile security while abroad was on my radar. I took some precautions myself and jotted down some ideas to discuss with my peers. Then one of my clients asked me to come up with a solution for their executives while traveling to locations that would benefit greatly from their intellectual property. This presentation covers the lessons learned while securing mobile devices for both the enterprise and consumer while outside the 50 states. Areas of particular interest will be common threats and attacks and the REALISTIC steps you can take to reduce your attack surface and return your IP home safely. We'll also cover what to do when your primary safeguards fail or end up in a toilet somewhere...<br>(Additional information not in the abstract - This will be a significantly updated version of the presentation from the one I presented at TakeDownCon Las Vegas 2011. I will have traveled extensively in Australia and Asia [24 days in Feb 2012] before giving this presentation and will update it with my research and observations and extend recommendations and areas of further interest)</div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>== The Speakers  ==</div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div>== The Speakers  ==</div></td></tr>
<tr><td class='diff-marker'>−</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;"><div>Justin Morehouse</div></td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"><table></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"><tr></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"><td></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline">===</ins>Justin Morehouse<ins class="diffchange diffchange-inline">===</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline">[[Image:AppSecDC12-Morehouse.jpg|left]]Justin Morehouse, Founder & Principal @ GuidePoint Security _ Justin has been working in the information security field for over 11 years, primarily focusing on the areas of attack and penetration. He has performed hundreds of security assessments for Fortune 100 companies and Federal government agencies. Before joining GuidePoint, Justin was the assessment lead at one of the nationÍs largest retailers. He has developed numerous tools including PassiveRecon and GuestStealer, and has spoken at DEF CON, EntNet, ISSA, ISACA, OWASP, ShmooCon and TakeDownCon conferences. He holds a Bachelors degree from The George Washington University and a Masters degree in Information Assurance from Norwich University. Justin is currently an Adjunct Professor at DeVry University, leads the OWASP Tampa Chapter, and recently co-authored the book, "Securing the Smart Grid: Next Generation Power Grid Security."</ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"></td></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"></tr></ins></div></td></tr>
<tr><td colspan="2"> </td><td class='diff-marker'>+</td><td style="color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;"><div><ins class="diffchange diffchange-inline"></table></ins></div></td></tr>
<tr><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div><noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude></div></td><td class='diff-marker'> </td><td style="background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;"><div><noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude></div></td></tr>
</table>Mark.bristowhttps://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Behind_Enemy_Lines_Practical_Triage_Approaches_to_MobileSecurity_Abroad_2012_Edition&diff=125481&oldid=prevMark.bristow: Created page with "<noinclude>{{:OWASP AppSec DC 2012 Header}}</noinclude> __NOTOC__ == The Presentation == rightHaving travelled over 100K miles internationally..."2012-03-02T20:56:51Z<p>Created page with "<noinclude>{{:OWASP AppSec DC 2012 Header}}</noinclude> __NOTOC__ == The Presentation == <a href="/index.php/File:Owasp_logo_normal.jpg" title="File:Owasp logo normal.jpg">right</a>Having travelled over 100K miles internationally..."</p>
<p><b>New page</b></p><div><noinclude>{{:OWASP AppSec DC 2012 Header}}</noinclude><br />
__NOTOC__<br />
== The Presentation ==<br />
[[Image:Owasp_logo_normal.jpg|right]]Having travelled over 100K miles internationally during the past 9 months, the topic of mobile security while abroad was on my radar. I took some precautions myself and jotted down some ideas to discuss with my peers. Then one of my clients asked me to come up with a solution for their executives while traveling to locations that would benefit greatly from their intellectual property. This presentation covers the lessons learned while securing mobile devices for both the enterprise and consumer while outside the 50 states. Areas of particular interest will be common threats and attacks and the REALISTIC steps you can take to reduce your attack surface and return your IP home safely. We'll also cover what to do when your primary safeguards fail or end up in a toilet somewhere...<br>(Additional information not in the abstract - This will be a significantly updated version of the presentation from the one I presented at TakeDownCon Las Vegas 2011. I will have traveled extensively in Australia and Asia [24 days in Feb 2012] before giving this presentation and will update it with my research and observations and extend recommendations and areas of further interest)<br />
== The Speakers ==<br />
Justin Morehouse<br />
<noinclude>{{:OWASP AppSec DC 2012 Footer}}</noinclude></div>Mark.bristow