SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
Cybersecurity for the IoT
Dr Abdullahi Arabo Jr
Senior Lecturer in Computer Networks and Mobile
Technologies
Department of Computer Science and Creative Technologies
Faculty of Environment and Technology
UWE, Frenchay, Bristol, BS16 1QY, UK
Overview
• Brief recap on IoT
• Some examples
• Cybersecurity Issues of IoT
12 May 2015 IoT Submit 2
12 May 2015 IoT Submit 3
12 May 2015 IoT Submit 4
12 May 2015 IoT Submit 5
Today’s Cyber Situation
• Victims of our own success
• Opportunity expands the attack surface:
– Clouds linked to legacy systems
– IoT means more entry points
– Bring Your Own Devices (BYOD)
• We’re not doing all we can:
– Poor info sharing even at basic levels, not real-
time
– Eliminating/upgrading legacy systems
– Government – no legislation since 2002, poor
grades
12 May 2015 IoT Submit 6
Cyber is not a Normal Risk!
• Cyber defies conventional metrics
– Non-quantifiable
– Non-predictable
– Global, not local
– Can put the entire system at complete risk
• Examples of normal risks:
– Weather - business interruption
– Employee and customer lawsuits
– Theft of a trailer full of cell phones
12 May 2015 IoT Submit 7
12 May 2015 IoT Submit 8
Attacks will increase rapidly due to
• Hyper-growth
• Poor security hygiene
• High value of data on IoT devices
Thread Predictions 2015 – McAfee Labs
12 May 2015 IoT Submit 9
12 May 2015 IoT Submit 10
12 May 2015 IoT Submit 11
12 May 2015 IoT Submit 12
12 May 2015 IoT Submit 13
12 May 2015 IoT Submit 14
IoT Cybersecurity/Privacy Issues
• IoT provide an opportunity for enterprise
and PAN or Connect Home Ecosystems
• Downside – all that connectivity and
production of massive amount of data and
lack of standards
• Dramatically increase the potential of
cybersecurity intrusions and infringements
upon privacy
12 May 2015 IoT Submit 15
IoT Cybersecurity/Privacy Issues
• As a starter, there are three areas that will
require some new or additional attention in
the IoT world
– Customer facing privacy policies
– Internal Infosec policies – BOYD and
DocRetention
– B2B commercial agreements – including
cloud storage agreements
12 May 2015 IoT Submit 16
12 May 2015 IoT Submit 17
Thread Predictions 2015 – McAfee Labs
12 May 2015 IoT Submit 18
Thread Predictions 2015 – McAfee Labs
12 May 2015 IoT Submit 19
Thread Predictions 2015 – McAfee Labs
12 May 2015 IoT Submit 20
12 May 2015 IoT Submit 21
Photo: Showtime
The scenario was explored in an
episode of Homeland
Terrorists could
hack into
electronic
implants like
pacemakers to
kill targets,
Defibrillators,
bedside intravenous
fluid pumps,
scanners and
hospital networks.
12 May 2015 IoT Submit 22
12 May 2015 IoT Submit 23
IoT Cybersecurity/Privacy Issues
12 May 2015 IoT Submit 24
12 May 2015 IoT Submit 25
12 May 2015 IoT Submit 26
IoT Cybersecurity/Privacy Issues
• In short, IoT will alter the playing filed as
much if not more than PCs and mobile
devices have, combined
• Vast amounts of data, increasing security
concerns, rising privacy issues
• The IoT savvy leaders will see this coming
and help to lead their company with
confidence and vision
12 May 2015 IoT Submit 27
Key STANDARDS emerging
for an Open Internet of Things
Lightweight protocols
for devices to work
together, communicate
OASIS MQTT, MQTT-SN
OASIS SmartGrid projects
Unique and extensible
identifiers for all those
billions of devices
Multiple new projects, XRI,
UUIDs, etc.
Demand for API access
and interoperability
SOA/Cloud orchestration
and API standardization
(AMQP, MQTT, OData)
Cybersecurity KMIP, SAML, XACML/JSON,
PKCS11, CloudAuthZ
Privacy and Policy PMRM, PbDSE, and Personal
Data Stores
12 May 2015 IoT Submit 28
IoT – Remarks
• IoT is an exciting megatrend – it offer amazing
advancements in connected homes, health,
community, defense etc.
• It is likely to propel organization forward in ways
yet to be imagined
• However, for us whose job is to secure this service
it provides a shifting and uncertain landscape
• For the cyber criminals – it provides a honeypot of
opportunities
• For lay users – it provides a security nightmare
• For enterprise developing such solutions – it
provides huge opportunities for revenue
12 May 2015 IoT Submit 29
@AArabojr
abdullahi.arabo@uwe.ac.uk

Weitere ähnliche Inhalte

Was ist angesagt?

Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Eryk Budi Pratama
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksYokogawa1
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...PECB
 
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPTInternet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPTMultisoft Virtual Academy
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slidesecommerce
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsEnergySec
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsBob Marcus
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne AFCEA International
 
General Version 8 Jul 09
General Version 8 Jul 09General Version 8 Jul 09
General Version 8 Jul 09tverbeck
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...team-WIBU
 

Was ist angesagt? (20)

Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
Data Privacy, Information Security, and Cybersecurity: What Your Business Nee...
 
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPTInternet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other SectorsICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
ICS Supply Chain Security: Learning from Recent Incidents and Other Sectors
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Cyber security trends 2018
Cyber security trends 2018Cyber security trends 2018
Cyber security trends 2018
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
General Version 8 Jul 09
General Version 8 Jul 09General Version 8 Jul 09
General Version 8 Jul 09
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
 

Ähnlich wie CyberSecurity_for_the_IoT

Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Peter Wood
 
Report the whole IoT r0.0.pptx
Report   the whole IoT r0.0.pptxReport   the whole IoT r0.0.pptx
Report the whole IoT r0.0.pptxoldmanegan
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTScaleway
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
 
Wireless Global Congress: 2020 is not that far away
Wireless Global Congress:  2020 is not that far awayWireless Global Congress:  2020 is not that far away
Wireless Global Congress: 2020 is not that far awayRob Van Den Dam
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 enKarel Van Isacker
 
33977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_1433977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_14Alex Blanter
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)Jackson Shaw
 
Bt idc event cloud adoption in ireland
Bt  idc event cloud adoption in irelandBt  idc event cloud adoption in ireland
Bt idc event cloud adoption in irelandFiona Sexton
 
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14Mark Morley, MBA
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.Atanu Roy Chowdhury
 
How IoT will change our world, and how to start building it - Digital Futures...
How IoT will change our world, and how to start building it - Digital Futures...How IoT will change our world, and how to start building it - Digital Futures...
How IoT will change our world, and how to start building it - Digital Futures...Ovum
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoTAhmed Banafa
 
How to fail in the IoT business
How to fail in the IoT businessHow to fail in the IoT business
How to fail in the IoT businessPerry Lea
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things WGroup
 

Ähnlich wie CyberSecurity_for_the_IoT (20)

Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)Big Data and Security - Where are we now? (2015)
Big Data and Security - Where are we now? (2015)
 
Report the whole IoT r0.0.pptx
Report   the whole IoT r0.0.pptxReport   the whole IoT r0.0.pptx
Report the whole IoT r0.0.pptx
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
Lecture 14
Lecture 14Lecture 14
Lecture 14
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoT
 
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014
 
Wireless Global Congress: 2020 is not that far away
Wireless Global Congress:  2020 is not that far awayWireless Global Congress:  2020 is not that far away
Wireless Global Congress: 2020 is not that far away
 
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
VET4SBO Level 2   module 6 - unit 4  - v0.9 enVET4SBO Level 2   module 6 - unit 4  - v0.9 en
VET4SBO Level 2 module 6 - unit 4 - v0.9 en
 
33977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_1433977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_14
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
 
Bt idc event cloud adoption in ireland
Bt  idc event cloud adoption in irelandBt  idc event cloud adoption in ireland
Bt idc event cloud adoption in ireland
 
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.
 
How IoT will change our world, and how to start building it - Digital Futures...
How IoT will change our world, and how to start building it - Digital Futures...How IoT will change our world, and how to start building it - Digital Futures...
How IoT will change our world, and how to start building it - Digital Futures...
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
How to fail in the IoT business
How to fail in the IoT businessHow to fail in the IoT business
How to fail in the IoT business
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
IOT System.pptx
IOT System.pptxIOT System.pptx
IOT System.pptx
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things
 

CyberSecurity_for_the_IoT

  • 1. Cybersecurity for the IoT Dr Abdullahi Arabo Jr Senior Lecturer in Computer Networks and Mobile Technologies Department of Computer Science and Creative Technologies Faculty of Environment and Technology UWE, Frenchay, Bristol, BS16 1QY, UK
  • 2. Overview • Brief recap on IoT • Some examples • Cybersecurity Issues of IoT 12 May 2015 IoT Submit 2
  • 3. 12 May 2015 IoT Submit 3
  • 4. 12 May 2015 IoT Submit 4
  • 5. 12 May 2015 IoT Submit 5
  • 6. Today’s Cyber Situation • Victims of our own success • Opportunity expands the attack surface: – Clouds linked to legacy systems – IoT means more entry points – Bring Your Own Devices (BYOD) • We’re not doing all we can: – Poor info sharing even at basic levels, not real- time – Eliminating/upgrading legacy systems – Government – no legislation since 2002, poor grades 12 May 2015 IoT Submit 6
  • 7. Cyber is not a Normal Risk! • Cyber defies conventional metrics – Non-quantifiable – Non-predictable – Global, not local – Can put the entire system at complete risk • Examples of normal risks: – Weather - business interruption – Employee and customer lawsuits – Theft of a trailer full of cell phones 12 May 2015 IoT Submit 7
  • 8. 12 May 2015 IoT Submit 8 Attacks will increase rapidly due to • Hyper-growth • Poor security hygiene • High value of data on IoT devices Thread Predictions 2015 – McAfee Labs
  • 9. 12 May 2015 IoT Submit 9
  • 10. 12 May 2015 IoT Submit 10
  • 11. 12 May 2015 IoT Submit 11
  • 12. 12 May 2015 IoT Submit 12
  • 13. 12 May 2015 IoT Submit 13
  • 14. 12 May 2015 IoT Submit 14
  • 15. IoT Cybersecurity/Privacy Issues • IoT provide an opportunity for enterprise and PAN or Connect Home Ecosystems • Downside – all that connectivity and production of massive amount of data and lack of standards • Dramatically increase the potential of cybersecurity intrusions and infringements upon privacy 12 May 2015 IoT Submit 15
  • 16. IoT Cybersecurity/Privacy Issues • As a starter, there are three areas that will require some new or additional attention in the IoT world – Customer facing privacy policies – Internal Infosec policies – BOYD and DocRetention – B2B commercial agreements – including cloud storage agreements 12 May 2015 IoT Submit 16
  • 17. 12 May 2015 IoT Submit 17 Thread Predictions 2015 – McAfee Labs
  • 18. 12 May 2015 IoT Submit 18 Thread Predictions 2015 – McAfee Labs
  • 19. 12 May 2015 IoT Submit 19 Thread Predictions 2015 – McAfee Labs
  • 20. 12 May 2015 IoT Submit 20
  • 21. 12 May 2015 IoT Submit 21 Photo: Showtime The scenario was explored in an episode of Homeland Terrorists could hack into electronic implants like pacemakers to kill targets, Defibrillators, bedside intravenous fluid pumps, scanners and hospital networks.
  • 22. 12 May 2015 IoT Submit 22
  • 23. 12 May 2015 IoT Submit 23
  • 24. IoT Cybersecurity/Privacy Issues 12 May 2015 IoT Submit 24
  • 25. 12 May 2015 IoT Submit 25
  • 26. 12 May 2015 IoT Submit 26
  • 27. IoT Cybersecurity/Privacy Issues • In short, IoT will alter the playing filed as much if not more than PCs and mobile devices have, combined • Vast amounts of data, increasing security concerns, rising privacy issues • The IoT savvy leaders will see this coming and help to lead their company with confidence and vision 12 May 2015 IoT Submit 27
  • 28. Key STANDARDS emerging for an Open Internet of Things Lightweight protocols for devices to work together, communicate OASIS MQTT, MQTT-SN OASIS SmartGrid projects Unique and extensible identifiers for all those billions of devices Multiple new projects, XRI, UUIDs, etc. Demand for API access and interoperability SOA/Cloud orchestration and API standardization (AMQP, MQTT, OData) Cybersecurity KMIP, SAML, XACML/JSON, PKCS11, CloudAuthZ Privacy and Policy PMRM, PbDSE, and Personal Data Stores 12 May 2015 IoT Submit 28
  • 29. IoT – Remarks • IoT is an exciting megatrend – it offer amazing advancements in connected homes, health, community, defense etc. • It is likely to propel organization forward in ways yet to be imagined • However, for us whose job is to secure this service it provides a shifting and uncertain landscape • For the cyber criminals – it provides a honeypot of opportunities • For lay users – it provides a security nightmare • For enterprise developing such solutions – it provides huge opportunities for revenue 12 May 2015 IoT Submit 29