SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Carlos Chalico
LI, CISA, CISSP, CISM, CGEIT,
CRISC, PbDLA, ISO27001LA
Instructor
University of Toronto
School of Continuing Studies
+1(647)406-7785
carlos.chalico@utoronto.ca
@CarlosChalicoT
#IoT
Understanding IoT
Internet of Things
Understanding IoT
Thing
Identification Communication
Sensitivity Control
Native
Enabled
IoT Expected Market Growth
7.1
1.8
700
531
Trillion - USA
Trillion - China
Billion - Germany
Billion - UK
Estimated
Value for
the Internet Of
Things in 2030
Fuente: The Growth Game-Changer; Accenture
IoT GDP Impact (Current Conditions)
IoT GDP Impact (with additional measures)
7.1
1.8
700
531
Trillion - USA
Trillion - China
Billion - Germany
Billion - UK
Estimated
Value for
the Internet Of
Things in 2030
Fuente: Winning with the Industrial Internet of Things; Accenture
• NAC = National Absorptive Capacity
- Reliable banking and finance
- Education
- Good governance
- Healthy network of suppliers
- Levels of research and development
- Presence of High-Tech companies
- Degree of Technology Skills
- Level of social and end-user acceptance
- Willingness to embrace organizational
change
- Ability to respond to the impacts on
human capital
Most conductive
environments
Weaker enabling
environments
Middle Performing Cohort
IoT Expected Market Growth
100%
Is there any threat for the IoT?
Fuente: Defending the Digital Frontier: A Security Agenda; Jose Granado, Sajay Rai, Mark Doll
Investment
High
Low
1990s 2000sTime
Information Security
Inform
ation
Technology
Security
Breach
Is there any threat for the IoT?
Is there any threat for the IoT?
Is there any threat for the IoT?
X
X
X
X
X
X
X
NYSE - Navigating the Digital Age
VI. Cybersecurity beyond your network
32. The Internet of Things
• IoT Benefits
• IoT Privacy Issues
• IoT Security Issues
• Addressing the Issues
• Not future, here, today
• Consider risks and challenges
• One step ahead
• Security protocols standardization
• Notifying security breaches
• Solve issues related to breaches
• Develop legal agreements with IoT
vendors
The OWASP Model - The IoT Top 10 Project
• I1 Insecure Web Interface
• I2 Insufficient Authentication/
Authorization
• I3 Insecure Network Services
• I4 Lack of Transport Encryption
• I5 Privacy Concerns
• I6 Insecure Cloud Interface
• I7 Insecure Mobile Interface
• I8 Insufficient Security Configurability
• I9 Insecure Software/Firmware
• I10 Poor Physical Security Ethics
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project
Protect from the very very beginning
Good Readings
Carlos Chalico
LI, CISA, CISSP, CISM, CGEIT,
CRISC, PbDLA, ISO27001LA
Instructor
University of Toronto
School of Continuing Studies
+1(647)406-7785
carlos.chalico@utoronto.ca
@CarlosChalicoT
#IoT

Weitere ähnliche Inhalte

Was ist angesagt?

[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Andris Soroka
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosErin_Jelecos
 
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationWeb Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationEryk Budi Pratama
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb GhallabFahmi Albaheth
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at ScaleWinston Morton
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingBryan Len
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseDavid Berkelmans
 
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskSecurity transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskCristian Garcia G.
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseDavid Berkelmans
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localAdrian Mikeliunas
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber SecurityNICVA
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019Ulf Mattsson
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data ProtectionNICVA
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills GapStephen Cobb
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
 

Was ist angesagt? (20)

[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationWeb Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskSecurity transformation: Helping you manage digital risk
Security transformation: Helping you manage digital risk
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data Protection
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
 

Andere mochten auch

Keyla manejo florestal 2ºb
Keyla manejo florestal 2ºbKeyla manejo florestal 2ºb
Keyla manejo florestal 2ºbBruna Thais
 
Factsheet-CORPORATE-ScreenA4
Factsheet-CORPORATE-ScreenA4Factsheet-CORPORATE-ScreenA4
Factsheet-CORPORATE-ScreenA4Karin Vedders
 
Battle of Minds - Redeem vouchers
Battle of Minds - Redeem vouchersBattle of Minds - Redeem vouchers
Battle of Minds - Redeem vouchersBattle of Minds
 
¿que es un sistema operativo? - What is the operating system?
¿que es un sistema operativo? -  What is the operating system?¿que es un sistema operativo? -  What is the operating system?
¿que es un sistema operativo? - What is the operating system?Mario Alberto Antonio Lopez
 
QSNTS Annual Report 2012-13
QSNTS Annual Report 2012-13QSNTS Annual Report 2012-13
QSNTS Annual Report 2012-13Angus Smith
 
Clara Johnson-Resume 1967
Clara Johnson-Resume 1967Clara Johnson-Resume 1967
Clara Johnson-Resume 1967Clara Johnson
 
Manejo florestal
Manejo florestal Manejo florestal
Manejo florestal Bruna Thais
 
La position zéro et les astuces pour avoir une plus grande visibilité dans le...
La position zéro et les astuces pour avoir une plus grande visibilité dans le...La position zéro et les astuces pour avoir une plus grande visibilité dans le...
La position zéro et les astuces pour avoir une plus grande visibilité dans le...Peak Ace
 
How to write a report
How to write a reportHow to write a report
How to write a reportsergeiG
 

Andere mochten auch (11)

Keyla manejo florestal 2ºb
Keyla manejo florestal 2ºbKeyla manejo florestal 2ºb
Keyla manejo florestal 2ºb
 
Factsheet-CORPORATE-ScreenA4
Factsheet-CORPORATE-ScreenA4Factsheet-CORPORATE-ScreenA4
Factsheet-CORPORATE-ScreenA4
 
Daily Cal Portfolio
Daily Cal PortfolioDaily Cal Portfolio
Daily Cal Portfolio
 
Battle of Minds - Redeem vouchers
Battle of Minds - Redeem vouchersBattle of Minds - Redeem vouchers
Battle of Minds - Redeem vouchers
 
¿que es un sistema operativo? - What is the operating system?
¿que es un sistema operativo? -  What is the operating system?¿que es un sistema operativo? -  What is the operating system?
¿que es un sistema operativo? - What is the operating system?
 
QSNTS Annual Report 2012-13
QSNTS Annual Report 2012-13QSNTS Annual Report 2012-13
QSNTS Annual Report 2012-13
 
Taller ofimatica vocabulario
Taller ofimatica vocabularioTaller ofimatica vocabulario
Taller ofimatica vocabulario
 
Clara Johnson-Resume 1967
Clara Johnson-Resume 1967Clara Johnson-Resume 1967
Clara Johnson-Resume 1967
 
Manejo florestal
Manejo florestal Manejo florestal
Manejo florestal
 
La position zéro et les astuces pour avoir une plus grande visibilité dans le...
La position zéro et les astuces pour avoir une plus grande visibilité dans le...La position zéro et les astuces pour avoir une plus grande visibilité dans le...
La position zéro et les astuces pour avoir une plus grande visibilité dans le...
 
How to write a report
How to write a reportHow to write a report
How to write a report
 

Ähnlich wie Kijiji 160616

Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)milemadinah
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaDinis Guarda
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIxonos Plc
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingTonex
 
Overview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson TuttleOverview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson TuttleSilicon Labs
 
Internet of everything presentation
Internet of everything presentationInternet of everything presentation
Internet of everything presentationLori Moody
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptMuhammadHashamKhanBI
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
33977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_1433977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_14Alex Blanter
 
What Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdfWhat Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdfTechugo
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
ITA Internet of Things Summit 2014
ITA Internet of Things Summit 2014ITA Internet of Things Summit 2014
ITA Internet of Things Summit 2014ILTechnologyAssoc
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017Ahmed Banafa
 
Advanced iot application training course
Advanced iot application training course Advanced iot application training course
Advanced iot application training course Bryan Len
 
IoT Investment Overview
IoT Investment OverviewIoT Investment Overview
IoT Investment Overviewlpchao
 

Ähnlich wie Kijiji 160616 (20)

Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis Guarda
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or Everything
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
 
Overview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson TuttleOverview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
 
Internet of everything presentation
Internet of everything presentationInternet of everything presentation
Internet of everything presentation
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.ppt
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
33977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_1433977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_14
 
What Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdfWhat Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdf
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
ITA Internet of Things Summit 2014
ITA Internet of Things Summit 2014ITA Internet of Things Summit 2014
ITA Internet of Things Summit 2014
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
Ethical issues in internet of things
Ethical issues in internet of thingsEthical issues in internet of things
Ethical issues in internet of things
 
Advanced iot application training course
Advanced iot application training course Advanced iot application training course
Advanced iot application training course
 
IoT Investment Overview
IoT Investment OverviewIoT Investment Overview
IoT Investment Overview
 

Mehr von Carlos Chalico

Isaca monterrey dic 2019
Isaca monterrey dic 2019Isaca monterrey dic 2019
Isaca monterrey dic 2019Carlos Chalico
 
ISACA Monterrey - Confianza Digital Diciembre 2018
ISACA Monterrey - Confianza Digital Diciembre 2018ISACA Monterrey - Confianza Digital Diciembre 2018
ISACA Monterrey - Confianza Digital Diciembre 2018Carlos Chalico
 
ISACA Privacidad LATAM
ISACA Privacidad LATAMISACA Privacidad LATAM
ISACA Privacidad LATAMCarlos Chalico
 
133 Chalico Privacidad
133 Chalico Privacidad133 Chalico Privacidad
133 Chalico PrivacidadCarlos Chalico
 
121 Chalico Internet de las Cosas
121 Chalico Internet de las Cosas121 Chalico Internet de las Cosas
121 Chalico Internet de las CosasCarlos Chalico
 
Asobancaria definiendo la estrategia de privacidad
Asobancaria definiendo la estrategia de privacidadAsobancaria definiendo la estrategia de privacidad
Asobancaria definiendo la estrategia de privacidadCarlos Chalico
 
Día Internacional de Protección de Datos Personales IFAI 2015
Día Internacional de Protección de Datos Personales IFAI 2015Día Internacional de Protección de Datos Personales IFAI 2015
Día Internacional de Protección de Datos Personales IFAI 2015Carlos Chalico
 
Latin CACS 2009 Carlos Chalico
Latin CACS 2009 Carlos ChalicoLatin CACS 2009 Carlos Chalico
Latin CACS 2009 Carlos ChalicoCarlos Chalico
 
Día Internacional de la Protección de Datos Personales 2015
Día Internacional de la Protección de Datos Personales 2015Día Internacional de la Protección de Datos Personales 2015
Día Internacional de la Protección de Datos Personales 2015Carlos Chalico
 
InfoDF Auditoría de Sistemas
InfoDF Auditoría de SistemasInfoDF Auditoría de Sistemas
InfoDF Auditoría de SistemasCarlos Chalico
 
Data Lifecycle Risks Considerations and Controls
Data Lifecycle Risks Considerations and ControlsData Lifecycle Risks Considerations and Controls
Data Lifecycle Risks Considerations and ControlsCarlos Chalico
 
InfoDF Protección de Datos Personales en Redes Sociales
InfoDF Protección de Datos Personales en Redes SocialesInfoDF Protección de Datos Personales en Redes Sociales
InfoDF Protección de Datos Personales en Redes SocialesCarlos Chalico
 

Mehr von Carlos Chalico (18)

Isaca monterrey dic 2019
Isaca monterrey dic 2019Isaca monterrey dic 2019
Isaca monterrey dic 2019
 
ISACA Monterrey - Confianza Digital Diciembre 2018
ISACA Monterrey - Confianza Digital Diciembre 2018ISACA Monterrey - Confianza Digital Diciembre 2018
ISACA Monterrey - Confianza Digital Diciembre 2018
 
ISACA Privacidad LATAM
ISACA Privacidad LATAMISACA Privacidad LATAM
ISACA Privacidad LATAM
 
ISACA DevOps LATAM
ISACA DevOps LATAMISACA DevOps LATAM
ISACA DevOps LATAM
 
133 Chalico Privacidad
133 Chalico Privacidad133 Chalico Privacidad
133 Chalico Privacidad
 
121 Chalico Internet de las Cosas
121 Chalico Internet de las Cosas121 Chalico Internet de las Cosas
121 Chalico Internet de las Cosas
 
Asobancaria definiendo la estrategia de privacidad
Asobancaria definiendo la estrategia de privacidadAsobancaria definiendo la estrategia de privacidad
Asobancaria definiendo la estrategia de privacidad
 
Día Internacional de Protección de Datos Personales IFAI 2015
Día Internacional de Protección de Datos Personales IFAI 2015Día Internacional de Protección de Datos Personales IFAI 2015
Día Internacional de Protección de Datos Personales IFAI 2015
 
Latin CACS 2009 224
Latin CACS 2009 224Latin CACS 2009 224
Latin CACS 2009 224
 
Latin CACS 2009 Carlos Chalico
Latin CACS 2009 Carlos ChalicoLatin CACS 2009 Carlos Chalico
Latin CACS 2009 Carlos Chalico
 
Latin CACS 2007 CC CZ
Latin CACS 2007 CC CZLatin CACS 2007 CC CZ
Latin CACS 2007 CC CZ
 
Latin cacs 2004 CC CZ
Latin cacs 2004 CC CZLatin cacs 2004 CC CZ
Latin cacs 2004 CC CZ
 
Día Internacional de la Protección de Datos Personales 2015
Día Internacional de la Protección de Datos Personales 2015Día Internacional de la Protección de Datos Personales 2015
Día Internacional de la Protección de Datos Personales 2015
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
InfoDF Auditoría de Sistemas
InfoDF Auditoría de SistemasInfoDF Auditoría de Sistemas
InfoDF Auditoría de Sistemas
 
Data Lifecycle Risks Considerations and Controls
Data Lifecycle Risks Considerations and ControlsData Lifecycle Risks Considerations and Controls
Data Lifecycle Risks Considerations and Controls
 
InfoDF Protección de Datos Personales en Redes Sociales
InfoDF Protección de Datos Personales en Redes SocialesInfoDF Protección de Datos Personales en Redes Sociales
InfoDF Protección de Datos Personales en Redes Sociales
 
Giss 2009 Final
Giss 2009 FinalGiss 2009 Final
Giss 2009 Final
 

Kürzlich hochgeladen

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 

Kürzlich hochgeladen (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 

Kijiji 160616

  • 1. Carlos Chalico LI, CISA, CISSP, CISM, CGEIT, CRISC, PbDLA, ISO27001LA Instructor University of Toronto School of Continuing Studies +1(647)406-7785 carlos.chalico@utoronto.ca @CarlosChalicoT #IoT
  • 4. IoT Expected Market Growth 7.1 1.8 700 531 Trillion - USA Trillion - China Billion - Germany Billion - UK Estimated Value for the Internet Of Things in 2030 Fuente: The Growth Game-Changer; Accenture IoT GDP Impact (Current Conditions) IoT GDP Impact (with additional measures)
  • 5. 7.1 1.8 700 531 Trillion - USA Trillion - China Billion - Germany Billion - UK Estimated Value for the Internet Of Things in 2030 Fuente: Winning with the Industrial Internet of Things; Accenture • NAC = National Absorptive Capacity - Reliable banking and finance - Education - Good governance - Healthy network of suppliers - Levels of research and development - Presence of High-Tech companies - Degree of Technology Skills - Level of social and end-user acceptance - Willingness to embrace organizational change - Ability to respond to the impacts on human capital Most conductive environments Weaker enabling environments Middle Performing Cohort IoT Expected Market Growth 100%
  • 6. Is there any threat for the IoT? Fuente: Defending the Digital Frontier: A Security Agenda; Jose Granado, Sajay Rai, Mark Doll Investment High Low 1990s 2000sTime Information Security Inform ation Technology Security Breach
  • 7. Is there any threat for the IoT?
  • 8. Is there any threat for the IoT?
  • 9. Is there any threat for the IoT? X X X X X X X
  • 10. NYSE - Navigating the Digital Age VI. Cybersecurity beyond your network 32. The Internet of Things • IoT Benefits • IoT Privacy Issues • IoT Security Issues • Addressing the Issues • Not future, here, today • Consider risks and challenges • One step ahead • Security protocols standardization • Notifying security breaches • Solve issues related to breaches • Develop legal agreements with IoT vendors
  • 11. The OWASP Model - The IoT Top 10 Project • I1 Insecure Web Interface • I2 Insufficient Authentication/ Authorization • I3 Insecure Network Services • I4 Lack of Transport Encryption • I5 Privacy Concerns • I6 Insecure Cloud Interface • I7 Insecure Mobile Interface • I8 Insufficient Security Configurability • I9 Insecure Software/Firmware • I10 Poor Physical Security Ethics https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project
  • 12. Protect from the very very beginning
  • 14. Carlos Chalico LI, CISA, CISSP, CISM, CGEIT, CRISC, PbDLA, ISO27001LA Instructor University of Toronto School of Continuing Studies +1(647)406-7785 carlos.chalico@utoronto.ca @CarlosChalicoT #IoT