SlideShare ist ein Scribd-Unternehmen logo
1 von 43
A smarter,
more secure
Internet of Things
Travis Greene
Identity Solutions Strategist, NetIQ
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.2
Internet of Things
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.3
Internet of Things
What “things” and how did we get there?
Goldman Sachs, What is the Internet of Things?, September 2014
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.4
Two Critical Components
Things People behind
the “Things”
The Internet of Things
- A Few Examples
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.6
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.7
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.8
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.9
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.10
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.11
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.12
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.13
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.14
The Risk Presented by
the Internet of Things
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.16
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.17
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.18
• The Internet of Things
will change the way we
use and interact with
technology.
• Devices will constantly
monitor and respond
both to us and to
each other.
• We must learn to
manage this interaction.
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.19
“Another evolving area of risk lies in
physical objects—industrial components,
automobiles, home automation products,
and consumer devices, to name a few—that
are being integrated into the information
network, a trend typically referred to as the
‘Internet of Things.’
The interconnection of billions of devices
with IT and operational systems will
introduce a new world of security risks for
businesses, consumers, and governments.”
2014 PwC State of Cybercrime Survey
“The development towards an IoT is likely to
give rise to a number of ethical issues and
debates in society, many of which have
already surfaced in connection with the
current Internet and ICT in general, such as
loss of trust, violations of privacy, misuse of
data, ambiguity of copyright, digital divide,
identity theft, problems of control and of
access to information and freedom of
speech and expression. However, in IoT,
many of these problems gain a new
dimension in light of the increased
complexity.”
2013 European Commission Report on the IoT
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.22
Gartner Hype Cycle
So, how do we do that?
Focus on the identities
Too many users with
too much access
Too many users with
too much access
devices
We can’t leave it to the
manufacturers’ plan
We can’t stop attacks,
but we can mitigate the
damage
Focus on the basics
Enforce
access
controls
Monitor
user
activity
Minimize
rights
But how do we understand if
the activity is appropriate?
31
The answer is
NOT more data
• Security teams already have too
much data to deal with
• New tools and new
infrastructures compound the
problem
Simply put…
There’s too much noise and
not enough insight
Security needs context…
What
access?
Access
okay?
Normal?
Where?
Who?
Identity?
We don’t know how attackers
will get in but we must spot
them when they do.
35
What is the key?
Identity
We must adopt identity-centric
thinking if we want to have any
chance of maintaining control
over the world we are building
Identity of Everything
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.38
The Identity of Everything allows the
creation of a unique set of attributes
• Who or what every connected item or person is
• What permissions those objects and people have
• What they do with those entitlements
• Who granted the permissions
• How other people and devices may interact
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.39
• Google Nest, a home
automation hub
• Collects data from other
appliances & sensors
• But there is a homeowner
identity behind it that Google
wants to market to
• And that owner will have
relationships to many other
things
The Identity of Everything will be both
Hierarchical and Matrixed
© 2014 NetIQ Corporation. All rights reserved.40
NetIQ provides a unique combination of
Identity, Access and Security solutions
that will scale to address the future
demands on identity
© 2015 NetIQ Corporation and its affiliates. All Rights Reserved.41
Actions for Today, Tomorrow, Next Year
• Understand the identity stores you already have
• Examine how identity information is used in your
organization
• Look for ways to integrate identity context into your
product design to protect data collected by IoT sensors
• Start to build a framework to handle more
sophisticated, aggregate identity, that can scale
• Work towards an extensible identity framework that
will encompass people, products, devices and services
+44 (0)1344 326410
contact-uk@netiq.com
www.netIQ.com
NetIQ
1 Arlington Square,
Downshire Way, Bracknell,
Berkshire, RG12 1WA, UK
www.netiq.com/communities
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new
editions of this document. NetIQ Corporation may make improvements in or changes to the
software described in this document at any time.
Copyright © 2015 NetIQ Corporation. All rights reserved.
ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the
cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration
Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy
Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit,
PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite,
Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ
Corporation or its subsidiaries in the United States and other countries.

Weitere ähnliche Inhalte

Was ist angesagt?

Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-SocialNetIQ
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and HealthcareNetIQ
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?Anchises Moraes
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect stormUlf Mattsson
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingAbzetdin Adamov
 
Bring Your Own Identity
Bring Your Own IdentityBring Your Own Identity
Bring Your Own IdentityNetIQ
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of ThingsGiulio Coraggio
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19Ahmed Banafa
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Cathy Dwyer
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONJohn Pinson
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slidesExponential_e
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of ThingsW. David Stephenson
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance ComputingAbzetdin Adamov
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014kevintsmith
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)Davor Dokonal
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersNicole Black
 
12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain TechnologyAhmed Banafa
 

Was ist angesagt? (20)

Are You Being Anti-Social
Are You Being Anti-SocialAre You Being Anti-Social
Are You Being Anti-Social
 
Identity, Security and Healthcare
Identity, Security and HealthcareIdentity, Security and Healthcare
Identity, Security and Healthcare
 
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
Big data security the perfect storm
Big data security   the perfect stormBig data security   the perfect storm
Big data security the perfect storm
 
Big Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision MakingBig Data Ecosystem for Data-Driven Decision Making
Big Data Ecosystem for Data-Driven Decision Making
 
Bring Your Own Identity
Bring Your Own IdentityBring Your Own Identity
Bring Your Own Identity
 
Legal issues of the Internet of Things
Legal issues of the Internet of ThingsLegal issues of the Internet of Things
Legal issues of the Internet of Things
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"Dwyer "Privacy by Design: Can It Work?"
Dwyer "Privacy by Design: Can It Work?"
 
WP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTIONWP-Privacy-IoT-Era - PRODUCTION
WP-Privacy-IoT-Era - PRODUCTION
 
12th July GDPR event slides
12th July GDPR event slides12th July GDPR event slides
12th July GDPR event slides
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
 
Big Data and High Performance Computing
Big Data and High Performance ComputingBig Data and High Performance Computing
Big Data and High Performance Computing
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
Big Data Security and Privacy - Presentation to AFCEA Cyber Symposium 2014
 
Internet of things enabling tech - challenges - opportunities (2016)
Internet of things   enabling tech - challenges - opportunities (2016)Internet of things   enabling tech - challenges - opportunities (2016)
Internet of things enabling tech - challenges - opportunities (2016)
 
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for LawyersIowa Weighs in on Ethics of Cloud Computing for Lawyers
Iowa Weighs in on Ethics of Cloud Computing for Lawyers
 
12 Myths about Blockchain Technology
12 Myths about Blockchain Technology12 Myths about Blockchain Technology
12 Myths about Blockchain Technology
 
Ritz 4th-july-gdpr
Ritz 4th-july-gdprRitz 4th-july-gdpr
Ritz 4th-july-gdpr
 

Andere mochten auch

οι άθλοι του ηρακλή
οι άθλοι του ηρακλήοι άθλοι του ηρακλή
οι άθλοι του ηρακλήChatzoulis Dimitris
 
HIST 258AN Essay
HIST 258AN EssayHIST 258AN Essay
HIST 258AN EssayMark Hayek
 
21. mart - Dan šuma
21. mart - Dan šuma21. mart - Dan šuma
21. mart - Dan šumadobrislava
 
cover dan daftar isi
cover dan daftar isicover dan daftar isi
cover dan daftar isiermasulistyan
 
Tugas matematika - Kelompok 3 (15-21)
Tugas matematika - Kelompok 3 (15-21)Tugas matematika - Kelompok 3 (15-21)
Tugas matematika - Kelompok 3 (15-21)mizhaphisari
 
Class 8 english lesson 1-the wheel
Class 8 english lesson 1-the wheelClass 8 english lesson 1-the wheel
Class 8 english lesson 1-the wheelAbdulláh Mámun
 
Yucatan Fall Break Trip
Yucatan Fall Break TripYucatan Fall Break Trip
Yucatan Fall Break TripTCU_SDS
 
2015 TMI Stars of Cash & Treasury Management Award
2015 TMI Stars of Cash & Treasury Management Award2015 TMI Stars of Cash & Treasury Management Award
2015 TMI Stars of Cash & Treasury Management AwardDeborah MacDonald
 
Yoav Friedländer-AND
Yoav Friedländer-ANDYoav Friedländer-AND
Yoav Friedländer-ANDYoav Friedl
 
LOTF unit outline sample
LOTF unit outline sampleLOTF unit outline sample
LOTF unit outline sampleRachael Schultz
 
Lesson 5 apply with your cv
Lesson 5 apply with your cvLesson 5 apply with your cv
Lesson 5 apply with your cvAbdulláh Mámun
 
dtc spring 15 newsletter
dtc spring 15 newsletterdtc spring 15 newsletter
dtc spring 15 newsletterChuck Bailey
 

Andere mochten auch (17)

οι άθλοι του ηρακλή
οι άθλοι του ηρακλήοι άθλοι του ηρακλή
οι άθλοι του ηρακλή
 
HIST 258AN Essay
HIST 258AN EssayHIST 258AN Essay
HIST 258AN Essay
 
21. mart - Dan šuma
21. mart - Dan šuma21. mart - Dan šuma
21. mart - Dan šuma
 
cover dan daftar isi
cover dan daftar isicover dan daftar isi
cover dan daftar isi
 
Tugas matematika - Kelompok 3 (15-21)
Tugas matematika - Kelompok 3 (15-21)Tugas matematika - Kelompok 3 (15-21)
Tugas matematika - Kelompok 3 (15-21)
 
Tugas
TugasTugas
Tugas
 
Studio team presentation
Studio team presentationStudio team presentation
Studio team presentation
 
Class 8 english lesson 1-the wheel
Class 8 english lesson 1-the wheelClass 8 english lesson 1-the wheel
Class 8 english lesson 1-the wheel
 
Slideshare
SlideshareSlideshare
Slideshare
 
Yucatan Fall Break Trip
Yucatan Fall Break TripYucatan Fall Break Trip
Yucatan Fall Break Trip
 
Anchal CV
Anchal CVAnchal CV
Anchal CV
 
Informatyka/
Informatyka/Informatyka/
Informatyka/
 
2015 TMI Stars of Cash & Treasury Management Award
2015 TMI Stars of Cash & Treasury Management Award2015 TMI Stars of Cash & Treasury Management Award
2015 TMI Stars of Cash & Treasury Management Award
 
Yoav Friedländer-AND
Yoav Friedländer-ANDYoav Friedländer-AND
Yoav Friedländer-AND
 
LOTF unit outline sample
LOTF unit outline sampleLOTF unit outline sample
LOTF unit outline sample
 
Lesson 5 apply with your cv
Lesson 5 apply with your cvLesson 5 apply with your cv
Lesson 5 apply with your cv
 
dtc spring 15 newsletter
dtc spring 15 newsletterdtc spring 15 newsletter
dtc spring 15 newsletter
 

Ähnlich wie A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene

A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsRyan Smith
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainHeather Vescent
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things WGroup
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iotHitesh Malviya
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsSustainable Brands
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarConcept Searching, Inc
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOThe Economist Media Businesses
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductSalesforce Developers
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachSLA-Ready Network
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptxOdedeleIfeoluwa
 

Ähnlich wie A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene (20)

A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply ChainSensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
Sensors, Identifiers & Digital Twins: Tracking Identity on the Supply Chain
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things
 
How blockchain will defend iot
How blockchain will defend iotHow blockchain will defend iot
How blockchain will defend iot
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World WebinarDiscovery, Risk, and Insight in a Metadata-Driven World Webinar
Discovery, Risk, and Insight in a Metadata-Driven World Webinar
 
Driving secureiot innovation
Driving secureiot innovationDriving secureiot innovation
Driving secureiot innovation
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Iot ppt
Iot pptIot ppt
Iot ppt
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
An Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT ProductAn Identity Crisis at the Center of Every IoT Product
An Identity Crisis at the Center of Every IoT Product
 
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic ApproachCloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
Cloud Services As An Enabler: the Strategic, Legal & Pragmatic Approach
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
 

A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene

  • 1. A smarter, more secure Internet of Things Travis Greene Identity Solutions Strategist, NetIQ
  • 2. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.2 Internet of Things
  • 3. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.3 Internet of Things What “things” and how did we get there? Goldman Sachs, What is the Internet of Things?, September 2014
  • 4. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.4 Two Critical Components Things People behind the “Things”
  • 5. The Internet of Things - A Few Examples
  • 6. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.6
  • 7. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.7
  • 8. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.8
  • 9. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.9
  • 10. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.10
  • 11. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.11
  • 12. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.12
  • 13. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.13
  • 14. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.14
  • 15. The Risk Presented by the Internet of Things
  • 16. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.16
  • 17. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.17
  • 18. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.18 • The Internet of Things will change the way we use and interact with technology. • Devices will constantly monitor and respond both to us and to each other. • We must learn to manage this interaction.
  • 19. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.19
  • 20. “Another evolving area of risk lies in physical objects—industrial components, automobiles, home automation products, and consumer devices, to name a few—that are being integrated into the information network, a trend typically referred to as the ‘Internet of Things.’ The interconnection of billions of devices with IT and operational systems will introduce a new world of security risks for businesses, consumers, and governments.” 2014 PwC State of Cybercrime Survey
  • 21. “The development towards an IoT is likely to give rise to a number of ethical issues and debates in society, many of which have already surfaced in connection with the current Internet and ICT in general, such as loss of trust, violations of privacy, misuse of data, ambiguity of copyright, digital divide, identity theft, problems of control and of access to information and freedom of speech and expression. However, in IoT, many of these problems gain a new dimension in light of the increased complexity.” 2013 European Commission Report on the IoT
  • 22. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.22 Gartner Hype Cycle
  • 23. So, how do we do that?
  • 24. Focus on the identities
  • 25. Too many users with too much access
  • 26. Too many users with too much access devices
  • 27. We can’t leave it to the manufacturers’ plan
  • 28. We can’t stop attacks, but we can mitigate the damage
  • 29. Focus on the basics Enforce access controls Monitor user activity Minimize rights
  • 30. But how do we understand if the activity is appropriate?
  • 31. 31 The answer is NOT more data • Security teams already have too much data to deal with • New tools and new infrastructures compound the problem
  • 32. Simply put… There’s too much noise and not enough insight
  • 34. We don’t know how attackers will get in but we must spot them when they do.
  • 35. 35 What is the key? Identity
  • 36. We must adopt identity-centric thinking if we want to have any chance of maintaining control over the world we are building
  • 38. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.38 The Identity of Everything allows the creation of a unique set of attributes • Who or what every connected item or person is • What permissions those objects and people have • What they do with those entitlements • Who granted the permissions • How other people and devices may interact
  • 39. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.39 • Google Nest, a home automation hub • Collects data from other appliances & sensors • But there is a homeowner identity behind it that Google wants to market to • And that owner will have relationships to many other things The Identity of Everything will be both Hierarchical and Matrixed
  • 40. © 2014 NetIQ Corporation. All rights reserved.40 NetIQ provides a unique combination of Identity, Access and Security solutions that will scale to address the future demands on identity
  • 41. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.41 Actions for Today, Tomorrow, Next Year • Understand the identity stores you already have • Examine how identity information is used in your organization • Look for ways to integrate identity context into your product design to protect data collected by IoT sensors • Start to build a framework to handle more sophisticated, aggregate identity, that can scale • Work towards an extensible identity framework that will encompass people, products, devices and services
  • 42. +44 (0)1344 326410 contact-uk@netiq.com www.netIQ.com NetIQ 1 Arlington Square, Downshire Way, Bracknell, Berkshire, RG12 1WA, UK www.netiq.com/communities
  • 43. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2015 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other countries.