SlideShare ist ein Scribd-Unternehmen logo
1 von 35
Downloaden Sie, um offline zu lesen
#impWebinars
HOUSEKEEPING ITEMS
Unmute Computer Speakers
Slides & Recording Distributed via Email
Following the Session
Please Submit Your Questions Via the Q&A Panel
Live Tweet Using #impWebinars
#impWebinars
WHAT WILL WE DISCUSS TODAY
1. Brief Introductions
2. Current State of IoT Security
3. Why Security Certification is Important
4. What is UL 2900-2-2? How Does it Affect IoT Moving Forward?
5. IoT Best Practices
6. Secure IoT in the Real World
7. Q&A
#impWebinars
TODAY’S SPEAKERS
Rachna Stegall is the Global Director of Connected Technologies – one of UL’s
newest divisions - designed to develop, support and deliver Cybersecurity
solutions including interoperability, software and functional safety, and new
associated technologies.
Global Director of Connected Technologies, UL LLC
Prior to co-founding Electric Imp, Hugo led the Apple hardware team through the
first four generations of the groundbreaking iPhone, and subsequently designed
and architected the hardware for the Nest Thermostat. Early in his career, Hugo
founded empeg, creator of the first in-car MP3 digital audio player.
CEO & Co-Founder, Electric Imp, Inc.
BRIEF INTRODUCTION TO
ELECTRIC IMP & UL®
#impWebinars
Award Winning Secure IoT. Managed Connectivity.
What We Do: Proven IoT
Deployments at Scale
We help more than 100
manufacturers and
enterprises in 105+ countries
transform the world through
the power of secure IoT
connectivity and enterprise
integrations.
Trusted by Industry Leaders Full Lifecycle,
Defense in Depth Security
1st IoT Platform UL®
2900-2-2 Certified.
Security & pen tested by
major global manufacturers
First edge IoT platform
aligned with IIC Security
Framework
#impWebinars
UL and the UL logo are trademarks of UL LLC © 2016. Proprietary & Confidential.
BRAND
PRESENCE
UL MARKS APPEAR on more than
22 BILLION
3OUT
O F
4U.S. CONSUMERS are FAMILIAR
WITH THE UL MARK
OF U.S. BUILT
ENVIRONMENT
AUTHORITIES
PREFER UL
92%
GLOBAL CONSUMERS
ANNUALLY WITH SAFETY MESSAGES
1 BILLION
UL WORKS TO PROTECT THE MARKET FROM COUNTERFEIT GOODS
IN 2015 ALONE, UL PARTICIPATED IN 506 SEIZURES, ELIMINATING MILLIONS OF DOLLARS OF COUNTERFEIT
PRODUCTS FROM THE MARKET
UL HAS SUPPORTED A
CENTURY OF
WORKING FOR A
SAFER WORLD
since
1894
PRODUCTS GLOBALLY
UL REACHES MORE THAN
INNOVATIONFROM ELECTRICITY TO NANOTECHNOLOGY
#impWebinars
UL and the UL logo are trademarks of UL LLC © 2017.
Proprietary & Confidential.
UL
EMPOWERS TRUST
IN A COMPLEX WORLD
Demonstrate
Safety
Deliver Quality &
Performance
Enhance Sustainability
Build Workplace
Excellence
Advance Societal
Wellbeing Confirm
Compliance &
Conformance
Strengthen
Security
Manage Transparency
Protect Brand
Reputation
CURRENT STATE OF
IOT SECURITY
#impWebinars
IN IOT, IT’S NOT JUST CONSUMER THAT MAKES
HEADLINES
Hackers are
just starting to
get interested.
0
5
10
15
20
25
defcon	18 defcon	19 defcon	20 defcon	21 defcon	22 defcon	23 defcon	24 defcon	25
iot/scada car consumer embedded
Number of IoT related sessions at the
last 7 DEFCON conferences
#impWebinars
COST OF SECURITY (VS COSTS OF NOT
DOING SECURITY)
Cost of IoT breaches
• Represent 13.4% of total revenues for
companies <$5 million annually
• $20 million cost for Enterprises with
$2billion+ revenues
SOURCE: Altman Vilandrie Company Survey of IoT Security Breaches, June 2017
A reputation
is a fragile
thing.
#impWebinars
SOURCE: Altman Vilandrie Company Survey of IoT Security Breaches, June 2017
IN IOT, THERE IS ROI FOR SECURITY.
Business Value of IoT Security
Companies that did not experience
a security incursion have invested
65% more on IoT security than
those who have been breached.
WHY THIRD PARTY
CERTIFICATION IS IMPORTANT
#impWebinars
Guidance Documents
• ISO/IEC TR 15443
• ITU-T CYBEX 1500
series
• CVE / NVD
• CWE
(CWRAF/CWSS,
SANS CWE Top
25 / OWASP Top
10) and CAPEC
• ISO/IEC 27000 series
• ISO/IEC 15408
• ISO/IEC DIS 20243
/O-TTPS
• FISMA
• HIPAA
• IEC 62443
• IEC 80001
• PCI
• SANS 20 CSC
• Cyber Essentials (UK)
• Top 35 mitigation strategies
(AU)
• NIST Cybersecurity Framework
& SP 800-53r4 security controls
• DHS C3 VP & CRR
• SAE AS5553 & 6174
Data Breaches 66%
International Data Corporation (IDC) Research shows that 66% of networks will be
breached by 2018
28% to 47% of organizations have
experienced IoT-related breaches
(Source: Forrester/CISCO)
70% of IoT devices are
vulnerable to attack
(Source:HP)
In 2016, the average consolidated
total cost of a data breach was $4M
USD
(Source: 2016 Ponemon Study)
BREACH
CURRENT CYBER RISKS
#impWebinars
• Technical Testable Criteria
• Objective Evidence
• Transparent Security Posture
• Validate Security Claims
• Demonstrate Product Security
• Market Differentiation
• Brand Trust
• Manage Security Risk
WHY THIRD PARTY CERTIFICATION IS IMPORTANT
WHAT IS UL 2900-2-2?
HOW WILL IT AFFECT IOT
MOVING FORWARD?
#impWebinars
UL CYBERSECURITY ASSURANCE PROGRAM
A standards-based program to evaluate the cybersecurity posture of SOFTWARE
in network-connectable products, aiming to provide a reasonable level of
confidence in the absence of vulnerabilities and software weaknesses and the
presence of appropriate risk controls
standards-based SOFTWARE
confidence vulnerabilities software weaknesses
risk controls
network-connectable products
#impWebinars
YOUR REPORT AND/OR
CERTIFICATION
CYBERSECURITY SOLUTIONS
TESTING
YOUR NETWORK
CONNECTABLE PRODUCT
AND/OR SYSTEM
AUTOMOTIVE LIGHTING SMART HOME HVAC BUILDING
AUTOMATION
APPLIANCES ALARM
SYSTEMS
SMART
METERS
MEDICAL
DEVICES
FIRE
SYSTEMS
INDUSTRIAL
CONTROL SYSTEMS
loT
NETWORK-CONNECTABLE PRODUCTS & SYSTEMS
UL CAP Solutions
TRAINING SERVICES
ADVISORY SERVICES
REVIEW SERVICES
Submit product or system
for discrete testing
(One or more individual
tests)
Submit product or system
for certification testing
(All tests)
• Fuzz Testing
• Known Vulnerabilities
• Code & Binary Analysis
• Access Control & Authentication
• Cryptography
• Remote Communication
• Software Updates
• Structured Penetration Testing
TESTING SERVICES
Test
Report
Certificate
KEY TAKEAWAYS: RISK MITIGATION INNOVATION COMPETITIVE ADVANTAGE
#impWebinars
UL 2900-2-2 FOR INDUSTRIAL
APPLICATIONS
#impWebinars
• Programmable Logic Controllers (PLC)
• Distributed Control Systems (DCS)
• Process control systems
• Historians, data loggers & data storage systems
• Control servers
• SCADA servers
• Remote Terminal Units (RTU)
• Human-Machine Interfaces (HMI)
• Input/Output (IO) servers
• Fieldbuses
• Networking equipment for ICS systems
• Smart sensors
• Controllers
• Embedded system/controllers
Fuzz Testing
Known Vulnerability
Code & Binary
Analysis
Access Control &
Authentication
Cryptography
Remote
Communication
Software Updates
Risk Assessment
Structured Pen
Testing
UL 2900-2-2
>
EXAMPLE PRODUCTS
#impWebinars
UL 2900-2-2
Internet
ERP Systems
Manufacturing and
Engineering Systems
Plant Floor
Branch
Offices
Branch
Factories
Customers
Supply Chain
Systems
Machining
Assets
Programmable Logic
Controllers (PLCs)
Factory Network
Infrastructure
UL 2900-2-2 PROGRAM SCOPE EXAMPLE
UL 2900-2-2 is written specifically to address product
ecosystems in the industrial control system vertical
Leverage Electric Imp’s Certification to
Save Time and Resources:
• By incorporating an IoT platform that
is already UL certified with your
products, you can leverage the UL
Certified Software Implementation
Solution by streamlining your
product’s UL certification with less
cost and faster time to market.
• Find out which platforms are already
UL certified by searching the UL
Online Certifications Directory with
the UL Category Code CYBR.
UL 2900-2-2 SOFTWARE IMPLEMENTATION SOLUTION
23
IOT SECURITY
WHY CERTIFIED SECURE
IS SO IMPORTANT
#impWebinars
BIG PICTURE: SECURITY IS CRUCIAL TO IOT
“Security is a special challenge for IoT.
IoT systems operate across the public internet; are deployed outside of the physical control
of the organization; may remain in place in critical systems for 10 to 20 years; and may control
critical infrastructure, or be capable of coordinated attacks on other systems.
Furthermore, IoT developers are focused on business
problems and may not have a strong security perspective. The
devices themselves may lack critical hardware capabilities for securing their operation against
attack. Securing IoT requires a balance of protecting against long- term devastation and
accelerating value generation… “
Internet of Things Primer for 2017
#impWebinars
WHAT DOES A “STRONG SECURITY PERSPECTIVE” MEAN?
UNDERSTANDING…
… need for Defense in Depth
… devices need to be able to be updated
without end user involvement
… no application is safe.
These are nodes. They are valuable to someone.
#impWebinars
POINTS OF
INTEGRATION ARE
OFTEN WHERE
VULNERABILITIES LIE.
Multiple	suppliers,	release	schedules,	nuanced
integrations	and	lack	of	cohesive	testing
#impWebinars
SECURE IOT IS FOR A LIFETIME
(of your connected product, that is)
• Devices in the
field for years or
even decades
• A compromise
may be invisible
but dangerous
Credit:	Happiest	Midns http://www.happiestminds.com/Insights/internet-of-things/
#impWebinars
IN IOT SECURITY, NO REASON TO REINVENT THE WHEEL
• Root of trust using FIPS140-2 HSMs
(OS signing)
• Every chip provisioned with unique
secrets at time of manufacture
• Privilege separation: application has
no access to keys
• Certificate secured communications
• OTA upgrades of both OS and
application: consensual or forced
Credit:	Spencer	Lewis	- http://www.spencerclewis.com/2016/04/reinventing-the-wheel/
#impWebinars
TIMING? YOU COULD WAIT FOR GOVERNMENT
MANDATES ….
Worldwide Threat Assessment of the
US Intelligence Community
Senate Select Committee on Intelligence
#impWebinars
… OR GET STARTED
NOW WITH
CONFIDENCE
• Certification delivers
cybersecurity due
diligence
• Ongoing testing is
defense against evolving
(and increasing) security
threats
SECURE IOT IN THE REAL WORLD
WINNING AWARDS IN
REGULATED MARKETS
#impWebinars
#impWebinars
ELECTRIC IMP: UL 2900-2-2 CYBERSECURITY CERTIFIED
This image cannot
currently be
displayed.
imp Authorized
Hardware
impOS
™
impCloud
™
BlinkUp
™
impFactory
™
impSecure
™
IoT Platform Stack
HARDWARE
DEVICE MGMT
CONNECTIVITY
APP ENABLEMENT
CLOUD
DATA
SECURITY
impCloud
™
#impWebinars
HOW TO WORK WITH US
SECURE IOT EDGE TO ENTERPRISE CONNECT TO LEARN MORE
Get started at:
electricimp.com/docs/gettingstarted/
Connect at:
ul.com/cybersecurity
Reach out to us to learn more ulcyber@ul.com
OR visit www.ul.com/cybersecurity
FREE DEVELOPER ACCOUNT
IoT QUICKSTART FAMILY FOR PROTOTYPING
• impExplorer™ Kits
• impAccelerator™ Solution Kits
• Electric Imp Breakout Boards

Weitere ähnliche Inhalte

Was ist angesagt?

The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019
The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019
The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019
Eclipse IoT
 

Was ist angesagt? (20)

IoT Developer Survey 2016
IoT Developer Survey 2016IoT Developer Survey 2016
IoT Developer Survey 2016
 
Addressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTAddressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoT
 
IoT Developer Survey 2015
IoT Developer Survey 2015IoT Developer Survey 2015
IoT Developer Survey 2015
 
IoT Systems: Technology, Architecture & Performance
IoT Systems: Technology, Architecture & PerformanceIoT Systems: Technology, Architecture & Performance
IoT Systems: Technology, Architecture & Performance
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
IoT Convention Europe - Mechelen June 15th 2017
IoT Convention Europe - Mechelen June 15th 2017IoT Convention Europe - Mechelen June 15th 2017
IoT Convention Europe - Mechelen June 15th 2017
 
Internet of Things (IoT) as a Driver for the Circular Economy – Innovation, Q...
Internet of Things (IoT) as a Driver for the Circular Economy – Innovation, Q...Internet of Things (IoT) as a Driver for the Circular Economy – Innovation, Q...
Internet of Things (IoT) as a Driver for the Circular Economy – Innovation, Q...
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
Internet of manufacturing and Open Source
Internet of manufacturing and Open SourceInternet of manufacturing and Open Source
Internet of manufacturing and Open Source
 
The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019
The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019
The MRAA and UPM Eclipse IoT Projects | Eclipse IoT Day Santa Clara 2019
 
The Journey Towards IR 4.0
The Journey Towards IR 4.0The Journey Towards IR 4.0
The Journey Towards IR 4.0
 
Internet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and OpportunitiesInternet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and Opportunities
 
Internet of things - The Present & The Future
Internet of things - The Present & The FutureInternet of things - The Present & The Future
Internet of things - The Present & The Future
 
Watson IoT @Ryerson University - IEEE Chapter
Watson IoT  @Ryerson University - IEEE Chapter  Watson IoT  @Ryerson University - IEEE Chapter
Watson IoT @Ryerson University - IEEE Chapter
 
Bridging the Physical and digital Adances in wearables and consumer IOT; Rani...
Bridging the Physical and digital Adances in wearables and consumer IOT; Rani...Bridging the Physical and digital Adances in wearables and consumer IOT; Rani...
Bridging the Physical and digital Adances in wearables and consumer IOT; Rani...
 
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschapIoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
IoT Update | Hoe implementeer je IoT Schaalbaar in je IT landschap
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615
 
Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018Open Source for Industry 4.0 – Open IoT Summit NA 2018
Open Source for Industry 4.0 – Open IoT Summit NA 2018
 
Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0
 

Ähnlich wie [Webinar] Why Security Certification is Crucial for IoT Success

Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE코리아
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 

Ähnlich wie [Webinar] Why Security Certification is Crucial for IoT Success (20)

IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
No Safety Without Security
No Safety Without SecurityNo Safety Without Security
No Safety Without Security
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 
Boosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk ImperativeBoosting IoT Protection: An Enterprise Risk Imperative
Boosting IoT Protection: An Enterprise Risk Imperative
 
IoT – Breaking Bad
IoT – Breaking BadIoT – Breaking Bad
IoT – Breaking Bad
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

[Webinar] Why Security Certification is Crucial for IoT Success

  • 1.
  • 2. #impWebinars HOUSEKEEPING ITEMS Unmute Computer Speakers Slides & Recording Distributed via Email Following the Session Please Submit Your Questions Via the Q&A Panel Live Tweet Using #impWebinars
  • 3. #impWebinars WHAT WILL WE DISCUSS TODAY 1. Brief Introductions 2. Current State of IoT Security 3. Why Security Certification is Important 4. What is UL 2900-2-2? How Does it Affect IoT Moving Forward? 5. IoT Best Practices 6. Secure IoT in the Real World 7. Q&A
  • 4. #impWebinars TODAY’S SPEAKERS Rachna Stegall is the Global Director of Connected Technologies – one of UL’s newest divisions - designed to develop, support and deliver Cybersecurity solutions including interoperability, software and functional safety, and new associated technologies. Global Director of Connected Technologies, UL LLC Prior to co-founding Electric Imp, Hugo led the Apple hardware team through the first four generations of the groundbreaking iPhone, and subsequently designed and architected the hardware for the Nest Thermostat. Early in his career, Hugo founded empeg, creator of the first in-car MP3 digital audio player. CEO & Co-Founder, Electric Imp, Inc.
  • 6. #impWebinars Award Winning Secure IoT. Managed Connectivity. What We Do: Proven IoT Deployments at Scale We help more than 100 manufacturers and enterprises in 105+ countries transform the world through the power of secure IoT connectivity and enterprise integrations. Trusted by Industry Leaders Full Lifecycle, Defense in Depth Security 1st IoT Platform UL® 2900-2-2 Certified. Security & pen tested by major global manufacturers First edge IoT platform aligned with IIC Security Framework
  • 7. #impWebinars UL and the UL logo are trademarks of UL LLC © 2016. Proprietary & Confidential. BRAND PRESENCE UL MARKS APPEAR on more than 22 BILLION 3OUT O F 4U.S. CONSUMERS are FAMILIAR WITH THE UL MARK OF U.S. BUILT ENVIRONMENT AUTHORITIES PREFER UL 92% GLOBAL CONSUMERS ANNUALLY WITH SAFETY MESSAGES 1 BILLION UL WORKS TO PROTECT THE MARKET FROM COUNTERFEIT GOODS IN 2015 ALONE, UL PARTICIPATED IN 506 SEIZURES, ELIMINATING MILLIONS OF DOLLARS OF COUNTERFEIT PRODUCTS FROM THE MARKET UL HAS SUPPORTED A CENTURY OF WORKING FOR A SAFER WORLD since 1894 PRODUCTS GLOBALLY UL REACHES MORE THAN INNOVATIONFROM ELECTRICITY TO NANOTECHNOLOGY
  • 8. #impWebinars UL and the UL logo are trademarks of UL LLC © 2017. Proprietary & Confidential. UL EMPOWERS TRUST IN A COMPLEX WORLD Demonstrate Safety Deliver Quality & Performance Enhance Sustainability Build Workplace Excellence Advance Societal Wellbeing Confirm Compliance & Conformance Strengthen Security Manage Transparency Protect Brand Reputation
  • 10. #impWebinars IN IOT, IT’S NOT JUST CONSUMER THAT MAKES HEADLINES
  • 11. Hackers are just starting to get interested. 0 5 10 15 20 25 defcon 18 defcon 19 defcon 20 defcon 21 defcon 22 defcon 23 defcon 24 defcon 25 iot/scada car consumer embedded Number of IoT related sessions at the last 7 DEFCON conferences
  • 12. #impWebinars COST OF SECURITY (VS COSTS OF NOT DOING SECURITY) Cost of IoT breaches • Represent 13.4% of total revenues for companies <$5 million annually • $20 million cost for Enterprises with $2billion+ revenues SOURCE: Altman Vilandrie Company Survey of IoT Security Breaches, June 2017 A reputation is a fragile thing.
  • 13. #impWebinars SOURCE: Altman Vilandrie Company Survey of IoT Security Breaches, June 2017 IN IOT, THERE IS ROI FOR SECURITY. Business Value of IoT Security Companies that did not experience a security incursion have invested 65% more on IoT security than those who have been breached.
  • 15. #impWebinars Guidance Documents • ISO/IEC TR 15443 • ITU-T CYBEX 1500 series • CVE / NVD • CWE (CWRAF/CWSS, SANS CWE Top 25 / OWASP Top 10) and CAPEC • ISO/IEC 27000 series • ISO/IEC 15408 • ISO/IEC DIS 20243 /O-TTPS • FISMA • HIPAA • IEC 62443 • IEC 80001 • PCI • SANS 20 CSC • Cyber Essentials (UK) • Top 35 mitigation strategies (AU) • NIST Cybersecurity Framework & SP 800-53r4 security controls • DHS C3 VP & CRR • SAE AS5553 & 6174 Data Breaches 66% International Data Corporation (IDC) Research shows that 66% of networks will be breached by 2018 28% to 47% of organizations have experienced IoT-related breaches (Source: Forrester/CISCO) 70% of IoT devices are vulnerable to attack (Source:HP) In 2016, the average consolidated total cost of a data breach was $4M USD (Source: 2016 Ponemon Study) BREACH CURRENT CYBER RISKS
  • 16. #impWebinars • Technical Testable Criteria • Objective Evidence • Transparent Security Posture • Validate Security Claims • Demonstrate Product Security • Market Differentiation • Brand Trust • Manage Security Risk WHY THIRD PARTY CERTIFICATION IS IMPORTANT
  • 17. WHAT IS UL 2900-2-2? HOW WILL IT AFFECT IOT MOVING FORWARD?
  • 18. #impWebinars UL CYBERSECURITY ASSURANCE PROGRAM A standards-based program to evaluate the cybersecurity posture of SOFTWARE in network-connectable products, aiming to provide a reasonable level of confidence in the absence of vulnerabilities and software weaknesses and the presence of appropriate risk controls standards-based SOFTWARE confidence vulnerabilities software weaknesses risk controls network-connectable products
  • 19. #impWebinars YOUR REPORT AND/OR CERTIFICATION CYBERSECURITY SOLUTIONS TESTING YOUR NETWORK CONNECTABLE PRODUCT AND/OR SYSTEM AUTOMOTIVE LIGHTING SMART HOME HVAC BUILDING AUTOMATION APPLIANCES ALARM SYSTEMS SMART METERS MEDICAL DEVICES FIRE SYSTEMS INDUSTRIAL CONTROL SYSTEMS loT NETWORK-CONNECTABLE PRODUCTS & SYSTEMS UL CAP Solutions TRAINING SERVICES ADVISORY SERVICES REVIEW SERVICES Submit product or system for discrete testing (One or more individual tests) Submit product or system for certification testing (All tests) • Fuzz Testing • Known Vulnerabilities • Code & Binary Analysis • Access Control & Authentication • Cryptography • Remote Communication • Software Updates • Structured Penetration Testing TESTING SERVICES Test Report Certificate KEY TAKEAWAYS: RISK MITIGATION INNOVATION COMPETITIVE ADVANTAGE
  • 20. #impWebinars UL 2900-2-2 FOR INDUSTRIAL APPLICATIONS
  • 21. #impWebinars • Programmable Logic Controllers (PLC) • Distributed Control Systems (DCS) • Process control systems • Historians, data loggers & data storage systems • Control servers • SCADA servers • Remote Terminal Units (RTU) • Human-Machine Interfaces (HMI) • Input/Output (IO) servers • Fieldbuses • Networking equipment for ICS systems • Smart sensors • Controllers • Embedded system/controllers Fuzz Testing Known Vulnerability Code & Binary Analysis Access Control & Authentication Cryptography Remote Communication Software Updates Risk Assessment Structured Pen Testing UL 2900-2-2 > EXAMPLE PRODUCTS
  • 22. #impWebinars UL 2900-2-2 Internet ERP Systems Manufacturing and Engineering Systems Plant Floor Branch Offices Branch Factories Customers Supply Chain Systems Machining Assets Programmable Logic Controllers (PLCs) Factory Network Infrastructure UL 2900-2-2 PROGRAM SCOPE EXAMPLE UL 2900-2-2 is written specifically to address product ecosystems in the industrial control system vertical
  • 23. Leverage Electric Imp’s Certification to Save Time and Resources: • By incorporating an IoT platform that is already UL certified with your products, you can leverage the UL Certified Software Implementation Solution by streamlining your product’s UL certification with less cost and faster time to market. • Find out which platforms are already UL certified by searching the UL Online Certifications Directory with the UL Category Code CYBR. UL 2900-2-2 SOFTWARE IMPLEMENTATION SOLUTION 23
  • 24. IOT SECURITY WHY CERTIFIED SECURE IS SO IMPORTANT
  • 25. #impWebinars BIG PICTURE: SECURITY IS CRUCIAL TO IOT “Security is a special challenge for IoT. IoT systems operate across the public internet; are deployed outside of the physical control of the organization; may remain in place in critical systems for 10 to 20 years; and may control critical infrastructure, or be capable of coordinated attacks on other systems. Furthermore, IoT developers are focused on business problems and may not have a strong security perspective. The devices themselves may lack critical hardware capabilities for securing their operation against attack. Securing IoT requires a balance of protecting against long- term devastation and accelerating value generation… “ Internet of Things Primer for 2017
  • 26. #impWebinars WHAT DOES A “STRONG SECURITY PERSPECTIVE” MEAN? UNDERSTANDING… … need for Defense in Depth … devices need to be able to be updated without end user involvement … no application is safe. These are nodes. They are valuable to someone.
  • 27. #impWebinars POINTS OF INTEGRATION ARE OFTEN WHERE VULNERABILITIES LIE. Multiple suppliers, release schedules, nuanced integrations and lack of cohesive testing
  • 28. #impWebinars SECURE IOT IS FOR A LIFETIME (of your connected product, that is) • Devices in the field for years or even decades • A compromise may be invisible but dangerous Credit: Happiest Midns http://www.happiestminds.com/Insights/internet-of-things/
  • 29. #impWebinars IN IOT SECURITY, NO REASON TO REINVENT THE WHEEL • Root of trust using FIPS140-2 HSMs (OS signing) • Every chip provisioned with unique secrets at time of manufacture • Privilege separation: application has no access to keys • Certificate secured communications • OTA upgrades of both OS and application: consensual or forced Credit: Spencer Lewis - http://www.spencerclewis.com/2016/04/reinventing-the-wheel/
  • 30. #impWebinars TIMING? YOU COULD WAIT FOR GOVERNMENT MANDATES …. Worldwide Threat Assessment of the US Intelligence Community Senate Select Committee on Intelligence
  • 31. #impWebinars … OR GET STARTED NOW WITH CONFIDENCE • Certification delivers cybersecurity due diligence • Ongoing testing is defense against evolving (and increasing) security threats
  • 32. SECURE IOT IN THE REAL WORLD WINNING AWARDS IN REGULATED MARKETS
  • 34. #impWebinars ELECTRIC IMP: UL 2900-2-2 CYBERSECURITY CERTIFIED This image cannot currently be displayed. imp Authorized Hardware impOS ™ impCloud ™ BlinkUp ™ impFactory ™ impSecure ™ IoT Platform Stack HARDWARE DEVICE MGMT CONNECTIVITY APP ENABLEMENT CLOUD DATA SECURITY impCloud ™
  • 35. #impWebinars HOW TO WORK WITH US SECURE IOT EDGE TO ENTERPRISE CONNECT TO LEARN MORE Get started at: electricimp.com/docs/gettingstarted/ Connect at: ul.com/cybersecurity Reach out to us to learn more ulcyber@ul.com OR visit www.ul.com/cybersecurity FREE DEVELOPER ACCOUNT IoT QUICKSTART FAMILY FOR PROTOTYPING • impExplorer™ Kits • impAccelerator™ Solution Kits • Electric Imp Breakout Boards

Hinweis der Redaktion

  1. SOURCE: Verizon Data Breach Survey http://www.verizonenterprise.com/verizon-insights-lab/data-breach-digest/2017/ SOURCE: https://www.rambus.com/blogs/u-s-firms-confirm-iot-security-breaches/
  2. SOURCE: Altman Vilandrie Company Survey of IoT Security Breaches http://www.businesswire.com/news/home/20170601006165/en/Survey-U.S.-Firms-Internet-Hit-Security-Breaches/?feedref=JjAwJuNHiystnCoBq_hl-Q-tiwWZwkcswR1UZtV7eGe24xL9TZOyQUMS3J72mJlQ7fxFuNFTHSunhvli30RlBNXya2izy9YOgHlBiZQk2LOzmn6JePCpHPCiYGaEx4DL1Rq8p
  3. SOURCE: Altman Vilandrie Company Survey of IoT Security Breaches http://www.businesswire.com/news/home/20170601006165/en/Survey-U.S.-Firms-Internet-Hit-Security-Breaches/?feedref=JjAwJuNHiystnCoBq_hl-Q-tiwWZwkcswR1UZtV7eGe24xL9TZOyQUMS3J72mJlQ7fxFuNFTHSunhvli30RlBNXya2izy9YOgHlBiZQk2LOzmn6JePCpHPCiYGaEx4DL1Rq8p
  4. Data breaches can have catastrophic effects including unplanned downtime and loss of production, costly harm to assets, reputational damage, and damage to living and working environments. This growing concern to address cybersecurity prompted many guidance and best practice documents to help product manufacturers and asset owners improve the security of their products and installations. After using these guidance documents, how do you validate that they helped improve cybersecurity?
  5. UL was asked by our clients and government stakeholders to create a transparent, testable framework that can be used across industry verticals to repeat-ably and reproducibly measure the security posture of products and address the basic cyber-hygiene of products in order to be the first step in improving product security.
  6. UL 2900-1 evaluates general product requirements that can be applied across industry verticals. UL 2900-2-2 targets specific industrial environment UL 2900-2-1 and -2-2 are written specifically to address product ecosystems in the medical device and industrial control system verticals. As we continue to expand UL CAP, additional Part 2s can be written easily using UL 2900-1 as a baseline and collaborating with industry stakeholders from various verticals. For example we have seen interest from the lighting and automotive industries to create particular requirements specific to those industries. In addition, to evaluate the organization, UL 2900-3 has been planned for release in Q2 of this year. The key differentiators from UL 2900 compared to other available testing programs is UL 2900 can be applied across industry verticals and second it is based on a balance of prescriptive and risk assessment based requirements. Because product security largely relies on the installation environment of the product, requirements must be fit for use of the product. For example, if a software exploit within the parameters is found, a product manufacturer may indicate risk mitigation methods during product installation that can prevent the exploit from causing a security risk. UL will work with vendors through their risk assessment process to identify mitigating factors are adequate to address security risks.
  7. Vector to attack behind firewalls Possible DDoS participants
  8. Closing Slide Thank you everyone for joining today’s session, we hope you gained valuable insight and enjoyed Hugo & Rachna’s unique take on IoT Security. We will take some time for Q&A but first we encourage you if you’re interested in learning more about electric imp to sign up for a FREE developer account to explore our platform– just visit the link displayed here on screen to get started. Electricimp.com/docs/gettingstarted If you’re interested in learning more about UL Cybersecurity, please reach out to them at ulcyber@ul.com or by visiting ul.com/cybersecurity. Now – let’s go ahead and answer some of the questions that came in during the session….. Seed Questions 1. Do customers have to send UL their source code? [Rachna] 2. What is UL’s experience in this space? How long has it been in cybersecurity? [Rachna] 3. What is the difference between IEC 62443 and UL 2900? [Rachna]