SlideShare ist ein Scribd-Unternehmen logo
1 von 15
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
Industry 4.0
By ChristophRoser at AllAboutLean.com, own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=47640595
© 2016 ForgeRock. All rights reserved.
Top Barriers to IoT Adoption
© 2016 ForgeRock. All rights reserved.
Internet of Things Top Concerns
Security & Privacy Concerns
Value Assessment, Case Studies &
Organizational Consensus
Lack of Solution Knowledge
Legacy Infrastructure, Lack of Skills,
Integration & Costs
Lack of Standards & Interoperability
1
2
3
4
5
Source: IoT Institute, 2016 IoT Trends
Survey
© 2016 ForgeRock. All rights reserved.
Connected Car Hacked
Charlie Miller
Chris Valasek
Kill Engine
Brake /
Disable
July 2015
Track / Steer
Jeep
Cherokee
© 2016 ForgeRock. All rights reserved. 6
Connected Health Hacked
Jack Barnaby
Medtronic Insulin Pump
Adjust /
Disable
February
2012
© 2016 ForgeRock. All rights reserved.
Internet of Things Other Hacks
HackedConnected Home
Connected Industry Hacked
Smart Livestock Unsure
© 2016 ForgeRock. All rights reserved.
Why is it that these connected devices are
being hacked over and over again?
The list below, while not exhaustive, explains some of the
reasons why these new connected devices are so easy to hack
and why we’re likely to see more hacks in the future.
‱ MVP mindset
‱ Usability > security
‱ Lack of skills and resources
‱ Ship and forget mindset
‱ You (the user)
‱ Complex supply chain
‱ Cybercrime as a service
© 2016 ForgeRock. All rights reserved.
Security Adoption Cycle
”Oh
Crap”
© 2016 ForgeRock. All rights reserved.
Identity Access Management Identity Relationship Management
Customers
(millions)
On-premises
People
Applications
and data
PCs
Endpoints
Workforce
(thousands)
Partners and
Suppliers
Customers
(millions)
On-premises Public
Cloud
Privat
e
Cloud
People
Things
(Tens of
millions)
Applications
and data
PCs PhonesTablet
s
Smart
Watches
Endpoints
Business Has Changed: Enterprises now require Identity
Relationship Management (IRM)
© 2016 ForgeRock. All rights reserved.
Perimeter-Based Security Identity-Centric Security
Enables Digital
Business
Untrusted
Truste
d
Inhibits Digital
Business
Old Security Model is Broken. Security Must Now Be
Identity-Based, and implemented by design.
© 2016 ForgeRock. All rights reserved.
IAM in the age of the digital
business is more typically
characterized by a web of
paths involving a variety of
application locations,
endpoint devices, and things.
Workforce
(thousands)
Partners and
Suppliers
Customers
(millions)
On-premises Public
Cloud
Private
Cloud
People
Things
(Tens of
millions)
Applications
and data
PCs PhonesTablet
s
Smart
Watches
Endpoints
Next Generation IAM
© 2016 ForgeRock. All rights reserved.
Why IoT Needs Identity
‱An object must be identified in order to be secured
‱Unified identities of applications, cloud services, software code and connected
devices
‱IoT authorization decisions requires real-time processing of
‱Complex relationships
‱Context
‱User digital interactions must be constantly monitored.
‱In addition to using contextual cues to evaluate customer behavior,
‱user identity and access rights can be verified through multi-factor authentication
© 2016 ForgeRock. All rights reserved.
IoT reference architecture
© 2016 ForgeRock. All rights reserved.
End-to-end IoT Identity Platform
BIG
DATA
Little Data
End-to-End Security, Web, Data Objects & Management
IP and Web to the
edge
Solutions
Edge
Identity Platform
‱ Consumers
‱ Customers
‱ Partners
‱ Contractors
‱ Employees
‱ 

FROM DEVICE TO
CLOUD IoT Services Enterprise

Weitere Àhnliche Inhalte

Was ist angesagt?

RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurity
Indy Dh
 
Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
Rick Huijbregts
 

Was ist angesagt? (20)

Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurity
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
FIDO Overview: Status and Future
FIDO Overview: Status and FutureFIDO Overview: Status and Future
FIDO Overview: Status and Future
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected World
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
 
FIDO, Federation & Facebook Social login
FIDO, Federation & Facebook Social loginFIDO, Federation & Facebook Social login
FIDO, Federation & Facebook Social login
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
Cross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationCross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperation
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
 
Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Accelerating Information with Identity
Accelerating Information with IdentityAccelerating Information with Identity
Accelerating Information with Identity
 
Wireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCornerWireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCorner
 
Identity as the Perimeter
Identity as the PerimeterIdentity as the Perimeter
Identity as the Perimeter
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Bootstrapping UX
Bootstrapping UXBootstrapping UX
Bootstrapping UX
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
Syntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesSyntax IT ISGRC Products & Services
Syntax IT ISGRC Products & Services
 

Ähnlich wie Ben goodman cybersecurity in the iiot

Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Mahbubul Alam
 

Ähnlich wie Ben goodman cybersecurity in the iiot (20)

No IoT Without Identity
No IoT Without Identity No IoT Without Identity
No IoT Without Identity
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
 
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity SummitKeynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
 
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
 
Backstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitBackstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity Summit
 
Customer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity SummitCustomer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity Summit
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
 
A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things Webinar
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
 
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
 
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Identity Gateway with the ForgeRock Identity Platform - So What’s New?Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 

Mehr von MassTLC

Old Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTAOld Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTA
MassTLC
 

Mehr von MassTLC (20)

MassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected CitiesMassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected Cities
 
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI SolutionMassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
 
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing PortMassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
 
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex WyglinskiMassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
 
Andres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in BusinessAndres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in Business
 
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrainMassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
 
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon Black
 
Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!
 
Cloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data CenterCloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data Center
 
Old Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTAOld Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTA
 
Lisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentationLisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentation
 
Smart cities thinking outside the box
Smart cities thinking outside the boxSmart cities thinking outside the box
Smart cities thinking outside the box
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethics
 
Abbas bagasra smart ag
Abbas bagasra smart agAbbas bagasra smart ag
Abbas bagasra smart ag
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation Session
 
Tom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key FindingsTom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key Findings
 
Michael Goodman: The State of the State Economy
Michael Goodman: The State of the State EconomyMichael Goodman: The State of the State Economy
Michael Goodman: The State of the State Economy
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalytics
 
Brainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distributionBrainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distribution
 
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
 

KĂŒrzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

KĂŒrzlich hochgeladen (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Ben goodman cybersecurity in the iiot

  • 1. © 2016 ForgeRock. All rights reserved.
  • 2. © 2016 ForgeRock. All rights reserved. Industry 4.0 By ChristophRoser at AllAboutLean.com, own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=47640595
  • 3. © 2016 ForgeRock. All rights reserved. Top Barriers to IoT Adoption
  • 4. © 2016 ForgeRock. All rights reserved. Internet of Things Top Concerns Security & Privacy Concerns Value Assessment, Case Studies & Organizational Consensus Lack of Solution Knowledge Legacy Infrastructure, Lack of Skills, Integration & Costs Lack of Standards & Interoperability 1 2 3 4 5 Source: IoT Institute, 2016 IoT Trends Survey
  • 5. © 2016 ForgeRock. All rights reserved. Connected Car Hacked Charlie Miller Chris Valasek Kill Engine Brake / Disable July 2015 Track / Steer Jeep Cherokee
  • 6. © 2016 ForgeRock. All rights reserved. 6 Connected Health Hacked Jack Barnaby Medtronic Insulin Pump Adjust / Disable February 2012
  • 7. © 2016 ForgeRock. All rights reserved. Internet of Things Other Hacks HackedConnected Home Connected Industry Hacked Smart Livestock Unsure
  • 8. © 2016 ForgeRock. All rights reserved. Why is it that these connected devices are being hacked over and over again? The list below, while not exhaustive, explains some of the reasons why these new connected devices are so easy to hack and why we’re likely to see more hacks in the future. ‱ MVP mindset ‱ Usability > security ‱ Lack of skills and resources ‱ Ship and forget mindset ‱ You (the user) ‱ Complex supply chain ‱ Cybercrime as a service
  • 9. © 2016 ForgeRock. All rights reserved. Security Adoption Cycle ”Oh Crap”
  • 10. © 2016 ForgeRock. All rights reserved. Identity Access Management Identity Relationship Management Customers (millions) On-premises People Applications and data PCs Endpoints Workforce (thousands) Partners and Suppliers Customers (millions) On-premises Public Cloud Privat e Cloud People Things (Tens of millions) Applications and data PCs PhonesTablet s Smart Watches Endpoints Business Has Changed: Enterprises now require Identity Relationship Management (IRM)
  • 11. © 2016 ForgeRock. All rights reserved. Perimeter-Based Security Identity-Centric Security Enables Digital Business Untrusted Truste d Inhibits Digital Business Old Security Model is Broken. Security Must Now Be Identity-Based, and implemented by design.
  • 12. © 2016 ForgeRock. All rights reserved. IAM in the age of the digital business is more typically characterized by a web of paths involving a variety of application locations, endpoint devices, and things. Workforce (thousands) Partners and Suppliers Customers (millions) On-premises Public Cloud Private Cloud People Things (Tens of millions) Applications and data PCs PhonesTablet s Smart Watches Endpoints Next Generation IAM
  • 13. © 2016 ForgeRock. All rights reserved. Why IoT Needs Identity ‱An object must be identified in order to be secured ‱Unified identities of applications, cloud services, software code and connected devices ‱IoT authorization decisions requires real-time processing of ‱Complex relationships ‱Context ‱User digital interactions must be constantly monitored. ‱In addition to using contextual cues to evaluate customer behavior, ‱user identity and access rights can be verified through multi-factor authentication
  • 14. © 2016 ForgeRock. All rights reserved. IoT reference architecture
  • 15. © 2016 ForgeRock. All rights reserved. End-to-end IoT Identity Platform BIG DATA Little Data End-to-End Security, Web, Data Objects & Management IP and Web to the edge Solutions Edge Identity Platform ‱ Consumers ‱ Customers ‱ Partners ‱ Contractors ‱ Employees ‱ 
 FROM DEVICE TO CLOUD IoT Services Enterprise