SlideShare a Scribd company logo
1 of 12
Event name
“CHARIOT”
Cognitive Heterogeneous Architecture for
Industrial IoT
Loredana Mancini
OWASP/WIA
1
Event name
CHARIOT Factsheet
2
Cognitive Heterogeneous Architecture for Industrial IoT
“CHARIOT”
Topic: IoT-03-2017 - R&I on IoT integration and platforms
Type of Action: Research and Innovation (RIA)
Funding: 4,928,562.50 €
Duration: 36 months
Start Date: 1/1/2018
Event name
The CHARIOT Consortium
3
Participant
No
Participant organization
name
Short
Name
Role Country
1. Inlecom Systems
(Coordinator)
ILS Project management, IoT governance BE
2. IBM IBM Cognitive Architectures & Platforms for IoT IE
3. CEA CEA Static source code analysis tools for IoT FR
4. Athens International
Airport - AIA
AIA Airport LL GR
5. eBOS Technologies Ltd EBOS Analytics Prediction models and Dashboard
development
CY
6. VLTN VLTN IoT deployment architectures/Cloud BE
8. Trenitalia TRIT Railway systems engineering/safety IT
9. CLMS CLMS Systems integration GR
10. ASPISEC ASP Cybersecurity IT
11. TELCOSERV TCS IoT Gateway provider GR
12. Information Sharing
Company
ICS IoT Security IT
Event name
Section 1: CHARIOT Project Overview and Focus
Event name
CHARIOT – Industrial IoT Challenges
5
• By 2025 it is anticipated that there will be 75 Billion IoT-connected devices World Wide
• Spending on IoT devices and services reached $2 trillion in 2017, with China, North America, and
Western Europe accounting for 67% of all devices (Gartner Inc)
• Growth in connected devices is anticipated accelerate due to a rise in adoption of cross-industry
devices (LED lighting, HVAC systems, physical security systems and lots more)
• In recognition of this, Secure IoT is now becoming a more important focus of attention
Event name
CHARIOT – Industrial IoT Challenges
6
• Internet of Things (IoT) security breaches have been dominating headlines recently
• WikiLeaks’s trove of CIA documents revealed that internet-connected televisions can be used
to secretly record conversations
• Trump’s advisor (Kelly-Anne Conway) believes that microwave ovens can spy on us (through
microwave cameras which can be used for surveillance)
• 96% of security professionals expect an increase in IoT breaches this year (Forbes 2017)
• Recently, ISP Dyn came under attack – cyber-criminals commandeered a large number of
internet-connected devices (mostly DVRs and cameras) to serve as their helpers
• Requests for government regulation of the IoT, asserting that IoT manufacturers and customers
are not paying attention to the security of IoT devices (Bruce Schneier, Cybersecurity expert )
Event name
Section 2: CHARIOT Objectives
Event name
CHARIOT – Overall Vision & Focus
8
• CHARIOT’s central focus is Safety Critical Systems (SCS)
• SCSs are systems whose failure or malfunction can result in harm, injury or death, loss or
damage to property, or impact to the environment
• SCSs comprise H/W, S/W, infrastructure, networks and human aspects needed to perform
safety functions, where failure would cause a significant increase in the safety risk for the
people or environment
• Securing data, objects, networks, infrastructure, systems & people in IoT will have a
prominent role in the research and standardization activities over the next several years
• CHARIOT also recognises that security threats are broad, and have the potential to
compromise IoT systems or alter their intended operation
Event name
CHARIOT Objectives
9
Objective 1: Specify a Methodological Framework for the Design and Operation of Secure and
Safe IoT Applications addressing System Safety as a cross cutting concern.
Objective 2: Develop an Open Cognitive IoT Architecture and Platform (CHARIOT Platform),
intelligent safety behaviour in the diverse and complex ways in which the safety critical system and
the IoT system will interact in a secure manner
Objective 3: Develop a runtime IoT Privacy, Security and Safety Supervision Engine (IPSE)
• Privacy Engine based on PKI and Blockchain technologies
• Firmware Security integrity checking
• IoT Safety Supervision Engine (ISSE)
• Analytics Prediction and Dashboard
Objective 4: Test and validate Industrial IoT safety in three Living Labs (LLs) addressing different
industrial areas in IoT safety
• Trenitalia (Italy)
• IBM Ireland Campus (Ireland)
• Athens International Airport (Greece)
Objective 5: Scale up through wide dissemination, exploitation, capacity building activities
WP2 Objectives
“Develop an Open Cognitive IoT Architecture and
Platform, called the CHARIOT Platform, that exhibits
intelligent safety behavior in the diverse and complex
ways in which the safety critical system and the IoT
system will interact in a secure manner.”, CHARIOT
DoW
 T2.1 Design specification for CHARIOT
cognitive IoTArchitecture
 T2.2 CHARIOT IoT Cognitive Platform
 T2.3 Interface to IoT Gateways and
components
 T2.4 Security & Blockchain
Event name
Chariot
Chariot Web site https://www.chariotproject.eu/
Chariot Forum
https://www.chariotproject.eu/forum/
Chariot Newsletter
https://www.chariotproject.eu/newsletter
Related Projects
https://www.chariotproject.eu/RelatedProjects
Event name
Contact
Details
email
name
company
12
Thank you for listening!
Any questions?
Event name

More Related Content

What's hot

Research Topics in IOT
Research Topics in IOTResearch Topics in IOT
Research Topics in IOTTechsparks
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesDenim Group
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist PriyaNemade
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Internet of things
Internet of thingsInternet of things
Internet of thingsraj esaki
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsMario Drobics
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Internet of Things - Esper
Internet of Things - EsperInternet of Things - Esper
Internet of Things - EsperTarun Vashisth
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaistIot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaistDaeyoung Kim
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesAsim Rais Siddiqui
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018Mario Drobics
 
Internet of things
Internet of thingsInternet of things
Internet of thingsAli Nezhad
 

What's hot (20)

Research Topics in IOT
Research Topics in IOTResearch Topics in IOT
Research Topics in IOT
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 
Iot Overview
Iot Overview Iot Overview
Iot Overview
 
Nazmul haq abir
Nazmul haq abirNazmul haq abir
Nazmul haq abir
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Internet of Things - Esper
Internet of Things - EsperInternet of Things - Esper
Internet of Things - Esper
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaistIot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
Iot ecosystem-challenges-daeyoungkim-auto-id-labs-kaist
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Similar to Chariot generic presentation owaspwia_Infosecgirls

A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...IRJET Journal
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptxishwar69
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET Journal
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsShyam Goyal
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Securityshiriskumar
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsBob Marcus
 
H2020 IoT Security/Privacy Cluster Projects Presentation
H2020 IoT Security/Privacy Cluster Projects PresentationH2020 IoT Security/Privacy Cluster Projects Presentation
H2020 IoT Security/Privacy Cluster Projects PresentationSecureIoT H2020 funded project
 
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v final
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v finalSoldatos cluster-h2020-security-projects-etsi-nice-221018-v final
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v finalJohn Soldatos
 
Brain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain IoT Project
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptxSyedSaqlain32
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
 

Similar to Chariot generic presentation owaspwia_Infosecgirls (20)

A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...Design of a Hybrid Authentication Technique for User and Device Authenticatio...
Design of a Hybrid Authentication Technique for User and Device Authenticatio...
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
inteross-iot.pdf
inteross-iot.pdfinteross-iot.pdf
inteross-iot.pdf
 
Lecture1_Introduction.pptx
Lecture1_Introduction.pptxLecture1_Introduction.pptx
Lecture1_Introduction.pptx
 
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and ProtectionIRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
IRJET- Blockchain for Large-Scale Internet of Things Data Storage and Protection
 
Io t security_review_blockchain_solutions
Io t security_review_blockchain_solutionsIo t security_review_blockchain_solutions
Io t security_review_blockchain_solutions
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Iio t security std
Iio t security stdIio t security std
Iio t security std
 
H2020 IoT Security/Privacy Cluster Projects Presentation
H2020 IoT Security/Privacy Cluster Projects PresentationH2020 IoT Security/Privacy Cluster Projects Presentation
H2020 IoT Security/Privacy Cluster Projects Presentation
 
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v final
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v finalSoldatos cluster-h2020-security-projects-etsi-nice-221018-v final
Soldatos cluster-h2020-security-projects-etsi-nice-221018-v final
 
Brain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overviewBrain-IoT Project: Security Cluster activities overview
Brain-IoT Project: Security Cluster activities overview
 
76 s201918
76 s20191876 s201918
76 s201918
 
Abid - Final Presentation .pptx
Abid - Final Presentation .pptxAbid - Final Presentation .pptx
Abid - Final Presentation .pptx
 
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 

More from Vandana Verma

Building security into the pipelines
Building security into the pipelinesBuilding security into the pipelines
Building security into the pipelinesVandana Verma
 
Applying OWASP web security testing guide (OWSTG)
Applying OWASP web security testing guide (OWSTG)Applying OWASP web security testing guide (OWSTG)
Applying OWASP web security testing guide (OWSTG)Vandana Verma
 
Running an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec VillageRunning an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec VillageVandana Verma
 
SARCON Talk - Vandana Verma Sehgal
SARCON Talk - Vandana Verma SehgalSARCON Talk - Vandana Verma Sehgal
SARCON Talk - Vandana Verma SehgalVandana Verma
 
Sacon 2020 living in the world of zero trust v1.0
Sacon 2020 living in the world of zero trust v1.0Sacon 2020 living in the world of zero trust v1.0
Sacon 2020 living in the world of zero trust v1.0Vandana Verma
 
Addo 2019 vandana_dev_secops_culturalchange
Addo 2019 vandana_dev_secops_culturalchangeAddo 2019 vandana_dev_secops_culturalchange
Addo 2019 vandana_dev_secops_culturalchangeVandana Verma
 
App Sec village DevSecOps as a culture
App Sec village DevSecOps as a cultureApp Sec village DevSecOps as a culture
App Sec village DevSecOps as a cultureVandana Verma
 
Web sockets - Pentesting
Web sockets - Pentesting Web sockets - Pentesting
Web sockets - Pentesting Vandana Verma
 
Story of http headers
Story of http headersStory of http headers
Story of http headersVandana Verma
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & complianceVandana Verma
 
Basics of Server Side Template Injection
Basics of Server Side Template InjectionBasics of Server Side Template Injection
Basics of Server Side Template InjectionVandana Verma
 
SIEM Vendor Neutrality
SIEM Vendor NeutralitySIEM Vendor Neutrality
SIEM Vendor NeutralityVandana Verma
 
Getting started with android
Getting started with androidGetting started with android
Getting started with androidVandana Verma
 
Importance of Penetration Testing
Importance of Penetration TestingImportance of Penetration Testing
Importance of Penetration TestingVandana Verma
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
OWASP - Dependency Check
OWASP - Dependency CheckOWASP - Dependency Check
OWASP - Dependency CheckVandana Verma
 
Incident response in Cloud
Incident response in CloudIncident response in Cloud
Incident response in CloudVandana Verma
 

More from Vandana Verma (18)

Building security into the pipelines
Building security into the pipelinesBuilding security into the pipelines
Building security into the pipelines
 
Applying OWASP web security testing guide (OWSTG)
Applying OWASP web security testing guide (OWSTG)Applying OWASP web security testing guide (OWSTG)
Applying OWASP web security testing guide (OWSTG)
 
Running an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec VillageRunning an app sec program with OWASP projects_ Defcon AppSec Village
Running an app sec program with OWASP projects_ Defcon AppSec Village
 
SARCON Talk - Vandana Verma Sehgal
SARCON Talk - Vandana Verma SehgalSARCON Talk - Vandana Verma Sehgal
SARCON Talk - Vandana Verma Sehgal
 
Sacon 2020 living in the world of zero trust v1.0
Sacon 2020 living in the world of zero trust v1.0Sacon 2020 living in the world of zero trust v1.0
Sacon 2020 living in the world of zero trust v1.0
 
Addo 2019 vandana_dev_secops_culturalchange
Addo 2019 vandana_dev_secops_culturalchangeAddo 2019 vandana_dev_secops_culturalchange
Addo 2019 vandana_dev_secops_culturalchange
 
App Sec village DevSecOps as a culture
App Sec village DevSecOps as a cultureApp Sec village DevSecOps as a culture
App Sec village DevSecOps as a culture
 
Oscp - Journey
Oscp - JourneyOscp - Journey
Oscp - Journey
 
Web sockets - Pentesting
Web sockets - Pentesting Web sockets - Pentesting
Web sockets - Pentesting
 
Story of http headers
Story of http headersStory of http headers
Story of http headers
 
Security audits & compliance
Security audits & complianceSecurity audits & compliance
Security audits & compliance
 
Basics of Server Side Template Injection
Basics of Server Side Template InjectionBasics of Server Side Template Injection
Basics of Server Side Template Injection
 
SIEM Vendor Neutrality
SIEM Vendor NeutralitySIEM Vendor Neutrality
SIEM Vendor Neutrality
 
Getting started with android
Getting started with androidGetting started with android
Getting started with android
 
Importance of Penetration Testing
Importance of Penetration TestingImportance of Penetration Testing
Importance of Penetration Testing
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
OWASP - Dependency Check
OWASP - Dependency CheckOWASP - Dependency Check
OWASP - Dependency Check
 
Incident response in Cloud
Incident response in CloudIncident response in Cloud
Incident response in Cloud
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Chariot generic presentation owaspwia_Infosecgirls

  • 1. Event name “CHARIOT” Cognitive Heterogeneous Architecture for Industrial IoT Loredana Mancini OWASP/WIA 1
  • 2. Event name CHARIOT Factsheet 2 Cognitive Heterogeneous Architecture for Industrial IoT “CHARIOT” Topic: IoT-03-2017 - R&I on IoT integration and platforms Type of Action: Research and Innovation (RIA) Funding: 4,928,562.50 € Duration: 36 months Start Date: 1/1/2018
  • 3. Event name The CHARIOT Consortium 3 Participant No Participant organization name Short Name Role Country 1. Inlecom Systems (Coordinator) ILS Project management, IoT governance BE 2. IBM IBM Cognitive Architectures & Platforms for IoT IE 3. CEA CEA Static source code analysis tools for IoT FR 4. Athens International Airport - AIA AIA Airport LL GR 5. eBOS Technologies Ltd EBOS Analytics Prediction models and Dashboard development CY 6. VLTN VLTN IoT deployment architectures/Cloud BE 8. Trenitalia TRIT Railway systems engineering/safety IT 9. CLMS CLMS Systems integration GR 10. ASPISEC ASP Cybersecurity IT 11. TELCOSERV TCS IoT Gateway provider GR 12. Information Sharing Company ICS IoT Security IT
  • 4. Event name Section 1: CHARIOT Project Overview and Focus
  • 5. Event name CHARIOT – Industrial IoT Challenges 5 • By 2025 it is anticipated that there will be 75 Billion IoT-connected devices World Wide • Spending on IoT devices and services reached $2 trillion in 2017, with China, North America, and Western Europe accounting for 67% of all devices (Gartner Inc) • Growth in connected devices is anticipated accelerate due to a rise in adoption of cross-industry devices (LED lighting, HVAC systems, physical security systems and lots more) • In recognition of this, Secure IoT is now becoming a more important focus of attention
  • 6. Event name CHARIOT – Industrial IoT Challenges 6 • Internet of Things (IoT) security breaches have been dominating headlines recently • WikiLeaks’s trove of CIA documents revealed that internet-connected televisions can be used to secretly record conversations • Trump’s advisor (Kelly-Anne Conway) believes that microwave ovens can spy on us (through microwave cameras which can be used for surveillance) • 96% of security professionals expect an increase in IoT breaches this year (Forbes 2017) • Recently, ISP Dyn came under attack – cyber-criminals commandeered a large number of internet-connected devices (mostly DVRs and cameras) to serve as their helpers • Requests for government regulation of the IoT, asserting that IoT manufacturers and customers are not paying attention to the security of IoT devices (Bruce Schneier, Cybersecurity expert )
  • 7. Event name Section 2: CHARIOT Objectives
  • 8. Event name CHARIOT – Overall Vision & Focus 8 • CHARIOT’s central focus is Safety Critical Systems (SCS) • SCSs are systems whose failure or malfunction can result in harm, injury or death, loss or damage to property, or impact to the environment • SCSs comprise H/W, S/W, infrastructure, networks and human aspects needed to perform safety functions, where failure would cause a significant increase in the safety risk for the people or environment • Securing data, objects, networks, infrastructure, systems & people in IoT will have a prominent role in the research and standardization activities over the next several years • CHARIOT also recognises that security threats are broad, and have the potential to compromise IoT systems or alter their intended operation
  • 9. Event name CHARIOT Objectives 9 Objective 1: Specify a Methodological Framework for the Design and Operation of Secure and Safe IoT Applications addressing System Safety as a cross cutting concern. Objective 2: Develop an Open Cognitive IoT Architecture and Platform (CHARIOT Platform), intelligent safety behaviour in the diverse and complex ways in which the safety critical system and the IoT system will interact in a secure manner Objective 3: Develop a runtime IoT Privacy, Security and Safety Supervision Engine (IPSE) • Privacy Engine based on PKI and Blockchain technologies • Firmware Security integrity checking • IoT Safety Supervision Engine (ISSE) • Analytics Prediction and Dashboard Objective 4: Test and validate Industrial IoT safety in three Living Labs (LLs) addressing different industrial areas in IoT safety • Trenitalia (Italy) • IBM Ireland Campus (Ireland) • Athens International Airport (Greece) Objective 5: Scale up through wide dissemination, exploitation, capacity building activities
  • 10. WP2 Objectives “Develop an Open Cognitive IoT Architecture and Platform, called the CHARIOT Platform, that exhibits intelligent safety behavior in the diverse and complex ways in which the safety critical system and the IoT system will interact in a secure manner.”, CHARIOT DoW  T2.1 Design specification for CHARIOT cognitive IoTArchitecture  T2.2 CHARIOT IoT Cognitive Platform  T2.3 Interface to IoT Gateways and components  T2.4 Security & Blockchain
  • 11. Event name Chariot Chariot Web site https://www.chariotproject.eu/ Chariot Forum https://www.chariotproject.eu/forum/ Chariot Newsletter https://www.chariotproject.eu/newsletter Related Projects https://www.chariotproject.eu/RelatedProjects
  • 12. Event name Contact Details email name company 12 Thank you for listening! Any questions? Event name

Editor's Notes

  1. 12