SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
Carlos Chalico
LI, CISA, CISSP, CISM, CGEIT,
CRISC, PbDLA, ISO27001LA
Instructor
University of Toronto
School of Continuing Studies
+1(647)406-7785
carlos.chalico@utoronto.ca
@CarlosChalicoT
#IoT
Understanding IoT
Internet of Things
Understanding IoT
Thing
Identification Communication
Sensitivity Control
Native
Enabled
IoT Expected Market Growth
7.1
1.8
700
531
Trillion - USA
Trillion - China
Billion - Germany
Billion - UK
Estimated
Value for
the Internet Of
Things in 2030
Fuente: The Growth Game-Changer; Accenture
IoT GDP Impact (Current Conditions)
IoT GDP Impact (with additional measures)
7.1
1.8
700
531
Trillion - USA
Trillion - China
Billion - Germany
Billion - UK
Estimated
Value for
the Internet Of
Things in 2030
Fuente: Winning with the Industrial Internet of Things; Accenture
• NAC = National Absorptive Capacity
- Reliable banking and finance
- Education
- Good governance
- Healthy network of suppliers
- Levels of research and development
- Presence of High-Tech companies
- Degree of Technology Skills
- Level of social and end-user acceptance
- Willingness to embrace organizational
change
- Ability to respond to the impacts on
human capital
Most conductive
environments
Weaker enabling
environments
Middle Performing Cohort
IoT Expected Market Growth
100%
Is there any threat for the IoT?
Fuente: Defending the Digital Frontier: A Security Agenda; Jose Granado, Sajay Rai, Mark Doll
Investment
High
Low
1990s 2000sTime
Information Security
Inform
ation
Technology
Security
Breach
Is there any threat for the IoT?
Is there any threat for the IoT?
Is there any threat for the IoT?
X
X
X
X
X
X
X
NYSE - Navigating the Digital Age
VI. Cybersecurity beyond your network
32. The Internet of Things
• IoT Benefits
• IoT Privacy Issues
• IoT Security Issues
• Addressing the Issues
• Not future, here, today
• Consider risks and challenges
• One step ahead
• Security protocols standardization
• Notifying security breaches
• Solve issues related to breaches
• Develop legal agreements with IoT
vendors
The OWASP Model - The IoT Top 10 Project
• I1 Insecure Web Interface
• I2 Insufficient Authentication/
Authorization
• I3 Insecure Network Services
• I4 Lack of Transport Encryption
• I5 Privacy Concerns
• I6 Insecure Cloud Interface
• I7 Insecure Mobile Interface
• I8 Insufficient Security Configurability
• I9 Insecure Software/Firmware
• I10 Poor Physical Security Ethics
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project
Protect from the very very beginning
Good Readings
Carlos Chalico
LI, CISA, CISSP, CISM, CGEIT,
CRISC, PbDLA, ISO27001LA
Instructor
University of Toronto
School of Continuing Studies
+1(647)406-7785
carlos.chalico@utoronto.ca
@CarlosChalicoT
#IoT

Weitere ähnliche Inhalte

Was ist angesagt?

[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Carlos Valderrama
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Andris Soroka
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
Bryan Len
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
Ulf Mattsson
 

Was ist angesagt? (20)

[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuani...
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationWeb Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
 
Steganography - Muheeb Ghallab
Steganography - Muheeb GhallabSteganography - Muheeb Ghallab
Steganography - Muheeb Ghallab
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskSecurity transformation: Helping you manage digital risk
Security transformation: Helping you manage digital risk
 
ISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press releaseISACA Canberra 30th annivesary press release
ISACA Canberra 30th annivesary press release
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Cyphra - Cyber Security
Cyphra - Cyber SecurityCyphra - Cyber Security
Cyphra - Cyber Security
 
What I learned from RSAC 2019
What I learned from RSAC 2019What I learned from RSAC 2019
What I learned from RSAC 2019
 
ICO Presentation - Data Protection
ICO Presentation - Data ProtectionICO Presentation - Data Protection
ICO Presentation - Data Protection
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
 

Andere mochten auch

Factsheet-CORPORATE-ScreenA4
Factsheet-CORPORATE-ScreenA4Factsheet-CORPORATE-ScreenA4
Factsheet-CORPORATE-ScreenA4
Karin Vedders
 
QSNTS Annual Report 2012-13
QSNTS Annual Report 2012-13QSNTS Annual Report 2012-13
QSNTS Annual Report 2012-13
Angus Smith
 
Clara Johnson-Resume 1967
Clara Johnson-Resume 1967Clara Johnson-Resume 1967
Clara Johnson-Resume 1967
Clara Johnson
 

Andere mochten auch (11)

Keyla manejo florestal 2ºb
Keyla manejo florestal 2ºbKeyla manejo florestal 2ºb
Keyla manejo florestal 2ºb
 
Factsheet-CORPORATE-ScreenA4
Factsheet-CORPORATE-ScreenA4Factsheet-CORPORATE-ScreenA4
Factsheet-CORPORATE-ScreenA4
 
Daily Cal Portfolio
Daily Cal PortfolioDaily Cal Portfolio
Daily Cal Portfolio
 
Battle of Minds - Redeem vouchers
Battle of Minds - Redeem vouchersBattle of Minds - Redeem vouchers
Battle of Minds - Redeem vouchers
 
¿que es un sistema operativo? - What is the operating system?
¿que es un sistema operativo? -  What is the operating system?¿que es un sistema operativo? -  What is the operating system?
¿que es un sistema operativo? - What is the operating system?
 
QSNTS Annual Report 2012-13
QSNTS Annual Report 2012-13QSNTS Annual Report 2012-13
QSNTS Annual Report 2012-13
 
Taller ofimatica vocabulario
Taller ofimatica vocabularioTaller ofimatica vocabulario
Taller ofimatica vocabulario
 
Clara Johnson-Resume 1967
Clara Johnson-Resume 1967Clara Johnson-Resume 1967
Clara Johnson-Resume 1967
 
Manejo florestal
Manejo florestal Manejo florestal
Manejo florestal
 
La position zéro et les astuces pour avoir une plus grande visibilité dans le...
La position zéro et les astuces pour avoir une plus grande visibilité dans le...La position zéro et les astuces pour avoir une plus grande visibilité dans le...
La position zéro et les astuces pour avoir une plus grande visibilité dans le...
 
How to write a report
How to write a reportHow to write a report
How to write a report
 

Ähnlich wie Kijiji 160616

Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
Tonex
 
33977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_1433977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_14
Alex Blanter
 
Advanced iot application training course
Advanced iot application training course Advanced iot application training course
Advanced iot application training course
Bryan Len
 

Ähnlich wie Kijiji 160616 (20)

Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
Blockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis GuardaBlockchain in IoT and Other Considerations by Dinis Guarda
Blockchain in IoT and Other Considerations by Dinis Guarda
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or Everything
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
 
Overview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson TuttleOverview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
 
Internet of everything presentation
Internet of everything presentationInternet of everything presentation
Internet of everything presentation
 
Industrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.pptIndustrial IOT slides for everyone.ppt
Industrial IOT slides for everyone.ppt
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
33977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_1433977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_14
 
What Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdfWhat Can We Expect From Upcoming Developments In IoT.pdf
What Can We Expect From Upcoming Developments In IoT.pdf
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
ITA Internet of Things Summit 2014
ITA Internet of Things Summit 2014ITA Internet of Things Summit 2014
ITA Internet of Things Summit 2014
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
Ethical issues in internet of things
Ethical issues in internet of thingsEthical issues in internet of things
Ethical issues in internet of things
 
Advanced iot application training course
Advanced iot application training course Advanced iot application training course
Advanced iot application training course
 
IoT Investment Overview
IoT Investment OverviewIoT Investment Overview
IoT Investment Overview
 

Mehr von Carlos Chalico

133 Chalico Privacidad
133 Chalico Privacidad133 Chalico Privacidad
133 Chalico Privacidad
Carlos Chalico
 
121 Chalico Internet de las Cosas
121 Chalico Internet de las Cosas121 Chalico Internet de las Cosas
121 Chalico Internet de las Cosas
Carlos Chalico
 

Mehr von Carlos Chalico (18)

Isaca monterrey dic 2019
Isaca monterrey dic 2019Isaca monterrey dic 2019
Isaca monterrey dic 2019
 
ISACA Monterrey - Confianza Digital Diciembre 2018
ISACA Monterrey - Confianza Digital Diciembre 2018ISACA Monterrey - Confianza Digital Diciembre 2018
ISACA Monterrey - Confianza Digital Diciembre 2018
 
ISACA Privacidad LATAM
ISACA Privacidad LATAMISACA Privacidad LATAM
ISACA Privacidad LATAM
 
ISACA DevOps LATAM
ISACA DevOps LATAMISACA DevOps LATAM
ISACA DevOps LATAM
 
133 Chalico Privacidad
133 Chalico Privacidad133 Chalico Privacidad
133 Chalico Privacidad
 
121 Chalico Internet de las Cosas
121 Chalico Internet de las Cosas121 Chalico Internet de las Cosas
121 Chalico Internet de las Cosas
 
Asobancaria definiendo la estrategia de privacidad
Asobancaria definiendo la estrategia de privacidadAsobancaria definiendo la estrategia de privacidad
Asobancaria definiendo la estrategia de privacidad
 
Día Internacional de Protección de Datos Personales IFAI 2015
Día Internacional de Protección de Datos Personales IFAI 2015Día Internacional de Protección de Datos Personales IFAI 2015
Día Internacional de Protección de Datos Personales IFAI 2015
 
Latin CACS 2009 224
Latin CACS 2009 224Latin CACS 2009 224
Latin CACS 2009 224
 
Latin CACS 2009 Carlos Chalico
Latin CACS 2009 Carlos ChalicoLatin CACS 2009 Carlos Chalico
Latin CACS 2009 Carlos Chalico
 
Latin CACS 2007 CC CZ
Latin CACS 2007 CC CZLatin CACS 2007 CC CZ
Latin CACS 2007 CC CZ
 
Latin cacs 2004 CC CZ
Latin cacs 2004 CC CZLatin cacs 2004 CC CZ
Latin cacs 2004 CC CZ
 
Día Internacional de la Protección de Datos Personales 2015
Día Internacional de la Protección de Datos Personales 2015Día Internacional de la Protección de Datos Personales 2015
Día Internacional de la Protección de Datos Personales 2015
 
IT Governance
IT GovernanceIT Governance
IT Governance
 
InfoDF Auditoría de Sistemas
InfoDF Auditoría de SistemasInfoDF Auditoría de Sistemas
InfoDF Auditoría de Sistemas
 
Data Lifecycle Risks Considerations and Controls
Data Lifecycle Risks Considerations and ControlsData Lifecycle Risks Considerations and Controls
Data Lifecycle Risks Considerations and Controls
 
InfoDF Protección de Datos Personales en Redes Sociales
InfoDF Protección de Datos Personales en Redes SocialesInfoDF Protección de Datos Personales en Redes Sociales
InfoDF Protección de Datos Personales en Redes Sociales
 
Giss 2009 Final
Giss 2009 FinalGiss 2009 Final
Giss 2009 Final
 

Kürzlich hochgeladen

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 

Kijiji 160616

  • 1. Carlos Chalico LI, CISA, CISSP, CISM, CGEIT, CRISC, PbDLA, ISO27001LA Instructor University of Toronto School of Continuing Studies +1(647)406-7785 carlos.chalico@utoronto.ca @CarlosChalicoT #IoT
  • 4. IoT Expected Market Growth 7.1 1.8 700 531 Trillion - USA Trillion - China Billion - Germany Billion - UK Estimated Value for the Internet Of Things in 2030 Fuente: The Growth Game-Changer; Accenture IoT GDP Impact (Current Conditions) IoT GDP Impact (with additional measures)
  • 5. 7.1 1.8 700 531 Trillion - USA Trillion - China Billion - Germany Billion - UK Estimated Value for the Internet Of Things in 2030 Fuente: Winning with the Industrial Internet of Things; Accenture • NAC = National Absorptive Capacity - Reliable banking and finance - Education - Good governance - Healthy network of suppliers - Levels of research and development - Presence of High-Tech companies - Degree of Technology Skills - Level of social and end-user acceptance - Willingness to embrace organizational change - Ability to respond to the impacts on human capital Most conductive environments Weaker enabling environments Middle Performing Cohort IoT Expected Market Growth 100%
  • 6. Is there any threat for the IoT? Fuente: Defending the Digital Frontier: A Security Agenda; Jose Granado, Sajay Rai, Mark Doll Investment High Low 1990s 2000sTime Information Security Inform ation Technology Security Breach
  • 7. Is there any threat for the IoT?
  • 8. Is there any threat for the IoT?
  • 9. Is there any threat for the IoT? X X X X X X X
  • 10. NYSE - Navigating the Digital Age VI. Cybersecurity beyond your network 32. The Internet of Things • IoT Benefits • IoT Privacy Issues • IoT Security Issues • Addressing the Issues • Not future, here, today • Consider risks and challenges • One step ahead • Security protocols standardization • Notifying security breaches • Solve issues related to breaches • Develop legal agreements with IoT vendors
  • 11. The OWASP Model - The IoT Top 10 Project • I1 Insecure Web Interface • I2 Insufficient Authentication/ Authorization • I3 Insecure Network Services • I4 Lack of Transport Encryption • I5 Privacy Concerns • I6 Insecure Cloud Interface • I7 Insecure Mobile Interface • I8 Insufficient Security Configurability • I9 Insecure Software/Firmware • I10 Poor Physical Security Ethics https://www.owasp.org/index.php/OWASP_Internet_of_Things_Top_Ten_Project
  • 12. Protect from the very very beginning
  • 14. Carlos Chalico LI, CISA, CISSP, CISM, CGEIT, CRISC, PbDLA, ISO27001LA Instructor University of Toronto School of Continuing Studies +1(647)406-7785 carlos.chalico@utoronto.ca @CarlosChalicoT #IoT