SlideShare ist ein Scribd-Unternehmen logo
1 von 36
Downloaden Sie, um offline zu lesen
Fostering the creation of a responsible &
human-centric Internet of Things
Towards a Trustmark for IoT
This work is created as part of a
Mozilla’s IoT Fellowship
First things first:
Who’s behind this?
Peter Bihr
The Waving Cat: Managing Director
Research, strategy, foresight for commercial, governmental
& non-profit organizations.
ThingsCon: Co-founder, Chairman
A global community of IoT practitioners with the mission to
foster the creation of a responsible & human-centric IoT.
Mozilla: Fellow
As a Mozilla IoT Fellow, I’ll be developing a trustmark for IoT.
The prototype will focus on voice-enabled IoT.
Contact
Email: peter@thewavingcat.com
Twitter: @peterbihr
Web: thingscon.com
Web: thewavingcat.com
Web: peterbihr.com
A Trustmark for IoT
I co-founded the ThingsCon network to explore how
to create IoT products responsibly.
This, and the research that led to our research report
for Mozilla (“A Trustmark for IoT”), led me to pursue
this project—within the ThingsCon network and with
support from Mozilla through a Mozilla IoT Fellowship.
Please note: This project is supported by but
independent from Mozilla—I do not speak for Mozilla.
Read the report at
thingscon.com/iot-trustmark
For a human-centric & responsible
Internet of Things
A global community & event platform by and for IoT practitioners
thingscon.com
Our theory of change:
Change is made through better
day-to-day decisions
IoT - an overview & why we need a trustmark
TL;DR: The Internet of Things increasingly touches all
aspects of our lives, but mostly it consists of black
boxes. We need to make sure that we can trust them.
Note: The next few slides will elaborate on this. If you’re
familiar with IoT, feel free to skip to the next section.
Source: The Waving Cat
The term Internet of Things (IoT) covers a wide
field of applications
The term Internet of Things (IoT) covers a wide
field of applications
Images: Stephen die Donato, Andrew Welch
Connected
Home
Smart

City
Two areas which manifest underlying issues of IoT
Challenges our traditional
notions of privacy*
* In the West, in the last 150 years or so
In public space, there is no
opt-out (of data collection,
urban analytics, etc.)
IoT lacks transparency
The Internet of Things with its dizzying array of connected products
and services is hard to navigate.
Consumers have little insight into what any one connected
product does, what it even might be capable of, or if the company
employs good, responsible data practices.
This is not an oversight on the consumers' side: We lack the tools
to find out.
Quelle: The Waving Cat
A simple litmus test: 4 questions
that we should be able to answer
for every connected device.
But for connected products, these
are very hard questions to answer.
Photo: Peter Bi hr
We need to model
less for efficiency
and more for
resilience.
One part of that is
increasing
transparency of
connected
systems.
A Trustmark for IoT
Concept draft. Feedback welcome!
Methodological notes
This trustmark concept is based on three main pillars:
The values we believe in and promote within ThingsCon, namely the creation
of a responsible IoT, respect for users and their privacy and other rights,
inclusivity and diversity, and openness.
The research we published with the 2017 report “A Trustmark for IoT” of
existing approaches to consumer protection labels, trustmarks, and certifications.
Conversations within the ThingsCon community of IoT practitioners, as well as
throughout the industry in my other role as managing director of a research &
strategy firm.
Goals
The trustmark we’re proposing is aspirational and aims to raise
the bar at the top of the pyramid: This is modeled not just to
filter out crap but to raise the overall bar of the conversation, and
to show that IoT can be done respectfully & responsibly.
Let me be clear: This is a work driven by values, not
pragmatism—because I believe this needs to exist in order to get
to a better IoT, and a better society.
We believe that good ethics are good for business. This is
also the angle we’ll take when pitching the trustmark to potential
industry partners.
Read my first thoughts on the
trustmark on medium.com
thingscon.com/iot-trustmark
Early feedback & successes
Our 2017 trustmark research has received great
feedback and reach.
Among other things it was quoted extensively in Brazil’s
National IoT Plan.
Now we want to put our research into action.
Why?
To recap, we need a trustmark for IoT…
• to empower consumers to make informed decisions.
• to allow for responsible organizations to clearly communicate
their commitment to a higher standard.
What
We’re proposing a trustmark for IoT that increases transparency and
empowers consumers to make better decisions. This trustmark…
• evaluates 5 key dimensions
• is pledge-based
• builds on verification through publicly available documentation
• (mostly) decentralized
The prototype phase will focus on voice-enabled IoT (smart speakers, etc.)
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
Dimensions
The trustmark evaluates compliance with 5 dimensions that we
identified in our initial research* as most crucial for consumers:
• Privacy & Data Practices
• Transparency
• Security
• Openness
• Sustainability
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
*See A Trustmark for IoT (2017), p. 56
Pledge-based
The trustmark is based on voluntary commitment: it’s pledge-based.
Why?
• As a rule of thumb, (more costly) certification based on third-party audits tend to
provide higher credibility. But we believe that our approach of transparency
through documentation offers both carrot (USP) and stick (public shaming).
• Certification requires a level of centralization we aim to avoid. (Exception: We
might need a governing body of sorts at a later stage.)
• Lightweight and easy to adopt beats hard verification for our purposes. The
notable exception is security, where we rely heavily on external certification as
indicators (the trustmark as an indicator of indicators).
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
Verification through documentation
The trustmark should convey at a glance the level of trustworthiness and allow to get more
detailed information to back this up. The approach of "self-assessed but verifiable" opens up
trustmark-carrying products to public scrutiny in a similar way that open source software can be
peer reviewed.
Compliance with the trustmark is proven by providing publicly available documentation to answer (in
a structured way) the questions that determine a product's compliance. A company is required to make
this information available and easily accessible/findable on their website (/iot-trustmark or
comparable, details TBD).
Why?
• While we cannot enforce that all information provided this way is accurate, the stick (scrutiny and risk
of public shaming/campaigning) outweighs the advantages of faking compliance.
• In the meantime it's significantly easier, cheaper, and quicker to provide this kind of documentation
over an external audit.
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
Decentralized
The documentation and pledge based approach also means the
trustmark is largely decentralized: Application to and of this trustmark
is done by each company independently from a centralized
authority. (We are looking into options to make this legally binding
through a licensing model.)
Applying the trustmark will always be free of charge.
Eventually we’ll need a governance system. For the purposes of
prototyping, I’ll be making final decisions based on input from
research, workshops, and the ThingsCon network in particular.
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
The foundations of an ecosystem
The knowledge encoded in this trustmark—through documentation,
etc.—serves as the foundation of what we hope to be a larger
ecosystem.
The trustmark documentation shall be provided in a standardized form
to allow for third parties to offer services on top of this foundation,
like editorials, ratings & reviews.
Note: This is our goal; year 1 serves to learn and prototype, and to
develop the concept to a stage of maturity that gets this launch-ready.
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
How
We plan the trustmark to evaluate a
product’s compliance through a
scorecard or checklist of questions to
be answered and documents to be
provided.
Each of them feeds into one of the five
dimensions: 5 dimensions x 5
compliance points for a possible total
of 25 points.
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
Inputs, processes, outputs
The trustmark will evaluate a mix of
• Inputs: What goes into making a product? 

In the textile world, Bluesign is a trustmark that demonstrates that an
apparel manufacturer uses sustainable, eco-friendly materials
• Processes: How is a product made?

Fairtrade with their strong focus on sustainable farming practices and
good labor conditions
• Outputs: What is the product like when it’s finished?

CE certification confirms that the final product fulfills certain EU quality
and safety requirements
How: Example questions
We’re drafting the checklist of questions to answer, and documents to provide to pass the
trustmark. We expect a mix of types of input:
• Third-party certifications and standards can serve as an indicator of quality. For
example, if a company open-sources their hardware according to OSHWA’s guidelines,
this might count into the openness score. If a product is GDPR compatible (and hence
guarantees data portability as well as privacy by design) this might count into the privacy
score. We expect third-party certifications to be especially relevant for the security score.
• First-party indicators, i.e. questions answered directly by the company. For example,
“Do you follow Security by Design best practices? Please elaborate.” or “Do you have a
business model in place that carries you beyond investments? Please elaborate.”
Some of this will be fuzzy. We’ll be prototyping how to allow for that.
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
Scoring
The passing requirements are to
fulfill two conditions:
• No complete FAIL (0 points) in any
dimension
• At least 20/25 points total
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
Example
This examples FAILS the test:
• It does not score 20/25 points.
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
Example
This examples FAILS the test:
• A complete failure (0 points) in one
dimension (Security).
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
Example
This examples PASSES the test:
• It scores 20/25 points total.
• No dimension fails (0 points)
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
Example
This examples PASSES the test:
• It scores >20/25 points total.
• No dimension fails (0 points)
Note: It’s still up for debate if the requirement is
• “≥20/25” or
• “minimum 4/5 per dimension”
Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
Open questions & next steps
• What aspects need to be evaluated through the checklist/
questionnaire (template for documentation)?
• Is there a way to make a pledge legally binding, and if so: What
does it take to make it so?
• Should using the trustmark be tied to “hard stick” conditions,
ie. fines, and if so how could they be enforced?
• Gather feedback, run prototyping sessions, and fine-tune the
concept.
Mood board
What could the trustmark look like, and how can it communicate
levels of trustworthiness effectively? Some examples from other
projects we liked in our research:
FCC Broadband Labels
Creative Commons licensing
Bihr/Thorne: Privacy Icons
Beyond IO: Washing instructions for IoT
Adryan: Data Labels
Pathways to partnerships & participation
This is a project in an early stage. We’re looking in a number of areas.
Particularly we’re looking for…
• academic partners to accompany the development of this trustmark
• bold commercial partners to help us prototype our requirements list
against their existing or upcoming products
• non-profit and media partners who can help us understand what
they need in order to build third-party offerings on top of a trustmark
Please get in touch if you’d like to get involved.
Thank you.
The Waving Cat GmbH
Twitter @thewavingcat
Web thewavingcat.com
Peter Bihr
Twitter @peterbihr
Email peter@thewavingcat.com
Contact ThingsCon
Twitter @thingscon
Web thingscon.com

Weitere ähnliche Inhalte

Was ist angesagt?

Understanding Emerging Technology - Blockchain
Understanding Emerging Technology - BlockchainUnderstanding Emerging Technology - Blockchain
Understanding Emerging Technology - BlockchainCompTIA
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too lateJohn Mancini
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleLogicalis
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of ThingsW. David Stephenson
 
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Livingstone Advisory
 
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignThe Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignDr. Ann Cavoukian
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLPYun Lu
 
GDPR Scotland 2018
GDPR Scotland 2018GDPR Scotland 2018
GDPR Scotland 2018Ray Bugg
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your InformationAIIM International
 
AIOTI GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015
 AIOTI  GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015 AIOTI  GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015
AIOTI GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015Patrick GUILLEMIN
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchainMicheleNati
 
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...Mighty Guides, Inc.
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White PapaerKristyn Greenwood
 
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...Doug Newdick
 
Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Livingstone Advisory
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Livingstone Advisory
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 

Was ist angesagt? (20)

Understanding Emerging Technology - Blockchain
Understanding Emerging Technology - BlockchainUnderstanding Emerging Technology - Blockchain
Understanding Emerging Technology - Blockchain
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late
 
No byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettleNo byod policy? Time to grasp the nettle
No byod policy? Time to grasp the nettle
 
4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things4 principles to get full benefit of the Internet of Things
4 principles to get full benefit of the Internet of Things
 
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
Cloud Security Keynote: Cloud-Mobile Convergence: IT's Next Horizon, CISO's N...
 
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by DesignThe Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
The Myth of Zero-Risk Solutions; The Benefits of Privacy by Design
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
GDPR Scotland 2018
GDPR Scotland 2018GDPR Scotland 2018
GDPR Scotland 2018
 
Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)Protecting Intellectual Property and Data Loss Prevention (DLP)
Protecting Intellectual Property and Data Loss Prevention (DLP)
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
 
AIOTI GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015
 AIOTI  GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015 AIOTI  GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015
AIOTI GA WG03 (IoT Standardisation) Chairman Presentation - 3 Nov 2015
 
Trust in the age of blockchain
Trust in the age of blockchainTrust in the age of blockchain
Trust in the age of blockchain
 
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
 
Privacy by Design: White Papaer
Privacy by Design: White PapaerPrivacy by Design: White Papaer
Privacy by Design: White Papaer
 
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
The Long White Cloud: Addressing Privacy, Residency and Security in the Cloud...
 
Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...Future Tech: How should enterprise avoid the 'success trap' of the next big t...
Future Tech: How should enterprise avoid the 'success trap' of the next big t...
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
Navigating through the Cloud - 7 feb 2012 at Institute for Information Manage...
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 

Ähnlich wie Towards a Trustmark for IoT (April 2018)

Trustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchTrustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchPeter Bihr
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)Peter Bihr
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Peter Bihr
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)Peter Bihr
 
The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology MarkPeter Bihr
 
Trustable Technology Mark (3 August 2018)
Trustable Technology Mark (3 August 2018)Trustable Technology Mark (3 August 2018)
Trustable Technology Mark (3 August 2018)Peter Bihr
 
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)Peter Bihr
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart citiesPeter Bihr
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoPeter Bihr
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metricsAbhishek Sood
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
Invessed Webinar: Investor Portals are not Rocket Science
Invessed Webinar: Investor Portals are not Rocket ScienceInvessed Webinar: Investor Portals are not Rocket Science
Invessed Webinar: Investor Portals are not Rocket ScienceTheo Paraskevopoulos
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekomChristina Azzam
 
The Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use casesThe Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use casesDeloitte United States
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...Franco Ferrario
 
Securing Business Operations and Critical Infrastructure: Trusted Technology,...
Securing Business Operations and Critical Infrastructure: Trusted Technology,...Securing Business Operations and Critical Infrastructure: Trusted Technology,...
Securing Business Operations and Critical Infrastructure: Trusted Technology,...Dana Gardner
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Downaccenture
 

Ähnlich wie Towards a Trustmark for IoT (April 2018) (20)

Trustable Technology Mark: Public Launch
Trustable Technology Mark: Public LaunchTrustable Technology Mark: Public Launch
Trustable Technology Mark: Public Launch
 
ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)ThingsCon: Trustable Tech mark (26 Sept 2018)
ThingsCon: Trustable Tech mark (26 Sept 2018)
 
Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)Trustable Tech mark (10 August 2018)
Trustable Tech mark (10 August 2018)
 
ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)ThingsCon: Trustable Tech Mark (10 Oct 2018)
ThingsCon: Trustable Tech Mark (10 Oct 2018)
 
The Trustable Technology Mark
The Trustable Technology MarkThe Trustable Technology Mark
The Trustable Technology Mark
 
Trustable Technology Mark (3 August 2018)
Trustable Technology Mark (3 August 2018)Trustable Technology Mark (3 August 2018)
Trustable Technology Mark (3 August 2018)
 
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
ThingsCon: Trustable Tech Mark (27 Oct 2018, Mozfest Edition)
 
2018 12 version 1.6 trustmark for smart cities
2018 12   version 1.6 trustmark for smart cities2018 12   version 1.6 trustmark for smart cities
2018 12 version 1.6 trustmark for smart cities
 
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina TorinoTrustable Tech Mark / Magic Monday at Casa Jasmina Torino
Trustable Tech Mark / Magic Monday at Casa Jasmina Torino
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things AM Briefing: Security for the internet of things
AM Briefing: Security for the internet of things
 
Invessed Webinar: Investor Portals are not Rocket Science
Invessed Webinar: Investor Portals are not Rocket ScienceInvessed Webinar: Investor Portals are not Rocket Science
Invessed Webinar: Investor Portals are not Rocket Science
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
The Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use casesThe Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use cases
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...
The Dbriefs Technology Executive series presents: The Postdigital Enterprise:...
 
Securing Business Operations and Critical Infrastructure: Trusted Technology,...
Securing Business Operations and Critical Infrastructure: Trusted Technology,...Securing Business Operations and Critical Infrastructure: Trusted Technology,...
Securing Business Operations and Critical Infrastructure: Trusted Technology,...
 
Executive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top DownExecutive Perspective Building an OT Security Program from the Top Down
Executive Perspective Building an OT Security Program from the Top Down
 

Mehr von Peter Bihr

ThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksPeter Bihr
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?Peter Bihr
 
Underexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsUnderexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsPeter Bihr
 
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Peter Bihr
 
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderNetzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderPeter Bihr
 
Fit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingFit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingPeter Bihr
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon IntroPeter Bihr
 
ThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsPeter Bihr
 
IoT Communities & different modes of production
IoT Communities & different modes of productionIoT Communities & different modes of production
IoT Communities & different modes of productionPeter Bihr
 
Making the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsMaking the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsPeter Bihr
 
Atoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationAtoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationPeter Bihr
 
Torino IoT Meetup
Torino IoT MeetupTorino IoT Meetup
Torino IoT MeetupPeter Bihr
 
IXDS Pre-Work Talk
IXDS Pre-Work TalkIXDS Pre-Work Talk
IXDS Pre-Work TalkPeter Bihr
 
ThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsPeter Bihr
 
Digitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITDigitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITPeter Bihr
 
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropeTokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropePeter Bihr
 
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoIoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoPeter Bihr
 
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...Peter Bihr
 

Mehr von Peter Bihr (19)

ThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarksThingsCon 2019: Closing remarks
ThingsCon 2019: Closing remarks
 
What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?What type of (smart) city do we want to live in?
What type of (smart) city do we want to live in?
 
Underexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky ThingsUnderexposed: The Internet of Sneaky Things
Underexposed: The Internet of Sneaky Things
 
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
Internet of Things: Bestandsaufnahme & Spannungsfelder (Uni Dresden, 18. Okt ...
 
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & SpannungsfelderNetzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
Netzpolitik13: Das Internet der Dinge: Rechte, Regulierung & Spannungsfelder
 
Fit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - ForecastingFit für die nächsten 20 Jahre - Forecasting
Fit für die nächsten 20 Jahre - Forecasting
 
ThingsCon Intro
ThingsCon IntroThingsCon Intro
ThingsCon Intro
 
ThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of ThingsThingsCon Amsterdam: A responsible Internet of Things
ThingsCon Amsterdam: A responsible Internet of Things
 
IoT Communities & different modes of production
IoT Communities & different modes of productionIoT Communities & different modes of production
IoT Communities & different modes of production
 
Making the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of ThingsMaking the case for a values-driven exploration of the Internet of Things
Making the case for a values-driven exploration of the Internet of Things
 
Atoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open InnovationAtoms & Bits & Commons: Open Innovation
Atoms & Bits & Commons: Open Innovation
 
Torino IoT Meetup
Torino IoT MeetupTorino IoT Meetup
Torino IoT Meetup
 
IXDS Pre-Work Talk
IXDS Pre-Work TalkIXDS Pre-Work Talk
IXDS Pre-Work Talk
 
ClueCamp
ClueCamp ClueCamp
ClueCamp
 
ThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of ThingsThingsCon Amsterdam: The State of Things
ThingsCon Amsterdam: The State of Things
 
Digitale Megatrends @CPS-IT
Digitale Megatrends @CPS-ITDigitale Megatrends @CPS-IT
Digitale Megatrends @CPS-IT
 
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for EuropeTokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
Tokyo Samurai Startup Island: Berlin as a hardware startup hub for Europe
 
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies TokyoIoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
IoT in Berlin: Berlin Innovation Meetup @ Recruit Technologies Tokyo
 
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
O'Reilly Solid: What Can IoT Entrepreneurs and the Mittelstand Learn from Eac...
 

Kürzlich hochgeladen

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Towards a Trustmark for IoT (April 2018)

  • 1. Fostering the creation of a responsible & human-centric Internet of Things Towards a Trustmark for IoT This work is created as part of a Mozilla’s IoT Fellowship
  • 3. Peter Bihr The Waving Cat: Managing Director Research, strategy, foresight for commercial, governmental & non-profit organizations. ThingsCon: Co-founder, Chairman A global community of IoT practitioners with the mission to foster the creation of a responsible & human-centric IoT. Mozilla: Fellow As a Mozilla IoT Fellow, I’ll be developing a trustmark for IoT. The prototype will focus on voice-enabled IoT. Contact Email: peter@thewavingcat.com Twitter: @peterbihr Web: thingscon.com Web: thewavingcat.com Web: peterbihr.com
  • 4. A Trustmark for IoT I co-founded the ThingsCon network to explore how to create IoT products responsibly. This, and the research that led to our research report for Mozilla (“A Trustmark for IoT”), led me to pursue this project—within the ThingsCon network and with support from Mozilla through a Mozilla IoT Fellowship. Please note: This project is supported by but independent from Mozilla—I do not speak for Mozilla. Read the report at thingscon.com/iot-trustmark
  • 5. For a human-centric & responsible Internet of Things A global community & event platform by and for IoT practitioners thingscon.com
  • 6. Our theory of change: Change is made through better day-to-day decisions
  • 7. IoT - an overview & why we need a trustmark TL;DR: The Internet of Things increasingly touches all aspects of our lives, but mostly it consists of black boxes. We need to make sure that we can trust them. Note: The next few slides will elaborate on this. If you’re familiar with IoT, feel free to skip to the next section.
  • 8. Source: The Waving Cat The term Internet of Things (IoT) covers a wide field of applications
  • 9. The term Internet of Things (IoT) covers a wide field of applications
  • 10. Images: Stephen die Donato, Andrew Welch Connected Home Smart
 City Two areas which manifest underlying issues of IoT Challenges our traditional notions of privacy* * In the West, in the last 150 years or so In public space, there is no opt-out (of data collection, urban analytics, etc.)
  • 11. IoT lacks transparency The Internet of Things with its dizzying array of connected products and services is hard to navigate. Consumers have little insight into what any one connected product does, what it even might be capable of, or if the company employs good, responsible data practices. This is not an oversight on the consumers' side: We lack the tools to find out.
  • 12. Quelle: The Waving Cat A simple litmus test: 4 questions that we should be able to answer for every connected device. But for connected products, these are very hard questions to answer.
  • 13. Photo: Peter Bi hr We need to model less for efficiency and more for resilience. One part of that is increasing transparency of connected systems.
  • 14. A Trustmark for IoT Concept draft. Feedback welcome!
  • 15. Methodological notes This trustmark concept is based on three main pillars: The values we believe in and promote within ThingsCon, namely the creation of a responsible IoT, respect for users and their privacy and other rights, inclusivity and diversity, and openness. The research we published with the 2017 report “A Trustmark for IoT” of existing approaches to consumer protection labels, trustmarks, and certifications. Conversations within the ThingsCon community of IoT practitioners, as well as throughout the industry in my other role as managing director of a research & strategy firm.
  • 16. Goals The trustmark we’re proposing is aspirational and aims to raise the bar at the top of the pyramid: This is modeled not just to filter out crap but to raise the overall bar of the conversation, and to show that IoT can be done respectfully & responsibly. Let me be clear: This is a work driven by values, not pragmatism—because I believe this needs to exist in order to get to a better IoT, and a better society. We believe that good ethics are good for business. This is also the angle we’ll take when pitching the trustmark to potential industry partners. Read my first thoughts on the trustmark on medium.com
  • 17. thingscon.com/iot-trustmark Early feedback & successes Our 2017 trustmark research has received great feedback and reach. Among other things it was quoted extensively in Brazil’s National IoT Plan. Now we want to put our research into action.
  • 18. Why? To recap, we need a trustmark for IoT… • to empower consumers to make informed decisions. • to allow for responsible organizations to clearly communicate their commitment to a higher standard.
  • 19. What We’re proposing a trustmark for IoT that increases transparency and empowers consumers to make better decisions. This trustmark… • evaluates 5 key dimensions • is pledge-based • builds on verification through publicly available documentation • (mostly) decentralized The prototype phase will focus on voice-enabled IoT (smart speakers, etc.) Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
  • 20. Dimensions The trustmark evaluates compliance with 5 dimensions that we identified in our initial research* as most crucial for consumers: • Privacy & Data Practices • Transparency • Security • Openness • Sustainability Icon: Lock by Ralf Schmitzer from the Noun Project (CC) *See A Trustmark for IoT (2017), p. 56
  • 21. Pledge-based The trustmark is based on voluntary commitment: it’s pledge-based. Why? • As a rule of thumb, (more costly) certification based on third-party audits tend to provide higher credibility. But we believe that our approach of transparency through documentation offers both carrot (USP) and stick (public shaming). • Certification requires a level of centralization we aim to avoid. (Exception: We might need a governing body of sorts at a later stage.) • Lightweight and easy to adopt beats hard verification for our purposes. The notable exception is security, where we rely heavily on external certification as indicators (the trustmark as an indicator of indicators). Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
  • 22. Verification through documentation The trustmark should convey at a glance the level of trustworthiness and allow to get more detailed information to back this up. The approach of "self-assessed but verifiable" opens up trustmark-carrying products to public scrutiny in a similar way that open source software can be peer reviewed. Compliance with the trustmark is proven by providing publicly available documentation to answer (in a structured way) the questions that determine a product's compliance. A company is required to make this information available and easily accessible/findable on their website (/iot-trustmark or comparable, details TBD). Why? • While we cannot enforce that all information provided this way is accurate, the stick (scrutiny and risk of public shaming/campaigning) outweighs the advantages of faking compliance. • In the meantime it's significantly easier, cheaper, and quicker to provide this kind of documentation over an external audit. Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
  • 23. Decentralized The documentation and pledge based approach also means the trustmark is largely decentralized: Application to and of this trustmark is done by each company independently from a centralized authority. (We are looking into options to make this legally binding through a licensing model.) Applying the trustmark will always be free of charge. Eventually we’ll need a governance system. For the purposes of prototyping, I’ll be making final decisions based on input from research, workshops, and the ThingsCon network in particular. Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
  • 24. The foundations of an ecosystem The knowledge encoded in this trustmark—through documentation, etc.—serves as the foundation of what we hope to be a larger ecosystem. The trustmark documentation shall be provided in a standardized form to allow for third parties to offer services on top of this foundation, like editorials, ratings & reviews. Note: This is our goal; year 1 serves to learn and prototype, and to develop the concept to a stage of maturity that gets this launch-ready. Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
  • 25. How We plan the trustmark to evaluate a product’s compliance through a scorecard or checklist of questions to be answered and documents to be provided. Each of them feeds into one of the five dimensions: 5 dimensions x 5 compliance points for a possible total of 25 points. Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
  • 26. Inputs, processes, outputs The trustmark will evaluate a mix of • Inputs: What goes into making a product? 
 In the textile world, Bluesign is a trustmark that demonstrates that an apparel manufacturer uses sustainable, eco-friendly materials • Processes: How is a product made?
 Fairtrade with their strong focus on sustainable farming practices and good labor conditions • Outputs: What is the product like when it’s finished?
 CE certification confirms that the final product fulfills certain EU quality and safety requirements
  • 27. How: Example questions We’re drafting the checklist of questions to answer, and documents to provide to pass the trustmark. We expect a mix of types of input: • Third-party certifications and standards can serve as an indicator of quality. For example, if a company open-sources their hardware according to OSHWA’s guidelines, this might count into the openness score. If a product is GDPR compatible (and hence guarantees data portability as well as privacy by design) this might count into the privacy score. We expect third-party certifications to be especially relevant for the security score. • First-party indicators, i.e. questions answered directly by the company. For example, “Do you follow Security by Design best practices? Please elaborate.” or “Do you have a business model in place that carries you beyond investments? Please elaborate.” Some of this will be fuzzy. We’ll be prototyping how to allow for that. Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
  • 28. Scoring The passing requirements are to fulfill two conditions: • No complete FAIL (0 points) in any dimension • At least 20/25 points total Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
  • 29. Example This examples FAILS the test: • It does not score 20/25 points. Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
  • 30. Example This examples FAILS the test: • A complete failure (0 points) in one dimension (Security). Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
  • 31. Example This examples PASSES the test: • It scores 20/25 points total. • No dimension fails (0 points) Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
  • 32. Example This examples PASSES the test: • It scores >20/25 points total. • No dimension fails (0 points) Note: It’s still up for debate if the requirement is • “≥20/25” or • “minimum 4/5 per dimension” Icon: Lock by Ralf Schmitzer from the Noun Project (CC)
  • 33. Open questions & next steps • What aspects need to be evaluated through the checklist/ questionnaire (template for documentation)? • Is there a way to make a pledge legally binding, and if so: What does it take to make it so? • Should using the trustmark be tied to “hard stick” conditions, ie. fines, and if so how could they be enforced? • Gather feedback, run prototyping sessions, and fine-tune the concept.
  • 34. Mood board What could the trustmark look like, and how can it communicate levels of trustworthiness effectively? Some examples from other projects we liked in our research: FCC Broadband Labels Creative Commons licensing Bihr/Thorne: Privacy Icons Beyond IO: Washing instructions for IoT Adryan: Data Labels
  • 35. Pathways to partnerships & participation This is a project in an early stage. We’re looking in a number of areas. Particularly we’re looking for… • academic partners to accompany the development of this trustmark • bold commercial partners to help us prototype our requirements list against their existing or upcoming products • non-profit and media partners who can help us understand what they need in order to build third-party offerings on top of a trustmark Please get in touch if you’d like to get involved.
  • 36. Thank you. The Waving Cat GmbH Twitter @thewavingcat Web thewavingcat.com Peter Bihr Twitter @peterbihr Email peter@thewavingcat.com Contact ThingsCon Twitter @thingscon Web thingscon.com