Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

Size: px
Start display at page:

Download "Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com"

Transcription

1 Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC

2 So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors Network connectivity Ability for objects to collect and exchange data Objects to be sensed and controlled remotely across existing network infrastructure Direct integration between the physical world and computerbased systems Resulting in improved efficiency, accuracy and economic benefit

3 So What is the Internet of Things Each thing is uniquely identifiable through its embedded computing system Able to interoperate within the existing Internet infrastructure It is estimated that only 1% of things are connected to the Internet today and that IoT will consist of almost billion objects by 2020

4 Smart IoT Implementations Cities Smart Parking Noise Urban Maps Traffic Congestion Smart Lighting Structural Health Waste Management Environment Forest Fire Detection Earthquake Early Detection Landslide and Avalanche Air Pollution Retail Product Management Supply Chain Control Intelligent Shopping Applications NFC Payments RFID Room Charges Water River Floods Water Quality Water Leakage Transportation Cars

5 Security Issues of IoT

6 So What are the issues with IoT Vendors are more concerned with getting the things out on the Internet Speed to Market, being first Connectivity is more important than security End Users may not know a device is connected Vendors may not understand threats and risks

7 IoT Threats and Risks Attacks on Devices Control or damage the device Use the device for distributed computing Attack other Systems with the Device Compromise and attack other systems/devices through distributed computing Use the Device for Information Gathering Network sniffing and data collection Vendor Views Who would want to attack a washing machine, toaster oven or wearable

8 Industrial IoT Smart Meters and Grid Controls Interconnected Minimal Human Monitoring mainly M2M SCADA Systems Minimal Security Designed as Closed System

9 Retail IoT Point of Sale Systems, Scanners, Kiosks Mobile Device Payment Applications Radio-frequency identification (RFID) Debit, Credit Cards, Hotel Near Field Communication (NFC) Mobile Payments Coupons Instore Customer Tracking Many systems are outdated & left unpatched

10 Smart Home IoT Security Privacy Authentication Internet Access Consumer Education

11 Internet and the IoT Webcams Businesses, Cities, Vacation Resorts, Highways, etc. Open Webservers for IoT Devices Home Automation Accessible via Routers Unpatched or not Password Protected Smart Home WiFi Leakage WiFi Passwords

12 Today s Security Incidents Card Skimmers Cyber Espionage Point of Sales Intrusions Web Application Attacks Physical Loss or Theft Denial of Service Attacks Crimeware Errors Insider Misuse Everything Else

13 A World of Things Things are - Designed, Created, Implemented and Connected by People Data is Collected and Stored by People People are still our weakest link in Security and Privacy It is easier to integrate Security and Privacy upfront, than fix later

14 IoT Security Network Security Architecture Network, Application and Device Segmentation or Segregation Understand your network and how it functions Vendor Understand the device security capabilities Control vendor access to the network Understand the associated risks Implement Compensating Security Controls Monitoring IDS, SIEM, Network, Switches, Routers Applications

15 IoT Information Security & Privacy Information Security and Privacy is not just about having strong passwords, its about Governance, Risk Management, understanding where your Information resides, Implementing Security Controls, Monitoring and Reporting This means The Internet of Things as well!

16 Questions

What happened to the "things"? Thoughts and Considerations on the Internet of Things.

What happened to the things? Thoughts and Considerations on the Internet of Things. What happened to the "things"? Thoughts and Considerations on the Internet of Things. Steve Halliday, president, High Tech Aid and president, RAIN RFID Alliance 1 Agenda Why are we here? What is the Internet

More information

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center

More information

The Internet of Things Risks and Challenges

The Internet of Things Risks and Challenges The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat

More information

How To Understand The Power Of The Internet Of Things

How To Understand The Power Of The Internet Of Things Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,

More information

Emerging Technologies in Healthcare:

Emerging Technologies in Healthcare: Emerging Technologies in Healthcare: Driving Transformational Change at Kaiser Permanente May 20, 2015 Trevor Hogberg Executive Director Facility Strategic Solutions Kaiser Permanente Information Technology

More information

The Internet of Things (IoT) Opportunities and Risks

The Internet of Things (IoT) Opportunities and Risks Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance

More information

The Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015

The Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 The Internet of Things (IoT) and Industrial Networks Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 Increasingly Everything will be interconnected 50 Billion Smart Objects

More information

Connecting things. Creating possibilities. A point of view

Connecting things. Creating possibilities. A point of view Connecting things. Creating possibilities. A point of view Is the next technological revolution already here? The Internet of Things is already transforming our daily lives, our health, education and businesses.

More information

Securing Smart City Platforms IoT, M2M, Cloud and Big Data

Securing Smart City Platforms IoT, M2M, Cloud and Big Data SESSION ID: SSC-W10 Securing Smart City Platforms IoT, M2M, Cloud and Big Data Ibrahim Al Mallouhi Vice President - Operations Emirates Integrated Telecommunication Company (du) Roshan Daluwakgoda Senior

More information

Securing the Growth of IoT and M2M

Securing the Growth of IoT and M2M Securing the Growth of IoT and M2M Svetlana Grant, Director, Future IoT Networks Connected Living Programme, GSMA 9 September 2015 Connected Living - Mobilising the Internet of Things GSMA VISION 2020

More information

Transformational Smart Cities: cyber security and resilience

Transformational Smart Cities: cyber security and resilience We protect the world s people and information Transformational Smart Cities: cyber security and resilience Towards the century of smart cities Executive Report Overview Giampiero Nanni Public Sector Strategy

More information

IoT basics: Getting started with the Internet of Things

IoT basics: Getting started with the Internet of Things March 2015 IoT basics: Getting started with the Internet of Things Author Knud Lasse Lueth Executive summary The whitepaper is aimed at people who are new to the Internet of Things and seek to get a basic

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

IoT Prospects of Worldwide Development and Current Global Circumstances

IoT Prospects of Worldwide Development and Current Global Circumstances IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in

More information

Bring Your Own Internet of Things BYO-IoT

Bring Your Own Internet of Things BYO-IoT Bring Your Own Internet of Things BYO-IoT Carsten Eiram Chief Research Officer che@riskbasedsecurity.com / @CarstenEiram Jake Kouns Chief Information Security Officer jake@riskbasedsecurity.com / @jkouns

More information

The Internet of Things (IoT)

The Internet of Things (IoT) The Internet of Things (IoT) The New New Thing October 2014 Smart Planet Green Environment Environmental Sensors Water, power leak detection Pollution, weather monitoring Smart Cities Connected Communities

More information

How to build a security assessment program. Dan Boucaut

How to build a security assessment program. Dan Boucaut How to build a security assessment program Dan Boucaut Agenda 1 Problem statement 2 Business case 3 How to avoid creating more problems Problem statement Security assessments are hard, costly and may take

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

Security Issues with Integrated Smart Buildings

Security Issues with Integrated Smart Buildings Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern

More information

How to Secure Your Environment

How to Secure Your Environment End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge

More information

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS Didier Mora System Engineer Cisco Mayo, 2015 Converging Digital Disruptions The Nexus of Forces The 3rd Platform The Industrial Internet IoT = $1.9

More information

Bring Your Own Internet of Things: BYO IoT

Bring Your Own Internet of Things: BYO IoT SESSION ID: CSV F02 Bring Your Own Internet of Things: BYO IoT Carsten Eiram Chief Research Officer Risk Based Security @carsteneiram Jake Kouns CISO Risk Based Security @jkouns Agenda What is IoT? What

More information

Emerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP

Emerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP Emerging SCADA and Security Solutions Presented by; Michael F. Graves, P.E. Chris Murphy, CISSP July 25, 2014 Topics Improved 4G Communications Mobile Devices Cyber Security Threats Cyber Security Guidance

More information

The Amazing Future of the IoE

The Amazing Future of the IoE The Amazing Future of the IoE Shaun Kirby CTO, Cisco Consulting Services November 2014 The Internet of Everything: People, Process, Data, and Things People Connecting people in more relevant, valuable

More information

The convergence of everything digital

The convergence of everything digital pwc.com/cybersecurity August 2014 Highlights Convergence of information (IT), operational (OT), and consumer (CT) technologies will generate sweeping business opportunities, as well as multidimensional

More information

internet of things Patrick Pax Business Development Manager Chris Geary Innovation Manager

internet of things Patrick Pax Business Development Manager Chris Geary Innovation Manager internet of things Patrick Pax Business Development Manager Chris Geary Innovation Manager agenda 1 2 3 4 internet of things moving into main stream uncover new opportunities in your business call for

More information

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015

GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 GOVERNMENT AND THE INTERNET OF THINGS (IOT) FINDINGS AND RECOMMENDATION OF ATARC S INTERNET OF THINGS INNOVATION LAB NOVEMBER, 2015 IoT Innovation Lab Sponsors IoT 101 Defining the Internet s Next Big

More information

Fostering Incident Response and Digital Forensics Research

Fostering Incident Response and Digital Forensics Research Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel bruce.nikkel@ubs.com September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014

More information

Internet of Things markets

Internet of Things markets Connected Objects Internet of Things markets BIG - RussianTechTour - NUMA 29th October 2015 Yves GASSOT, CEO, IDATE Agenda Scope of Internet of Things market Main market figures New segmentation with emerging

More information

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What

More information

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated

More information

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions

More information

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom. M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.fr WHAT IS EURECOM A graduate school & research centre in communication

More information

Cisco to work with JDA to make Jaipur a smart city- Economic Times-21 May

Cisco to work with JDA to make Jaipur a smart city- Economic Times-21 May Smart Cities Cisco to work with JDA to make Jaipur a smart city- Economic Times-21 May "Smart city infrastructure will improve the efficiency and quality of services received by 3.5 million residents and

More information

FORRESTER CONSULTING INTERNET OF THINGS SURVEY - KEY FINDINGS. Building Value from Visibility: 2012 Enterprise Internet of Things Adoption Outlook

FORRESTER CONSULTING INTERNET OF THINGS SURVEY - KEY FINDINGS. Building Value from Visibility: 2012 Enterprise Internet of Things Adoption Outlook FORRESTER CONSULTING INTERNET OF THINGS SURVEY - KEY FINDINGS Building Value from Visibility: 2012 Enterprise Internet of Things Adoption Outlook SURVEY RESPONDENTS WERE PROVIDED WITH FOLLOWING DEFINITION

More information

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com

More information

Dr. György Kálmán gyorgy@mnemonic.no

Dr. György Kálmán gyorgy@mnemonic.no COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán gyorgy@mnemonic.no Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats

More information

Update On Smart Grid Cyber Security

Update On Smart Grid Cyber Security Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

M2M & Internet of Things Opportunities

M2M & Internet of Things Opportunities M2M & Internet of Things Opportunities The Advent of The Internet of Things Mainframe Minicomputer Desktop PC Internet Mobile Internet (1M+ Units) (10M+ Units) (100M+ Units) (1B+ Units/Users) (3B+ Users)

More information

How To Protect Your Network From Attack

How To Protect Your Network From Attack NextGen SCADA security Erwin Kooi Setting the stage This talk is not An introduction to SCADA security AIC versus CIA The latest blinky-lights SCADA security appliance How to use IT security in OT envrionments

More information

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE0000191 Interim Techlogy Performance Report 3 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V1 Company Name: The Boeing Company November 19, 2013 1 Interim Techlogy Performance Report 3

More information

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS

SECURITY & ACCESS CONTROL SYSTEM BASED PROJECTS ************************************************************************ INNOVATIVE & APPLICATION ORIENTED PROJECTS ON SVSEMBEDDED SYSTEMS (8051/AVR/ARM7/MSP430/RENESAS/ARM cortex M3) ************************************************************************

More information

IOT: When Things Crawl Into Your Corporate Network #RSAC

IOT: When Things Crawl Into Your Corporate Network #RSAC SESSION ID: STR-F01 IOT: When Things Crawl Into Your Corporate Network Sam Curry Chief Technology and Security Officer Arbor Networks @samjcurry / scurry@arbor.net Uri Rivner Head of Cyber Strategy BioCatch

More information

Affordable Building Automation System Enabled by the Internet of Things (IoT)

Affordable Building Automation System Enabled by the Internet of Things (IoT) Solution Blueprint Internet of Things (IoT) Affordable Building Automation System Enabled by the Internet of Things (IoT) HCL Technologies* uses an Intel-based intelligent gateway to deliver a powerful,

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

The Internet of Things

The Internet of Things The Internet of Things Powe re d by IPv6 Jeff Apcar Distinguished Services Engineer, Cisco Systems March 14 th 2014, ida IPv6 Conference IoT Definition ** A collection of things Cisco Confidential 2 IoE/IoT/M2M

More information

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005 SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems

More information

Leveraging the Internet of Things in Marketing

Leveraging the Internet of Things in Marketing Leveraging the Internet of Things in Marketing Index 3 3 4 4 5 5 6 6 Introduction The Internet of Things outlook IoT and marketing Wearables: Reaching customers anywhere Location-based marketing RFID tags

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor

Now and Tomorrow. IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor Now and Tomorrow IEEE/AICCSA Conference November 2014 Malike Bouaoud Cyber Security Advisor Hacktivism Regulatory/Compliance (local and international) Sophisticated Malware Data leakage Cybercriminal syndicates

More information

Trusted Network Connect (TNC)

Trusted Network Connect (TNC) Trusted Network Connect (TNC) Open Standards for Integrity-based Network Access Control and Coordinated Network Security April 2011 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006 Tel

More information

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The

More information

Airports and their SCADA Systems. Dr Leigh Armistead, CISSP. Peregrine Technical Solutions

Airports and their SCADA Systems. Dr Leigh Armistead, CISSP. Peregrine Technical Solutions Airports and their SCADA Systems Dr Leigh Armistead, CISSP Peregrine Technical Solutions What We May Face For an attack to be successful it only has to cause disruption not loss of life to a significant

More information

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

KEY STEPS FOLLOWING A DATA BREACH

KEY STEPS FOLLOWING A DATA BREACH KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,

More information

Endpoint & Server Protection. Brent Biernat First Vice President Network Services May 13, 2014

Endpoint & Server Protection. Brent Biernat First Vice President Network Services May 13, 2014 Endpoint & Server Protection Brent Biernat First Vice President Network Services May 13, 2014 The Evolution of Cyber Crime 1878 Bell Telephone Teenage Switchboard Operator Disconnected calls, eavesdropped,

More information

A ZK Research Whitepaper. November 2014. e t. It s INTERNET OF THINGS

A ZK Research Whitepaper. November 2014. e t. It s INTERNET OF THINGS A ZK Research Whitepaper November 2014 It s inesses to em s u b r o bra f e ce tim t he INTERNET OF THINGS The Era of the Internet of Things Has Arrived The term perfect storm is used to describe a scenario

More information

Mobile Trust Net. Powering the mobile revolution MOBILE TRUST NET

Mobile Trust Net. Powering the mobile revolution MOBILE TRUST NET Mobile Trust Net Powering the mobile revolution MOBILE TRUST NET 1 Trust is everything Trust is critical to the current phase of the mobile revolution. Without trust, users won t try services that ask

More information

Development and Outlook of Internet of Things in China. CATR of MIIT June 5, 2012

Development and Outlook of Internet of Things in China. CATR of MIIT June 5, 2012 Development and Outlook of Internet of Things in China CATR of MIIT June 5, 2012 Contents I. Development of Internet of Things in China Main Contents II. Outlook of Internet of Things in China 2 IoT for

More information

An Introduction to the Internet of Things (IoT)

An Introduction to the Internet of Things (IoT) An Introduction to the Internet of Things (IoT) Part 1. of The IoT Series November 2013 Lopez Research LLC 2269 Chestnut Street #202 San Francisco, CA 94123 T (866) 849-5750 E sales@lopezresearch.com W

More information

Wireless Security and the Internet of Things Nick Hunn

Wireless Security and the Internet of Things Nick Hunn Wireless Security and the Internet of Things Nick Hunn WiFore Consulting The Legal Requirement In the EU proposal for the revision of the R&TTE directive, it states that: Article 3 Radio equipment shall

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Business models in the Internet of Things. Miriam Cordero Head of Strategy - BT Group @miricoru

Business models in the Internet of Things. Miriam Cordero Head of Strategy - BT Group @miricoru Business models in the Internet of Things Miriam Cordero Head of Strategy - BT Group @miricoru IoT applications bring a set of benefits Increase efficiency Scarce resources New services End to end supply

More information

Cyber Security for SCADA/ICS Networks

Cyber Security for SCADA/ICS Networks Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And

More information

MES and Industrial Internet

MES and Industrial Internet October 7, 2014 MES and Industrial Internet Jan Snoeij Board Member, MESA International Principal Consultant, CGI Do you know MESA? Agenda Introduction Internet of Things Big Data Smart Factory or Smart

More information

SECURITY CONSIDERATIONS FOR LAW FIRMS

SECURITY CONSIDERATIONS FOR LAW FIRMS SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,

More information

Smart Substation Security

Smart Substation Security Smart Substation Security SmartSec Europe 2014 Amsterdam 29/01/2014 Agenda Context Elia Introduction to the substation environment in Elia Security design and measures in the substation Near and far future

More information

Technology Implications of an Instrumented Planet presented at IFIP WG 10.4 Workshop on Challenges and Directions in Dependability

Technology Implications of an Instrumented Planet presented at IFIP WG 10.4 Workshop on Challenges and Directions in Dependability Technology Implications of an Instrumented Planet presented at IFIP WG 10.4 Workshop on Challenges and Directions in Dependability Nick Bowen Colin Harrison IBM June 2008 1 Background Global Technology

More information

- M2M Connections & Modules: Network connections, sim-cards, module types.

- M2M Connections & Modules: Network connections, sim-cards, module types. Brochure More information from http://www.researchandmarkets.com/reports/2785177/ Internet of Things (IoT) & Machine-To-Machine (M2M) Communication Market by Technologies & Platforms, M2M Connections &

More information

Facing Up to the Threats of Cyber A6acks in a 5G World

Facing Up to the Threats of Cyber A6acks in a 5G World Facing Up to the Threats of Cyber A6acks in a 5G World Zoltan Precsenyi CIPP/E, CIPM Senior Manager Government Affairs EMEA Agenda 1 What threats? 2 What security? 3 What EU policies? 2 Reminder: The 5G

More information

The Internet of Things From a User Perspective: Enhancing user experience in networks with multiple devices

The Internet of Things From a User Perspective: Enhancing user experience in networks with multiple devices The Internet of Things From a User Perspective: Enhancing user experience in networks with multiple devices Helena Holmström Olsson Malmö University Helena Holmström Olsson About me: Professor, Computer

More information

WHITE PAPER Security in M2M Communication What is secure enough?

WHITE PAPER Security in M2M Communication What is secure enough? WHITE PAPER Security in M2M Communication What is secure enough? Motivation Wireless Machine-To-Machine (M2M) communication has grown dramatically over the past decade and is still growing rapidly. In

More information

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013 Cyber Security and Information Assurance Controls Prevention and Reaction 1 About Enterprise Risk Management Capabilities Cyber Security Risk Management Information Assurance Strategic Governance Regulatory

More information

The Industrial Internet of Things. Overcoming Adoption Challenges to Release the Value Within IIoT

The Industrial Internet of Things. Overcoming Adoption Challenges to Release the Value Within IIoT The Industrial Internet of Things Overcoming Adoption Challenges to Release the Value Within IIoT What is the Internet of Things (IoT)? Smart Television Smart Light Control Smart Motion Sensor Smart Environment

More information

The Importance of Cybersecurity Monitoring for Utilities

The Importance of Cybersecurity Monitoring for Utilities The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A. 21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale

More information

13 Ways Through A Firewall

13 Ways Through A Firewall Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright

More information

RIOT CONTROL The Art of Managing Risk for Internet of Things

RIOT CONTROL The Art of Managing Risk for Internet of Things RIOT CONTROL The Art of Managing Risk for Internet of Things Kim Singletary McAfee Session ID: Session Classification: Advanced Intro What is IoT and why is it different? What are the risks? What are the

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

exceet Secure Solutions Smart & Secure Network From Vision to Reality

exceet Secure Solutions Smart & Secure Network From Vision to Reality exceet Secure Solutions Smart & Secure Network From Vision to Reality Agenda 1. About exceet 2. Entering the World of Smart Connected Products 3. exceet s Transformation Developing New Competencies 4.

More information

MOBILE SECURITY: DON T FENCE ME IN

MOBILE SECURITY: DON T FENCE ME IN MOBILE SECURITY: DON T FENCE ME IN Apart from the known and the unknown, what else is there? 18 Harold Pinter, Nobel Prize-winning playwright, screenwriter, director, actor 32 INTRODUCTION AND METHODOLOGY

More information

White Paper. Information Security -- Network Assessment

White Paper. Information Security -- Network Assessment Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer

More information

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Cloud Computing Risks & Reality. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com Cloud Computing Risks & Reality Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com What is Cloud Security The quality or state of being secure to be free from danger & minimize risk To be protected from

More information

Impact of Internet of Things (IoT) on Industry and Supply Chain

Impact of Internet of Things (IoT) on Industry and Supply Chain Impact of Internet of Things (IoT) on Industry and Supply Chain Agenda Safety Message Part One CPS Energy Story Part Two The Digital Wave and the Internet of Things (IoT) CPS Energy Overview Largest municipally

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Protecting Critical Infrastructure

Protecting Critical Infrastructure Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security

More information

Smart Grid Security: A roadmap

Smart Grid Security: A roadmap Smart Grid Security: A roadmap Klaus Kursawe Klaus.Kursawe @ ENCS.EU VDI Fachkonferenz Industrial IT Security, 2014 What is The Smart Grid? The electric grid is an engineering marvel, arguably the single

More information

Challenges. Department of Informatics University of Oslo. Presenter. kashifd@ifi.uio.no. October 25, 2011

Challenges. Department of Informatics University of Oslo. Presenter. kashifd@ifi.uio.no. October 25, 2011 Internet t of Things: Applications and Challenges Presenter Kashif Dar kashifd@ifi.uio.no INF9910: Cyber Physical Systems Department of Informatics University of Oslo October 25, 2011 Overview Internet

More information

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE0000191

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE0000191 Interim Techlogy Performance Report 1 PROJECT BOEING SGS Contract ID: DE-OE0000191 Project Type: Revision: V2 Company Name: The Boeing Company December 10, 2012 1 Interim Techlogy Performance Report 1

More information

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project

EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies

More information

8/27/2015. Brad Schuette IT Manager City of Punta Gorda bschuette@pgorda.us (941) 575-3354. Don t Wait Another Day

8/27/2015. Brad Schuette IT Manager City of Punta Gorda bschuette@pgorda.us (941) 575-3354. Don t Wait Another Day Brad Schuette IT Manager City of Punta Gorda bschuette@pgorda.us (941) 575-3354 2015 FRWA Annual Conference Don t Wait Another Day 1 SCADA Subsystems Management Physical Connectivity Configuration Mgmt.

More information

Connecting the Internet of Things Inside the Home

Connecting the Internet of Things Inside the Home Connecting the Internet of Things Inside the Home Russell Haggar 4th Annual Smart Grids & Cleanpower 2012 Conference 14 June 2012 Cambridge www.cir-strategy.com/events Internet of Things: It s Big u Connecting

More information

M2M. In an IoT World. Whitepaper. www.juniperresearch.com

M2M. In an IoT World. Whitepaper. www.juniperresearch.com M2M In an IoT World Whitepaper www.juniperresearch.com 1 1.1 Introduction In the last couple of years M2M (machine-to-machine) has become part of the arsenal of products on offer by global carriers and

More information

Cyber Security. Securing Your Mobile and Online Banking Transactions

Cyber Security. Securing Your Mobile and Online Banking Transactions Cyber Security Securing Your Mobile and Online Banking Transactions For additional copies or to download this document, please visit: http://msisac.cisecurity.org/resources/guides 2014 Center for Internet

More information