Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

Size: px
Start display at page:

Download "Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec"

Transcription

1 Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

2 3.58 KM KPH 493 Calories 114 BPM WEARABLE TECH EVOLUTION AND SECURITY GRANT BROWN SECURITY V1.1 2

3 WEARABLE IS PART OF A RAPIDLY EXPANDING TECHNOLOGY LANDSCAPE DATA GROWTH INTERNET OF THINGS BIG DATA CONSUMERIZATION CLOUD MOBILE SOFTWARE DEFINED OPEN SOURCE CONVERGED

4 ONE COMPUTER -- TO MANY DEVICES 4

5 CONSTANT CONNECTION 5

6 INFORMATION HERE TO INFORMATION EVERYWHERE 6

7 INTERNET OF EVERYTHING 7

8 Wearable Technology WEARABLE TECHNOLOGY Presentation Identifier Goes Here 8

9 WEARABLE TECH IS RESULT OF KEY TECH THEMES INTERACTING Smartphone as core to access systems Cognizant Computing Mobile wallet Internet based communications Expanding Smartphone and Tablet Usage Critical infrastructure and manufacturing Smart Homes / Cities Cars with mobile functionality Internet of Things Fitness and lifestyle Fashion and Style Connectivity Privacy concerns Smaller devices Wearable Technology Open Data rather than just big Data Increase in Data Volumes Connecting of information to social Big Data and Open / Social Information Non-Tech Savvy Users Left behind by the innovation Confusion for users Will wearable make this easier or harder? Wider Accessibility

10 NEW THREATS ARISE AS NEW TECHNOLOGY REACHES CRITICAL MASS M2M Internet of Things Wearable Technology PCs Servers Internet ecommerce Viruses Worms Mobility Cloud Identity Theft DDoS Mobile Malware Social Media Terrorism? Privacy Manipulation of Data

11 PRIVACY AND SECURITY Protection across the ecosystem Across networks, devices and content Cloud Brokers Implementation of Protection Hacking Internet of Things Compromise physical security from digital Ransomware Hacktivism Cybercrime affecting the physical world People centric authentication Biometrics Location Context Behaviour Authentication Multiple online personae Separation of work and personal Expansion of privacy services Provenance on Social Media and Websites Anonymity and Provenance Expansion of regulation Harmonisation and cooperation across borders. Manage security exposure from sharing information online? Privacy and Data Protection

12 A DATA EXPLOSION! 12 A large and growing market with big security problems Surveillance Data Breach Stalking ID Theft Privacy Safety 60% US Adults Self-Track (Pew Research) 170M Self-Tracking Devices to Ship in 2017 (ABI Research)

13 ANATOMY OF A SELF-TRACKING DEVICE 13 Battery Splash-proof cover Motor Generates vibrations for discrete feedback Motion sensor Multi-axis motion detector Bluetooth chip For wireless syncing with computer/phone Power button Status LEDs Syncing jack For wired syncing with phone/tablet & charging TRACKING YOUR EVERY MOVE

14 ANOTHER TRACKING DEVICE 14 Magnetometer Proximity & ambient light sensors Yaw Roll Magnetic field Cameras front & back Pitch GPS sensor Gyroscopic sensor Microphone Accelerometer A SENSOR FOR EVERYTHING

15 WHERE THE BITS FIT IN 15 More moving parts = more risks RISK RISK RISK KM 123 BPM RISK RISK

16 PERSONAL DATA S NEW FRIEND 16 Traditional personally identifiable information (PII) NAME SLEEP DOB ADDRESS RISK GPS COORDS GLUCOSE MOOD ID # WEIGHT meets quantified self Information

17 SELF-TRACKING IS RISKY FOR USERS 17 Your digital footprint will be everywhere! KM 123 BPM % Do not have a privacy policy 20% Login credentials in clear text (Apps that require login) 14 Domains contacted by apps

18 MEET BLUEBERRY PI! 18 TOTAL PRICE $75 4GB SD Card $5 Raspberry pi $35 Bluetooth 4.0 USB dongle $7 Battery pack $28 OUR BLUETOOTH TRACKER

19 TRIGGERS OUTCOMES AND SOCIETAL IMPACT MATRIX Business motivations that will either drive or inhibit adoption and use of new technology Personal motivation that will either drive or inhibit an individual s adoption and use of new technology Government motivations that will either drive or inhibit government use of technology and possible regulation and laws Current and emerging trends in data collection, analytics systems and information storage and management Systems and ways that users interact with each other and machines. Also includes machine to machine (M2M) interfaces E.g.; mobile apps, Facebook, Twitter, Smart Systems etc. Ecosystems that involve locking information, devices, interfaces into a system in order to get benefit from that system. For example, cloud service providers, Facebook, Apple, Google Devices and technology. Ranging from consumer devices to industrial technology.

20 TRIGGERS OUTCOMES AND SOCIETAL IMPACT MATRIX Drivers Business Cost Efficiency Profit New Markets Ethics Competitive Customer Advantage Information Personal Personal Health Privacy Convenience Personal Capabilities Comfort Quality of Life Fashion Religion Govt Cost Efficiency Privacy Legal Aging Population Regulation Public Health &Safety Cultural Norms Trust and Services Interactions Activity tracking Location awareness Biometric Data Context Data Predictive Analytics for health Information Interfaces Social M2M Media RFID Nano-Bio Gesture Visual Brainwave Physical Wearable Apps Non- Bio Technical Printers Users Current Triggers Future Triggers Inhibitors Infrastructure Human Body Cloud Cognizant Computing Connected Healthcare Home Mobile Environment Platforms Ecosystems Devices Augmented Human Sensors Implants Manufactured Activity Organs Trackers Google Power Glass Mobile

21 RISKS AND OPPORTUNITIES FROM AUGMENTED HUMAN Strengths Health and lifestyle information Augmented reality to assist with access to information online Easier access to Smartphones and the Internet Opportunities Health Monitoring Personal Security and Safety Public Safety and Security Cognizant Computing Inputs and Information to Assist with treatment and diagnosis Weaknesses Standards and connectivity Power and communications requirements Increase in information that can be attacked as more information becomes digitized. Leaving the non-digital behind? Threats Ability for a third party to take over wearable device ransom, bullying, terrorism Privacy Data stolen by 3 rd party Glassholes Black-market and fraudulent sales in augmentation technologies 21

22 FOR THIS NEW WORLD TO FUNCTION, THERE NEEDS TO BE TRUST 22

23 INFORMATION TECHNOLOGY IS MATURING IF WE RE EMBEDDING TECHNOLOGY WE NEED TO EMBED SECURITY Last 20 years improvements in security and performance Next 5 years improvements in security and performance

24 As Devices become Smarter, Data more Personalized, Connectivity increasingly Pervasive, New Methods of Protection will be Required Virtual Personal Security Vendors such as Symantec working beyond our traditional markets Assets Physical 24

25 INFORMATION PEOPLE

26 CONTEXT AND RELEVANCE Context - Which Device am I on? Context - Where am I? Was I there 5 minutes ago? Identity - Who am I? Policy Do I have rights to this information? Trust and Security Context = + +

27 UNIVERSAL IDENTITY IDENTITY AND TRUST MODEL INTELLIGENT AUTHENTICATION OF USERS, DEVICES BIOMETRICS, LOCATION, CONTEXT, BEHAVIOR A FUTURE WITH NO PASSWORDS 27

28 SYMANTEC S ROLE IN EVOLVING INTERNET The information protection authority Data Systems Identities Interactions Security Storage Availability Innovator Advisor Influencer Leader 28

29

QUANTIFIED SELF A Path to Self-Enlightenment or Just a Security Nightmare?

QUANTIFIED SELF A Path to Self-Enlightenment or Just a Security Nightmare? 42 Calories 96 BPM Location: AMS QUANTIFIED SELF A Path to Self-Enlightenment or Just a Security Nightmare? Candid Wüest THREAT RESEARCHER Thanks To: Mario Ballano & Hon Lau WHAT IS QUANTIFIED SELF? Recording

More information

MEPTEC. Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015 tonym@semico.

MEPTEC. Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015 tonym@semico. MEPTEC Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015 tonym@semico.com Outline Impact of Sensors Basic Building Blocks for IoT Sensors

More information

Facing Up to the Threats of Cyber A6acks in a 5G World

Facing Up to the Threats of Cyber A6acks in a 5G World Facing Up to the Threats of Cyber A6acks in a 5G World Zoltan Precsenyi CIPP/E, CIPM Senior Manager Government Affairs EMEA Agenda 1 What threats? 2 What security? 3 What EU policies? 2 Reminder: The 5G

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

Connected Intelligence and the 21 st Century Digital Enterprise

Connected Intelligence and the 21 st Century Digital Enterprise Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015 By 2025 we will become a deeply connected, digital world Digital everything everywhere,

More information

How To Understand The Power Of The Internet Of Things

How To Understand The Power Of The Internet Of Things Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,

More information

The SMB Cyber Security Survival Guide

The SMB Cyber Security Survival Guide The SMB Cyber Security Survival Guide Stephen Cobb, CISSP Security Evangelist The challenge A data security breach can put a business out of business or create serious unbudgeted costs To survive in today

More information

IoT: New Opportunities for Semiconductor Industry Growth. Andrew C. Russell Vice President Marketing Greater China

IoT: New Opportunities for Semiconductor Industry Growth. Andrew C. Russell Vice President Marketing Greater China IoT: New Opportunities for Semiconductor Industry Growth Andrew C. Russell Vice President Marketing Greater China Agenda The Internet of Things ( IoT ): An Exciting, Disruptive Technology and Application

More information

Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things

Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things aisa.org.a u aisa.org.a u Rebecca Herold, CEO The Privacy Professor 1 rebeccaherold@rebeccaherold.com Agenda Technology

More information

CORE Education s Ten Trends matrix 2013

CORE Education s Ten Trends matrix 2013 CORE Education s Ten Trends matrix 2013 Trend (in correct order) Explanation Drivers Impact (e.g.) Implications 1. Personalisation There is a growing awareness that one- size- fits- all approaches to school

More information

Here s what they are predicting we should watch out for in 2012... 2012: Resolve To Be Digitally Secure 2012 Threats: Are You Ready?

Here s what they are predicting we should watch out for in 2012... 2012: Resolve To Be Digitally Secure 2012 Threats: Are You Ready? 2012: Resolve To Be Digitally Secure 2012 Threats: Are You Ready? by Robert Siciliano History is said to be a good indicator of what might come in the future. If you follow trends in how things are done

More information

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors Microsoft Confidential for internal use only Wall Street Journal, JP Morgan, Lockheed, Bushehr nuclear

More information

Mobility. Mobility is a major force. It s changing human culture and business on a global scale. And it s nowhere near achieving its full potential.

Mobility. Mobility is a major force. It s changing human culture and business on a global scale. And it s nowhere near achieving its full potential. Mobility arrow.com Mobility This year, the number of mobile devices is expected to exceed the world s population. Soon, smartphones will surpass PCs as the device of choice for Internet access. A startling

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA

More information

Mobile Payments: The Market for Travelers, Unbanked, and No/Low Credit Users

Mobile Payments: The Market for Travelers, Unbanked, and No/Low Credit Users Table of Contents: This report package includes the following reports: Market Opportunity: Social + LTE + Commerce Wi-Fi Direct: Market View of Product Categories, Products, and Vendors Strategic Alliances

More information

Top 10 Tech Predictions for 2016. Bob O Donnell, President and Chief Analyst

Top 10 Tech Predictions for 2016. Bob O Donnell, President and Chief Analyst Top 10 Tech Predictions for 2016 Bob O Donnell, President and Chief Analyst Agenda Revisiting 2015 Predictions Top 10 Predictions for 2016 Prediction 1: The Death of Software Platforms, The Rise of the

More information

Five Trends to Track in E-Commerce Fraud

Five Trends to Track in E-Commerce Fraud Five Trends to Track in E-Commerce Fraud Fraud is nothing new if you re in the e-commerce business you probably have a baseline level of fraud losses due to stolen credit cards, return fraud and other

More information

Is your business secure in a hosted world?

Is your business secure in a hosted world? Is your business secure in a hosted world? Threats to the security of business data are constantly growing and evolving - What can you do ensure your data remains secure? Introduction The safe use of computer

More information

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus cdoulig at unipi dot gr Department of Informatics University of Piraeus Safety & Security in Cyber Space: Building up Trust in the EU Athens, 6-7 March 2014 Cybersecurity: where do we stand? Major Trends

More information

How to Secure Your Environment

How to Secure Your Environment End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

The Evolving Internet of Things Market

The Evolving Internet of Things Market The Evolving Internet of Things Market Key Trends and Implications By Kevin Foley, Todd Bricker and Syed Raza The phrase Internet of Things (IoT) is firmly established in today s business lexicon but no

More information

Executive Summary P 1. ActivIdentity

Executive Summary P 1. ActivIdentity WHITE PAPER WP Converging Access of IT and Building Resources P 1 Executive Summary To get business done, users must have quick, simple access to the resources they need, when they need them, whether they

More information

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China Agenda The Internet of Things ( IoT ): a New and Exciting Application Space A typical IoT application Lighting for Home

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management. 1 FUTURE FOCUS What s Coming in Enterprise Mobility Management Whitepaper 2 Future Focus: What s Coming in Enterprise Mobility Management (EMM) There s far more power in modern smartphones and tablets

More information

Today s mobile ecosystem means shared responsibility

Today s mobile ecosystem means shared responsibility It seems just about everybody has a mobile phone now, including more than three-quarters of U.S. teens and a rapidly growing number of younger kids. For young people as well as adults, the technology has

More information

Key Trends in Enterprise Mobility. Shaun Collins CEO @shauncollins shaun.collins@ccsinsight.com

Key Trends in Enterprise Mobility. Shaun Collins CEO @shauncollins shaun.collins@ccsinsight.com Key Trends in Enterprise Mobility Shaun Collins CEO @shauncollins shaun.collins@ccsinsight.com Evolving from a PC/Notebook World to Smartphone/Tablet/Hybrid World 2 2 Mobility Is Now Much More Than Just

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security Senaca Shield Presents 10 Top Tip For Small Business Cyber Security Presented by Liam O Connor www.senacashield.com info@senacashield.com #Senacashield Small businesses need cyber security too. This slide

More information

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

Healthcare Delivery. Transforming. through Mobility Solutions. A Solution White Paper - version 1.0

Healthcare Delivery. Transforming. through Mobility Solutions. A Solution White Paper - version 1.0 Transforming Healthcare Delivery through Mobility Solutions A Solution White Paper - version 1.0 HTC Global Services HTC Towers, No. 41, GST Road, Guindy, Chennai - 600 032, India. Ph: +91 44 4345 3500

More information

WHITE PAPER Security in M2M Communication What is secure enough?

WHITE PAPER Security in M2M Communication What is secure enough? WHITE PAPER Security in M2M Communication What is secure enough? Motivation Wireless Machine-To-Machine (M2M) communication has grown dramatically over the past decade and is still growing rapidly. In

More information

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives Cyber Risk as a Component of Business Risk: Communicating with the C-Suite Jigar Kadakia DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily

More information

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity

More information

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE 2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE WHO ARE WE? 12 years of local Tech, Training and Website services Service the 4 areas of life Regularly

More information

RUNNING HEAD: BRING YOUR OWN DEVICE 1

RUNNING HEAD: BRING YOUR OWN DEVICE 1 RUNNING HEAD: BRING YOUR OWN DEVICE 1 Bring Your Own Device: The Advantages and Disadvantages of BYOD Network Policies Benjamin Fuller BRING YOUR OWN DEVICE 2 Introduction The world of mobile devices continues

More information

Best Practices for Integrating Mobile into the Access Control Architecture

Best Practices for Integrating Mobile into the Access Control Architecture Best Practices for Integrating Mobile into the Access Control Architecture Merging Security and Convenience with Mobile Mobile Access Using a mobile device to gain access to different buildings is not

More information

WHITEPAPER. Combating Cybercrime A Collective Global Response

WHITEPAPER. Combating Cybercrime A Collective Global Response Combating Cybercrime A Collective Global Response Executive Summary 3 Cybercrime Onslaught Enemy at the Gates 4 Evil Nexus of Data Breaches and Fraud 4 Web Fraud Attack Channels and Vectors 5 Tools and

More information

Big Data or Data Tsunami - The Challenge of accessing meaningful clinical information. Can we learn from other industries?

Big Data or Data Tsunami - The Challenge of accessing meaningful clinical information. Can we learn from other industries? Big Data or Data Tsunami - The Challenge of accessing meaningful clinical information. Can we learn from other industries? Nick Scholes ehealth Solutions Specialist - EMEA Hitachi Commitment to Healthcare

More information

Splunk Company Overview

Splunk Company Overview Copyright 2015 Splunk Inc. Splunk Company Overview Name Title Safe Harbor Statement During the course of this presentation, we may make forward looking statements regarding future events or the expected

More information

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Westcon Presentation on Security Innovation, Opportunity, and Compromise Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M

More information

IoT basics: Getting started with the Internet of Things

IoT basics: Getting started with the Internet of Things March 2015 IoT basics: Getting started with the Internet of Things Author Knud Lasse Lueth Executive summary The whitepaper is aimed at people who are new to the Internet of Things and seek to get a basic

More information

KEY LEGAL ISSUES IN TODAY S MOBILE MARKETING:

KEY LEGAL ISSUES IN TODAY S MOBILE MARKETING: KEY LEGAL ISSUES IN TODAY S MOBILE MARKETING: Emerging Trends in Mobile Technology, Location-Based Services, and Mobile Commerce Mark Bisard, American Express Nate Hole, Loeb & Loeb LLP Brian Nixon, Loeb

More information

Frequently asked questions

Frequently asked questions Frequently asked questions FAQ: MicroStrategy 9s/9.5 General What is MicroStrategy 9s? MicroStrategy 9s combines the world s most sophisticated analytics platform with Usher, a revolutionary security platform.

More information

Software Token Security & Provisioning: Innovation Galore!

Software Token Security & Provisioning: Innovation Galore! Software Token Security & Provisioning: Innovation Galore! Kenn Min Chong, Principal Product Manager SecurID, RSA Emily Ryan, Security Solution Architect, Intel Michael Lyman, Product Marketing Manager,

More information

Securing Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely

Securing Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely Securing Your Enterprise in the Cloud IT executives must be ready to move to the cloud safely The technology pendulum is always swinging. And chief information security officers must be prepared to swing

More information

"Secure insight, anytime, anywhere."

Secure insight, anytime, anywhere. "Secure insight, anytime, anywhere." THE MOBILE PARADIGM Mobile technology is revolutionizing the way information is accessed, distributed and consumed. This 5th way of computing will dwarf all others

More information

Click to edit Master title style

Click to edit Master title style About Alexandra Instituttet A/S Non-profit application oriented research institution focus on IT GTS Godkendt Teknologisk Service Institut 100+ employees generating R&D Researchers Providers Users Commercial

More information

Enabling Smart Data on M2M Gateways and Aggregators

Enabling Smart Data on M2M Gateways and Aggregators Enabling Smart Data on M2M Gateways and Aggregators How OSGi and Java enables smart data on M2M aggregators and gateways. 3/27/2013 Hitachi Communication Technologies America, Inc. Walt Bowers Chief Architect

More information

MES and Industrial Internet

MES and Industrial Internet October 7, 2014 MES and Industrial Internet Jan Snoeij Board Member, MESA International Principal Consultant, CGI Do you know MESA? Agenda Introduction Internet of Things Big Data Smart Factory or Smart

More information

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number

More information

ICT Development Trends (2014): Embracing the Era of Mobile-ICT

ICT Development Trends (2014): Embracing the Era of Mobile-ICT ICT Development Trends (2014): Embracing the Era of Mobile-ICT ZTE COPORATION In our fast-growing global information society, technology has had a profound effect on every aspect of society and each individual's

More information

Application Development, Distribution and HCI for a Post-PC Era

Application Development, Distribution and HCI for a Post-PC Era Application Development, Distribution and HCI for a Post-PC Era Herbert Poul TaPo-IT OG h.poul@tapo.at http://tapo-it.at Abstract. This paper presents how the upcome and ubiquity of the web as well as

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

NETWORK SECURITY, REIMAGINED FPO

NETWORK SECURITY, REIMAGINED FPO FPO NETWORK SECURITY, REIMAGINED by Derek Korte AS TENS OF BILLIONS OF NEW DEVICES GET CONNECTED, BUSINESS AND SOCIETY MUST RETHINK SECURITY, PRIVACY, AND OPPORTUNITY Illustration JUSTIN GABBARD Smart

More information

Hemant Kulkarni MOBILE BI HYPE OR REAL NEED?

Hemant Kulkarni MOBILE BI HYPE OR REAL NEED? Hemant Kulkarni MOBILE BI HYPE OR REAL NEED? AGENDA WHY PEOPLE STILL FILL ITS HYPE? WHAT GARTNER HYPE CYCLE FOR EMERGING TRENDS SAYS? WHAT IS THE REALITY? MOBILE BI EVOLUTION MOBILE BI IS NOT JUST BI ON

More information

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer Risks and Rewards of the Internet of Things Findings From ISACA s 2013 IT Risk/Reward Barometer The world is increasingly being populated by connected devices that collect and share information over the

More information

Securing the Mobile Enterprise. How mobile devices, BYOD and other trends are driving a need for a new approach to mobile security

Securing the Mobile Enterprise. How mobile devices, BYOD and other trends are driving a need for a new approach to mobile security Securing the Mobile Enterprise How mobile devices, BYOD and other trends are driving a need for a new approach to mobile security Table of Contents Securing and Managing the Mobile Enterprise... 3 Introduction...

More information

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

More information

Connected Homes: Enabling a Digital Lifestyle

Connected Homes: Enabling a Digital Lifestyle Connected Homes: Enabling a Digital Lifestyle www.wipro.com Alan Young Manoj Barara Satish Singla Table of contents Introduction...3 The drivers of connected homes...4 The emerging opportunities...5 Key

More information

Component 4: Introduction to Information and Computer Science. Topic III: Cloud Computing. Distributed computing

Component 4: Introduction to Information and Computer Science. Topic III: Cloud Computing. Distributed computing Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science University, funded by the Department of Health

More information

Is the Future of Public Service Delivery Mobile-Only?

Is the Future of Public Service Delivery Mobile-Only? Is the Future of Public Service Delivery Mobile-Only? 10 th Public Sector IT Conference, Dublin, 31 Oct. 2014 Norbert Sagnard Managing Consultant Sagnard Associates IRELAND 2014 A MOBILE SOCIETY Ireland:

More information

How To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device

How To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device Page 2 of 14 Securing Critical Corporate Data in a Mobile World Page 3 of 14 Table of Contents 1 Mobile is the New Normal... 4 1.1 The Critical Importance of Mobile Security... 4 1.2 Mobile Security Challenges...

More information

INFORMATION SECURITY FOR YOUR AGENCY

INFORMATION SECURITY FOR YOUR AGENCY INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection

More information

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

Top 10 IT Trends that will shape 2014. David Chin Chair BICSI Southeast Asia

Top 10 IT Trends that will shape 2014. David Chin Chair BICSI Southeast Asia Top 10 IT Trends that will shape 2014 David Chin Chair BICSI Southeast Asia Gartner Hype Cycle: Emerging Technologies 2013 Convergence of cloud, social, mobile, devices, analytic-driven automation and

More information

NOK NOK LABS AUTHENTICATION & OTT SERVICES

NOK NOK LABS AUTHENTICATION & OTT SERVICES NOK NOK LABS AUTHENTICATION & OTT SERVICES RAJIV DHOLAKIA VP PRODUCTS & BUSINESS DEVELOPMENT 1 NOK NOK LABS The authentication challenge A DILEMMA UNTIL WE CAN TRULY RECOGNIZE PEOPLE ONLINE, IN REAL TIME...

More information

Project 2020: Preparing Your Organization for Future Cyber Threats Today

Project 2020: Preparing Your Organization for Future Cyber Threats Today Project 2020: Preparing Your Organization for Future Cyber Threats Today SESSION ID: CLE-T08 Ken Low CISSP GSLC Director of Cybersecurity Programs, Asia Pacific TREND MICRO 2 PROJECT 2020 An initiative

More information

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014 Knowing Your Enemy How Your Business is Attacked Andrew Rogoyski June 2014 Why Cyber is the New Security 1986: Lawrence Berkeley NL discovers attempt to copy US Government Information on Arpanet 1988:

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

Trust No One Encrypt Everything!

Trust No One Encrypt Everything! Trust No One Encrypt Everything! Business Primer March 2014 This white paper explores cloud users requirements for data access and sharing, especially in relation to trends in BYOD and personal cloud storage

More information

The Internet of Things: Opportunities & Challenges

The Internet of Things: Opportunities & Challenges The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is

More information

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD STRATEGY ANALYTICS INSIGHT October 2012 Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD By Mark Levitt, Analyst/Director at Strategy Analytics BYOD

More information

CSUF Tech Day 2015. Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu

CSUF Tech Day 2015. Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu CSUF Tech Day 2015 Security Awareness Overview Dale Coddington, Information Security Office dcoddington@fullerton.edu Agenda Introduction Large scale data breaches: 2014 and beyond Email based attacks:

More information

Tronico Technology Company Limited. First step of IOT - DIY smart home

Tronico Technology Company Limited. First step of IOT - DIY smart home Tronico Technology Company Limited First step of IOT - DIY smart home What is IOT? 2 The Internet of Things (IoT) is the network of physical objects devices, vehicles, buildings and other items that enables

More information

Entrust IdentityGuard

Entrust IdentityGuard +1-888-437-9783 sales@identisys.com IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's

More information

Towards the Web of Things

Towards the Web of Things Ubiquitous Web Applications Towards the Web of Things Dave Raggett, W3C & JustSystems Mobile Web 2.0, Seoul, 5 March 2008 Contact: dsr@w3.org 1 Web of Things Barcodes as a way to connect physical objects

More information

PRIVATE NETWORK Take control of your network with Verizon Wireless Private Network and 4G LTE.

PRIVATE NETWORK Take control of your network with Verizon Wireless Private Network and 4G LTE. Verizon Wireless PRIVATE NETWORK Take control of your network with Verizon Wireless Private Network and 4G LTE. THE CONNECTED WORKPLACE SERIES WIRELESS DEVICES CHALLENGE CONTROL. As networks evolve, companies

More information

2012 Bit9 Cyber Security Research Report

2012 Bit9 Cyber Security Research Report 2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by

More information

The Internet of Things (IoT) Opportunities and Risks

The Internet of Things (IoT) Opportunities and Risks Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance

More information

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123 Cybersecurity: A Growing Concern for Small Businesses Copyright Materials This presentation is protected by US and International Copyright

More information

Security and Compliance challenges in Mobile environment

Security and Compliance challenges in Mobile environment Security and Compliance challenges in Mobile environment Emerging Technologies November 19, 2013 Bob Bastani Introductions Bob Bastani, Security & Compliance Program Manager, IBM, 301-803-6078, bbastani@us.ibm.com

More information

Education in Transition. Learning in the 21 st Century. Paige Johnson Education Strategist Intel

Education in Transition. Learning in the 21 st Century. Paige Johnson Education Strategist Intel Education in Transition Education in Transition Learning in the 21 st Century Rick Herrmann and Jeff Galinovsky Intel Americas Education and Intel Education Group Paige Johnson Education Strategist Intel

More information

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American

More information

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell

Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Tom Schauer TrustCC tschauer@trustcc.com 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü

More information

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination

More information

Smart Systems: the key enabling technology for future IoT

Smart Systems: the key enabling technology for future IoT Smart Systems: the key enabling technology for future IoT Roberto Zafalon Technology Programmes, Director R&D and Public Affairs, Italy STMicroelectronics IoT Large Scale Pilots Brokerage Workshop London

More information

Hear from 4,000+ IoT developers in 15 minutes..and who are the early winners in the IoT platform landscape

Hear from 4,000+ IoT developers in 15 minutes..and who are the early winners in the IoT platform landscape Hear from 4,000+ IoT developers in 15 minutes..and who are the early winners in the IoT platform landscape VisionMobile the analysts of the developer economy We help companies understand developers and

More information

Mobile Application Marketplace 2015: Market Analysis and Assessment of Future Evolution and Opportunities

Mobile Application Marketplace 2015: Market Analysis and Assessment of Future Evolution and Opportunities Brochure More information from http://www.researchandmarkets.com/reports/3245389/ Mobile Application Marketplace 2015: Market Analysis and Assessment of Future Evolution and Opportunities Description:

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because

More information

The Convergence of IT Security and Physical Access Control

The Convergence of IT Security and Physical Access Control The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which

More information

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs.

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs. PREP Course #25: Hot Topics in Cyber Security and Database Security Presented by: Joe Baskin Manager, Information Security, OCIO JBaskin@nshs.edu Objectives Discuss hot topics in cyber security and database

More information

CYBERCRIME AND THE HEALTHCARE INDUSTRY

CYBERCRIME AND THE HEALTHCARE INDUSTRY CYBERCRIME AND THE HEALTHCARE INDUSTRY Access to data and information is fast becoming a target of scrutiny and risk. Healthcare professionals are in a tight spot. As administrative technologies like electronic

More information

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE INTRODUCTION The technological revolution has made us dependent on our mobile devices, whether we re at home, in the office, on the go or anywhere

More information

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers IDENTITY & ACCESS Providing Cost-Effective Strong Authentication in the Cloud a brief for cloud service providers Introduction Interest and use of the cloud to store enterprise resources is growing fast.

More information