IoT Potential Risks and Challenges
|
|
|
- Eunice Stanley
- 10 years ago
- Views:
Transcription
1 IoT Potential Risks and Challenges GRIFES / GITI / EPFL Alumni Conference, Lausanne, May 7 th, 2015 Stefan Schiller, HP ESP Fortify Solution Architect D/A/CH
2 IoT Potential Risks and Challenges Agenda IDC Directions Summary IoT Some Observations HP Internet of Things Research Study 2014 New Industry Standard OWASP Internet of Things Top 10 Some Players Some Architectures Existing Means, Tools, Services and Processes for Security Testing of IoT devices Challenges 2
3 IDC Direction Summary: Internet of Things (IoT) Definition Common Segmentation It s A Vastly Expanded Set Of Things Connected To The Existing Internet It Is Not One Business Model But In Fact Is Millions Of Models It Extends The Machine To Machine World To Embrace A Human World The IoT Infrastructure Is At The Heart Of The 3rd Platform The IoT Will Create Disruption IDC defines the Internet of Things (IoT) as a network connecting either wired or wireless devices, or 'things', that is characterized by autonomous provisioning, management, and monitoring. The IoT is innately analytical and integrated. 3 Source : Summary of IDC conference held on Mar at Directions 2014
4 IDC Direction Summary: Internet of Things (IoT) IoT as an ecosystem IDC s view of IoT in Source : Summary of IDC conference held on Mar at Directions 2014
5 IDC Direction Summary: Internet of Things (IoT) Revenue Opportunity 2020 IoT Revenue Path 5 Source : Summary of IDC conference held on Mar at Directions 2014
6 IDC Direction Summary: Internet of Things (IoT) The IoT Impact on IT Infrastructure 6 Source : Summary of IDC conference held on Mar at Directions 2014
7 IDC Direction Summary: Internet of Things (IoT) IoT Partner s emerge as important vendors 7 Source : Summary of IDC conference held on Mar at Directions 2014
8 IDC Direction Summary: Internet of Things (IoT) Consumer, 26% WW IoT Spending Infrastructur e [VALUE] Financial Services, 3% Manufacturi ng & Resources, 24% Public Sector, 23% Distribution & Services, 15% Funding Where To Start Security Privacy Key considerations for IoT Success Public Sector Citizens Buy-In Complex Projects Collaboration Across Agencies Industry Disruption Competitive Differentiation Innovation Content Ownership IT Partnership OT Private Sector Developers 8 Source : Summary of IDC conference held on Mar at Directions 2014
9 IoT Potential Risks: Some Observations, Example 1 Take control over Vaillant eco Power 1.0 Combined Heat and Power Units 9
10 IoT Potential Risks: Some Observations, Take Example control of Heating 2 Units of a Beer Brewery in the Black Forest 10
11 IoT Potential Risks: Some Observations, Take Example control of Heating 3 Units of a German State Prison 11
12 HP Internet of Things Research Study 2014 The Study In 2014 HP Security Research took the freedom to review 10 of the most popular devices in some of the most common IoT niches revealing an alarmingly high average number of vulnerabilities (25!) per device. Vulnerabilities ranged from Heartbleed to Denial of Service to weak passwords to cross-site scripting HP analyzed IoT devices from manufacturers of TVs, webcams, home thermostats, remote power outlets, sprinkler controllers, hubs for controlling multiple devices, door locks, home alarms, scales and garage door openers A majority of devices included some form of cloud service All devices included mobile applications which can be used to access or control the devices remotely 12
13 HP Internet of Things Research Study 2014 The Findings On average 25 weaknesses discovered with each device 60% of devices that provide user interfaces were vulnerable to a range of issues such as persistent XSS and weak credentials 80% of devices along with their cloud and mobile application components failed to require passwords of a sufficient complexity and length 90% of devices collected at least one piece of personal information via the device, the cloud, or its mobile application 80% of devices raised privacy concerns 70% did not encrypt communications to the internet and local network 60% did not use encryption when downloading software updates 70% of devices along with their cloud and mobile application enable an attacker to identify valid user accounts through account enumeration 13
14 New Industry Standard OWASP IoT Top 10 As a consequence to the study HP ESP did help to establish a new OWASP standard The OWASP Internet of Things Top is as follows: I1 Insecure Web Interface I2 Insufficient Authentication/Authorization I3 Insecure Network Services I4 Lack of Transport Encryption I5 Privacy Concerns I6 Insecure Cloud Interface I7 Insecure Mobile Interface I8 Insufficient Security Configurability I9 Insecure Software/Firmware I10 Poor Physical Security 14
15 New Industry Standard OWASP IoT Top 10 The OWASP Project Page 15
16 Some Players Nest Labs acquired by Google Smart Things acquired by Samsung Dropcam acquired by Nest Labs Revolv acquired by Nest Labs 16
17 Some Architectures Nest Nest thermostat uses an AM3703 Sitara processor139 from Texas Instruments. The thermostat is based on the ARM Cortex -A8 architecture. The development tools include the Linux EZ Software development kit and the Android Development Kit for Sitara Microprocessors The first-generation Nest OS is based on Linux and uses other free software components. The firmware image is locked so it only accepts signed firmware updates. Nest also provides unlocked firmware so it can accept unsigned firmware images. This allowed a third party to re-implement the basic logic of the thermostat as an open source project called FreeAbode 17
18 Some Architectures Linux/Windows vs. Open-Source Real-Time vs. MBed Linux or Windows embedded OS Open-source real-time operating systems with a small memory footprint (for example RTOS, Micrium uc/os-ii, uc/os-iii, or TI-RTOS-KERNEL) Event-driven MBed OS specifically targeting low-power devices. MBed OS, MBed device server (which acts as an MBed-powered IoT devices cloud aggregator and a portal for Internet applications), and a suite of MBed tools, all Open Source In general: All these components are well known and well understood and means, tools, services and processes are already in place that CAN be used to invest into IT security of devices in the Internet of Things 18
19 Existing Means, Tools, Services and Processes for Security Testing of IoT devices 19
20 HP Fortify on Premise Fortify Software Security Center SCA Static Code Analysis WebInspect (Enterprise) Dynamic Code Analysis Fortify Runtime 20 RTAP Runtime Application Protection RTAL Runtime Application Logging Application View Application Defender WebInspect Agent SSC Collaboration Module SSC Governance Module SSC Cloudscan SCA Scan Step in Cloudscan Server Farm
21 HP Fortify on Demand - Your Tenant in a Public Cloud 21
22 HP Fortify on Demand - Your On-demand Application Security Solution 22
23 HP Fortify on Demand (FoD) Get results fast with security testing software-as-a-service Simple Launch your application security initiative in <1 day No hardware or software investments No security experts to hire, train and retain Fast Scale to test all applications in your organization Typically 1 day turn-around on application security results Support 1000s of applications for the desktop, mobile or cloud Flexible Test any application from anywhere Secure commercial, open source and 3 rd party applications Test applications on-premise or on demand, or both 23
24 Challenges How to convince vendors to apply IT security testing and fix issues found? Infrastructure dealing with heating and/or power generation and/or distribution (Micro CHPs, SCADA, Thermostats, Intelligent Power Meters etc. pp.) can be regarded as critical infrastructures There are regulations on the way on the EU level as well as on some national levels (e.g. Germany) that will require vendors to prove, that they are spending reasonable effort on IT security of critical infrastructure devices This should also hold for IoT devices Raise consumer awareness. Consumers should request from the vendors at least minimum levels of IT security certification before procuring their devices 24 This could be implemented via labels like OWASP IoT Top Ten compliant
25 Challenges How to convince vendors to apply IT security testing and fix issues found? Standardization of IoT device platforms Though there may not be one single platform suited for all the different device types, reducing the number of platforms used per device type would certainly help to ease improving IT security of these platforms while reducing the cost of this effort at the same time 25
26 Questions?
27 Discussion What are your proposals for improving IT security in the IoT? 27
28 Thank you for having me here for sharing some of your time with me for your undivided attention
Security and the Internet of Things (IoT)
Security and the Internet of Things (IoT) Analysis and Recommendations for IoT Manufacturers and IT/Business Executives Wei (Weslay) Xu Tuck School of Business at Dartmouth 03/20/2015 High Level Description
2015. 9. 17 ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics
ARTIK TM The Ultimate Platform Solution for IoT 2015. 9. 17 MyungKoo Kang (VP) Samsung Electronics Future Changes from IoT Privacy in the Web Security in SmartGrill 2 IoT Market Forecast ($T) 7 6 5 4 3
IoT & SCADA Cyber Security Services
IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: [email protected]
HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training
HP ESP Partner Enablement Fortify Proof of Concept Boot Camp Training HP and HP Enterprise Security Products are committed to your success as an HP Partner. In the Fortify Proof of Concept Boot Camp Training,
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions Liwei Ren, Ph.D Trend Micro Background Liwei Ren Research interests Data security & privacy, network security Data compression, math modeling & algorithms
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Securing the Internet of Things: Mapping Attack Surface Areas Using the OWASP IoT Top 10
SESSION ID: ASD-T10 Securing the Internet of Things: Mapping Attack Surface Areas Using the OWASP IoT Top 10 Daniel Miessler Security Research HP Fortify on Demand @danielmiessler HP Fortify on Demand
Security and the Internet of Things
Security and the Internet of Things Joe Sanford 1. Abstract More and more smart devices are being introduced to the market, allowing end-users to have more of the devices they use every day to be connected
The Platform is the Planet
The Platform is the Planet IoT Solutions in a Heterogeneous World Kevin Miller ([email protected]) Principal Program Manager, Azure IoT IoT Solutions Until Now Most earlier successful IoT deployments
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security
HP Fortify Application Security Lucas v. Stockhausen PreSales Manager HP Fortify EMEA [email protected] +49 1520 1898430 Enterprise Security The problem Cyber attackers are targeting applications
What someone said about junk hacking
What someone said about junk hacking Yes, we get it. Cars, boats, buses, and those singing fish plaques are all hackable and have no security. Most conferences these days have a whole track called "Junk
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein INNOVATORS START HERE. EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly growing data
Enterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.
FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates
Connected Intelligence and the 21 st Century Digital Enterprise
Connected Intelligence and the 21 st Century Digital Enterprise Lewis Carr Senior Director, HP Software May 25 th, 2015 By 2025 we will become a deeply connected, digital world Digital everything everywhere,
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Adobe Systems Incorporated
Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...
On Demand Penetration Testing Applications Networks Compliance. www.ivizsecurity.com
On Demand Penetration Testing Applications Networks Compliance www.ivizsecurity.com About iviz Security Information Security company with industry s first on-demand penetration testing solution using unique
Building Cloud-Connected Solutions with Exosite and Texas Instruments
Building Cloud-Connected Solutions with Exosite and Texas Instruments IoT Development Kits Exosite and Texas Instruments (TI) are working together to provide development kits that include an out-of-box
IoT Security & Privacy
Page 1: IoT Security & Privacy Technical White Paper June 2015 Page 2: Table of Contents The IoT ecosystem 3 A gold rush 3 Two major issues need to be overcome: Usability and Security 4 A centralised IoT
IoT Business Solutions
IoT Business Solutions Re-thinking Re-shaping Business Good Reasons for Businesses and Organizations to look into M2M / IoT now Become more efficient Actions based on real data from the field Avoid cost
HP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
From the Bottom to the Top: The Evolution of Application Monitoring
From the Bottom to the Top: The Evolution of Application Monitoring Narayan Makaram, CISSP Director, Security Solutions HP/Enterprise Security Business Unit Session ID: SP01-202 Session 2012 Classification:
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions Liwei Ren, Ph.D Trend Micro Background Liwei Ren Research interests Data security & privacy, network security analysis Data compression, math modeling &
Capturing the New Frontier:
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Executive Summary Cloud computing is garnering a vast share of IT interest. Its promise of revolutionary cost savings
SEACW DELIVERABLE D.1.6
SEACW DELIVERABLE D.1.6 Validation Methodology Specifications Project Acronym SEACW Grant Agreement No. 325146 Project Title Deliverable Reference Number Deliverable Title Social Ecosystem for Antiaging,
Securing the Internet of Things Opportunities and Challenges with scaling IoT solutions
Securing the Internet of Things Opportunities and Challenges with scaling IoT solutions Rob van den Dam Global Telecom Leader IBM Institute for Business Value IoT is IBM s # 1 research area Dublin Research
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4
SAST, DAST and Vulnerability Assessments, 1+1+1 = 4 Gordon MacKay Digital Defense, Inc. Chris Wysopal Veracode Session ID: Session Classification: ASEC-W25 Intermediate AGENDA Risk Management Challenges
IQware's Approach to Software and IT security Issues
IQware's Approach to Software and IT security Issues The Need for Security Security is essential in business intelligence (BI) systems since they have access to critical and proprietary enterprise information.
Design for Success: Designing for the Internet of Things with TiWiConnect
Design for Success: Designing for the Internet of Things with TiWiConnect Today s presenters Scott Lederer Senior Software Architect Dave Burleton Vice President of Marketing LSR.com Today s Agenda Why
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
20 th Year of Publication. A monthly publication from South Indian Bank. www.sib.co.in
To kindle interest in economic affairs... To empower the student community... Open YAccess www.sib.co.in [email protected] A monthly publication from South Indian Bank 20 th Year of Publication Experience
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
PULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
Web of Things Architecture
Web of Things Architecture 1. Introduction This document is an explanation about the architecture of Web Of Things (WoT). The purpose of this document is to provide (a) a guideline of the mapping between
Design for Success. Elevating Your Product s Capabilities through a Cloud-Connectivity System
Design for Success Elevating Your Product s Capabilities through a Cloud-Connectivity System Today s presenters Scott Lederer Senior Software Architect Dave Burleton Vice President of Marketing LSR.com
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
SAS and (the) Cloud. Dave Annis SAS Solutions ondemand
SAS and (the) Cloud Dave Annis SAS Solutions ondemand SAS and (the) Cloud Everyone s Cloud Tour of the buzzwords, myths and realities What s in store for me, the boss, the company, the industry? Your cloud,
ARTICLE Cloud Computing more than a hype?
Author: Klaus Hübschle Created on: August 2015 Version: 1.0 Content Most IT experts predict a promising future for cloud computing also in the automation industry. However, which are the applications where
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing
North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division
Mobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
SAP Business One OnDemand. SAP Business One OnDemand Solution Overview
SAP Business One OnDemand SAP Business One OnDemand Solution Overview SAP Business One OnDemand Table of Contents 4 Executive Summary Introduction SAP Business One Today 8 A Technical Overview: SAP Business
Westcon Presentation on Security Innovation, Opportunity, and Compromise
Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
EZ RMC Remote HMI App Application Guide for Android Devices
EZ RMC Remote HMI App Application Guide for Android Devices The EZ RMC Remote HMI App is an application designed for your Android devices to enable the monitoring and control of your EZTouch HMIs from
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)
Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused
Software Security. Group project: application security verification using OWASP ASVS
Software Security Group project: application security verification using OWASP ASVS Brainstorm What would you do if you if someone asked you to check if some piece of software that they use (and possibly
FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES
Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that
Intelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
A Peek into the Future-''Internet of Things''
A Peek into the Future-''Internet of Things'' Raj Kosaraju CIO at Maxil Technology Solutions Inc. A Peek into the Future-''Internet of Things'' Smart appliances that communicate with each other and share
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
The Massachusetts Open Cloud (MOC)
The Massachusetts Open Cloud (MOC) October 11, 2012 Abstract The Massachusetts open cloud is a new non-profit open public cloud that will be hosted (primarily) at the MGHPCC data center. Its mission is
Applied Micro development platform. ZT Systems (ST based) HP Redstone platform. Mitac Dell Copper platform. ARM in Servers
ZT Systems (ST based) Applied Micro development platform HP Redstone platform Mitac Dell Copper platform ARM in Servers 1 Server Ecosystem Momentum 2009: Internal ARM trials hosting part of website on
Cloud-Security: Show-Stopper or Enabling Technology?
Cloud-Security: Show-Stopper or Enabling Technology? Fraunhofer Institute for Secure Information Technology (SIT) Technische Universität München Open Grid Forum, 16.3,. 2010, Munich Overview 1. Cloud Characteristics
Defending Behind The Device Mobile Application Risks
Defending Behind The Device Mobile Application Risks Tyler Shields Product Manager and Strategist Veracode, Inc Session ID: MBS-301 Session Classification: Advanced Agenda The What The Problem Mobile Ecosystem
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
Assuring Application Security: Deploying Code that Keeps Data Safe
Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe 2 Introduction There s an app for that has become the mantra of users,
A Review of Different Comparative Studies on Mobile Operating System
Research Journal of Applied Sciences, Engineering and Technology 7(12): 2578-2582, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: August 30, 2013 Accepted: September
WhitePaper. Private Cloud Computing Essentials
Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers
White Paper Guide to PCI Application Security Compliance for Merchants and Service Providers Contents Overview... 3 I. The PCI DSS Requirements... 3 II. Compliance and Validation Requirements... 4 III.
Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX
Enabling Manufacturing Transformation in a Connected World John Shewchuk Technical Fellow DX Internet of Things What is the Internet of Things? The network of physical objects that contain embedded technology
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges
MSP Center Plus Features Checklist
Features Checklist Your evaluation is not complete until you check out top vendors and the price. Here is a list prepared based customer queries. Features General Easy web interface with admin, technician,
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
Guide to AWS. Brought to you by
Guide to AWS Brought to you by Welcome to Ingram Micro Cloud For more than 35 years, Ingram Micro a Fortune 100 company with $30 billion in annual revenue has been successfully connecting IT technology
Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer
Securing and Auditing Cloud Computing Jason Alexander Chief Information Security Officer What is Cloud Computing A model for enabling convenient, on-demand network access to a shared pool of configurable
Web App Security Audit Services
locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System
Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, 2014. Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661
Adobe ColdFusion Secure Profile Web Application Penetration Test July 31, 2014 Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661 Chicago Dallas This document contains and constitutes the
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions
Leveraging Cloud Services for Quicker Implementation and More Secure Automation Solutions Peter Reynolds Senior Consultant ARC Advisory Group [email protected] Twitter @PeterDReynolds The Hardware Layer
Affordable Building Automation System Enabled by the Internet of Things (IoT)
Solution Blueprint Internet of Things (IoT) Affordable Building Automation System Enabled by the Internet of Things (IoT) HCL Technologies* uses an Intel-based intelligent gateway to deliver a powerful,
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
IBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD
CONTINUOUS MONITORING A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD Healthcare companies utilizing cloud infrastructure require continuous security monitoring. Learn how to prevent
Evolving from SCADA to IoT
Evolving from SCADA to IoT Evolving from SCADA to IoT Let s define Semantics IoT Objectives, chapters 1 and 2 Separating the hype from the reality Why IoT isn t easy An IoT roadmap & framework IoT vs.
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
HMS Industrial Networks
HMS Industrial Networks Putting industrial applications on the cloud Whitepaper Best practices for managing and controlling industrial equipment remotely. HMS Industrial Networks AB Stationsgatan 37 30245
API Management: Powered by SOA Software Dedicated Cloud
Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting
