Expert Interview Series

Size: px
Start display at page:

Download "Expert Interview Series"

Transcription

1

2 Expert Interview Series Konk ana Khaund Principal Consultant - Energy & Environment FROST & SULLIVAN Konkana Khaund is the Principal Consultant with Frost & Sullivan s Energy & Environment Practice, North America. She focuses on driving and managing research programs within the areas of smart buildings, smart homes, smart cities, energy efficient technologies, as well as strategic consultative engagements with our wide cross section of industry clients around these disciplines. A cybersecurity expert, we had the pleasure to interview Konkana on her thoughts around cybersecurity in the connected home. Q: What do you think are the main cybersecurity concerns in the connected home industry today? The main concerns I feel encompasses a wide cross-section of issues we first need to look at what is at risk clearly everything; from internal connected network of the home and smart grid related components, to shared networks, data management components and services covering third party arrangements are equally impacted by cyber breaches. Presently connected devices have very little cybersecurity mechanisms in-built into their framework. In the rush to deliver connected devices, manufacturers did not adequately factor in cybersecurity. And the notion of cybersecurity often varies as you move from device to component to system providers. So it is not easy to integrate the same vision across the board unless stringent measures and standards are adopted. Secondly, consumers have very little power over the desired level of connectedness and information sharing they wish to opt for in the way connected home solutions are offered at the moment. So I feel the concerns are manifold and incorporate practically all stakeholders within the connected home industry. In the rush to deliver connected devices, manufacturers did not adequately factor in cybersecurity

3 From a utility s standpoint, the AMI network and components related to that such as MDM, are certainly vulnerable points. Q: What are some of the specific issues utilities need to address in order to decrease cybersecurity risks? Access to utility-installed devices such as metering solutions, in-home display, energy monitoring devices, SCADA devices, DR technologies these are all at-risk elements during a cyber-breach. Besides, in case of utility-driven programs, there are often third parties involved in carrying out monitoring, diagnostics, and analytics that involve the cloud in a big way. This poses significant risk of compromise of critical information for consumers, utilities as well as business entities involved in delivering such services on behalf of utilities. Some of the measures that can be adopted to address these issues would involve tighter standards in system deployment, data management ethics incumbent on third parties, better encryption standards, and potentially localized storing and encryption, instead of pushing information into the cloud where possible. Along with this of course there is a huge need for change of consumer behaviour and increased awareness to understand what a cyber-breach could entail and how to minimize the risks and damages by consumers. There is a huge need for change of consumer behaviour and increased awareness to understand what a cyber-breach could entail Q: In addition to utilities, who are the other This ecosystem, besides players that should be or are involved in the utilities, involves a broad cybersecurity ecosystem? spectrum of players including connected home consumers, developers, solution manufacturers, product and service integrators, managed service and third party service providers, OTT service providers, as well as participants from the IT and internet security solution providers, research institutes, government regulators, compliance enforcement bodies, not-forprofit organizations involved in consumer protection and privacy.

4 I expect the ecosystem of the connected homes market to expand quite Q: Within the next 5 years, where do you see the rapidly over the next five years, as connected home headed globally? we will witness the entry of newer products and service segments into this ecosystem with innovations in connectivity and smart devices progressing further. The concept of connected homes is also expanding in definition. This will include the broader context of connected living; combining connected home, workspace and the city. Ubiquitous connectivity, visibility and smart mobility are significantly driving the demand for connected living. Our in-house research suggests the global connected living market to reach $ billion by 2020 as the importance of Internet and digital solutions grows in the overall economy. The next five years will certainly make the connected home a more achievable concept as connected devices make way for more configurable and easy-to-use connected platform to create, manage and monitor a connected home. Our research suggests that the global connected living market will reach $ billion by 2020 as the importance of Internet and digital solutions grows in the overall economy I am trying to bring more focus into the changing technology landscape Q: What goals are you trying to achieve in 2015? through the research we are undertaking, as well as some of the broad overarching trends that we see in the horizon that could have meaningful impact in the smart and connected spaces. Urbanization, connected living, new business models and convergence of technology and markets are some of the themes I am associated with right now. I feel innovations will continue to drive the markets for smart homes and buildings. However, from a technology standpoint, we are perhaps reaching a tipping point. From here on, we need to make sure that we, as an industry, get our business models right if we are going to expect the kind of growth rates that the associated market and technology segments are capable of delivering. This a key part of my research and consulting focus through 2015.

5 CONNECTED+ is tailored to meet the industry s need for a unified and collaborative forum, that paves the way to IoT application and smart home success If you have any questions, please don t hesitate to contact us or us at vcaudan@corpagency.com Register now at: we look forward to seeing you at the Connected Conference!

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center

More information

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The

More information

National Institute of Standards and Technology Smart Grid Cybersecurity

National Institute of Standards and Technology Smart Grid Cybersecurity National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair Victoria.yan@nist.gov 1 The National Institute of Standards

More information

IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities

IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities IT Infrastructure Services White Paper Cyber Risk Mitigation for Smart Cities About the Author Abhik Chaudhuri Abhik Chaudhuri is a Domain Consultant with the Information Technology Infrastructure Services

More information

Enterprise Application Enablement for the Internet of Things

Enterprise Application Enablement for the Internet of Things Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices

More information

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT) INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au

More information

The Challenges Posed by BYOD.

The Challenges Posed by BYOD. The Challenges Posed by BYOD. The Challenges Posed by BYOD.... 1 Introduction... 3 Primary Bring Your Own Device Challenges... 3 Enable Workers to Securely Accomplish Business Tasks... 4 Managing Multiple

More information

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything

More information

Evolution of Meter Data Management

Evolution of Meter Data Management Evolution of Meter Data Management April, 2015 Agenda Global Deployment of Smart Meters MDM Revenue Forecasts How intelligent are Current Smart Meter Deployments? Evolution of Meter Data Management Competitive

More information

BEST PRACTICES RESEARCH

BEST PRACTICES RESEARCH 2013 Frost & Sullivan 1 We Accelerate Growth Customer Value Leadership Award Building Energy Management Solutions North America, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in

More information

The butterfly effect. How smart technology is set to completely transform utilities

The butterfly effect. How smart technology is set to completely transform utilities How smart technology is set to completely transform utilities An era of unprecedented change Utility companies operate in one of the most complex, high profile, regulated and politically charged sectors.

More information

Could your utility improve efficiency and performance with third-party services?

Could your utility improve efficiency and performance with third-party services? White Paper Outsourced Smart Grid Services: A Smart Approach for AMI and Beyond Could your utility improve efficiency and performance with third-party services? Jim Blake Director of Customer Operations

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

CONTENTS. Introduction 3. IoT- the next evolution of the internet..3. IoT today and its importance..4. Emerging opportunities of IoT 5

CONTENTS. Introduction 3. IoT- the next evolution of the internet..3. IoT today and its importance..4. Emerging opportunities of IoT 5 #924, 5 A The catchy phrase Internet of Things (IoT) or the Web of Things has become inevitable to the modern world. Today wireless technology has reached its zenith making it possible to interact with

More information

NetVision. NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management. Solution Datasheet

NetVision. NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management. Solution Datasheet Version 2.0 - October 2014 NetVision Solution Datasheet NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management According to analyst firm Berg Insight, the installed base

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com

Phone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security

More information

security changes with Orange focus on your business, we focus on your security

security changes with Orange focus on your business, we focus on your security security changes with Orange focus on your business, we focus on your security the only constant in security is change New uses and new technologies, proliferation of platforms and new workspaces in a

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

Utility Analytics, Challenges & Solutions. Session Three September 24, 2014

Utility Analytics, Challenges & Solutions. Session Three September 24, 2014 The Place Analytics Leaders Turn to for Answers Member.UtilityAnalytics.com Utility Analytics, Challenges & Solutions Session Three September 24, 2014 The Place Analytics Leaders Turn to for Answers Member.UtilityAnalytics.com

More information

Redefining MDM for a Smart Grid Enabled

Redefining MDM for a Smart Grid Enabled Redefining MDM for a Smart Grid Enabled Enterprise Florida Power and Light Radha Swaminathan Director, AMI Information Technology, MDM and its future in a smart grid enabled enterprise A key component

More information

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014

More information

Ecom Infotech. Page 1 of 6

Ecom Infotech. Page 1 of 6 Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance

More information

Trends of Internet of Things and Cloud Services. Sak Segkhoonthod, Ph.D CEO Electronic Government Agency (Public Organization)

Trends of Internet of Things and Cloud Services. Sak Segkhoonthod, Ph.D CEO Electronic Government Agency (Public Organization) Trends of Internet of Things and Cloud Services Sak Segkhoonthod, Ph.D CEO Electronic Government Agency (Public Organization) 1 Agenda Mega Trends Implications on Cloud + IoT Cloud and IoT Relationships

More information

Transformational Smart Cities: cyber security and resilience

Transformational Smart Cities: cyber security and resilience We protect the world s people and information Transformational Smart Cities: cyber security and resilience Towards the century of smart cities Executive Report Overview Giampiero Nanni Public Sector Strategy

More information

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015 Breaking Down the Silos: A 21st Century Approach to Information Governance May 2015 Introduction With the spotlight on data breaches and privacy, organizations are increasing their focus on information

More information

Driving IoT Adoption with Innovative IoT Cloud Management Ian Khan Manager of Innovation ikhan@solgenia.com

Driving IoT Adoption with Innovative IoT Cloud Management Ian Khan Manager of Innovation ikhan@solgenia.com Driving IoT Adoption with Innovative IoT Cloud Management Ian Khan Manager of Innovation ikhan@solgenia.com www.solgenia.com The State of IoT The State of Cloud Managing & Monetizing IoT The State of IoT

More information

Cyber Security: Confronting the Threat

Cyber Security: Confronting the Threat 09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%

More information

Strategic Opportunity Analysis of the Global Smart City Market Smart City Market is Likely to be Worth a Cumulative $1.565 Trillion by 2020

Strategic Opportunity Analysis of the Global Smart City Market Smart City Market is Likely to be Worth a Cumulative $1.565 Trillion by 2020 Strategic Opportunity Analysis of the Global City Market City Market is Likely to be Worth a Cumulative $1.565 Trillion by 2020 August 2013 1 Contents Section Slide Numbers Executive Summary 7 Definition

More information

Global Smart Grid Data Analytics Market 2015-2019

Global Smart Grid Data Analytics Market 2015-2019 Global Smart Grid Data Analytics Market 2015-2019 Global Smart Grid Data Analytics Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports

More information

Information Bulletin

Information Bulletin Public Policy Division Impact of NIST Guidelines for Cybersecurity Prepared by UTC Staff 1. Introduction... 3 2. Cybersecurity Landscape... 3 3. One Likely Scenario... 5 4. Draft NISTIR 7628, Guidelines

More information

A strategic approach to fraud

A strategic approach to fraud A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for

More information

DAY 1 MONDAY, SEPT 28 2015

DAY 1 MONDAY, SEPT 28 2015 MaRS Discovery District TORONTO, ON Sep 28 29, 2015 8:45 AM 9:15 AM 9:15 AM 10:00 AM 10:00 AM 11:00 AM DAY 1 MONDAY, SEPT 28 2015 OPENING KEYNOTE SPEAKER A Connected World with Intelligence 1-YEAR-LATER

More information

Cybersecurity Converged Resilience :

Cybersecurity Converged Resilience : Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the

More information

Connecting the Internet of Things Inside the Home

Connecting the Internet of Things Inside the Home Connecting the Internet of Things Inside the Home Russell Haggar 4th Annual Smart Grids & Cleanpower 2012 Conference 14 June 2012 Cambridge www.cir-strategy.com/events Internet of Things: It s Big u Connecting

More information

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013

WHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013 WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest

More information

Cybersecurity, Privacy and Data Protection. Jay Taylor Director Global Standards, Code and Environment Jay.Taylor@schneider-electric.

Cybersecurity, Privacy and Data Protection. Jay Taylor Director Global Standards, Code and Environment Jay.Taylor@schneider-electric. Cybersecurity, Privacy and Data Protection Jay Taylor Director Global Standards, Code and Environment Jay.Taylor@schneider-electric.com Executive Summary ICT Enables Personal Productivity Telecom/ICT Is

More information

Significance of the Entrepreneurial Company of the Year Award

Significance of the Entrepreneurial Company of the Year Award Entrepreneurial Company of the Year Award Plant-to-enterprise Integration Solutions North America, 2012 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year in business with

More information

2013 European Conferencing Services Entrepreneurial Company of the Year Award

2013 European Conferencing Services Entrepreneurial Company of the Year Award 2013 2013 European Conferencing Services Entrepreneurial Company of the Year Award 2013 Frost & Sullivan 1 We Accelerate Growth Entrepreneurial Company of the Year Award Conferencing Services Europe, 2013

More information

A Business Perspective on Promoting Cybersecurity. Art Reilly Cisco Systems For the ICC

A Business Perspective on Promoting Cybersecurity. Art Reilly Cisco Systems For the ICC A Business Perspective on Promoting Cybersecurity Art Reilly Cisco Systems For the ICC Topics Culture of Cybersecurity Role of Business Cooperation with the Stakeholders ICC Companion documents to the

More information

How To Be Prepared For A Cybercrime

How To Be Prepared For A Cybercrime Cybersecurity and the Internet of Things June 2015 What is the Internet of Things? Agenda What is the Internet of Things?..2 The many and various benefits of IoT...7 The rise of the cyber threat..13 The

More information

2015 North American Utility Grid Intelligence Competitive Strategy Innovation and Leadership Award

2015 North American Utility Grid Intelligence Competitive Strategy Innovation and Leadership Award 2015 North American Utility Grid Intelligence Competitive Strategy Innovation and Leadership Award 2015 Contents Background and Company Performance... 3 Industry Challenges... 3 Strategy Innovation and

More information

Project Management for Implementing the Smart Grid By Power System Engineering, Inc. Abstract PM Methodology Using a Repeatable Project Management

Project Management for Implementing the Smart Grid By Power System Engineering, Inc. Abstract PM Methodology Using a Repeatable Project Management Project Management for Implementing the Smart Grid By Power System Engineering, Inc. Abstract PM Methodology Using a Repeatable Project Management Approach Project management solutions for the Smart Grid

More information

The Value of Automating Network Operations to Realize the Full Potential of IoE

The Value of Automating Network Operations to Realize the Full Potential of IoE WHITE PAPER The Value of Automating Network Operations to Realize the Full Potential of IoE Sponsored by: Cisco Brad Casemore Leslie Rosenberg May 2014 Carrie MacGillivray Vernon Turner IDC OPINION This

More information

3 Myths about IoT in Logistics

3 Myths about IoT in Logistics 3 Myths about IoT in Logistics Executive White Paper Contents Executive Summary... 2 Myth #1: IoT benefits advanced countries only.... 3 Myth #2: We mean the same thing by internet of things.... 4 Myth

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

BEST PRACTICES RESEARCH

BEST PRACTICES RESEARCH Frost & Sullivan 2015 1 We Accelerate Growth Contents Background and Company Performance... 3 Industry Challenges... 3 Focus on the Future and Best Practices Implementation... 4 Conclusion... 7 Significance

More information

World Wide Wireless Web The Nano Core Disruptive or Generation Bridge! The Power of 5G

World Wide Wireless Web The Nano Core Disruptive or Generation Bridge! The Power of 5G World Wide Wireless Web The Nano Core Disruptive or Generation Bridge! The Power of 5G Indian Telecom Service providers perspective on Deployment Architecture, Deployment Strategies as well as the Business

More information

The Future of M2M Application Enablement Platforms

The Future of M2M Application Enablement Platforms / White Paper The Future of M2M Application Enablement Platforms Prepared by Ari Banerjee Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.aeris.com September 2013 Introduction: Trends

More information

The Evolving Internet of Things Market

The Evolving Internet of Things Market The Evolving Internet of Things Market Key Trends and Implications By Kevin Foley, Todd Bricker and Syed Raza The phrase Internet of Things (IoT) is firmly established in today s business lexicon but no

More information

I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2

I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2 www.vitria.com TABLE OF CONTENTS I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2 III. COMPLEMENTING UTILITY IT ARCHITECTURES WITH THE VITRIA PLATFORM FOR

More information

THE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET

THE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET THE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET STRATEGIC WHITE PAPER The machine-to-machine (M2M) industry is focused on extending its reach beyond niche

More information

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs 1 Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs NEW YORK Byungkwon Lim blim@debevoise.com Gary E. Murphy gemurphy@debevoise.com Michael J. Decker mdecker@debevoise.com

More information

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING

CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law

More information

SOLUTION BRIEF June 2014. How do you capitalize on mobility opportunities in healthcare, both today and in the long term?

SOLUTION BRIEF June 2014. How do you capitalize on mobility opportunities in healthcare, both today and in the long term? SOLUTION BRIEF June 2014 How do you capitalize on mobility opportunities in healthcare, both today and in the long term? SOLUTION BRIEF While bring your own device (BYOD) and physician texting are hot

More information

How To Manage Assets In Utilities

How To Manage Assets In Utilities Preparing for the Future: How Asset Management Will Evolve in the Age of Smart Grid By: Jeff Meyers, Smart Grid Solutions Telvent Utilities Group Table of Contents Introduction 3 The State of Asset Management

More information

Cybersecurity at the Nexus of a Hyper- Connected World

Cybersecurity at the Nexus of a Hyper- Connected World Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major

More information

Research Topics in the National Cyber Security Research Agenda

Research Topics in the National Cyber Security Research Agenda Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

IoT Security & Privacy

IoT Security & Privacy Page 1: IoT Security & Privacy Technical White Paper June 2015 Page 2: Table of Contents The IoT ecosystem 3 A gold rush 3 Two major issues need to be overcome: Usability and Security 4 A centralised IoT

More information

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015 Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are

More information

The Internet of Things (IoT) Opportunities and Risks

The Internet of Things (IoT) Opportunities and Risks Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance

More information

BOOST YOUR BUSINESS WITH M2M TECHNOLOGY

BOOST YOUR BUSINESS WITH M2M TECHNOLOGY S AS K TEL BUS I NE S S S OLUT I ONS_B OOS T YO U R B U S I NE S S W I TH M 2 M TEC HNO LO G Y BOOST YOUR BUSINESS WITH M2M TECHNOLOGY JU LY, 201 5 SASKTEL BUSINESS SOLUTIONS_BOOST YOUR BUSINESS WITH M2M

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges

More information

INTRODUCTION. IoT AND IP STRATEGIES

INTRODUCTION. IoT AND IP STRATEGIES INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic

More information

View Point. Lifting the Fog on Cloud

View Point. Lifting the Fog on Cloud View Point Lifting the Fog on Cloud There s a massive Cloud build-up on the horizon and the forecast promises a rain of benefits for the enterprise. Cloud is no more a buzzword. The enabling power of the

More information

Call to Action on Smart Sustainable Cities

Call to Action on Smart Sustainable Cities Call to Action on Smart Sustainable Cities 1. Introduction Achieving sustainable urbanization, along with the preservation of our planet, has been recognized as one of the major challenges of our society

More information

HEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES

HEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES HEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES OCTOBER 2014 3300 North Fairfax Drive, Suite 308 Arlington, Virginia 22201 USA +1.571.481.9300 www.lunarline.com OUR CLIENTS INCLUDE Contents Healthcare

More information

According to NASSCOM-Frost & Sullivan's Study on 'Analytics' Product Excellence Matrix, the first in the seven-segment series

According to NASSCOM-Frost & Sullivan's Study on 'Analytics' Product Excellence Matrix, the first in the seven-segment series Analytics on a Transformation Path From a 'Good-to-Have' to a 'Must -Have Solution' According to NASSCOM-Frost & Sullivan's Study on 'Analytics' Product Excellence Matrix, the first in the seven-segment

More information

Government + Enterprise + Innovation + Strategy

Government + Enterprise + Innovation + Strategy Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia Digital Disruption What does this mean for cyber security? Digital Changes Everything

More information

Impact of Internet of Things (IoT) on Industry and Supply Chain

Impact of Internet of Things (IoT) on Industry and Supply Chain Impact of Internet of Things (IoT) on Industry and Supply Chain Agenda Safety Message Part One CPS Energy Story Part Two The Digital Wave and the Internet of Things (IoT) CPS Energy Overview Largest municipally

More information

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors

More information

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013 Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5

More information

Readiness Assessments: Vital to Secure Mobility

Readiness Assessments: Vital to Secure Mobility White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats

More information

Accenture and Oracle: Leading the IoT Revolution

Accenture and Oracle: Leading the IoT Revolution Accenture and Oracle: Leading the IoT Revolution ACCENTURE AND ORACLE The Internet of Things (IoT) is rapidly moving from concept to reality, as companies see the value of connecting a range of sensors,

More information

CASE STUDIES ON CYBER SECURITY

CASE STUDIES ON CYBER SECURITY CASE STUDIES ON CYBER SECURITY ERRIN - CYBER SECURITY BROKERAGE EVENT 30 TH SEPT 2015 DAVID CROZIER TECHNICAL MARKETING MANAGER @DAVID_CROZIER Vision GLOBAL INNOVATION HUB FOR CYBER SECURITY Our vision

More information

Mobility Impact on the Enterprise

Mobility Impact on the Enterprise BYOD Managing and Securing the Mobile Enterprise November 21, 2013 by Rick McCharles Bring Your Own Device (BYOD), Bring Your Own Cloud (BYOC), Bring Your Own Technology (BYOT), Choose Your Own Device

More information

Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample

Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Frost & Sullivan http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm EST

More information

30 BILLION RISKS AND REWARDS OF CONNECTED DEVICES THE INTERNET OF THINGS CYBER LANDSCAPE TODAY

30 BILLION RISKS AND REWARDS OF CONNECTED DEVICES THE INTERNET OF THINGS CYBER LANDSCAPE TODAY RISKS AND REWARDS OF CONNECTED DEVICES THE HIDDEN INTERNET OF THINGS ISACA 2015 IT RISK / REWARD BAROMETER The Internet of Things paints a vision of a carefree, seamlessly connected world where interconnected

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

INSERT COMPANY LOGO HERE

INSERT COMPANY LOGO HERE INSERT COMPANY LOGO HERE 2014 Frost & Sullivan 1 We Accelerate Growth Technology Innovation Leadership Award Network Security Global, 2014 Frost & Sullivan s Global Research Platform Frost & Sullivan is

More information

Introduction. 1. Superior broadband technology. 2. Economics of the legacy content distribution model. 3. Favorable regulatory status quo

Introduction. 1. Superior broadband technology. 2. Economics of the legacy content distribution model. 3. Favorable regulatory status quo Finding Opportunity in Disruption: Driving a New Era of Value Growth in the Cable Industry Introduction The cable industry has generated impressive growth over the last half decade, building on its traditional

More information

DUE DILIGENCE Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part One of Two)

DUE DILIGENCE Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part One of Two) DUE DILIGENCE Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part One of Two) By Amy Terry Sheehan Vendors and other third parties are vital to

More information

2012 North American Managed Security Service Providers Growth Leadership Award

2012 North American Managed Security Service Providers Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate

More information

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data. Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating

More information

Canada's Global Viewpoint: Emerging Technologies and Healthcare Interoperability

Canada's Global Viewpoint: Emerging Technologies and Healthcare Interoperability Canada's Global Viewpoint: Emerging Technologies and Healthcare Interoperability Ron G. Parker, Group Director Canada Health Infoway Inc. 1/31/2013 www.iheusa.org 1 About The Speaker 2 28 years in IT/IM

More information

Standards in the Digital Single Market: setting priorities and ensuring delivery

Standards in the Digital Single Market: setting priorities and ensuring delivery Case Id: 7ea2081f-7496-473e-a25f-805fd92c4aad Date: 04/01/2016 19:19:44 Standards in the Digital Single Market: setting priorities and ensuring delivery Fields marked with are mandatory. General information

More information

SCADA Cloud Computing

SCADA Cloud Computing SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com

More information

Green Software Services From requirements to Business Models

Green Software Services From requirements to Business Models Green Software Services From requirements to Business Models Schahram Dustdar TU Wien Austria Distributed Systems Group dsg.tuwien.ac.at Smart Evolution People, Services,Things Smart Buildings and Energy

More information

2012 Global Web Conferencing Services Growth Leadership Award

2012 Global Web Conferencing Services Growth Leadership Award 2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2013 2012 Global Web Conferencing Services Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate Growth

More information

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V

ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER Create the Data Center of the Future Accelerate

More information

utureready Security Check An end-to-end view of smart grid security AMI+DA: Building a Smarter Grid Distributed Generation: Best Practices

utureready Security Check An end-to-end view of smart grid security AMI+DA: Building a Smarter Grid Distributed Generation: Best Practices MARCH 2012 A Landis+Gyr Publication utureready Where the Smart Grid is Heading AMI+DA: Building a Smarter Grid Distributed Generation: Some Pros and Cons Security Check An end-to-end view of smart grid

More information