Expert Interview Series
|
|
- Audrey Armstrong
- 8 years ago
- Views:
Transcription
1
2 Expert Interview Series Konk ana Khaund Principal Consultant - Energy & Environment FROST & SULLIVAN Konkana Khaund is the Principal Consultant with Frost & Sullivan s Energy & Environment Practice, North America. She focuses on driving and managing research programs within the areas of smart buildings, smart homes, smart cities, energy efficient technologies, as well as strategic consultative engagements with our wide cross section of industry clients around these disciplines. A cybersecurity expert, we had the pleasure to interview Konkana on her thoughts around cybersecurity in the connected home. Q: What do you think are the main cybersecurity concerns in the connected home industry today? The main concerns I feel encompasses a wide cross-section of issues we first need to look at what is at risk clearly everything; from internal connected network of the home and smart grid related components, to shared networks, data management components and services covering third party arrangements are equally impacted by cyber breaches. Presently connected devices have very little cybersecurity mechanisms in-built into their framework. In the rush to deliver connected devices, manufacturers did not adequately factor in cybersecurity. And the notion of cybersecurity often varies as you move from device to component to system providers. So it is not easy to integrate the same vision across the board unless stringent measures and standards are adopted. Secondly, consumers have very little power over the desired level of connectedness and information sharing they wish to opt for in the way connected home solutions are offered at the moment. So I feel the concerns are manifold and incorporate practically all stakeholders within the connected home industry. In the rush to deliver connected devices, manufacturers did not adequately factor in cybersecurity
3 From a utility s standpoint, the AMI network and components related to that such as MDM, are certainly vulnerable points. Q: What are some of the specific issues utilities need to address in order to decrease cybersecurity risks? Access to utility-installed devices such as metering solutions, in-home display, energy monitoring devices, SCADA devices, DR technologies these are all at-risk elements during a cyber-breach. Besides, in case of utility-driven programs, there are often third parties involved in carrying out monitoring, diagnostics, and analytics that involve the cloud in a big way. This poses significant risk of compromise of critical information for consumers, utilities as well as business entities involved in delivering such services on behalf of utilities. Some of the measures that can be adopted to address these issues would involve tighter standards in system deployment, data management ethics incumbent on third parties, better encryption standards, and potentially localized storing and encryption, instead of pushing information into the cloud where possible. Along with this of course there is a huge need for change of consumer behaviour and increased awareness to understand what a cyber-breach could entail and how to minimize the risks and damages by consumers. There is a huge need for change of consumer behaviour and increased awareness to understand what a cyber-breach could entail Q: In addition to utilities, who are the other This ecosystem, besides players that should be or are involved in the utilities, involves a broad cybersecurity ecosystem? spectrum of players including connected home consumers, developers, solution manufacturers, product and service integrators, managed service and third party service providers, OTT service providers, as well as participants from the IT and internet security solution providers, research institutes, government regulators, compliance enforcement bodies, not-forprofit organizations involved in consumer protection and privacy.
4 I expect the ecosystem of the connected homes market to expand quite Q: Within the next 5 years, where do you see the rapidly over the next five years, as connected home headed globally? we will witness the entry of newer products and service segments into this ecosystem with innovations in connectivity and smart devices progressing further. The concept of connected homes is also expanding in definition. This will include the broader context of connected living; combining connected home, workspace and the city. Ubiquitous connectivity, visibility and smart mobility are significantly driving the demand for connected living. Our in-house research suggests the global connected living market to reach $ billion by 2020 as the importance of Internet and digital solutions grows in the overall economy. The next five years will certainly make the connected home a more achievable concept as connected devices make way for more configurable and easy-to-use connected platform to create, manage and monitor a connected home. Our research suggests that the global connected living market will reach $ billion by 2020 as the importance of Internet and digital solutions grows in the overall economy I am trying to bring more focus into the changing technology landscape Q: What goals are you trying to achieve in 2015? through the research we are undertaking, as well as some of the broad overarching trends that we see in the horizon that could have meaningful impact in the smart and connected spaces. Urbanization, connected living, new business models and convergence of technology and markets are some of the themes I am associated with right now. I feel innovations will continue to drive the markets for smart homes and buildings. However, from a technology standpoint, we are perhaps reaching a tipping point. From here on, we need to make sure that we, as an industry, get our business models right if we are going to expect the kind of growth rates that the associated market and technology segments are capable of delivering. This a key part of my research and consulting focus through 2015.
5 CONNECTED+ is tailored to meet the industry s need for a unified and collaborative forum, that paves the way to IoT application and smart home success If you have any questions, please don t hesitate to contact us or us at vcaudan@corpagency.com Register now at: we look forward to seeing you at the Connected Conference!
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center
More informationUtility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security
Boeing Defense, Space & Security Ventures Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security Tristan Glenwright - Boeing BOEING is a trademark of Boeing Management Company. The
More informationNational Institute of Standards and Technology Smart Grid Cybersecurity
National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair Victoria.yan@nist.gov 1 The National Institute of Standards
More informationIT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities
IT Infrastructure Services White Paper Cyber Risk Mitigation for Smart Cities About the Author Abhik Chaudhuri Abhik Chaudhuri is a Domain Consultant with the Information Technology Infrastructure Services
More informationEnterprise Application Enablement for the Internet of Things
Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices
More informationSOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)
INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015
More informationIoT & SCADA Cyber Security Services
IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au
More informationThe Challenges Posed by BYOD.
The Challenges Posed by BYOD. The Challenges Posed by BYOD.... 1 Introduction... 3 Primary Bring Your Own Device Challenges... 3 Enable Workers to Securely Accomplish Business Tasks... 4 Managing Multiple
More informationNational Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
More informationEvolution of Meter Data Management
Evolution of Meter Data Management April, 2015 Agenda Global Deployment of Smart Meters MDM Revenue Forecasts How intelligent are Current Smart Meter Deployments? Evolution of Meter Data Management Competitive
More informationBEST PRACTICES RESEARCH
2013 Frost & Sullivan 1 We Accelerate Growth Customer Value Leadership Award Building Energy Management Solutions North America, 2013 Frost & Sullivan s Global Research Platform Frost & Sullivan is in
More informationThe butterfly effect. How smart technology is set to completely transform utilities
How smart technology is set to completely transform utilities An era of unprecedented change Utility companies operate in one of the most complex, high profile, regulated and politically charged sectors.
More informationCould your utility improve efficiency and performance with third-party services?
White Paper Outsourced Smart Grid Services: A Smart Approach for AMI and Beyond Could your utility improve efficiency and performance with third-party services? Jim Blake Director of Customer Operations
More informationAddress C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
More informationCONTENTS. Introduction 3. IoT- the next evolution of the internet..3. IoT today and its importance..4. Emerging opportunities of IoT 5
#924, 5 A The catchy phrase Internet of Things (IoT) or the Web of Things has become inevitable to the modern world. Today wireless technology has reached its zenith making it possible to interact with
More informationNetVision. NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management. Solution Datasheet
Version 2.0 - October 2014 NetVision Solution Datasheet NetVision: Smart Energy Smart Grids and Smart Meters - Towards Smarter Energy Management According to analyst firm Berg Insight, the installed base
More informationCONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
More informationPhone: +44 20 8123 2220 Fax: +44 207 900 3970 office@marketpublishers.com https://marketpublishers.com
Cyber Security Market by Solution (IAM, Encryption, DLP, Risk and Compliance Management, IDS/IPS, UTM, Firewall, Antivirus/Antimalware, SIEM, Disaster Recovery, DDOS Mitigation, Web Filtering, and Security
More informationsecurity changes with Orange focus on your business, we focus on your security
security changes with Orange focus on your business, we focus on your security the only constant in security is change New uses and new technologies, proliferation of platforms and new workspaces in a
More informationMarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
More informationThe Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
More informationServices. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
More informationUtility Analytics, Challenges & Solutions. Session Three September 24, 2014
The Place Analytics Leaders Turn to for Answers Member.UtilityAnalytics.com Utility Analytics, Challenges & Solutions Session Three September 24, 2014 The Place Analytics Leaders Turn to for Answers Member.UtilityAnalytics.com
More informationRedefining MDM for a Smart Grid Enabled
Redefining MDM for a Smart Grid Enabled Enterprise Florida Power and Light Radha Swaminathan Director, AMI Information Technology, MDM and its future in a smart grid enabled enterprise A key component
More informationFrost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends
Frost & Sullivan s Aerospace, Defence & Security Practice Global Industrial Cyber Security Trends Presented by Philipp Reuter Director Frost & Sullivan, Turkey 1 Worth over $ 50 Billion globally in 2014
More informationEcom Infotech. Page 1 of 6
Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance
More informationTrends of Internet of Things and Cloud Services. Sak Segkhoonthod, Ph.D CEO Electronic Government Agency (Public Organization)
Trends of Internet of Things and Cloud Services Sak Segkhoonthod, Ph.D CEO Electronic Government Agency (Public Organization) 1 Agenda Mega Trends Implications on Cloud + IoT Cloud and IoT Relationships
More informationTransformational Smart Cities: cyber security and resilience
We protect the world s people and information Transformational Smart Cities: cyber security and resilience Towards the century of smart cities Executive Report Overview Giampiero Nanni Public Sector Strategy
More informationBreaking Down the Silos: A 21st Century Approach to Information Governance. May 2015
Breaking Down the Silos: A 21st Century Approach to Information Governance May 2015 Introduction With the spotlight on data breaches and privacy, organizations are increasing their focus on information
More informationDriving IoT Adoption with Innovative IoT Cloud Management Ian Khan Manager of Innovation ikhan@solgenia.com
Driving IoT Adoption with Innovative IoT Cloud Management Ian Khan Manager of Innovation ikhan@solgenia.com www.solgenia.com The State of IoT The State of Cloud Managing & Monetizing IoT The State of IoT
More informationCyber Security: Confronting the Threat
09 Cyber Security: Confronting the Threat Cyber Security: Confronting the Threat 09 In Short Cyber Threat Awareness and Preparedness Active Testing Likelihood of Attack Privacy Breaches 9% 67% Only 9%
More informationStrategic Opportunity Analysis of the Global Smart City Market Smart City Market is Likely to be Worth a Cumulative $1.565 Trillion by 2020
Strategic Opportunity Analysis of the Global City Market City Market is Likely to be Worth a Cumulative $1.565 Trillion by 2020 August 2013 1 Contents Section Slide Numbers Executive Summary 7 Definition
More informationGlobal Smart Grid Data Analytics Market 2015-2019
Global Smart Grid Data Analytics Market 2015-2019 Global Smart Grid Data Analytics Market 2015-2019 Sector Publishing Intelligence Limited (SPi) has been marketing business and market research reports
More informationInformation Bulletin
Public Policy Division Impact of NIST Guidelines for Cybersecurity Prepared by UTC Staff 1. Introduction... 3 2. Cybersecurity Landscape... 3 3. One Likely Scenario... 5 4. Draft NISTIR 7628, Guidelines
More informationA strategic approach to fraud
A strategic approach to fraud A continuous cycle of fraud risk management The risk of fraud is rising at an unprecedented rate. Today s tough economic climate is driving a surge in first party fraud for
More informationDAY 1 MONDAY, SEPT 28 2015
MaRS Discovery District TORONTO, ON Sep 28 29, 2015 8:45 AM 9:15 AM 9:15 AM 10:00 AM 10:00 AM 11:00 AM DAY 1 MONDAY, SEPT 28 2015 OPENING KEYNOTE SPEAKER A Connected World with Intelligence 1-YEAR-LATER
More informationCybersecurity Converged Resilience :
Cybersecurity Converged Resilience : The cybersecurity of critical infrastructure 2 AECOM Port Authority of New York and New Jersey (PANYNJ), New York, New York, United States. AECOM, working with the
More informationConnecting the Internet of Things Inside the Home
Connecting the Internet of Things Inside the Home Russell Haggar 4th Annual Smart Grids & Cleanpower 2012 Conference 14 June 2012 Cambridge www.cir-strategy.com/events Internet of Things: It s Big u Connecting
More informationWHITE PAPER Secure Enterprise Data in a BYOD World IDC OPINION IN THIS WHITE PAPER. Sponsored by: Excitor. Jason Andersson January 2013
WHITE PAPER Secure Enterprise Data in a BYOD World Sponsored by: Excitor Jason Andersson January 2013 IDC OPINION As consumerization trends continue to accelerate in the enterprise, there is growing interest
More informationCybersecurity, Privacy and Data Protection. Jay Taylor Director Global Standards, Code and Environment Jay.Taylor@schneider-electric.
Cybersecurity, Privacy and Data Protection Jay Taylor Director Global Standards, Code and Environment Jay.Taylor@schneider-electric.com Executive Summary ICT Enables Personal Productivity Telecom/ICT Is
More informationSignificance of the Entrepreneurial Company of the Year Award
Entrepreneurial Company of the Year Award Plant-to-enterprise Integration Solutions North America, 2012 Frost & Sullivan s Global Research Platform Frost & Sullivan is in its 50th year in business with
More information2013 European Conferencing Services Entrepreneurial Company of the Year Award
2013 2013 European Conferencing Services Entrepreneurial Company of the Year Award 2013 Frost & Sullivan 1 We Accelerate Growth Entrepreneurial Company of the Year Award Conferencing Services Europe, 2013
More informationA Business Perspective on Promoting Cybersecurity. Art Reilly Cisco Systems For the ICC
A Business Perspective on Promoting Cybersecurity Art Reilly Cisco Systems For the ICC Topics Culture of Cybersecurity Role of Business Cooperation with the Stakeholders ICC Companion documents to the
More informationHow To Be Prepared For A Cybercrime
Cybersecurity and the Internet of Things June 2015 What is the Internet of Things? Agenda What is the Internet of Things?..2 The many and various benefits of IoT...7 The rise of the cyber threat..13 The
More information2015 North American Utility Grid Intelligence Competitive Strategy Innovation and Leadership Award
2015 North American Utility Grid Intelligence Competitive Strategy Innovation and Leadership Award 2015 Contents Background and Company Performance... 3 Industry Challenges... 3 Strategy Innovation and
More informationProject Management for Implementing the Smart Grid By Power System Engineering, Inc. Abstract PM Methodology Using a Repeatable Project Management
Project Management for Implementing the Smart Grid By Power System Engineering, Inc. Abstract PM Methodology Using a Repeatable Project Management Approach Project management solutions for the Smart Grid
More informationThe Value of Automating Network Operations to Realize the Full Potential of IoE
WHITE PAPER The Value of Automating Network Operations to Realize the Full Potential of IoE Sponsored by: Cisco Brad Casemore Leslie Rosenberg May 2014 Carrie MacGillivray Vernon Turner IDC OPINION This
More information3 Myths about IoT in Logistics
3 Myths about IoT in Logistics Executive White Paper Contents Executive Summary... 2 Myth #1: IoT benefits advanced countries only.... 3 Myth #2: We mean the same thing by internet of things.... 4 Myth
More informationPCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
More informationNational Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
More informationBEST PRACTICES RESEARCH
Frost & Sullivan 2015 1 We Accelerate Growth Contents Background and Company Performance... 3 Industry Challenges... 3 Focus on the Future and Best Practices Implementation... 4 Conclusion... 7 Significance
More informationWorld Wide Wireless Web The Nano Core Disruptive or Generation Bridge! The Power of 5G
World Wide Wireless Web The Nano Core Disruptive or Generation Bridge! The Power of 5G Indian Telecom Service providers perspective on Deployment Architecture, Deployment Strategies as well as the Business
More informationThe Future of M2M Application Enablement Platforms
/ White Paper The Future of M2M Application Enablement Platforms Prepared by Ari Banerjee Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.aeris.com September 2013 Introduction: Trends
More informationThe Evolving Internet of Things Market
The Evolving Internet of Things Market Key Trends and Implications By Kevin Foley, Todd Bricker and Syed Raza The phrase Internet of Things (IoT) is firmly established in today s business lexicon but no
More informationI. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2
www.vitria.com TABLE OF CONTENTS I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2 III. COMPLEMENTING UTILITY IT ARCHITECTURES WITH THE VITRIA PLATFORM FOR
More informationTHE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET
THE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET STRATEGIC WHITE PAPER The machine-to-machine (M2M) industry is focused on extending its reach beyond niche
More informationClient Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs
1 Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs NEW YORK Byungkwon Lim blim@debevoise.com Gary E. Murphy gemurphy@debevoise.com Michael J. Decker mdecker@debevoise.com
More informationCCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING
CCBE RESPONSE REGARDING THE EUROPEAN COMMISSION PUBLIC CONSULTATION ON CLOUD COMPUTING CCBE response regarding the European Commission Public Consultation on Cloud Computing The Council of Bars and Law
More informationSOLUTION BRIEF June 2014. How do you capitalize on mobility opportunities in healthcare, both today and in the long term?
SOLUTION BRIEF June 2014 How do you capitalize on mobility opportunities in healthcare, both today and in the long term? SOLUTION BRIEF While bring your own device (BYOD) and physician texting are hot
More informationHow To Manage Assets In Utilities
Preparing for the Future: How Asset Management Will Evolve in the Age of Smart Grid By: Jeff Meyers, Smart Grid Solutions Telvent Utilities Group Table of Contents Introduction 3 The State of Asset Management
More informationCybersecurity at the Nexus of a Hyper- Connected World
Cybersecurity at the Nexus of a Hyper- Connected World Azer Bestavros, Wayne Burleson, Frans Kaashoek, Greg Morrisett, and Engin Kirda Draft of April 4, 2012 This document identifies a number of major
More informationResearch Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
More informationThe 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
More informationIoT Security & Privacy
Page 1: IoT Security & Privacy Technical White Paper June 2015 Page 2: Table of Contents The IoT ecosystem 3 A gold rush 3 Two major issues need to be overcome: Usability and Security 4 A centralised IoT
More informationInternal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
More informationThe Internet of Things (IoT) Opportunities and Risks
Session No. 744 The Internet of Things (IoT) Opportunities and Risks David Loomis, CSP Risk Specialist Chubb Group of Insurance Companies Brian Wohnsiedler, CSP Risk Specialist Chubb Group of Insurance
More informationBOOST YOUR BUSINESS WITH M2M TECHNOLOGY
S AS K TEL BUS I NE S S S OLUT I ONS_B OOS T YO U R B U S I NE S S W I TH M 2 M TEC HNO LO G Y BOOST YOUR BUSINESS WITH M2M TECHNOLOGY JU LY, 201 5 SASKTEL BUSINESS SOLUTIONS_BOOST YOUR BUSINESS WITH M2M
More informationInternet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges
More informationINTRODUCTION. IoT AND IP STRATEGIES
INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic
More informationView Point. Lifting the Fog on Cloud
View Point Lifting the Fog on Cloud There s a massive Cloud build-up on the horizon and the forecast promises a rain of benefits for the enterprise. Cloud is no more a buzzword. The enabling power of the
More informationCall to Action on Smart Sustainable Cities
Call to Action on Smart Sustainable Cities 1. Introduction Achieving sustainable urbanization, along with the preservation of our planet, has been recognized as one of the major challenges of our society
More informationHEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES
HEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES OCTOBER 2014 3300 North Fairfax Drive, Suite 308 Arlington, Virginia 22201 USA +1.571.481.9300 www.lunarline.com OUR CLIENTS INCLUDE Contents Healthcare
More informationAccording to NASSCOM-Frost & Sullivan's Study on 'Analytics' Product Excellence Matrix, the first in the seven-segment series
Analytics on a Transformation Path From a 'Good-to-Have' to a 'Must -Have Solution' According to NASSCOM-Frost & Sullivan's Study on 'Analytics' Product Excellence Matrix, the first in the seven-segment
More informationGovernment + Enterprise + Innovation + Strategy
Government + Enterprise + Innovation + Strategy Australia as Lead Regional Player in Cyber War Greg Rudd CEO Crest Australia Digital Disruption What does this mean for cyber security? Digital Changes Everything
More informationImpact of Internet of Things (IoT) on Industry and Supply Chain
Impact of Internet of Things (IoT) on Industry and Supply Chain Agenda Safety Message Part One CPS Energy Story Part Two The Digital Wave and the Internet of Things (IoT) CPS Energy Overview Largest municipally
More informationInternet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com
Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors
More informationStrategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA vandeke@gmail.com 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5
More informationReadiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
More informationAccenture and Oracle: Leading the IoT Revolution
Accenture and Oracle: Leading the IoT Revolution ACCENTURE AND ORACLE The Internet of Things (IoT) is rapidly moving from concept to reality, as companies see the value of connecting a range of sensors,
More informationCASE STUDIES ON CYBER SECURITY
CASE STUDIES ON CYBER SECURITY ERRIN - CYBER SECURITY BROKERAGE EVENT 30 TH SEPT 2015 DAVID CROZIER TECHNICAL MARKETING MANAGER @DAVID_CROZIER Vision GLOBAL INNOVATION HUB FOR CYBER SECURITY Our vision
More informationMobility Impact on the Enterprise
BYOD Managing and Securing the Mobile Enterprise November 21, 2013 by Rick McCharles Bring Your Own Device (BYOD), Bring Your Own Cloud (BYOC), Bring Your Own Technology (BYOT), Choose Your Own Device
More informationFrost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample
Frost & Sullivan http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm EST
More information30 BILLION RISKS AND REWARDS OF CONNECTED DEVICES THE INTERNET OF THINGS CYBER LANDSCAPE TODAY
RISKS AND REWARDS OF CONNECTED DEVICES THE HIDDEN INTERNET OF THINGS ISACA 2015 IT RISK / REWARD BAROMETER The Internet of Things paints a vision of a carefree, seamlessly connected world where interconnected
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More informationCombating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
More informationINSERT COMPANY LOGO HERE
INSERT COMPANY LOGO HERE 2014 Frost & Sullivan 1 We Accelerate Growth Technology Innovation Leadership Award Network Security Global, 2014 Frost & Sullivan s Global Research Platform Frost & Sullivan is
More informationIntroduction. 1. Superior broadband technology. 2. Economics of the legacy content distribution model. 3. Favorable regulatory status quo
Finding Opportunity in Disruption: Driving a New Era of Value Growth in the Cable Industry Introduction The cable industry has generated impressive growth over the last half decade, building on its traditional
More informationDUE DILIGENCE Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part One of Two)
DUE DILIGENCE Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties (Part One of Two) By Amy Terry Sheehan Vendors and other third parties are vital to
More information2012 North American Managed Security Service Providers Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
More informationAnswers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
More informationCanada's Global Viewpoint: Emerging Technologies and Healthcare Interoperability
Canada's Global Viewpoint: Emerging Technologies and Healthcare Interoperability Ron G. Parker, Group Director Canada Health Infoway Inc. 1/31/2013 www.iheusa.org 1 About The Speaker 2 28 years in IT/IM
More informationStandards in the Digital Single Market: setting priorities and ensuring delivery
Case Id: 7ea2081f-7496-473e-a25f-805fd92c4aad Date: 04/01/2016 19:19:44 Standards in the Digital Single Market: setting priorities and ensuring delivery Fields marked with are mandatory. General information
More informationSCADA Cloud Computing
SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com
More informationGreen Software Services From requirements to Business Models
Green Software Services From requirements to Business Models Schahram Dustdar TU Wien Austria Distributed Systems Group dsg.tuwien.ac.at Smart Evolution People, Services,Things Smart Buildings and Energy
More information2012 Global Web Conferencing Services Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2013 2012 Global Web Conferencing Services Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate Growth
More informationATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V
ATA DRIVEN GLOBAL VISION CLOUD PLATFORM STRATEG N POWERFUL RELEVANT PERFORMANCE SOLUTION CLO IRTUAL BIG DATA SOLUTION ROI FLEXIBLE DATA DRIVEN V WHITE PAPER Create the Data Center of the Future Accelerate
More informationutureready Security Check An end-to-end view of smart grid security AMI+DA: Building a Smarter Grid Distributed Generation: Best Practices
MARCH 2012 A Landis+Gyr Publication utureready Where the Smart Grid is Heading AMI+DA: Building a Smarter Grid Distributed Generation: Some Pros and Cons Security Check An end-to-end view of smart grid
More information