The Next Wave: The Internet of Things and Security



Similar documents
Top 10 Strategic Technology Trends for Smart Government

Mobility in the Enterprise: Trends

What Makes A Good Hosting

Product Innovation Platforms: Enabling Product Design and PLM in the Digital Business Era

Cloud Trends 2015 and beyond

Understanding the impact of the connected revolution. Vodafone Power to you

How To Understand The Power Of The Internet Of Things

The Outlook for IT to Michael Smith VP Distinguished Analyst January 31, 2014

The Quantified Self. Market Overview and Proprietary Financial Intelligence

The Nexus and the Top Strategic Technologies for Education, 2014

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

2015 CIO Agenda: An Africa Perspective

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business

T r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things

Technology Update & Trends In Government

FWD. What the Internet of Things will mean for business

Architecting an Industrial Sensor Data Platform for Big Data Analytics: Continued

Reimagining Business with SAP HANA Cloud Platform for the Internet of Things

The Internet of Things and I4.0 is an Evolution. New Markets (e.g. maintenance hub operator) Data Driven. Services. (e.g. predictive.

Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day.

Emerging Technology Analysis: The Internet of Things Creates Semiconductor Business Opportunities at Several Levels

Using Big Data Analytics to

Agenda Overview for Emerging Marketing Technology and Trends, 2015

IT Services Opportunities in IP Telephony (Executive Summary) Executive Summary

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014

Agenda Overview for Marketing Management, 2015

Big Data e BI voltados a estratégias em governo e definição de políticas e serviços públicos

Public/Private/Hybrid Cloud choosing horses for courses. NetEvents APAC Cloud Summit

KSÖ-SICHERHEITSKONGRESS 2015

The Internet of Things. A fleet manager s guide to the Internet of Things

Inside the Hype Cycle: What s Hot and What s Not in 2009

TELUS/IDC Internet of Things Study 2014

MES and Industrial Internet

In the pursuit of becoming smart

Building Connected Businesses with Internet of Things Services

Connected Intelligence and the 21 st Century Digital Enterprise

How does your Internet of Things (IoT) strategy stack up?

The Internet of Things: Connected Home, Auto, and Life

Wireless Security Strategies for ac and the Internet of Things

The Canadian Realities of Big Data and Business Analytics. Utsav Arora February 12, 2014

Realize That Big Security Data Is Not Big Security Nor Big Intelligence

SESSION 308 Wednesday, March 25, 3:00 PM - 4:00 PM Track: Industry Insights

INTERNET OF THINGS: SCIENCE FICTION OR BUSINESS FACT?

Software as a Service: Uncertainties Revealed

The Evolving Internet of Things Market

Streaming Analytics and the Internet of Things: Transportation and Logistics

Users and Vendors Speak Out: Intrusion Detection and Prevention

Mobilizing the Enterprise: Trends, Strategies and Techniques

Formulate Winning Sales and Operations Strategies Through Integrated Planning

Highlights of the 2015 CEO Survey: Business Leaders Are Betting on Tech

Oracle s Internet of Things Platform: The M2M Platform for a Connected World

Internet of Things: Consumerisation of Technology.

Page 1. Transform the Retail Store with the Internet of Things

Agenda Overview for Digital Commerce, 2015

Q&A: The Many Aspects of Private Cloud Computing

Operating from the middle of the digital economy: Integrated Digital Service Providers. By Ed Bae, Sumit Banerjee and Tom Loozen

Enterprise Application Enablement for the Internet of Things

Hype Cycle for Intelligent Grid Technologies

Business Intelligence: The European Perspective

Accenture and Oracle: Leading the IoT Revolution

Moving From Business Intelligence to an Intelligent Business

Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day.

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

What's a Digital Marketing Platform? What Isn't?

Agenda Overview for Multichannel Marketing, 2013

Survey Analysis: Adoption of Cloud ERP, 2013 Through 2023

UPnP: The Discovery & Service Layer For The Internet of Things April 2015

Make Migration From Windows Server 2003 a Priority, Before Support Ends in July 2015

Understanding Current Cloud Market Drivers and Responses

IBM Software Integrated Service Management: Visibility. Control. Automation.

Digital Grids: IT-OT Convergence to Enable the Interoperability

Leverage the Internet of Things to Transform Maintenance and Service Operations

Seven Requirements for Hybrid Web Delivery Getting the best of both on-premises and SaaS

Oracle Internet of Things Cloud Service

Emerging Trends, Disruptions and Digital Business

IoT market analysis: Sizing the opportunity

The Gartner Scenario For 2010: The Current State and Future Direction of the IT Industry

Achieving business agility and cost optimization by reducing IT complexity. The value of adding ESB enrichment to your existing messaging solution

TOTAL DATA WAREHOUSING:

Secure Cloud Hosting for Healthcare Organizations

ready for real business?

Top 10 Technology Trends, 2013: Cloud Computing and Hybrid IT Drive Future IT Models

The Impact of the Internet of Things on Enterprises

The Future of IT Sourcing

IT S NOT JUST ABOUT BIG DATA:

Blueprints and feasibility studies for Enterprise IoT (Part Two of Three)

Explore the Art of the Possible Discover how your company can create new business value through a co-innovation partnership with SAP

The Cyber Threat Landscape

Internet of Things Vom Hype zum Innovationsschub!

Optimize Revenue for High-Volume Service Providers with Pricing Simulation

Transformational Smart Cities: cyber security and resilience

Systems of Discovery The Perfect Storm of Big Data, Cloud and Internet-of-Things

Agenda Overview for Social Marketing, 2015

Connecting things. Creating possibilities. A point of view

Agenda Overview for Mobile Marketing, 2013

The cat, as we know, is already out of the bag.

RESEARCH NOTE. Workplace Service. Why You Need A Technology Toolbox For External Collaboration

Agenda Overview for Customer Experience, 2015

ARI: Driving Results in Fleet Management on SAP HANA

Agenda Overview for Multichannel Marketing, 2015

Transcription:

The Next Wave: The Internet of Things and Security F. Christian Byrnes Twitter: @cbyrnes Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity."

Let's Get the Big Story Out of the Way Right Now

Digital Business Moment: Renting a Car 1974

Customer Experience: Call three rental companies on the phone; wait on hold, eventually find one with a car available. On check-in fill out reams of paperwork with a dozen signatures. Insurance is included in the rental automatically. If an accident occurs call for a tow truck and the rental company brings out a replacement car. When returning wait on line to process car back in. IT experience: Nightly inventory update job. Nightly billing run. Planned inventory is always highly uncertain. Billing errors require manual correction. Risks: Lost business due to incorrect inventory. Unhappy customers due to long waits in line, doing paperwork and then eventually getting a car.

Digital Business Moment: Renting a Car 1994

Customer Experience: Still call on the phone, but now the agent has a terminal with past customer profiles and a more accurate inventory. On check-in forms are printed partially filled out. A few signatures and initials suffice. Accident: no change. Return: no change. IT experience: Mainframe OLTP system handles basic transactions and updates inventory. Risks: Loss of leased communications lines stops reservations. Check-in agent has fall-back to paper as option. Re-entering manual transaction can take days, creating old inventory problems. Most serious risk is database corruption which can take up to a week to repair.

Digital Business Moment: Renting a Car 2014

Customer Experience: Reservation made via the web. Fast, clean, minimal effort. No check-in; go straight to car, even pick your car. Show license on exit from parking lot. Insurance costs extra; post-accident services slow to non-existent. On return wait for agent to come to the car and check you out. Email confirmations followed by endless marketing emails. IT experience: Mobile, networking, cloud and social support built on reliable infrastructure. Risks: DDOS, client data loss due to security breach, fallback to paper virtually impossible, in part due to reduced staffing that improved profitability. Reputational risk, negative social reviews,

Digital Business Moment: Renting a Car 2034

Customer Experience: Siri, I need a car in Dubai next week. Siri: Human driver or self driving? Siri checks for airline tickets, arranges car according to preference profile. Pickup: walk to car and drive away. Drop-off: Get out of car and walk away. IT experience: Hundreds of sensors in the car and in the lot. Physical security, car maintenance, etc. Robots service the car in preparation for the next renter. Risks: Your competitors want your sensor data as well as your client data. Some geographies mandate human drivers; others do not allow them. Cyber-gangs and corporate fiefdoms.

.

SECURITY SCENARIO 2020

FORCE 1: Target Enterprise Individual

Tribal FORCE 1: Target FORCE 2: Authority Enterprise Individual Monolithic

Tribal Coalition Rule Neighborhood Watch Enterprise Individual Regulated Risk Controlling Parent Monolithic

The Third Industrial Revolution The first industrial revolution 1780-1850 The second industrial revolution 1870-1930 The third industrial revolution 1940-2025(?) - In Germany the result is called Business 3.0 If history provides any guidance: Industrial revolutions end with a game changer. Of the five pillars of a stable society, prosperity is always threatened at the end of an industrial revolution. That threat leads to major changes in the economy. 15

The Nexus of Forces is a game changer Mobile, social and cloud create massive data and shift control away from the enterprise. This is the largest change since 1966. Its next phase technical implementation is embodied in the Internet of Things (IoT). 16

The Internet of Things: 15 Billion or One Trillion Things by 2020? Light Bulbs Smart Meters Smart Hubs

Internet of Things Hype Cycle, 2014 expectations Smart Transportation Sensor Fusion Intelligent Business Operations ibeacons and Bluetooth Beacons Context Delivery Architecture IT/OT Integration Internet of Things for Government Autonomous Vehicles Smart City Framework High-Performance Message Infrastructure Message Queue Telemetry Transport Weightless Decisions and Recommendations as a Service Vehicle-to-Grid Internet of Things in Insurance Embedded Software and Systems Security 802.11ah Operational Intelligence Platforms IoT Platform Ambient Energy Harvesters for the Internet of Things Smart Workspace Licensing and Entitlement Management Innovation Trigger Machine Learning Quantified Self Mobile Health Monitoring Operational Technology Platform Convergence Vehicle-to-Infrastructure Smart Dust Communications Digital Security Peak of Inflated Expectations Plateau will be reached in: Home Energy Management/Consumer Energy Management Internet of Things Low-Cost Development Boards Consumer Smart Appliances Internet of Things for Manufacturing Operations Wearable User Interfaces Wireless Power Charging Bluetooth 4 Complex-Event Processing Big Data Facilities Energy Management Operational Technology Security Asset Performance Management Advanced Metering Infrastructure Machine-to-Machine Communication Services Trough of Disillusionment time ZigBee Vehicle-to-Vehicle Communications AMQP Enterprise Manufacturing Intelligence Slope of Enlightenment less than 2 years 2 to 5 years 5 to 10 years more than 10 years Commercial Telematics Wireless Healthcare Asset Management RFID for Logistics and Transportation Consumer Telematics As of July 2014 Plateau of Productivity obsolete before plateau

What Can We Learn From Legacy IoT? Over the past five years changes in - Capability - Deployment - Connection - External environment of operational technology have forced changes within enterprises to secure OT. What can we learn from them as we approach securing the Internet of Things? 19

Hype Cycle for Operational Technology G00246894 20

Operational Technology Exists in All Industries Operational technology is technology used in the running of a business that senses or controls physical assets.

The Things of OT & the Lesson of Target Legacy SCADA Native IP Equipment IP Connectors

Strategic Planning Assumption By 2017, half of global enterprises responsible for OT will have integrated IT/OT cybersecurity planning practices. Reasons why SPA will be true: The budget for increasing complexity in IT and OT security requires cost savings moves. IT security technology is being applied increasingly to OT security problems. OT is the first of several integration phases for security and risk in the enterprise stay tuned for physical security and the securing the Internet of Things. Reasons why SPA may be false: Differences in mission, culture and process will keep IT and OT apart longer. Progress delays in technical standards for OT security will slow market adoption. Skills shortages will take longer to overcome.

Part 3 How can organizations prepare for the IoT?

Understand your new role in the IoT security universe Information Security IT Security OT Security Physical Security IoT Security Cybersecurity Digital Security

Map the role of IoT security into the 2020 security scenario AUTHORITY Tribal Coalition Rule Neighborhood Watch Enterprise Individual Regulated Risk Controlling Parent TARGET Monolithic

Embrace secure IoT practice as part of the new digital workplace Data Science Social Science Cognitive Science Behavioral Science 27

Ensure your IoT strategy has privacy and trust as foundations Privacy Buy It and Give Control to Customer Digital Security Build It Trust Earn It Great products, services, experiences

Ensure that IoT and cloud security are part of the same framework The Digital Business Enterprise Enterprise Security Application 'Store' Security Services Broker (Enterprise and cloud) Private Cloud Security Services Public Cloud Security Services Managed or Hosted Security Services Enterprise Security Infrastructure Mobile, OT and IoT Security Services

Leverage Written Guidance, Frameworks and Methodologies ISO/IEC 27001 IEC 62443/ISA-99 NIST SP Guides ES-ISAC DHS-TSA DHS-CFAT NERC CIP RG 5.71 CERT CPNI ENISA SANS UCA Strategy and Governance Management and Operations

Organizations Must Address the Security Skills Shortfall Relationship and Relative Availability OT Security IT IT Security OT Engineering Source: Protecting Industrial Control Systems from Electronic Threats, by Joseph Weiss

Security Architecture Becomes Critical Identify the constituencies in the IoT constituencies are not just people Determine the number of different security baselines (2-5) Define baselines as control sets Map the constituencies, their boundaries and their shared functional requirements Define the connection requirements between constituencies specify proxies to support them with filtering and monitoring controls as appropriate Design a network architecture that creates zones, each at or above a defined baseline, to contain each constituency. 32

Deploy an Adaptive Protection Architecture Threat Intelligence Community Intelligence Vendor Labs Policy Vulnerability Insights Context Next-generation security protection platforms Continuous Monitoring 33 Embedded Analytics

Design for new security challenges in a world of zones Core IT Zones IT to IoT Management Zones IoT Control Zones Back office The World 34

Recommendations Engage your business make sure you know how they are developing IoT-related business initiatives. Actively increase awareness to the business of IoT security and risk implications and impact. Plug into industry initiatives and standards development around secure embedded systems and M2M communications. Establish education and training for selected security planners in IoT principles and concepts.

Recommended Gartner Research Forecast: The Internet of Things, Worldwide Peter Middleton, Peter Kjeldsen, and Jim Tully (G00259115) What Securing the Internet of Things Means for CISOs Earl Perkins (G00259020) Cool Vendors in the Internet of Things, 2014 Alfonso Velosa and others (G00262623) The Impact of the Internet of Things on Data Centers Fabrizio Biscotti and others (G00250562) Hype Cycle for the Internet of Things Hung LeHong (G00252763) For more information, stop by Gartner Research Zone.