Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

Similar documents
QUANTIFIED SELF A Path to Self-Enlightenment or Just a Security Nightmare?

MEPTEC. Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015

Facing Up to the Threats of Cyber A6acks in a 5G World

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Connected Intelligence and the 21 st Century Digital Enterprise

How To Understand The Power Of The Internet Of Things

The SMB Cyber Security Survival Guide

IoT: New Opportunities for Semiconductor Industry Growth. Andrew C. Russell Vice President Marketing Greater China

Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things

CORE Education s Ten Trends matrix 2013

Here s what they are predicting we should watch out for in : Resolve To Be Digitally Secure 2012 Threats: Are You Ready?

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

Mobility. Mobility is a major force. It s changing human culture and business on a global scale. And it s nowhere near achieving its full potential.

In the pursuit of becoming smart

Cyber Security. John Leek Chief Strategist

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Mobile Payments: The Market for Travelers, Unbanked, and No/Low Credit Users

Top 10 Tech Predictions for Bob O Donnell, President and Chief Analyst

Five Trends to Track in E-Commerce Fraud

Is your business secure in a hosted world?

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

How to Secure Your Environment

OCR LEVEL 3 CAMBRIDGE TECHNICAL

2012 NCSA / Symantec. National Small Business Study

The Evolving Internet of Things Market

Executive Summary P 1. ActivIdentity

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China

Securing Corporate on Personal Mobile Devices

Future Focus: What s Coming in Enterprise Mobility Management (EMM) FUTURE FOCUS. What s Coming in Enterprise Mobility Management.

Today s mobile ecosystem means shared responsibility

Key Trends in Enterprise Mobility. Shaun Collins

Endpoint protection for physical and virtual desktops

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

Healthcare Delivery. Transforming. through Mobility Solutions. A Solution White Paper - version 1.0

WHITE PAPER Security in M2M Communication What is secure enough?

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

2016 Digital Safety Class UNDERSTAND YOUR RISKS AND STAY TOTALLY SECURE JESSE ROBERTSON, TECH 4 LIFE

RUNNING HEAD: BRING YOUR OWN DEVICE 1

Best Practices for Integrating Mobile into the Access Control Architecture

WHITEPAPER. Combating Cybercrime A Collective Global Response

Big Data or Data Tsunami - The Challenge of accessing meaningful clinical information. Can we learn from other industries?

Splunk Company Overview

Westcon Presentation on Security Innovation, Opportunity, and Compromise

IoT basics: Getting started with the Internet of Things

KEY LEGAL ISSUES IN TODAY S MOBILE MARKETING:

Frequently asked questions

Software Token Security & Provisioning: Innovation Galore!

Securing Your Enterprise in the Cloud. IT executives must be ready to move to the cloud safely

"Secure insight, anytime, anywhere."

Click to edit Master title style

Enabling Smart Data on M2M Gateways and Aggregators

MES and Industrial Internet

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

ICT Development Trends (2014): Embracing the Era of Mobile-ICT

Application Development, Distribution and HCI for a Post-PC Era

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

NETWORK SECURITY, REIMAGINED FPO

Hemant Kulkarni MOBILE BI HYPE OR REAL NEED?

Risks and Rewards of the Internet of Things. Findings From ISACA s 2013 IT Risk/Reward Barometer

Securing the Mobile Enterprise. How mobile devices, BYOD and other trends are driving a need for a new approach to mobile security

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com

Connected Homes: Enabling a Digital Lifestyle

Component 4: Introduction to Information and Computer Science. Topic III: Cloud Computing. Distributed computing

Is the Future of Public Service Delivery Mobile-Only?

How To Protect Your Business Information From Being Stolen From A Cell Phone Or Tablet Device

INFORMATION SECURITY FOR YOUR AGENCY

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Top 10 IT Trends that will shape David Chin Chair BICSI Southeast Asia

NOK NOK LABS AUTHENTICATION & OTT SERVICES

Project 2020: Preparing Your Organization for Future Cyber Threats Today

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Internet threats: steps to security for your small business

Trust No One Encrypt Everything!

The Internet of Things: Opportunities & Challenges

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

CSUF Tech Day Security Awareness Overview Dale Coddington, Information Security Office

Tronico Technology Company Limited. First step of IOT - DIY smart home

Entrust IdentityGuard

Towards the Web of Things

PRIVATE NETWORK Take control of your network with Verizon Wireless Private Network and 4G LTE.

2012 Bit9 Cyber Security Research Report

The Internet of Things (IoT) Opportunities and Risks

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Security and Compliance challenges in Mobile environment

Education in Transition. Learning in the 21 st Century. Paige Johnson Education Strategist Intel

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Tom Schauer TrustCC cell

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Smart Systems: the key enabling technology for future IoT

Hear from 4,000+ IoT developers in 15 minutes..and who are the early winners in the IoT platform landscape

Mobile Application Marketplace 2015: Market Analysis and Assessment of Future Evolution and Opportunities

Information Security It s Everyone s Responsibility

The Convergence of IT Security and Physical Access Control

PREP Course #25: Hot Topics in Cyber Security and Database Security. Presented by: Joe Baskin Manager, Information Security, OCIO

CYBERCRIME AND THE HEALTHCARE INDUSTRY

BYOD THE SMALL BUSINESS GUIDE TO BRING YOUR OWN DEVICE

IDENTITY & ACCESS. Providing Cost-Effective Strong Authentication in the Cloud. a brief for cloud service providers

Transcription:

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

3.58 KM 12.11 KPH 493 Calories 114 BPM WEARABLE TECH EVOLUTION AND SECURITY GRANT BROWN SECURITY STRATEGIST @thegrantbrown V1.1 2

WEARABLE IS PART OF A RAPIDLY EXPANDING TECHNOLOGY LANDSCAPE DATA GROWTH INTERNET OF THINGS BIG DATA CONSUMERIZATION CLOUD MOBILE SOFTWARE DEFINED OPEN SOURCE CONVERGED

ONE COMPUTER -- TO MANY DEVICES 4

CONSTANT CONNECTION 5

INFORMATION HERE TO INFORMATION EVERYWHERE 6

INTERNET OF EVERYTHING 7

Wearable Technology WEARABLE TECHNOLOGY Presentation Identifier Goes Here 8

WEARABLE TECH IS RESULT OF KEY TECH THEMES INTERACTING Smartphone as core to access systems Cognizant Computing Mobile wallet Internet based communications Expanding Smartphone and Tablet Usage Critical infrastructure and manufacturing Smart Homes / Cities Cars with mobile functionality Internet of Things Fitness and lifestyle Fashion and Style Connectivity Privacy concerns Smaller devices Wearable Technology Open Data rather than just big Data Increase in Data Volumes Connecting of information to social Big Data and Open / Social Information Non-Tech Savvy Users Left behind by the innovation Confusion for users Will wearable make this easier or harder? Wider Accessibility

NEW THREATS ARISE AS NEW TECHNOLOGY REACHES CRITICAL MASS M2M Internet of Things Wearable Technology PCs Servers Internet ecommerce Viruses Worms Mobility Cloud Identity Theft DDoS Mobile Malware Social Media Terrorism? Privacy Manipulation of Data

PRIVACY AND SECURITY Protection across the ecosystem Across networks, devices and content Cloud Brokers Implementation of Protection Hacking Internet of Things Compromise physical security from digital Ransomware Hacktivism Cybercrime affecting the physical world People centric authentication Biometrics Location Context Behaviour Authentication Multiple online personae Separation of work and personal Expansion of privacy services Provenance on Social Media and Websites Anonymity and Provenance Expansion of regulation Harmonisation and cooperation across borders. Manage security exposure from sharing information online? Privacy and Data Protection

A DATA EXPLOSION! 12 A large and growing market with big security problems Surveillance Data Breach Stalking ID Theft Privacy Safety 60% US Adults Self-Track (Pew Research) 170M Self-Tracking Devices to Ship in 2017 (ABI Research)

ANATOMY OF A SELF-TRACKING DEVICE 13 Battery Splash-proof cover Motor Generates vibrations for discrete feedback Motion sensor Multi-axis motion detector Bluetooth chip For wireless syncing with computer/phone Power button Status LEDs Syncing jack For wired syncing with phone/tablet & charging TRACKING YOUR EVERY MOVE

ANOTHER TRACKING DEVICE 14 Magnetometer Proximity & ambient light sensors Yaw Roll Magnetic field Cameras front & back Pitch GPS sensor Gyroscopic sensor Microphone Accelerometer A SENSOR FOR EVERYTHING

WHERE THE BITS FIT IN 15 More moving parts = more risks RISK RISK RISK 23.56 KM 123 BPM 15. 8 RISK RISK

PERSONAL DATA S NEW FRIEND 16 Traditional personally identifiable information (PII) NAME SLEEP DOB ADDRESS RISK GPS COORDS GLUCOSE MOOD ID # WEIGHT meets quantified self Information

SELF-TRACKING IS RISKY FOR USERS 17 Your digital footprint will be everywhere! 23.56 KM 123 BPM 15.8 52% Do not have a privacy policy 20% Login credentials in clear text (Apps that require login) 14 Domains contacted by apps

MEET BLUEBERRY PI! 18 TOTAL PRICE $75 4GB SD Card $5 Raspberry pi $35 Bluetooth 4.0 USB dongle $7 Battery pack $28 OUR BLUETOOTH TRACKER

TRIGGERS OUTCOMES AND SOCIETAL IMPACT MATRIX Business motivations that will either drive or inhibit adoption and use of new technology Personal motivation that will either drive or inhibit an individual s adoption and use of new technology Government motivations that will either drive or inhibit government use of technology and possible regulation and laws Current and emerging trends in data collection, analytics systems and information storage and management Systems and ways that users interact with each other and machines. Also includes machine to machine (M2M) interfaces E.g.; mobile apps, Facebook, Twitter, Smart Systems etc. Ecosystems that involve locking information, devices, interfaces into a system in order to get benefit from that system. For example, cloud service providers, Facebook, Apple, Google Devices and technology. Ranging from consumer devices to industrial technology.

TRIGGERS OUTCOMES AND SOCIETAL IMPACT MATRIX Drivers Business Cost Efficiency Profit New Markets Ethics Competitive Customer Advantage Information Personal Personal Health Privacy Convenience Personal Capabilities Comfort Quality of Life Fashion Religion Govt Cost Efficiency Privacy Legal Aging Population Regulation Public Health &Safety Cultural Norms Trust and Services Interactions Activity tracking Location awareness Biometric Data Context Data Predictive Analytics for health Information Interfaces Social M2M Media RFID Nano-Bio Gesture Visual Brainwave Physical Wearable Apps Non- Bio Technical Printers Users Current Triggers Future Triggers Inhibitors Infrastructure Human Body Cloud Cognizant Computing Connected Healthcare Home Mobile Environment Platforms Ecosystems Devices Augmented Human Sensors Implants Manufactured Activity Organs Trackers Google Power Glass Mobile

RISKS AND OPPORTUNITIES FROM AUGMENTED HUMAN Strengths Health and lifestyle information Augmented reality to assist with access to information online Easier access to Smartphones and the Internet Opportunities Health Monitoring Personal Security and Safety Public Safety and Security Cognizant Computing Inputs and Information to Assist with treatment and diagnosis Weaknesses Standards and connectivity Power and communications requirements Increase in information that can be attacked as more information becomes digitized. Leaving the non-digital behind? Threats Ability for a third party to take over wearable device ransom, bullying, terrorism Privacy Data stolen by 3 rd party Glassholes Black-market and fraudulent sales in augmentation technologies 21

FOR THIS NEW WORLD TO FUNCTION, THERE NEEDS TO BE TRUST 22

INFORMATION TECHNOLOGY IS MATURING IF WE RE EMBEDDING TECHNOLOGY WE NEED TO EMBED SECURITY Last 20 years improvements in security and performance Next 5 years improvements in security and performance

As Devices become Smarter, Data more Personalized, Connectivity increasingly Pervasive, New Methods of Protection will be Required Virtual Personal Security Vendors such as Symantec working beyond our traditional markets Assets Physical 24

INFORMATION PEOPLE

CONTEXT AND RELEVANCE Context - Which Device am I on? Context - Where am I? Was I there 5 minutes ago? Identity - Who am I? Policy Do I have rights to this information? Trust and Security Context = + +

UNIVERSAL IDENTITY IDENTITY AND TRUST MODEL INTELLIGENT AUTHENTICATION OF USERS, DEVICES BIOMETRICS, LOCATION, CONTEXT, BEHAVIOR A FUTURE WITH NO PASSWORDS 27

SYMANTEC S ROLE IN EVOLVING INTERNET The information protection authority Data Systems Identities Interactions Security Storage Availability Innovator Advisor Influencer Leader 28