securing the internet of things
play

Securing the Internet of Things CSM-ACE 2013 13 November 2013 - PowerPoint PPT Presentation

Intelligence and Security Informatics Securing the Internet of Things CSM-ACE 2013 13 November 2013 www.cyberunited.com Darin Andersen 20 Years Hi-Tech and 12 Years Cybersecurity Experience International Cyber Speaker, Insider Threat, SiOT


  1. Intelligence and Security Informatics Securing the Internet of Things CSM-ACE 2013 13 November 2013 www.cyberunited.com

  2. Darin Andersen 20 Years Hi-Tech and 12 Years Cybersecurity Experience International Cyber Speaker, Insider Threat, SiOT Created “Securing our eCity” (2008) “Securing the Internet of Things Forum” (2012) CyberTECH – Eco system for iOT + Cyber CyberHive – Cyber & Big Data Inccubator CyberUnited www.cyberunited.com Intersect - Threat Detection & Prevention System www.cyberunited.com

  3. iOT Defined “Things” have identities and operate in “smart mode” using “intelligent interfaces” to connect and communicate within social, environmental, and user contexts www.cyberunited.com

  4. 3 Dimensional Convergence Connectivity Everywhere Miniaturization Sensors Big Data GPS Defense & Cyber Predictive Analytics Life Sciences Machine Learning Health Sciences Informatics Sports & Active www.cyberunited.com

  5. iOT by the Numbers $5.0 trillion market, growing to $9.0 trillion by 2020 (IDC) 50 billion devices connected by 2020 (Cisco) 220 exabytes of data storage by 2015 (ASPIRE) 40% decrease in iOT related costs by 2020 (GE) www.cyberunited.com

  6. Mobile iOT 2020 www.cyberunited.com

  7. Making Things Smarter Internet of things Internet Things Sensor Networks Sensors Local Area Communications Sensors RFID Local Scanning Devices Storage & Analytics User Facing Services Intelligent Tags November 18, 2013 www.cyberunited.com

  8. iOT Use Cases Continuous firmware/upgrades for vehicles Asset tracking of goods in transit Home & industrial building automation “Smart” infrastructure and consumer goods Real-time health monitoring diagnosis & drug delivery www.cyberunited.com

  9. iOT Healthcare Use Case 55% growth in health monitoring in 2013 Up from 22% in 2012 WHY COMPELLING • Scaled Expertise • Ongoing Monitoring • Hospital Prevention www.cyberunited.com

  10. iOT Security Challenges CRITICAL FACTORS “ Exafloods ” of data to protect Miniaturization and “small” energy requirements Information “availability” with assured integrity Confidentiality and privacy BAD ACTORS External Attack Malicious Insider Threat + Impostors November 18, 2013 www.cyberunited.com

  11. iOT Privacy and Security Executing against our promise ? Protecting Sensitive Data ? Adequately protecting data ? Do customers have choice ? Properly Disposing of In Compliance ? Customer Data ? Do customers have visibility and and ability to order corrections ? High Data Integrity ? Is data accurate ? In Compliance ? www.cyberunited.com

  12. Hacking Hacking the the iOT iOT Fraud IT Sabotage IP Theft Tampering www.cyberunited.com

  13. iOT Insider iOT Insider Threat Threat www.cyberunited.com

  14. How Do We Find Insiders Today By Accident After the Fact Not at All www.cyberunited.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend