top ten challenges of securing smart infrastructure
play

Top Ten Challenges of Securing Smart Infrastructure Niloufer - PowerPoint PPT Presentation

Top Ten Challenges of Securing Smart Infrastructure Niloufer Tamboly, CISSP, CCSP, CPA I am Niloufer Tamboly I am a risk management professional and help companies manage risk, execute cybersecurity strategy and accept risks appropriately


  1. Top Ten Challenges of Securing Smart Infrastructure Niloufer Tamboly, CISSP, CCSP, CPA

  2. I am Niloufer Tamboly I am a risk management professional and help companies manage risk, execute cybersecurity strategy and accept risks appropriately based on quantified risk appetite. I am the organizer of the largest cybersecurity career MeetUp group. Since 2012, I’ve coached IT professionals transition to a career in cybersecurity. Connect with me on LinkedIn! 2

  3. Why Do I Care? IDC's Worldwide Semiannual Smart Cities Spending Guide: Worldwide spending on technologies for smart cities projects will grow to $135 billion by 2021 3

  4. What is smart infrastructure?

  5. Usability, not Security, is the focus 8

  6. Can’t identify or predict users environment ▸ Smart devices are ubiquitous so it is diffjcult to identify or predict the users environment. 9

  7. Participants People Process Systems The User Vendor Diversity Resilient network Shared Responsibility Security Operations Integrated Architecture 10

  8. Smart Infrastructure May Not 10 Be Critical Instructure ▸ Identify the critical information and the infrastructure because they may not be easily apparent. 11

  9. Devices Are Mobile 9 ▸ Due to the small form factor, devices are mobile and not all supporting infrastructure may be secure. 12

  10. Not All Smart Devices Are The Same 8 13

  11. Hardware Security 7 ▸ Cost, Data, Life of Device Considerations ▸ How much security can you expect from a $10 device? ▸ What type of data is stored, processed and transmitted? 14

  12. Using Standards of Yesterday 6 ▸ This includes mistakes made years ago, but were only recently discovered or disclosed which can have big implications in the future. 15

  13. High Level of Customization 5 16

  14. Increased Connectivity 4 17

  15. Evolving Threats 3 ▸ New threats come up once a product is released. ▸ Unknown unknowns 18

  16. 2 Sensor Security - Google Maps Fooled by Man Who Used 99 Smartphones to Create a Fake Traffic Jam 19

  17. Customer Engagement 1 ▸ Educating the customer and making them aware and engaged for security 20

  18. What Can We Do? ▸ Encourage users to participate ▸ Apply patches, firmware updates timely ▸ Secure physical access to build a defensive environment 21

  19. Credits Special thanks to all the people who made and released these awesome resources for free: ▸ Presentation template by SlidesCarnival ▸ Illustrations by Sergei Tikhonov ▸ Photographs by Unsplash 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend