SlideShare uma empresa Scribd logo
1 de 40
Baixar para ler offline
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
THE STATE OF IoT SECURITY
SHAWN HENRY, President of Services & CSO
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
1 Threats and Vulnerabilities
2
Impact of unsecure devices: industrial and
critical infrastructures,
3 …in smart cities,
4 …in the home
5 The Future of IoT Security
6 Questions
THREATS AND VULNERABILITIES
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
THE INTERNET OF THINGS: BY THE NUMBERS
Gartner & IDC estimate the amount and cost of IoT devices at:
YEAR 2016:
6.4 billion devices
totaling over
$235 billion
YEAR 2020:
20 billion devices
totaling over
$1.7 trillion
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.Reference: Ericsson Mobility Report 2016
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
HOW MUCH WILL BE SPENT ON IoT SECURITY?
Worldwide IoT Security Spending Forecast (Millions of Dollars)
2014 2015 2016 2017 2018
$231.86 $281.54 $348.32 $433.95 $547.20
Reference: Forecast: IoT Security, Worldwide, Gartner, April 2016
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
THE INTERNET OF VULNERABILITIES
 IoT Village at DEF CON 2016:
 47 new vulnerabilities affecting
 23 devices from
 21 manufacturers
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
THE INTERNET OF VULNERABILITIES
• Late 2016 brought the rise of Mirai, the botnet “that broke the
Internet”
• Exploits vulnerabilities on unsecure IoT devices
• CCTV cameras, routers, DVRs, smart TVs, etc.
• Continuously scans for connected IoT devices configured with
factory default settings
2015 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
INTERNET OF THINGS
ADVERSARY PRIORITIES
 Vehicle Systems
 ICS/SCADA
 Network Devices
 EFI Firmware
 Embedded Applications
 Linux/Unix
 BSD
 VxWorks
 QNX
INDUSTRIAL IoT AND SMART CITIES
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Reference: The Internet Of Things Heat Map, 2016 --Forrester
THE GROWTH OF IoT AT A GLANCE
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
INDUSTRIAL IoT
Bain: by 2020 annual revenues could exceed $470B
for IoT vendors
General Electric: investment in the Industrial Internet
of Things (IIoT) to exceed $60 trillion during the next
15 years
Reference: Forecast: IoT Security, Worldwide, Gartner, April 2016
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
INDUSTRIAL IoT
“Lufthansa is using an IoT-based strategy to create an
entirely new business mining data from their maintenance,
repair and overhaul operations and providing it to their
customers.” –Forbes
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
FIRST, THE GOOD NEWS…
“Enterprises lead small and medium size businesses in IoT
adoption and interest by more than 10 points”
“23% percent of global enterprise respondents use IoT, but
only about 14% of small and medium-size business
respondents do.”
- Forbes
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
SIEMENS STEP-7 ICS DEVICES ON SHODAN
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
INFRASTRUCTURE ATTACK:
ENERGY GRID
 Dec 2015: Ukrainian power stations hacked
 Commands disable UPS systems –225,000 customers go dark
 “From an attack perspective, it was just so awesome. I mean
really well done by them.”
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
INFRASTRUCTURE ATTACK:
DAM CONTROL SYSTEM
 2013: Iranian hackers infiltrated the control system of a dam via
Google hacking
 Officials identified the dam breach while investigating the same
hackers conducting attacks on the US financial infrastructure
 Fortunately, the dam was out of commission for repairs during
the attack so the flood gate was unaffected
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
SMART CITIES
 Google’s Sydney office hacked
via its building management
system
 Michigan researchers hacked
into wireless traffic lights
 ATMs robbed via Smartphones
in Taiwan
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
CCTV HACKING (UKRAINE)
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
VEHICLE TELEMATICS
Researcher hack publicly available Telematics Gateway Units.
 Cellular modem with public IP address
 Mandated for commercial trucking in 2017
 Trucks, ambulances, buses, industrial vehicles
 GPS location, speed, fuel efficiency, potential for vehicle
controls (ignition, brakes, etc.)
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
TRUCKING TELEMATICS (PORT 23)
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
TIMELINE OF VEHICLE HACKS
• 2015: Researchers hack a Jeep’s
digital system over the Internet
Chrysler recalls 1.4M vehicles
• 2016: USG issues PSA about the
“real rise” of car hacking
• 2017: Legislation calls for car
cybersecurity standards
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
VEHICLE INFOTAINMENT
Vehicles pre-equipped with:
• WiFi
• BlueTooth
• Microphones
• Cloud-based content sharing
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
PROTECTING THE CONSUMER
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
WIRED HOMES
 LG announced all home appliances will feature:
 Advanced Wi-Fi connectivity
 DeepThinkQ technology
 Each item to learn from its owner’s patterns
 Example: smart refrigerator featuring a camera and
voice-activated system powered by Amazon’s Alexa
Reference: BU News Service
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Photo: iFixit.com
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
WEBCAMS
Reference: Selling Slaving, Digital Citizens Alliance
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
PUBLICLY AVAILABLE BACKUP DRIVES
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
WEARABLES
Worldwide shipments of
wearable devices belived to
have reached110 million in
2016 with 38.2% growth year
over year
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
MEDICAL DEVICES
THE FUTURE OF IoT
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
THE NEXT MIRAI
IoT devices continue to remain unsecure:
 Outdated code
 Poorly maintained operating systems
 “Install and Forget” model
 No patching
 Long lifespan of devices
 Default credentials
 Lack of security solutions
 “Minimal Viable Products”
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
THE NEXT MIRAI
• Mirai converted IOT devices into a botnet for DDoS
• Estimates range up to 400,000 devices controlled
• ~250,000,000 CCTV cameras are deployed around the
world
• Source code is
openly available
• What happens when botnets are converted from DDoS to access platforms?
WE’VE SEEN THE PROBLEMS….
NOW HOW DO WE SECURE OURSELVES IN THE
AGE OF IoT?
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
STEPS IN SECURING IoT
1) Major expansion of
supply chain, network
edge devices, and
cloud operations
2) Defense in depth and
limiting the attack
surface
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
3) Red teaming and
penetration testing
4) Device reverse
engineering and due
diligence
STEPS IN SECURING IoT
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
5) Vendor pressure to provide
adequate and standardized
logging
6) Security devices that can
interact with a multitude of
network protocols
STEPS IN SECURING IoT
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
7) Managed security
services
8) Government
Regulations and
Liabilities for Consumer
Devices
STEPS IN SECURING IoT
QUESTIONS?
2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

Mais conteúdo relacionado

Mais procurados

Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...CableLabs
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoTMONICA-Project
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsDesign World
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015Hildebrand Technology
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of ThingsRishabh Sharma
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTWSO2
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetNathan Wallace, PhD, PE
 

Mais procurados (20)

Iot(security)
Iot(security)Iot(security)
Iot(security)
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Contextual Cyber Security for IoT
Contextual Cyber Security for IoTContextual Cyber Security for IoT
Contextual Cyber Security for IoT
 
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure ThingsSecurity Fundamental for IoT Devices; Creating the Internet of Secure Things
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Your Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoTYour Thing is Pwned - Security Challenges for the IoT
Your Thing is Pwned - Security Challenges for the IoT
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
IoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the InternetIoT Security: How Your TV and Thermostat are Attacking the Internet
IoT Security: How Your TV and Thermostat are Attacking the Internet
 

Semelhante a "The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security

IoT Scotland 2018
IoT Scotland 2018IoT Scotland 2018
IoT Scotland 2018Ray Bugg
 
How many "things" are there in the Internet of Things?
How many "things" are there in the Internet of Things?How many "things" are there in the Internet of Things?
How many "things" are there in the Internet of Things?Swathi Young
 
Bii 30bigtechpredictions 2017
Bii 30bigtechpredictions 2017Bii 30bigtechpredictions 2017
Bii 30bigtechpredictions 2017MYO AUNG Myanmar
 
30 Big Tech Predictions for 2017
30 Big Tech Predictions for 201730 Big Tech Predictions for 2017
30 Big Tech Predictions for 2017Filipp Paster
 
30 Big Tech Predictions for 2017
30 Big Tech Predictions for 201730 Big Tech Predictions for 2017
30 Big Tech Predictions for 2017MYO AUNG Myanmar
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsForgeRock
 
Revolutionising Facility Management Services Through Internet of Things - Is ...
Revolutionising Facility Management Services Through Internet of Things - Is ...Revolutionising Facility Management Services Through Internet of Things - Is ...
Revolutionising Facility Management Services Through Internet of Things - Is ...Dr. Mazlan Abbas
 
5G What it means for IoT
5G What it means for IoT5G What it means for IoT
5G What it means for IoTMr Risman
 
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
Iot tunisia forum 2017    internet of things trends_directions and opportunit...Iot tunisia forum 2017    internet of things trends_directions and opportunit...
Iot tunisia forum 2017 internet of things trends_directions and opportunit...IoT Tunisia
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart CityDr. Mazlan Abbas
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...Knud Lasse Lueth
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoTAnalytics
 
Your IOT Journey Starts Here
Your IOT Journey Starts HereYour IOT Journey Starts Here
Your IOT Journey Starts HereDr. Mazlan Abbas
 
Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Dr. Mazlan Abbas
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017Ahmed Banafa
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIPerry Lea
 
uniten-june21-v1-160621070721.pdf
uniten-june21-v1-160621070721.pdfuniten-june21-v1-160621070721.pdf
uniten-june21-v1-160621070721.pdfLê Duy Tân
 
Top Adopters of IoT in 2018 - An Infographic by RapidValue
Top Adopters of IoT in 2018 - An Infographic by RapidValueTop Adopters of IoT in 2018 - An Infographic by RapidValue
Top Adopters of IoT in 2018 - An Infographic by RapidValueRapidValue
 

Semelhante a "The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security (20)

IoT Scotland 2018
IoT Scotland 2018IoT Scotland 2018
IoT Scotland 2018
 
How many "things" are there in the Internet of Things?
How many "things" are there in the Internet of Things?How many "things" are there in the Internet of Things?
How many "things" are there in the Internet of Things?
 
Bii 30bigtechpredictions 2017
Bii 30bigtechpredictions 2017Bii 30bigtechpredictions 2017
Bii 30bigtechpredictions 2017
 
30 Big Tech Predictions for 2017
30 Big Tech Predictions for 201730 Big Tech Predictions for 2017
30 Big Tech Predictions for 2017
 
30 Big Tech Predictions for 2017
30 Big Tech Predictions for 201730 Big Tech Predictions for 2017
30 Big Tech Predictions for 2017
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
 
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
IDC FutureScape : Worldwide Internet of Things 2017 Predictions.
 
IoT and AI
IoT and AIIoT and AI
IoT and AI
 
Revolutionising Facility Management Services Through Internet of Things - Is ...
Revolutionising Facility Management Services Through Internet of Things - Is ...Revolutionising Facility Management Services Through Internet of Things - Is ...
Revolutionising Facility Management Services Through Internet of Things - Is ...
 
5G What it means for IoT
5G What it means for IoT5G What it means for IoT
5G What it means for IoT
 
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
Iot tunisia forum 2017    internet of things trends_directions and opportunit...Iot tunisia forum 2017    internet of things trends_directions and opportunit...
Iot tunisia forum 2017 internet of things trends_directions and opportunit...
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
 
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
IoT Meetup Hamburg 3 February 2015 - Getting Hamburg set-up for the Internet ...
 
Your IOT Journey Starts Here
Your IOT Journey Starts HereYour IOT Journey Starts Here
Your IOT Journey Starts Here
 
Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)Current Trends in Internet of Things (IOT)
Current Trends in Internet of Things (IOT)
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROI
 
uniten-june21-v1-160621070721.pdf
uniten-june21-v1-160621070721.pdfuniten-june21-v1-160621070721.pdf
uniten-june21-v1-160621070721.pdf
 
Top Adopters of IoT in 2018 - An Infographic by RapidValue
Top Adopters of IoT in 2018 - An Infographic by RapidValueTop Adopters of IoT in 2018 - An Infographic by RapidValue
Top Adopters of IoT in 2018 - An Infographic by RapidValue
 

Último

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Último (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security

  • 1. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. THE STATE OF IoT SECURITY SHAWN HENRY, President of Services & CSO
  • 2. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. 1 Threats and Vulnerabilities 2 Impact of unsecure devices: industrial and critical infrastructures, 3 …in smart cities, 4 …in the home 5 The Future of IoT Security 6 Questions
  • 3. THREATS AND VULNERABILITIES 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 4. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. THE INTERNET OF THINGS: BY THE NUMBERS Gartner & IDC estimate the amount and cost of IoT devices at: YEAR 2016: 6.4 billion devices totaling over $235 billion YEAR 2020: 20 billion devices totaling over $1.7 trillion
  • 5. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.Reference: Ericsson Mobility Report 2016
  • 6. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. HOW MUCH WILL BE SPENT ON IoT SECURITY? Worldwide IoT Security Spending Forecast (Millions of Dollars) 2014 2015 2016 2017 2018 $231.86 $281.54 $348.32 $433.95 $547.20 Reference: Forecast: IoT Security, Worldwide, Gartner, April 2016
  • 7. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. THE INTERNET OF VULNERABILITIES  IoT Village at DEF CON 2016:  47 new vulnerabilities affecting  23 devices from  21 manufacturers
  • 8. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. THE INTERNET OF VULNERABILITIES • Late 2016 brought the rise of Mirai, the botnet “that broke the Internet” • Exploits vulnerabilities on unsecure IoT devices • CCTV cameras, routers, DVRs, smart TVs, etc. • Continuously scans for connected IoT devices configured with factory default settings
  • 9. 2015 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. INTERNET OF THINGS ADVERSARY PRIORITIES  Vehicle Systems  ICS/SCADA  Network Devices  EFI Firmware  Embedded Applications  Linux/Unix  BSD  VxWorks  QNX
  • 10. INDUSTRIAL IoT AND SMART CITIES 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 11. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. Reference: The Internet Of Things Heat Map, 2016 --Forrester THE GROWTH OF IoT AT A GLANCE
  • 12. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. INDUSTRIAL IoT Bain: by 2020 annual revenues could exceed $470B for IoT vendors General Electric: investment in the Industrial Internet of Things (IIoT) to exceed $60 trillion during the next 15 years Reference: Forecast: IoT Security, Worldwide, Gartner, April 2016
  • 13. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. INDUSTRIAL IoT “Lufthansa is using an IoT-based strategy to create an entirely new business mining data from their maintenance, repair and overhaul operations and providing it to their customers.” –Forbes
  • 14. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. FIRST, THE GOOD NEWS… “Enterprises lead small and medium size businesses in IoT adoption and interest by more than 10 points” “23% percent of global enterprise respondents use IoT, but only about 14% of small and medium-size business respondents do.” - Forbes
  • 15. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. SIEMENS STEP-7 ICS DEVICES ON SHODAN
  • 16. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. INFRASTRUCTURE ATTACK: ENERGY GRID  Dec 2015: Ukrainian power stations hacked  Commands disable UPS systems –225,000 customers go dark  “From an attack perspective, it was just so awesome. I mean really well done by them.”
  • 17. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. INFRASTRUCTURE ATTACK: DAM CONTROL SYSTEM  2013: Iranian hackers infiltrated the control system of a dam via Google hacking  Officials identified the dam breach while investigating the same hackers conducting attacks on the US financial infrastructure  Fortunately, the dam was out of commission for repairs during the attack so the flood gate was unaffected
  • 18. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. SMART CITIES  Google’s Sydney office hacked via its building management system  Michigan researchers hacked into wireless traffic lights  ATMs robbed via Smartphones in Taiwan
  • 19. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. CCTV HACKING (UKRAINE)
  • 20. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. VEHICLE TELEMATICS Researcher hack publicly available Telematics Gateway Units.  Cellular modem with public IP address  Mandated for commercial trucking in 2017  Trucks, ambulances, buses, industrial vehicles  GPS location, speed, fuel efficiency, potential for vehicle controls (ignition, brakes, etc.)
  • 21. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. TRUCKING TELEMATICS (PORT 23)
  • 22. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. TIMELINE OF VEHICLE HACKS • 2015: Researchers hack a Jeep’s digital system over the Internet Chrysler recalls 1.4M vehicles • 2016: USG issues PSA about the “real rise” of car hacking • 2017: Legislation calls for car cybersecurity standards
  • 23. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. VEHICLE INFOTAINMENT Vehicles pre-equipped with: • WiFi • BlueTooth • Microphones • Cloud-based content sharing
  • 24. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. PROTECTING THE CONSUMER
  • 25. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. WIRED HOMES  LG announced all home appliances will feature:  Advanced Wi-Fi connectivity  DeepThinkQ technology  Each item to learn from its owner’s patterns  Example: smart refrigerator featuring a camera and voice-activated system powered by Amazon’s Alexa Reference: BU News Service
  • 26. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 27. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. Photo: iFixit.com
  • 28. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. WEBCAMS Reference: Selling Slaving, Digital Citizens Alliance
  • 29. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. PUBLICLY AVAILABLE BACKUP DRIVES
  • 30. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. WEARABLES Worldwide shipments of wearable devices belived to have reached110 million in 2016 with 38.2% growth year over year
  • 31. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. MEDICAL DEVICES
  • 32. THE FUTURE OF IoT 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 33. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. THE NEXT MIRAI IoT devices continue to remain unsecure:  Outdated code  Poorly maintained operating systems  “Install and Forget” model  No patching  Long lifespan of devices  Default credentials  Lack of security solutions  “Minimal Viable Products”
  • 34. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. THE NEXT MIRAI • Mirai converted IOT devices into a botnet for DDoS • Estimates range up to 400,000 devices controlled • ~250,000,000 CCTV cameras are deployed around the world • Source code is openly available • What happens when botnets are converted from DDoS to access platforms?
  • 35. WE’VE SEEN THE PROBLEMS…. NOW HOW DO WE SECURE OURSELVES IN THE AGE OF IoT? 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
  • 36. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. STEPS IN SECURING IoT 1) Major expansion of supply chain, network edge devices, and cloud operations 2) Defense in depth and limiting the attack surface
  • 37. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. 3) Red teaming and penetration testing 4) Device reverse engineering and due diligence STEPS IN SECURING IoT
  • 38. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. 5) Vendor pressure to provide adequate and standardized logging 6) Security devices that can interact with a multitude of network protocols STEPS IN SECURING IoT
  • 39. 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED. 7) Managed security services 8) Government Regulations and Liabilities for Consumer Devices STEPS IN SECURING IoT
  • 40. QUESTIONS? 2017 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.