SlideShare uma empresa Scribd logo
1 de 33
Baixar para ler offline
Silo Busters: The Value
of User and Data
Centricity beyond IoT
Devices
Stein Myrseth
Senior Technology Solutions
Director
ForgeRock
Gerhard Zehethofer
VP, Industries (IOT &
Manufacturing)
ForgeRock
© 2017 ForgeRock. All rights reserved.
The Value of User and Data
Centricity beyond IoT Device
Stein Myrseth & Gerhard Zehethofer
Austin May, 2018
© 2018 ForgeRock. All rights reserved.
4
© 2017 ForgeRock. All rights reserved.
… the data driven age ...
… from product centric to
customer / solution centricity …
Security & privacy
Scalability
TrustBusiness Value
Experience
© 2018 ForgeRock. All rights reserved.
“ … market disruption has been
found to be a function usually not
of technology itself but rather of
its changing application… ”Source: The innovators dilemma
© 2018 ForgeRock. All rights reserved.
New Mobility
Working
Health & Life
Traveling
Automotive
Connectivity
Payment
Government
Insurance
IoT/
Automation
…
…
From Verticals to Horizontals
© 2018 ForgeRock. All rights reserved.
Smart City and Mobility
Automotive – build the Connected Car
Services around Connected Cars
New Mobility – Use cases of physical mobility
Smart City - New Mobility & more
ECUIDs->CarID
ServiceID=CarID+UserID
NewMobilityID=ServiceID+User’sPersonas
SmartCityID=NewMobilityID+anyothereServiceID
OEMSpaceEcosystemSpace
© 2018 ForgeRock. All rights reserved.
Performance
Customers
Competition
Trust
01
02
03
04
• Shifting from asset based to customer intimacy / service
• Digital native demanding new experiences; Ease of use
• Bespoke has become the norm
Changing Customer Behavior
• Mandate to reduce cost of operations
• Good enough makes it hard to differentiate on product
• Lack of product related differentiation
• No low hanging fruits left
Eroding Margins
• Customer satisfaction measures are influenced by digital competition
• Digital natives deploy disruptive business models
• Digital rewards first movers and superfast followers
New players disrupt the status quo
• Privacy / New regulatory requirements on Data privacy (GDPR)
• Protect IP
• Trust / Image / Brand
Security
Trends That Force Change
© 2018 ForgeRock. All rights reserved.
Performance
Customers
Competition
Trust
01
02
03
04
• Shifting from asset based to customer intimacy / service
• Digital native demanding new experiences; Ease of use
• Bespoke has become the norm
Changing Customer Behavior
• Mandate to reduce cost of operations
• Good enough makes it hard to differentiate on product
• Lack of product related differentiation
• No low hanging fruits left
Eroding Margins
• Customer satisfaction measures are influenced by digital competition
• Digital natives deploy disruptive business models
• Digital rewards first movers and superfast followers
New players disrupt the status quo
• Privacy / New regulatory requirements on Data privacy (GDPR)
• Protect IP
• Trust / Image / Brand
Security
Trends That Force Change
Business Transformation
• New revenue streams
• New business models (transaction to
service)
• Value creation; value capture
Customer 360
Business Optimization
• Maximizing value of existing assets /
investments
• Increased / new efficiency
• Incremental shift to OpEx
Enterprise 360
The market is driven by two forces
Trust creates value
© 2018 ForgeRock. All rights reserved.
PWC Future of customer experience
survey 2017/18
Q: When it comes to overall customer
experience, how important do you think
each of the following will be in the
future? Which of the following things are
worth paying for
Attribute that can be categorized as
Customer/enterprise 360 and trust are
coming out on top
ü Efficiency
ü Convenience
ü Knowledgeable Service
ü Easy payment
Followed by
ü Up to date technology
11
What People Value Most In Their Customer Experience
Source: PWC
IoT Convergence
Identity Platform
ASSETS ORGANIZATIONS
USERS
CONSUMERS
© 2018 ForgeRock. All rights reserved.
Customer
IAM
Enterprise Supply
chain
FactoryReporting
Audit
RMA
…
Service
Digital Identity for people
Digital Identity for things
ForgeRock trusted relationships
IAMCIAM Audit No identity LegacyLegacy
IOT point solutions (Silos)
Industry specific
© 2018 ForgeRock. All rights reserved.
Digital Business - With Identity as The Driver
KNOW YOUR CUSTOMER
SECURE DATA SHARING INTEROPERABILITY
IOT SECURITY
TRUSTED DIGITAL RELATIONSHIPS
CUSTOMER EXPERIENCE
Digital
Identity
© 2018 ForgeRock. All rights reserved.
Value Added Services - Leveraging Identities
KNOW YOUR CUSTOMER
SECURE DATA SHARING INTEROPERABILITY
TRUSTED DIGITAL RELATIONSHIPS
Digital
Identity
CUSTOMER EXPERIENCE
IOT SECURITY
© 2018 ForgeRock. All rights reserved.
ForgeRock
Edge Security Suite
© 2018 ForgeRock. All rights reserved.
© 2018 ForgeRock. All rights reserved.
Why IoT Security Is Hard To Do
Chip-2-Cloud
Gateway
Security
End Node
Security
Application
Security
User
Security
BLE, Thread, ZWave
TLS, SSL, PKI…. Application key uid, pwd, 2FA
uid, pwd
How to guarantee privacy and confidentiality ?
Account
Security
© 2018 ForgeRock. All rights reserved.
#1 Top IoT Security Trends to Watch in 2018
The Identity of Things (IDoT) Trusted identity is the foundation of IoT
security. It’s critical that traditional identity and access management (IAM)
systems are extended to encompass all entities in IoT ecosystems—
humans, devices, applications, and services.
© 2016 ForgeRock. All rights reserved.
Evolution Of IoT & Internet Compared
Through three phases
Internet
Real-time
Secure encrypted transport and transactions. Two factor,
biometric, password less authentication. Adaptive and
context driven authorization, and user managed access.
Interactive, co-creative web, interoperable profiles,
integrated games, education and business, augmented
reality, multi device support, federated and global identities.
Share
Two way, blogs, wikis, video, podcasts, sharing, personal
publishing, social networks, Single Sign-On, SAML
federation, transactional web, secure payments
Presence
Internet connected, retrieve data, multi-protocol, multi-
vendor solutions
Internet of Things
Real-time
Root of trust at the edge, onboard trusted identities, secure
and trusted automation, data privacy, data encryption. Cross
IoT ecosystems trust and sharing with a single security
domain across IoT, consumer, customers and enterprise
Share
Single device identities, secure connect and onboard,
connect or pair consumer devices and users, enterprise
collect and share data across consumers, customers and
enterprise. Closed ecosystems, disconnected security
across users and IoT
Presence
Internet connected, retrieve data, multi-protocol, multi-
vendor solutions
© 2018 ForgeRock. All rights reserved.
© 2018 ForgeRock. All rights reserved.
Extending the ForgeRock Platform To the Edge
One single security domain
BIG DATALittle Data
End-to-End Security, Web, Data Objects & Management
IP and Web to the edge
Solutions
Edge
Identity Platform
• Consumers
• Customers
• Partners
• Contractors
• Employees
• …
IoT Services Enterprise
© 2018 ForgeRock. All rights reserved.
“A digital twin reflects physical objects like people or internet
of things using a digital representation to better understand,
predict, and control the cyber physical world.”
Digital Twin
© 2018 ForgeRock. All rights reserved.
Credentials - users & IoT
Passport
High assurance
Driver’s License
Medium assurance
Conference Badge
Low assurance
Credential based on strong identity, from trusted authority
Attestation based on chip-level credential security
Credential only trusted within a given context
Attestation given operating system level security
Credential defined implicit
Attestation using device-derived credential
© 2018 ForgeRock. All rights reserved.
IEC – Southbound Services
• Attestation, onboarding itself automatically at first boot (digital twin)
• Service status
• Attestation, onboarding of edge nodes & services (3rd party trust, digital twin)
• Authorize itself and edge nodes/services - retrieve JWT token
payload
• JIT configuration – real time and context driven
• Sign data key
• Encrypt data key
• Initiate device pairing/claim ownership - 2 step process
• Token validation (offline support)
• Token re-issuing (offline support)
• Bidirectional channel to send action/message to edge like “update”
For building secure OEM edge applications
© 2018 ForgeRock. All rights reserved.
ForgeRock Identity Edge Controller
Build trust into IoT systems from end to end
Constrained
Devices
Unconstrained
Devices
Edge nodes
Edge Gateway
OEM service
Edge Controller
Embedded OS Core
ZeroMQ*
API
Trustzone
Trusted
Agent
Identity
Message
Broker
MQTT
client
Identity Platform
FIDO 2.0 Server
FIDO
- Relaying party
FIDO Client
*CurveZMQ
NFC/BLE/Bluetooth…
sensors & actuators
smart devices
S
D
K
S
D
K
© 2018 ForgeRock. All rights reserved.
Identity Edge Controller
ForgeRock
OP-TEE
Intel SDO Samsung
Trustware
Infineon
TPM
HW root of trust integration layer
(global platform)
Yubico
FIDO
FIDO
(Relaying party)
A Pluggable HW Security Architecture
Trustonic
Chain of Trust – Edge to Cloud
Root of trust
Signature
Crypto key
Second stage
Boot loader
Signature
Crypto key
Operating
System
Signature
Crypto key
Edge
Controller
Secure
Execution
Environment
Signature
Crypto key
Access
Management
Cloud/Premise
Identity Platform
Signature
Crypto key
First stage
Boot loader
BIG DATALittle Data
End-to-EndSecurity, Web, Data Objects & Management
IP and Web to the edge
Solutions
Edge
Identity Platform
• Consumers
• Customers
• Partners
• Contractors
• Employees
• …
IoT Services Enterprise
© 2018 ForgeRock. All rights reserved.
Data
Control
ZigBee,Z-Wave,Thread,6LowPAN,
Sigfox,LoRaWAN,Bluetooth
Identity Platform
BIG DATALittle Data
End-to-EndSecurity, Web, Data Objects & Management
IP and Web to the edge
Solutions
Edge
Identity Platform
• Consumers
• Customers
• Partners
• Contractors
• Employees
• …
IoT Services Enterprise
ForgeRock – Edge Security
© 2018 ForgeRock. All rights reserved.
Identity Platform
Hospitality IOT platform
Identity Edge Controller
Control plane
• attestation
• on-boarding
• provisioning
• authentication
• authorization
Data plane
• authenticate
• authorize
• interaction
• secure messaging
• data encryption
Guest
• authenticate
• authorize
• hospitality application
• loyalty program
• Personalize, preferences
Bluetooth/BLE
• proximity based security
• secure pairing/device relationships
• offline mode support
Service backend
• backend operations
• data access
• data sharing and consumptions
• access policies enforcement
• data decryption
Accountant
Husband
Insurance
Hotel receptionist
- access granted by owner
© 2018 ForgeRock. All rights reserved.
Connected Car Ecosystem
Control
• attestation
• on-boarding
• provisioning
• authentication
• authorization
Messaging
• authenticate
• authorize
• interaction
• secure messaging
• data encryption
Driver
• authenticate
• authorize
• In-vehicle Application
• manage data sharing
• data capture
Bluetooth/BLE
• proximity based security
• secure pairing/device relationships
• offline mode support
Devices
• Operations
• Data
Service backend
• backend operations
• data access
• data sharing and consumptions
• access policies enforcement
• data decryption
Mechanic/specialist
Husband
Family
Maintenance Portal
- access granted by car owner
Car Owner / Driver
ForgeRock Edge security
• Enterprise Security for IoT
• SCADA, Industrial Control Systems, Med-Tech and all embedded
systems
• Secure IoT Devices to Protect Against Attacks
• Edge computing
• Over the Air Update (OTA)
• High performance secure messaging
Value added partners at the edge
Protecting IP From Capturing To Consumption
Root of trust
Signature
Crypto key
Second stage
Boot loader
Signature
Crypto key
Operating
System
Signature
Crypto key
Edge
Controller
Secure
Execution
Environment
Signature
Crypto key
OpenAM
Cloud/Premise
Identity Platform
Signature
Crypto key
First stage
Boot loader
Trust
IntegrityConfidentiality
Security
Data
Quality
User
Privacy
Securing Digital
Identities for
People, Devices,
and Things
Copyright © 2018 ForgeRock. All Rights Reserved.
• Privacy and Consent
• Intelligent Authentication
• Complex Relationships
• Scalable, Unified Platform
• Contextual Identity
• A decade of innovation
• ANY IDENTITY
• ANY DEPLOYMENT
• ANY SCALE
- IoT NATIVE -
Thank You
For Rocking!

Mais conteúdo relacionado

Mais procurados

Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...ForgeRock
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationForgeRock
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected SocietyForgeRock
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfForgeRock
 
Amer Sports - ForgeRock Identity Live - Dusseldorf
Amer Sports - ForgeRock Identity Live - DusseldorfAmer Sports - ForgeRock Identity Live - Dusseldorf
Amer Sports - ForgeRock Identity Live - DusseldorfForgeRock
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationForgeRock
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmForgeRock
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyForgeRock
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...ForgeRock
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014Chin Wan Lim
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity ForgeRock
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...PiyushHipparkar
 
Tarya - Stolen identities
Tarya - Stolen identitiesTarya - Stolen identities
Tarya - Stolen identitiesCyberX-Labs
 
Winning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and TrustWinning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and TrustForgeRock
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementForgeRock
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseForgeRock
 
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyIdentity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyForgeRock
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of ThingsForgeRock
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTForgeRock
 

Mais procurados (20)

Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...Shift from GDPR readiness to sustained compliance to improve your business an...
Shift from GDPR readiness to sustained compliance to improve your business an...
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
Identity Live Sydney: Building Trust and Privacy in a Connected Society
Identity Live  Sydney:  Building Trust and Privacy in a Connected SocietyIdentity Live  Sydney:  Building Trust and Privacy in a Connected Society
Identity Live Sydney: Building Trust and Privacy in a Connected Society
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
 
Amer Sports - ForgeRock Identity Live - Dusseldorf
Amer Sports - ForgeRock Identity Live - DusseldorfAmer Sports - ForgeRock Identity Live - Dusseldorf
Amer Sports - ForgeRock Identity Live - Dusseldorf
 
Identity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote PresentationIdentity Live Sydney 2018 Keynote Presentation
Identity Live Sydney 2018 Keynote Presentation
 
Identity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'EmIdentity Live Singapore: Just Ask 'Em
Identity Live Singapore: Just Ask 'Em
 
Identity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected SocietyIdentity Live Singapore: Building Trust & Privacy in a Connected Society
Identity Live Singapore: Building Trust & Privacy in a Connected Society
 
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
GDPR is coming in Hot. Top Burning Questions Answered to Help You Keep Your C...
 
SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014SecureMAG Volume 6 - 2014
SecureMAG Volume 6 - 2014
 
Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity Go Beyond PSD2 Compliance with Digital Identity
Go Beyond PSD2 Compliance with Digital Identity
 
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
Public Key Infrastructure (PKI) Market 2021 - Regional Outlook and Competitiv...
 
SecureMAG Vol 3
SecureMAG Vol 3SecureMAG Vol 3
SecureMAG Vol 3
 
Tarya - Stolen identities
Tarya - Stolen identitiesTarya - Stolen identities
Tarya - Stolen identities
 
Winning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and TrustWinning with GDPR: How to Win Customer Loyalty and Trust
Winning with GDPR: How to Win Customer Loyalty and Trust
 
Using Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship ManagementUsing Identity to Empower the Enterprise: Identity Relationship Management
Using Identity to Empower the Enterprise: Identity Relationship Management
 
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 ReleaseThe ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
The ForgeRock Identity Platform Extends CIAM, Fall 2017 Release
 
Identity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim SheedyIdentity Live Sydney 2017 - Tim Sheedy
Identity Live Sydney 2017 - Tim Sheedy
 
Trends in IRM: Internet of Things
Trends in IRM: Internet of ThingsTrends in IRM: Internet of Things
Trends in IRM: Internet of Things
 
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENTBUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
BUSINESS CASES AND IDENTITY RELATIONSHIP MANAGEMENT
 

Semelhante a The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and Gerhard Zehethofer

Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business ConsiderationsFIDO Alliance
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation CenterForgeRock
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of ThingsForgeRock
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyUbisecure
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
 
Cisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainCisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainMatteo Masi
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesDenim Group
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...FaberLab
 
Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!ForgeRock
 
monogoto Programmable Cellular
monogoto Programmable Cellularmonogoto Programmable Cellular
monogoto Programmable Cellularmonogoto
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationFIDO Alliance
 
No IoT Without Identity
No IoT Without Identity No IoT Without Identity
No IoT Without Identity ForgeRock
 
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfVictor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfForgeRock
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile AuthenticationFIDO Alliance
 

Semelhante a The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and Gerhard Zehethofer (20)

Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center2015 Identity Summit - CTO Innovation Center
2015 Identity Summit - CTO Innovation Center
 
Security On The Edge - A New Way To Think About Securing the Internet of Things
Security On The Edge -  A New Way To Think About Securing the Internet of ThingsSecurity On The Edge -  A New Way To Think About Securing the Internet of Things
Security On The Edge - A New Way To Think About Securing the Internet of Things
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategy
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
Cisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & BlockchainCisco on Distributed Ledgers & Blockchain
Cisco on Distributed Ledgers & Blockchain
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
Power at the edge: l'analisi del ciao di produzione previene guasti, riduce g...
 
Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!Provisioning IoT...Oh Baby You Know Meeee!
Provisioning IoT...Oh Baby You Know Meeee!
 
monogoto Programmable Cellular
monogoto Programmable Cellularmonogoto Programmable Cellular
monogoto Programmable Cellular
 
Global Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong AuthenticationGlobal Regulatory Landscape for Strong Authentication
Global Regulatory Landscape for Strong Authentication
 
No IoT Without Identity
No IoT Without Identity No IoT Without Identity
No IoT Without Identity
 
NSW-IOT-Summit-July2018.pdf
NSW-IOT-Summit-July2018.pdfNSW-IOT-Summit-July2018.pdf
NSW-IOT-Summit-July2018.pdf
 
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - DusseldorfVictor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
Victor Ake and Chris Kawalek - ForgeRock Identity Live 2017 - Dusseldorf
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 

Mais de ForgeRock

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondForgeRock
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic OpportunityForgeRock
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityForgeRock
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveForgeRock
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewForgeRock
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...ForgeRock
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)ForgeRock
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...ForgeRock
 
What the Internet of Things Means for Consumer Privacy: Veronica Lara
What the Internet of Things Means for Consumer Privacy: Veronica LaraWhat the Internet of Things Means for Consumer Privacy: Veronica Lara
What the Internet of Things Means for Consumer Privacy: Veronica LaraForgeRock
 
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David BirchWhere Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David BirchForgeRock
 
Identity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBCIdentity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBCForgeRock
 
Identity Live Paris 2017 | Jean-François Dupitier & Christophe Lemaire, Pôle ...
Identity Live Paris 2017 | Jean-François Dupitier & Christophe Lemaire, Pôle ...Identity Live Paris 2017 | Jean-François Dupitier & Christophe Lemaire, Pôle ...
Identity Live Paris 2017 | Jean-François Dupitier & Christophe Lemaire, Pôle ...ForgeRock
 
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsForgeRock
 

Mais de ForgeRock (15)

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and BeyondGet the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
Get the Exact Identity Solution You Need - In the Cloud - AWS and Beyond
 
Identity Live Sydney: Identity Management - A Strategic Opportunity
Identity Live Sydney: Identity Management  - A Strategic OpportunityIdentity Live Sydney: Identity Management  - A Strategic Opportunity
Identity Live Sydney: Identity Management - A Strategic Opportunity
 
Identity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity CapabilityIdentity Live Singapore: Transform Your Cybersecurity Capability
Identity Live Singapore: Transform Your Cybersecurity Capability
 
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep DiveGet the Exact Identity Solution you Need in the Cloud - Deep Dive
Get the Exact Identity Solution you Need in the Cloud - Deep Dive
 
Get the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - OverviewGet the Exact Identity Solution You Need - In the Cloud - Overview
Get the Exact Identity Solution You Need - In the Cloud - Overview
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
Steinberg - Customer identity as the cornerstone of our approach to digitaliz...
 
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)BMW Group - Identity Enables the Next 100 Years..  (Identity Live Berlin 2018)
BMW Group - Identity Enables the Next 100 Years.. (Identity Live Berlin 2018)
 
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
Silo Busters- The Value of User and Data Centricity beyond IoT Devices (Ident...
 
What the Internet of Things Means for Consumer Privacy: Veronica Lara
What the Internet of Things Means for Consumer Privacy: Veronica LaraWhat the Internet of Things Means for Consumer Privacy: Veronica Lara
What the Internet of Things Means for Consumer Privacy: Veronica Lara
 
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David BirchWhere Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
Where Biometrics, Blockchains, and Bots are Taking Digital Identity: David Birch
 
Identity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBCIdentity Live Paris 2017 | Ian Sorbello, HSBC
Identity Live Paris 2017 | Ian Sorbello, HSBC
 
Identity Live Paris 2017 | Jean-François Dupitier & Christophe Lemaire, Pôle ...
Identity Live Paris 2017 | Jean-François Dupitier & Christophe Lemaire, Pôle ...Identity Live Paris 2017 | Jean-François Dupitier & Christophe Lemaire, Pôle ...
Identity Live Paris 2017 | Jean-François Dupitier & Christophe Lemaire, Pôle ...
 
Identity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer RelationshipsIdentity Live Paris 2017 | Monetising Digital Customer Relationships
Identity Live Paris 2017 | Monetising Digital Customer Relationships
 

Último

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and Gerhard Zehethofer

  • 1.
  • 2. Silo Busters: The Value of User and Data Centricity beyond IoT Devices Stein Myrseth Senior Technology Solutions Director ForgeRock Gerhard Zehethofer VP, Industries (IOT & Manufacturing) ForgeRock
  • 3. © 2017 ForgeRock. All rights reserved. The Value of User and Data Centricity beyond IoT Device Stein Myrseth & Gerhard Zehethofer Austin May, 2018
  • 4. © 2018 ForgeRock. All rights reserved. 4
  • 5. © 2017 ForgeRock. All rights reserved. … the data driven age ... … from product centric to customer / solution centricity … Security & privacy Scalability TrustBusiness Value Experience
  • 6. © 2018 ForgeRock. All rights reserved. “ … market disruption has been found to be a function usually not of technology itself but rather of its changing application… ”Source: The innovators dilemma
  • 7. © 2018 ForgeRock. All rights reserved. New Mobility Working Health & Life Traveling Automotive Connectivity Payment Government Insurance IoT/ Automation … … From Verticals to Horizontals
  • 8. © 2018 ForgeRock. All rights reserved. Smart City and Mobility Automotive – build the Connected Car Services around Connected Cars New Mobility – Use cases of physical mobility Smart City - New Mobility & more ECUIDs->CarID ServiceID=CarID+UserID NewMobilityID=ServiceID+User’sPersonas SmartCityID=NewMobilityID+anyothereServiceID OEMSpaceEcosystemSpace
  • 9. © 2018 ForgeRock. All rights reserved. Performance Customers Competition Trust 01 02 03 04 • Shifting from asset based to customer intimacy / service • Digital native demanding new experiences; Ease of use • Bespoke has become the norm Changing Customer Behavior • Mandate to reduce cost of operations • Good enough makes it hard to differentiate on product • Lack of product related differentiation • No low hanging fruits left Eroding Margins • Customer satisfaction measures are influenced by digital competition • Digital natives deploy disruptive business models • Digital rewards first movers and superfast followers New players disrupt the status quo • Privacy / New regulatory requirements on Data privacy (GDPR) • Protect IP • Trust / Image / Brand Security Trends That Force Change
  • 10. © 2018 ForgeRock. All rights reserved. Performance Customers Competition Trust 01 02 03 04 • Shifting from asset based to customer intimacy / service • Digital native demanding new experiences; Ease of use • Bespoke has become the norm Changing Customer Behavior • Mandate to reduce cost of operations • Good enough makes it hard to differentiate on product • Lack of product related differentiation • No low hanging fruits left Eroding Margins • Customer satisfaction measures are influenced by digital competition • Digital natives deploy disruptive business models • Digital rewards first movers and superfast followers New players disrupt the status quo • Privacy / New regulatory requirements on Data privacy (GDPR) • Protect IP • Trust / Image / Brand Security Trends That Force Change Business Transformation • New revenue streams • New business models (transaction to service) • Value creation; value capture Customer 360 Business Optimization • Maximizing value of existing assets / investments • Increased / new efficiency • Incremental shift to OpEx Enterprise 360 The market is driven by two forces Trust creates value
  • 11. © 2018 ForgeRock. All rights reserved. PWC Future of customer experience survey 2017/18 Q: When it comes to overall customer experience, how important do you think each of the following will be in the future? Which of the following things are worth paying for Attribute that can be categorized as Customer/enterprise 360 and trust are coming out on top ü Efficiency ü Convenience ü Knowledgeable Service ü Easy payment Followed by ü Up to date technology 11 What People Value Most In Their Customer Experience Source: PWC
  • 12. IoT Convergence Identity Platform ASSETS ORGANIZATIONS USERS CONSUMERS
  • 13. © 2018 ForgeRock. All rights reserved. Customer IAM Enterprise Supply chain FactoryReporting Audit RMA … Service Digital Identity for people Digital Identity for things ForgeRock trusted relationships IAMCIAM Audit No identity LegacyLegacy IOT point solutions (Silos) Industry specific
  • 14. © 2018 ForgeRock. All rights reserved. Digital Business - With Identity as The Driver KNOW YOUR CUSTOMER SECURE DATA SHARING INTEROPERABILITY IOT SECURITY TRUSTED DIGITAL RELATIONSHIPS CUSTOMER EXPERIENCE Digital Identity
  • 15. © 2018 ForgeRock. All rights reserved. Value Added Services - Leveraging Identities KNOW YOUR CUSTOMER SECURE DATA SHARING INTEROPERABILITY TRUSTED DIGITAL RELATIONSHIPS Digital Identity CUSTOMER EXPERIENCE IOT SECURITY
  • 16. © 2018 ForgeRock. All rights reserved. ForgeRock Edge Security Suite
  • 17. © 2018 ForgeRock. All rights reserved. © 2018 ForgeRock. All rights reserved. Why IoT Security Is Hard To Do Chip-2-Cloud Gateway Security End Node Security Application Security User Security BLE, Thread, ZWave TLS, SSL, PKI…. Application key uid, pwd, 2FA uid, pwd How to guarantee privacy and confidentiality ? Account Security
  • 18. © 2018 ForgeRock. All rights reserved. #1 Top IoT Security Trends to Watch in 2018 The Identity of Things (IDoT) Trusted identity is the foundation of IoT security. It’s critical that traditional identity and access management (IAM) systems are extended to encompass all entities in IoT ecosystems— humans, devices, applications, and services.
  • 19. © 2016 ForgeRock. All rights reserved. Evolution Of IoT & Internet Compared Through three phases Internet Real-time Secure encrypted transport and transactions. Two factor, biometric, password less authentication. Adaptive and context driven authorization, and user managed access. Interactive, co-creative web, interoperable profiles, integrated games, education and business, augmented reality, multi device support, federated and global identities. Share Two way, blogs, wikis, video, podcasts, sharing, personal publishing, social networks, Single Sign-On, SAML federation, transactional web, secure payments Presence Internet connected, retrieve data, multi-protocol, multi- vendor solutions Internet of Things Real-time Root of trust at the edge, onboard trusted identities, secure and trusted automation, data privacy, data encryption. Cross IoT ecosystems trust and sharing with a single security domain across IoT, consumer, customers and enterprise Share Single device identities, secure connect and onboard, connect or pair consumer devices and users, enterprise collect and share data across consumers, customers and enterprise. Closed ecosystems, disconnected security across users and IoT Presence Internet connected, retrieve data, multi-protocol, multi- vendor solutions
  • 20. © 2018 ForgeRock. All rights reserved. © 2018 ForgeRock. All rights reserved. Extending the ForgeRock Platform To the Edge One single security domain BIG DATALittle Data End-to-End Security, Web, Data Objects & Management IP and Web to the edge Solutions Edge Identity Platform • Consumers • Customers • Partners • Contractors • Employees • … IoT Services Enterprise
  • 21. © 2018 ForgeRock. All rights reserved. “A digital twin reflects physical objects like people or internet of things using a digital representation to better understand, predict, and control the cyber physical world.” Digital Twin
  • 22. © 2018 ForgeRock. All rights reserved. Credentials - users & IoT Passport High assurance Driver’s License Medium assurance Conference Badge Low assurance Credential based on strong identity, from trusted authority Attestation based on chip-level credential security Credential only trusted within a given context Attestation given operating system level security Credential defined implicit Attestation using device-derived credential
  • 23. © 2018 ForgeRock. All rights reserved. IEC – Southbound Services • Attestation, onboarding itself automatically at first boot (digital twin) • Service status • Attestation, onboarding of edge nodes & services (3rd party trust, digital twin) • Authorize itself and edge nodes/services - retrieve JWT token payload • JIT configuration – real time and context driven • Sign data key • Encrypt data key • Initiate device pairing/claim ownership - 2 step process • Token validation (offline support) • Token re-issuing (offline support) • Bidirectional channel to send action/message to edge like “update” For building secure OEM edge applications
  • 24. © 2018 ForgeRock. All rights reserved. ForgeRock Identity Edge Controller Build trust into IoT systems from end to end Constrained Devices Unconstrained Devices Edge nodes Edge Gateway OEM service Edge Controller Embedded OS Core ZeroMQ* API Trustzone Trusted Agent Identity Message Broker MQTT client Identity Platform FIDO 2.0 Server FIDO - Relaying party FIDO Client *CurveZMQ NFC/BLE/Bluetooth… sensors & actuators smart devices S D K S D K
  • 25. © 2018 ForgeRock. All rights reserved. Identity Edge Controller ForgeRock OP-TEE Intel SDO Samsung Trustware Infineon TPM HW root of trust integration layer (global platform) Yubico FIDO FIDO (Relaying party) A Pluggable HW Security Architecture Trustonic
  • 26. Chain of Trust – Edge to Cloud Root of trust Signature Crypto key Second stage Boot loader Signature Crypto key Operating System Signature Crypto key Edge Controller Secure Execution Environment Signature Crypto key Access Management Cloud/Premise Identity Platform Signature Crypto key First stage Boot loader BIG DATALittle Data End-to-EndSecurity, Web, Data Objects & Management IP and Web to the edge Solutions Edge Identity Platform • Consumers • Customers • Partners • Contractors • Employees • … IoT Services Enterprise
  • 27. © 2018 ForgeRock. All rights reserved. Data Control ZigBee,Z-Wave,Thread,6LowPAN, Sigfox,LoRaWAN,Bluetooth Identity Platform BIG DATALittle Data End-to-EndSecurity, Web, Data Objects & Management IP and Web to the edge Solutions Edge Identity Platform • Consumers • Customers • Partners • Contractors • Employees • … IoT Services Enterprise ForgeRock – Edge Security
  • 28. © 2018 ForgeRock. All rights reserved. Identity Platform Hospitality IOT platform Identity Edge Controller Control plane • attestation • on-boarding • provisioning • authentication • authorization Data plane • authenticate • authorize • interaction • secure messaging • data encryption Guest • authenticate • authorize • hospitality application • loyalty program • Personalize, preferences Bluetooth/BLE • proximity based security • secure pairing/device relationships • offline mode support Service backend • backend operations • data access • data sharing and consumptions • access policies enforcement • data decryption Accountant Husband Insurance Hotel receptionist - access granted by owner
  • 29. © 2018 ForgeRock. All rights reserved. Connected Car Ecosystem Control • attestation • on-boarding • provisioning • authentication • authorization Messaging • authenticate • authorize • interaction • secure messaging • data encryption Driver • authenticate • authorize • In-vehicle Application • manage data sharing • data capture Bluetooth/BLE • proximity based security • secure pairing/device relationships • offline mode support Devices • Operations • Data Service backend • backend operations • data access • data sharing and consumptions • access policies enforcement • data decryption Mechanic/specialist Husband Family Maintenance Portal - access granted by car owner Car Owner / Driver
  • 30. ForgeRock Edge security • Enterprise Security for IoT • SCADA, Industrial Control Systems, Med-Tech and all embedded systems • Secure IoT Devices to Protect Against Attacks • Edge computing • Over the Air Update (OTA) • High performance secure messaging Value added partners at the edge
  • 31. Protecting IP From Capturing To Consumption Root of trust Signature Crypto key Second stage Boot loader Signature Crypto key Operating System Signature Crypto key Edge Controller Secure Execution Environment Signature Crypto key OpenAM Cloud/Premise Identity Platform Signature Crypto key First stage Boot loader Trust IntegrityConfidentiality Security Data Quality User Privacy
  • 32. Securing Digital Identities for People, Devices, and Things Copyright © 2018 ForgeRock. All Rights Reserved. • Privacy and Consent • Intelligent Authentication • Complex Relationships • Scalable, Unified Platform • Contextual Identity • A decade of innovation • ANY IDENTITY • ANY DEPLOYMENT • ANY SCALE - IoT NATIVE -