SlideShare uma empresa Scribd logo
1 de 15
© 2016 ForgeRock. All rights reserved.
© 2016 ForgeRock. All rights reserved.
Industry 4.0
By ChristophRoser at AllAboutLean.com, own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=47640595
© 2016 ForgeRock. All rights reserved.
Top Barriers to IoT Adoption
© 2016 ForgeRock. All rights reserved.
Internet of Things Top Concerns
Security & Privacy Concerns
Value Assessment, Case Studies &
Organizational Consensus
Lack of Solution Knowledge
Legacy Infrastructure, Lack of Skills,
Integration & Costs
Lack of Standards & Interoperability
1
2
3
4
5
Source: IoT Institute, 2016 IoT Trends
Survey
© 2016 ForgeRock. All rights reserved.
Connected Car Hacked
Charlie Miller
Chris Valasek
Kill Engine
Brake /
Disable
July 2015
Track / Steer
Jeep
Cherokee
© 2016 ForgeRock. All rights reserved. 6
Connected Health Hacked
Jack Barnaby
Medtronic Insulin Pump
Adjust /
Disable
February
2012
© 2016 ForgeRock. All rights reserved.
Internet of Things Other Hacks
HackedConnected Home
Connected Industry Hacked
Smart Livestock Unsure
© 2016 ForgeRock. All rights reserved.
Why is it that these connected devices are
being hacked over and over again?
The list below, while not exhaustive, explains some of the
reasons why these new connected devices are so easy to hack
and why we’re likely to see more hacks in the future.
• MVP mindset
• Usability > security
• Lack of skills and resources
• Ship and forget mindset
• You (the user)
• Complex supply chain
• Cybercrime as a service
© 2016 ForgeRock. All rights reserved.
Security Adoption Cycle
”Oh
Crap”
© 2016 ForgeRock. All rights reserved.
Identity Access Management Identity Relationship Management
Customers
(millions)
On-premises
People
Applications
and data
PCs
Endpoints
Workforce
(thousands)
Partners and
Suppliers
Customers
(millions)
On-premises Public
Cloud
Privat
e
Cloud
People
Things
(Tens of
millions)
Applications
and data
PCs PhonesTablet
s
Smart
Watches
Endpoints
Business Has Changed: Enterprises now require Identity
Relationship Management (IRM)
© 2016 ForgeRock. All rights reserved.
Perimeter-Based Security Identity-Centric Security
Enables Digital
Business
Untrusted
Truste
d
Inhibits Digital
Business
Old Security Model is Broken. Security Must Now Be
Identity-Based, and implemented by design.
© 2016 ForgeRock. All rights reserved.
IAM in the age of the digital
business is more typically
characterized by a web of
paths involving a variety of
application locations,
endpoint devices, and things.
Workforce
(thousands)
Partners and
Suppliers
Customers
(millions)
On-premises Public
Cloud
Private
Cloud
People
Things
(Tens of
millions)
Applications
and data
PCs PhonesTablet
s
Smart
Watches
Endpoints
Next Generation IAM
© 2016 ForgeRock. All rights reserved.
Why IoT Needs Identity
•An object must be identified in order to be secured
•Unified identities of applications, cloud services, software code and connected
devices
•IoT authorization decisions requires real-time processing of
•Complex relationships
•Context
•User digital interactions must be constantly monitored.
•In addition to using contextual cues to evaluate customer behavior,
•user identity and access rights can be verified through multi-factor authentication
© 2016 ForgeRock. All rights reserved.
IoT reference architecture
© 2016 ForgeRock. All rights reserved.
End-to-end IoT Identity Platform
BIG
DATA
Little Data
End-to-End Security, Web, Data Objects & Management
IP and Web to the
edge
Solutions
Edge
Identity Platform
• Consumers
• Customers
• Partners
• Contractors
• Employees
• …
FROM DEVICE TO
CLOUD IoT Services Enterprise

Mais conteúdo relacionado

Mais procurados

Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsZeshan Sattar
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Alliance
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurityIndy Dh
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
FIDO Overview: Status and Future
FIDO Overview: Status and FutureFIDO Overview: Status and Future
FIDO Overview: Status and FutureFIDO Alliance
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected WorldFIDO Alliance
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall WebinarAT&T
 
FIDO, Federation & Facebook Social login
FIDO, Federation & Facebook Social loginFIDO, Federation & Facebook Social login
FIDO, Federation & Facebook Social loginFIDO Alliance
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynoteNur Shiqim Chok
 
Cross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationCross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationPeter Waher
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
 
Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsRick Huijbregts
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO AllianceFIDO Alliance
 
Accelerating Information with Identity
Accelerating Information with IdentityAccelerating Information with Identity
Accelerating Information with Identityscoopnewsgroup
 
Wireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCornerWireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCornerReports Corner
 
Identity as the Perimeter
Identity as the PerimeterIdentity as the Perimeter
Identity as the Perimeterscoopnewsgroup
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
Bootstrapping UX
Bootstrapping UXBootstrapping UX
Bootstrapping UXJim Lane
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)FIDO Alliance
 
Syntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesSyntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesPanagiotis Kalantzis
 

Mais procurados (20)

Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
FIDO Webinar – A New Model for Online Authentication: Implications for Policy...
 
RisingStarsOfCybersecurity
RisingStarsOfCybersecurityRisingStarsOfCybersecurity
RisingStarsOfCybersecurity
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
FIDO Overview: Status and Future
FIDO Overview: Status and FutureFIDO Overview: Status and Future
FIDO Overview: Status and Future
 
Modern Authentication for a Connected World
Modern Authentication for a Connected WorldModern Authentication for a Connected World
Modern Authentication for a Connected World
 
Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
 
FIDO, Federation & Facebook Social login
FIDO, Federation & Facebook Social loginFIDO, Federation & Facebook Social login
FIDO, Federation & Facebook Social login
 
Brink sanders cisco architecture keynote
Brink sanders   cisco architecture keynoteBrink sanders   cisco architecture keynote
Brink sanders cisco architecture keynote
 
Cross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationCross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperation
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
 
Smart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter OrganizationsSmart Tech = Smart Organizations : Building Smarter Organizations
Smart Tech = Smart Organizations : Building Smarter Organizations
 
Introduction to FIDO Alliance
Introduction to FIDO AllianceIntroduction to FIDO Alliance
Introduction to FIDO Alliance
 
Accelerating Information with Identity
Accelerating Information with IdentityAccelerating Information with Identity
Accelerating Information with Identity
 
Wireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCornerWireless security companies and solutions 2014 - ReportsCorner
Wireless security companies and solutions 2014 - ReportsCorner
 
Identity as the Perimeter
Identity as the PerimeterIdentity as the Perimeter
Identity as the Perimeter
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Bootstrapping UX
Bootstrapping UXBootstrapping UX
Bootstrapping UX
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
Syntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesSyntax IT ISGRC Products & Services
Syntax IT ISGRC Products & Services
 

Semelhante a Ben goodman cybersecurity in the iiot

No IoT Without Identity
No IoT Without Identity No IoT Without Identity
No IoT Without Identity ForgeRock
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock
 
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...IdentityNorthEvents
 
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity SummitKeynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity SummitForgeRock
 
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...ForgeRock
 
Backstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitBackstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitForgeRock
 
Customer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity SummitCustomer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity SummitForgeRock
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeForgeRock
 
A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016ForgeRock
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarForgeRock
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity ForgeRock
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security SecureAuth
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Mahbubul Alam
 
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)ForgeRock
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...ForgeRock
 
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Identity Gateway with the ForgeRock Identity Platform - So What’s New?Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Identity Gateway with the ForgeRock Identity Platform - So What’s New?ForgeRock
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication ForgeRock
 
Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Oracle Developers
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkReal-Time Innovations (RTI)
 

Semelhante a Ben goodman cybersecurity in the iiot (20)

No IoT Without Identity
No IoT Without Identity No IoT Without Identity
No IoT Without Identity
 
ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit ForgeRock Gartner 2016 Security & Risk Management Summit
ForgeRock Gartner 2016 Security & Risk Management Summit
 
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
Webinar: Making the Move from Legacy IAM to Modern Digital Identity – On Your...
 
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity SummitKeynote : Customer Identity Builds Digital Trust - Paris Identity Summit
Keynote : Customer Identity Builds Digital Trust - Paris Identity Summit
 
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
NYC Identity Summit Business Day: Identity is the Center of Everything (Mike ...
 
Backstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity SummitBackstage Tour of Identity - London Identity Summit
Backstage Tour of Identity - London Identity Summit
 
Customer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity SummitCustomer Identity Builds Digital Trust - London Identity Summit
Customer Identity Builds Digital Trust - London Identity Summit
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
 
A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016A Backstage Tour of Identity - Paris Identity Summit 2016
A Backstage Tour of Identity - Paris Identity Summit 2016
 
Security & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things WebinarSecurity & Identity for the Internet of Things Webinar
Security & Identity for the Internet of Things Webinar
 
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
Canberra Executive Breakfast - A Citizen-Centric Approach to Identity
 
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
 
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
Sydney Identity Summit: Using Identity to Build Digital Trust (Mike Ellis Intro)
 
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
 
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Identity Gateway with the ForgeRock Identity Platform - So What’s New?Identity Gateway with the ForgeRock Identity Platform - So What’s New?
Identity Gateway with the ForgeRock Identity Platform - So What’s New?
 
Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication Identity Live Sydney: Intelligent Authentication
Identity Live Sydney: Intelligent Authentication
 
Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 

Mais de MassTLC

MassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected CitiesMassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected CitiesMassTLC
 
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI SolutionMassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI SolutionMassTLC
 
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing PortMassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing PortMassTLC
 
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex WyglinskiMassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex WyglinskiMassTLC
 
Andres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in BusinessAndres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in BusinessMassTLC
 
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrainMassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrainMassTLC
 
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC
 
Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!MassTLC
 
Cloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data CenterCloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data CenterMassTLC
 
Old Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTAOld Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTAMassTLC
 
Lisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentationLisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentationMassTLC
 
Smart cities thinking outside the box
Smart cities thinking outside the boxSmart cities thinking outside the box
Smart cities thinking outside the boxMassTLC
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsMassTLC
 
Abbas bagasra smart ag
Abbas bagasra smart agAbbas bagasra smart ag
Abbas bagasra smart agMassTLC
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC
 
Tom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key FindingsTom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key FindingsMassTLC
 
Michael Goodman: The State of the State Economy
Michael Goodman: The State of the State EconomyMichael Goodman: The State of the State Economy
Michael Goodman: The State of the State EconomyMassTLC
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC
 
Brainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distributionBrainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distributionMassTLC
 
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)MassTLC
 

Mais de MassTLC (20)

MassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected CitiesMassIntelligence 2018: Intelligent Connected Cities
MassIntelligence 2018: Intelligent Connected Cities
 
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI SolutionMassIntelligence 2018: How to Rapidly Prototype an AI Solution
MassIntelligence 2018: How to Rapidly Prototype an AI Solution
 
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing PortMassIntelligence 2018: Connecting the Nation's Top Fishing Port
MassIntelligence 2018: Connecting the Nation's Top Fishing Port
 
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex WyglinskiMassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
MassIntelligence 2018: Transportation & Mobility, Alex Wyglinski
 
Andres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in BusinessAndres Corrada-Emmanuel - Ground Truth Problems in Business
Andres Corrada-Emmanuel - Ground Truth Problems in Business
 
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrainMassTLC product launch campaign strategies, Jason Baudreau, NetBrain
MassTLC product launch campaign strategies, Jason Baudreau, NetBrain
 
MassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon BlackMassTLC product launch campaign strategies, ben austin, Carbon Black
MassTLC product launch campaign strategies, ben austin, Carbon Black
 
Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!Forget about A.G.I. Let's Build Useable Ai Tools!
Forget about A.G.I. Let's Build Useable Ai Tools!
 
Cloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data CenterCloud Edge Computing: Beyond the Data Center
Cloud Edge Computing: Beyond the Data Center
 
Old Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTAOld Company - New Technology, Elixir @ the MBTA
Old Company - New Technology, Elixir @ the MBTA
 
Lisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentationLisa seacat deluca io t robotics presentation
Lisa seacat deluca io t robotics presentation
 
Smart cities thinking outside the box
Smart cities thinking outside the boxSmart cities thinking outside the box
Smart cities thinking outside the box
 
Lily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethicsLily lim data privacy ownership and ethics
Lily lim data privacy ownership and ethics
 
Abbas bagasra smart ag
Abbas bagasra smart agAbbas bagasra smart ag
Abbas bagasra smart ag
 
MassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation SessionMassTLC Opening Slides and Simulation Session
MassTLC Opening Slides and Simulation Session
 
Tom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key FindingsTom Hopcroft: State of the Tech Economy Key Findings
Tom Hopcroft: State of the Tech Economy Key Findings
 
Michael Goodman: The State of the State Economy
Michael Goodman: The State of the State EconomyMichael Goodman: The State of the State Economy
Michael Goodman: The State of the State Economy
 
MassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalyticsMassTLC summit_amacleod_predictiveanalytics
MassTLC summit_amacleod_predictiveanalytics
 
Brainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distributionBrainshark mass tlc brand revitalizaion_final for distribution
Brainshark mass tlc brand revitalizaion_final for distribution
 
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
Mass tlc summit-mapping-content-strategy-customer-journey-final (002)
 

Último

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Último (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Ben goodman cybersecurity in the iiot

  • 1. © 2016 ForgeRock. All rights reserved.
  • 2. © 2016 ForgeRock. All rights reserved. Industry 4.0 By ChristophRoser at AllAboutLean.com, own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=47640595
  • 3. © 2016 ForgeRock. All rights reserved. Top Barriers to IoT Adoption
  • 4. © 2016 ForgeRock. All rights reserved. Internet of Things Top Concerns Security & Privacy Concerns Value Assessment, Case Studies & Organizational Consensus Lack of Solution Knowledge Legacy Infrastructure, Lack of Skills, Integration & Costs Lack of Standards & Interoperability 1 2 3 4 5 Source: IoT Institute, 2016 IoT Trends Survey
  • 5. © 2016 ForgeRock. All rights reserved. Connected Car Hacked Charlie Miller Chris Valasek Kill Engine Brake / Disable July 2015 Track / Steer Jeep Cherokee
  • 6. © 2016 ForgeRock. All rights reserved. 6 Connected Health Hacked Jack Barnaby Medtronic Insulin Pump Adjust / Disable February 2012
  • 7. © 2016 ForgeRock. All rights reserved. Internet of Things Other Hacks HackedConnected Home Connected Industry Hacked Smart Livestock Unsure
  • 8. © 2016 ForgeRock. All rights reserved. Why is it that these connected devices are being hacked over and over again? The list below, while not exhaustive, explains some of the reasons why these new connected devices are so easy to hack and why we’re likely to see more hacks in the future. • MVP mindset • Usability > security • Lack of skills and resources • Ship and forget mindset • You (the user) • Complex supply chain • Cybercrime as a service
  • 9. © 2016 ForgeRock. All rights reserved. Security Adoption Cycle ”Oh Crap”
  • 10. © 2016 ForgeRock. All rights reserved. Identity Access Management Identity Relationship Management Customers (millions) On-premises People Applications and data PCs Endpoints Workforce (thousands) Partners and Suppliers Customers (millions) On-premises Public Cloud Privat e Cloud People Things (Tens of millions) Applications and data PCs PhonesTablet s Smart Watches Endpoints Business Has Changed: Enterprises now require Identity Relationship Management (IRM)
  • 11. © 2016 ForgeRock. All rights reserved. Perimeter-Based Security Identity-Centric Security Enables Digital Business Untrusted Truste d Inhibits Digital Business Old Security Model is Broken. Security Must Now Be Identity-Based, and implemented by design.
  • 12. © 2016 ForgeRock. All rights reserved. IAM in the age of the digital business is more typically characterized by a web of paths involving a variety of application locations, endpoint devices, and things. Workforce (thousands) Partners and Suppliers Customers (millions) On-premises Public Cloud Private Cloud People Things (Tens of millions) Applications and data PCs PhonesTablet s Smart Watches Endpoints Next Generation IAM
  • 13. © 2016 ForgeRock. All rights reserved. Why IoT Needs Identity •An object must be identified in order to be secured •Unified identities of applications, cloud services, software code and connected devices •IoT authorization decisions requires real-time processing of •Complex relationships •Context •User digital interactions must be constantly monitored. •In addition to using contextual cues to evaluate customer behavior, •user identity and access rights can be verified through multi-factor authentication
  • 14. © 2016 ForgeRock. All rights reserved. IoT reference architecture
  • 15. © 2016 ForgeRock. All rights reserved. End-to-end IoT Identity Platform BIG DATA Little Data End-to-End Security, Web, Data Objects & Management IP and Web to the edge Solutions Edge Identity Platform • Consumers • Customers • Partners • Contractors • Employees • … FROM DEVICE TO CLOUD IoT Services Enterprise