SlideShare a Scribd company logo
1 of 356
Download to read offline
Welcome To
#iotscotland
#iotscotland
Mark Stephen
BBC Scotland
#iotscotland
Theo Priestley
Forbes Online
I Predict A (R)IOT
Why everything is connected and everything will change
Theo Priestley
IOT Scotland 2015
Our Dynamic Earth
Theo Priestley
Technology Analyst, Advisor, Forbes
Twitter: @ITredux
http://www.linkedin.com/in/theopriestley
50.19.500.6.2020
The Numbers Game
Where Do You Even Begin ?
Three Things Will Occur
• Data will become open to all
• Real-time analysis will occur at source
• Blockchain technology will become a
critical component for security
Change Driven By Open Data Not Things
Planning For Change
Plan Do Check Act
Devices Data Insight Action
Changing Of The Guard
This is not a place for your Grandfather’s
Data Protection Act
Privacy today is not the privacy of 1998
Business Models Will Change
DIGITAL
INTERNET OF STUFF
The Customer Will See You Now
The Customer Will Own Their Data
And You Will Rent It From Them
Internal And External Opportunities
Appirio gives all employees Fitbit trackers
Google Hangouts offer employees live video
sessions with a trainer
Data mined from Chatter groups and Fitbit
devices lead to 5% reduction in annual
insurance premiums at approx. $300k
Theo Priestley
Technology Analyst, Advisor, Strategist
Twitter: @ITredux
http://www.linkedin.com/in/theopriestley
#iotscotland
Pilgrim Beart
1248
Turning innovative ideas
into tangible value
The past & future of connected devices
…from my perspective
1998-2006
Splashpower
1998-2001
2000-
2001-2008
2006-2015
Energy Controls
‘Hive’
Home Automation
‘Iris’
An Innovation lesson
it takes time
Persistence
New
Science
New
Technology
New
Product
New
Sector
Profitable
Growth
Revenue
Zone of
temptationVision
Easy
money
Market
10y+
A couple of IoT lessons
Embedded
platform Fog?
ManagementAnalytics
UX
Security
Cloud
Platform
Search
@pilgrimbeart
#iotscotland
Steve McKee
Cisco
© 2014 All rights reserved. Do not distribute. Hosted by
Driving Real Business Outcomes
with IoT
Steve McKee
Solution Architect
© 2014 Cisco and/or its affiliates. All rights reserved. 33
IoT is Here Now. And it’s Growing !
TIMELINE
2010 2015 2020
BILLIONSOFDEVICES
0
10
20
30
50
Adoption rate of digital
infrastructure:
5X faster than electricity
and telephony
25
12.5
7.26.8 7.6
World Population
50+ Billion
Smart Objects
Inflection
point
© 2014 Cisco and/or its affiliates. All rights reserved. 34
IoT Investments Are Growing
Source: Cisco IoT Survey 2014; % of survey respondents N=1230
86%
76%
86%
79%
91%
89%
77%
% of Respondents Increasing IoT Investments in
the Next 3 Years
© 2014 Cisco and/or its affiliates. All rights reserved. 35
2014 Microsoft
Entered the
IoT Market
Schnieder and
ioBridge Announce
Partnership
Siemens Announces
$100M IoT Fund
UK Creates £45m
IoT Fund
Zebra Acquires
Motorola Wireless
$3.45B
June 2014
Apple Announces
Their First Home
Automation Initiative
Feb 2014 AT&T and
IBM Announce Join
IoT Vision
Barcelona Smart City:
$3.6B Value Creation
Google Buys Nest
for $3.2B
Announces
IoT Group
IoT Market Is Here Now
0 1 2 3 4 5 6 7 8 9 10
11
Estimated Potential Economic Impact of Technologies Across Sized
Applications in 2025 ($ Trillion, Annual)
A Gallery of Disruptive Technologies
Source: McKinsey Global Institute
Mobile Internet
Automation of Knowledge Work
Internet of Things
Cloud
Advanced Robotics
Autonomous / Near-Autonomous Vehicles
Next-Generation Genomics
Energy Storage
3-D Printing
Advanced Materials
Oil and Gas Exploration and Recovery
Renewable Energy
Applications
Things
App Enablement
Workflow /
Rules Engine
Event
Management
Video
Sensing
Data Normalization
and Modeling
Protocol
Mediation
Enterprise App
Integration
Infrastructure
Software Defined Networking
Network Compute Storage
Applications
App Enablement
Workflow /
Rules Engine
Event
Management
Video
Sensing
Data Normalization
and Modeling
Protocol
Mediation
Enterprise App
Integration
Cloud and Fog
Analytics
Security and
Identity Management
Open and
Programmability
(APIs)
Ease of use
and Management
Infrastructure
Software Defined Networking
Network Compute Storage
Things
IoT Technology Platform – Accelerating Adoption
© 2014 Cisco and/or its affiliates. All rights reserved. 37
Environment
Great Barrier
Reef in Australia
Buoys equipped with
sensors collect
biological, physical,
and chemical data to
minimize and prevent
reef damage.
© 2014 Cisco and/or its affiliates. All rights reserved. 38
Healthcare
Medication in
The United States
Smart pill bottles
remind patients to take
their medication and
records that the patient
has taken the correct
dosage.
© 2014 Cisco and/or its affiliates. All rights reserved. 39
Smart
Buses
Smart
Bus Stop
Smart
Water
Smart
Lighting
Smart
Parking
Smart
Citizens
Smart
Waste
Revenue Citizen
Experiences
Productivity
Cost
Avoidance
Jobs
Barcelona: Smart City
$3.6 Billion
Value Creation
“We are obsessed with
building quality of life for
our citizens.
That is our present and
the future of our city.”
Antoni Vives
Deputy Vice Mayor
City of Barcelona, Spain
© 2014 Cisco and/or its affiliates. All rights reserved. 40
TRANSPORTATION
Reduced
Traffic Congestion
in SF
Deployed 20,000
Smart Parking
Spaces
Innovative
Demand-
Responsive
Pricing
40© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
San Francisco
Gets Smarter
Parking Spaces
IoE Solution
Parking, garage and
roadway sensors for real-
time parking
and traffic analysis
San Francisco, CA
© 2014 Cisco and/or its affiliates. All rights reserved. 41
Harley-Davidson Accelerates Product Cycles
Manufacturing
York, PA
Manufacturing flexibility across
supply chain
IoT Solution
Solution Partners
Sped up Product
Cycles by 10–20%
Accelerated Triage
and
Troubleshooting
Improved
Working Culture
© 2014 Cisco and/or its affiliates. All rights reserved. 42
Hamburg Is on Its Way to Becoming a Smarter City
Smart Cities
Hamburg, Germany
Citywide traffic incident
management solution,
Smart Street lighting and
environmental sensing, smart
shipping container management
IoT Solution
Solution Partners
Deployed Smart
Traffic and
Street Lights
Improved
Traffic Flow
Optimized Power
Consumption
© 2014 Cisco and/or its affiliates. All rights reserved. 43
And Many, Many, More……….
Becoming an Engaged and
Connected City
Driving new levels of Utility
efficiency and uptime
Gaining Double Digits
Manufacturing Productivity
IoTWF Working Groups
Horizontal Working Groups
Vertical Working Groups
Security,
Privacy,
Compliance
Standards &
Interoperabilit
y
Architecture,
Management,
Analytics
Innovations,
Start-Ups
Sensors &
Embedded OS
GTM:
New Business
Models
Marketing
Education Health Manufacturing Energy Retail Transportation Smart City
© 2014 Cisco and/or its affiliates. All rights reserved. 45
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Prof. Michael Nelson,
Georgetown University
“Trying to determine the market size for the
Internet of Things is like trying to calculate the
market for plastics, circa 1940.
At the time, it was difficult to imagine that
plastics could be in everything.”
© 2014 Cisco and/or its affiliates. All rights reserved. 46
The
Internet
of Things.
Here.
Now.
#iotscotland
John Swinney MSP
The Scottish
Government
#iotscotland
Questions &
Discussion
www.it500-conference.com
ITinThePark
#iotscotland
Refreshments &
Networking. Please
check badges for
breakout locations
www.scot-data.com
2nd Annual Big Data Scotland
#iotscotland
Welcome Back
#iotscotland
David Holder
Erion
© Erion Ltd 2015 - All rights reserved
IoT:
Integration and
Standardisation
Making your way through the “Fog”
Dr David Holder CEng FIET MIEEE
david.holder@erion.co.uk http://www.erion.co.uk
IoT Scotland 2015
Profile: David Holder
 CEO and Chief Consultant Erion
 Author of numerous reports and whitepapers including
recent CGN and IPv6 studies for Ofcom
 Chairman of IPv6 Task Force Scotland
 Regular speaker at global conferences on IPv6
 Extensive experience of IPv6 spanning over 17 years
 Builds sensor networks for fun!
• PhD in electronic engineering
• (Microwave Semiconductor Devices)
• Fellow of IET (FIET)
• Member of IEEE (MIEEE)
• Chartered Engineer (CEng)
© Erion Ltd 2015 - All rights reserved
Integration & Standardisation
Why you should care
The consequences of getting it wrong
Standards
Take your pick
What will the future be?
Predicting the future is difficult
Backing the “right” standard/s
How to make the “right” choice
© Erion Ltd 2015 - All rights reserved
Why Standards are Important
 Compatibility
 Interoperability
 Functionality
 Flexibility
 Longevity
 Ease of use
 Maintainability
 Manageability
 Ease of application development
Impact on bottom line
© Erion Ltd 2015 - All rights reserved
Bewildering Array of IoT
Standards to Choose From
Examples of standards bodies and standards
How do you choose?
© Erion Ltd 2015 - All rights reserved
802.15.4
CoAP HTTP
The Ideal
 Devices talk directly to each other (the “Fog”)
 No complex translators, gateways or “Upperware”
 Devices communicate directly with the Internet
© Erion Ltd 2015 - All rights reserved
Internet
The Reality
 “Vertical Silos” – islands of standards
 “Upperware” necessary for interoperability
 Devices cannot talk to each other or to the Internet
Incompatible datalinks, WiFi, IEEE 802.15.4, NFC, Bluetooth etc cannot communicate directly
© Erion Ltd 2015 - All rights reserved
Upperware Upperware
X
The Solution
 One standard beings all together
© Erion Ltd 2015 - All rights reserved
802.15.4
?
 The current Internet Protocol IPv4 is not suitable
 IPv4 addresses are exhausted* – none left for IoT
(* IPv4 never have had enough, as it only supports 4 billion addresses)
 Address conservation using NAT/CGN* break
connectivity to other IoT devices and the Internet
(* Network Address Translation / Carrier Grade NAT )
 Backwards support for IPv4 is often provided usually
through some form of translator or gateway
50 Billion
Why IPv4 is NOT the Solution
© Erion Ltd 2015 - All rights reserved
Devices by 2020
IPv6 a Solution for IoT
340,282,366,920,938,463,463,374,607,431,768,211,456
 Practically unlimited number of addresses
 No Network Address Translation (NAT or CGN)
 Better performance
 End-to-end Internet connectivity is possible
 Network layer security is possible
 6LowPAN is IPv6 designed for IoT
 Works across many technologies
 Internet standards have a long shelf life
 Internet is over 30 years old
© Erion Ltd 2015 - All rights reserved
802.15.4 etc...
Why is 6LowPAN Good?
 Uses standard Internet Protocols
 Interoperates across many radio types
 Designed for Low-power, Lossy IoT networks
 Familiar APIs for software developers
 Allows direct connection between devices
 Allows connection to global Internet
© Erion Ltd 2015 - All rights reserved
802.15.4
Internet(IPv6)
802.15.4 etc...
IPv6 Status Today
 No more IPv4 addresses
 Today 70% of a dual-stack user’s traffic is IPv6
 Over 50% of top web sites are IPv6 enabled
 IPv6 connections are faster – no NAT/CGN
 UK ISPs are rolling out IPv6
 Number of IPv6-capable users doubles annually
At this rate everyone will be using IPv6 by 2020
© Erion Ltd 2015 - All rights reserved
Please sir can I have some more?
RIPE
The Future of IoT Standards
 Many contenders
 Historically Zigbee was the biggest player
 6LowPAN is taking off rapidly
 A number of big players are 6LowPAN based
 Zigbee-IP brings together Zigbee and 6LowPAN
 Thread is 6LowPAN (Wide industry support)
 Longevity of installed devices and significant
investments by players may make the move to a
common set of standard/s a long process
© Erion Ltd 2015 - All rights reserved
Preparing for IoT
 Be aware of the huge range of options
 Understand the consequences
 Choose your standards carefully
 Include 6LowPAN in your options
 Prepare for IoT by deploying IPv6
© Erion Ltd 2015 - All rights reserved
Personal Example
 Bespoke IoT network house & grounds
 Avoided commercial options due to vertical tie-in
 Chose Zigbee initially due to immaturity of
6LowPAN products at time of deployment
 Downside learning new standards and APIs
 Currently migrating to 6LowPAN
 Gates, door bells, temperature, security,
weather, garden etc...
© Erion Ltd 2015 - All rights reserved
Thank you for listening
Further Information
 6LowPAN
 6LowPAN and IoT
http://www.erion.co.uk/Training/6lowpanandtheinternetofthings.html
 IPv6 Training http://www.ipv6training.com
 IPv6 Consultancy http://www.ipv6consultancy.com
© Erion Ltd 2015 - All rights reserved
#iotscotland
Martin Sloan
Brodies LLP
ABERDEEN • EDINBURGH • GLASGOW • BRUSSELS www.brodies.com
Internet of Things
Retaining privacy and security in an ever connected
world
Martin Sloan, Partner, Brodies LLP
Blog: http://techblog.brodies.com
Twitter: @Brodies TechBlog
30 September 2015
What data is being
collected?
"We, Siemens, have the technology to record [energy
consumption] every minute, second, microsecond, more or
less live... From that we can infer how many people are in
the house, what they do, whether they're upstairs,
downstairs, do you have a dog, when do you habitually get
up, when did you get up this morning, when do you have a
shower: masses of private data.”
Martin Pollack, Director of M&A, Siemens Energy
Smart Grids and Cleanpower Conference 2010
(as reported by Reuters)
Or….
BBC News: Not in front of the telly: Warning over 'listening' TV
http://www.bbc.co.uk/news/technology-31296188
What data is being collected?
Privacy and security –
what does the law say?
Xkcdhttps://xkcd.com/1269/
LicensedunderaCreativeCommonsAttributionNonCommercialLicence2.5
What does the law say?
• EU-wide laws on data protection
• Other rules apply elsewhere – understand your markets
• Data Protection Act 1998
– imposes obligations on data controllers
– in connection with processing
– of personal data
– about living individuals, known as data subjects, who
have certain corresponding rights under the DPA
• If you are not processing personal data then DPA will not
apply
Data protection principles
• Principle 1 – processed fairly and lawfully
• Principle 2 – processed only for specified and lawful
purposes
• Principle 3 – adequate, relevant and not excessive
• Principle 4 – accurate and (where necessary) up to date
• Principle 5 – kept only for so long as is necessary
• Principle 6 – processed in accordance with rights of the
data subject
• Principle 7 – kept secure
• Principle 8 – not transferred outside EEA, unless the
country ensures “adequate” protection
Fair and lawful processing
• Must satisfy a Schedule 1 condition – includes:
– consent
– necessary for pursuit of legitimate interests
• Sensitive personal data – more limited conditions
(Schedule 2)
• Fair processing code
– must ensure “so far as practicable” that data subject
is informed of the processing
• Processing must otherwise be fair and lawful in all the
circumstances
Secure processing
• Obligation to put in place “appropriate” technical and
organisational measures to prevent
unauthorised/unlawful processing and accidental loss,
damage or destruction
• “Appropriate” depends on nature of data and
consequences of a security breach
• ISO 27001 and other relevant standards?
• Techical and organisational measures:
– not just IT
– Needs holistic approach
– Use of third party processors
Where is the law going?
• New Data Protection Regulation
• European Commission
– Digital Single Market Initiative
– Alliance for Internet of Things Innovation
• ICO guidance
– ANPR, body worn cameras, drones
• Article 29 Working Party
– Opinions to date on geolocation, smart metering
It’s not just about privacy
• CMA investigation into consumer data
• Liability – what if
– your fridge orders too much milk?
– your health monitoring device fails to report an issue?
– your connected car crashes?
• Cyber attacks
– Not just about personal data – also reputational
• IP
– Who owns the IP? What can you do with it?
What should you be doing to protect
personal privacy?
BBC News: Smart devices to get security tune-up
http://www.bbc.co.uk/news/technology-34324247
Key issues to consider
• Consumer understanding
• Privacy by Design
• How do you enable ongoing security improvements?
• Will you collect data about/from children?
• Will you collect sensitive personal data?
• Will you share data with third parties?
• Privacy impact assessments
• Privacy policy/fair processing notice
– What does it say?
– How do you future proof?
– How do you communicate that to individuals?
Developing a privacy aware product
• Conduct a privacy impact assessment
• Anonymisation – do you need to process personal data
at all? Can it be anonymised?
• Repurposing – is the processing consistent with the
original purpose? Do you need consent?
• Data minimsation – how do you achieve this?
• Transparency – how do you convey what you are
doing?
• Subject access requests – design your system to
enable you to comply with rules on subject access rights
• Data management policy
Online Trust Alliance
• Alliance of technology businesses
• Industry initiative to address privacy concerns
• Draft framework on best practices
• Covers:
– Transparency
– Limitations on use of data and data retention
– Rights of the individual
– Security
• Consultation closed 14 September 2015
xkcdStandards
https://xkcd.com/927/
Questions?
• Blog: http://techblog.brodies.com/
• Twitter:
– @BrodiesTechBlog
– @lawyer_martin
• Email: martin.sloan@brodies.com
ABERDEEN • EDINBURGH • GLASGOW • BRUSSELS www.brodies.com
Internet of Things
Retaining privacy and security in an ever connected
world
Martin Sloan, Partner, Brodies LLP
Blog: http://techblog.brodies.com
Twitter: @Brodies TechBlog
30 September 2015
#iotscotland
Colin Birchenall
Future City
Glasgow
Internet of
Things
in the City of
the Future
http://futurecity.glasgow.gov.ukColin Birchenall
Glasgow City Council
30th September 2015
The
“Internet” of
“Things”
…The Convergence of our Physical Worlds and Dig
Quality of Life Economic Growth Environment
City
Priorities
Demonstrate ScaleIntegrated City Services
Health Energy
Transport Public Safety
Research Moisture & Temperature
Insight
Insulation
Retrofit Sensors
Dynamic Routing Route
Optimisation
Integrated
Social Transport
Energy Smart Grid/Building Integration
Insight
Demand-Side
Management
Energy Maintenance Public Safety
Insight
Intelligent
Street Lighting
New Sensors
New Insight
Air Quality
Sensors
Re-Use of Existing & New Sensors New
Insight
Footfall Sensors
Re-Use of Existing Sensors
New Insight
Traffic Sensors
Remote
Monitoring
Benefits to the
City
Proactive
Maintenance
Data
Collection &
Real-Time/
Predictive
Targeted
Service
Reactive to
Proactive
Transformation
through Insight
Better Outcomes
Economy Learning Vulnerable
Environment Vibrancy
Better Services
Improved Efficiency Better
Customer Experience
Better
Engagement
Community Engagement Community
Empowerment
New
Opportunities
New Markets New Industries
Economic Growth
Find out more
http://futurecity.glasg
ow.gov.uk
http://open.glasgow.gov
.uk
Follow us @openglasgow
#iotscotland
Questions &
Discussion
www.scot-data.com
2nd Annual Big Data Scotland
Designing
value in
the
Internet of
Things@chrisspeed
Design Informatics, Edinburgh
Push to pull markets
Push to pull markets
Push to pull markets
Domestic
markets
!"#$%"&' ()*!"#$%"&' ()*
Domestic markets: Verticals
! " $%"&' ()*! " #$%"&' ()*
Domestic markets: Horizontals
Domestic markets: Verticals
Stefan Michel
Domestic markets: Horizontals
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Doors were closed
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Domestic markets: Hub of All Things
Tactics and
horizontals
What would 20,000 Things design?What would 20,000 Things design?
Dat
a
Things
Patterns
Usages
Ideas
Prototypes
Publications
Patents
NewThings
Data
hings
Patterns
Usages
deas
Prototypes
Publications
Patents
NewThings
Tactics and horizontals
What would 20,000 Things design?What would 20,000 Things design?
Dat
a
Things
Patterns
Usages
Ideas
Prototypes
Publications
Patents
NewThings
Data
hings
Patterns
Usages
deas
Prototypes
Publications
Patents
NewThings
Tactics and horizontals
What would 20,000 Things design?What would 20,000 Things design?
Dat
a
Things
Patterns
Usages
Ideas
Prototypes
Publications
Patents
NewThings
Data
hings
Patterns
Usages
deas
Prototypes
Publications
Patents
NewThings
Tactics and horizontals
More than
human
horizontals
ThingTank
“By 2017, asignificant disruptive digital businesswill belaunched
that wasconceivedbya computer algorithm.”
Gartner Report 2014, www.networkedworld.com, October 2014
More than human horizontals: ThingTank.org
ThingTank
Solo
Designer
The Crowd
Things
More than human horizontals: ThingTank.org
ThingTank
Solo
Designer
The Crowd
Things
More than human horizontals: ThingTank.org
853 people designed this
854 people
invented
Pivot Power
http://www.quirky.com
More than human horizontals: ThingTank.org
What would 20,000 Things design?More than human horizontals: ThingTank.org
More than human horizontals: ThingTank.org
More than human horizontals: ThingTank.org
More than human horizontals: ThingTank.org
More than human horizontals: ThingTank.org
More than human horizontals: ThingTank.org
More than human horizontals: ThingTank.org
What would 20,000 Things design?More than human horizontals: ThingTank.org
! " $%"&' ()*! " #$%"&' ()*
More than human horizontals: ThingTank.org
! " $%"&' ()*! " #$%"&' ()*
More than human horizontals: ThingTank.org
Stefan Michel
More than human horizontals: ThingTank.org
Stefan Michel
Algorithm
More than human horizontals: ThingTank.org
Designing
value in
the
Internet of
Things@chrisspeed
Design Informatics, Edinburgh
www.stream-technologies.com Simplifying the Complex
Vision
To be THE Leading Global enabler for
Managing, Monitoring and Monetizing IoT across all
Connectivity Technologies
Cellular Satellite Wi-FiLPWA
Simplifying the Complex
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
We started with the concept of a Customer in the Stream
environment that subscribes to multiple networks using various
technologies.
We treat network problems like software problems.
Scale • Integration • Speed • Efficiency
Stream: A completely differentiated approach
165
Data Routing & Transit: Device to Enterprise
Device
Device
Device
Device
Enterprise
Applications
Data Stores
IT Services
Stream’s Customers
Stream’s Customers Comprise Leading Companies
from the following sectors:
MNOs Solution & Service
Providers
Enterprise Government
IoT-X™ Development Timeline
2002
ENTERPRISE CLIENTS
MNO’s
SP’s
2005
2009
2011
2013
2014
2015
Wholesale
Agreements
Cellular
+
+
Telefonica
Vodafone
EE
Satellite
LPRN
Wi-Fi
+
+
+
Predictive Analytics
Platform & Billing
Backhaul Infrastructure
Network Optimisation +
+
Iridium
Avanti
Inmarsat
Data Services Exchange +
LoRa
NWave
B&B Wizzard
Orion
Application Enablement
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
Services all Verticals & Solutions
Construction
Manufacturing & Distribution
Utilities
Retail
Healthcare
Transportation
Government
Wireless Backup
Digital Signage
Remote Monitoring
Wi-Fi for Public Transportation
Video Communication
Fleet Tracking
Smart Metering
169
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
IoT-X™ Network Partners
170
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
Stream Technologies – Since 2000
Comprehensive
• Industry Leading Platform
• Deep Technical Expertise
• Highly Flexible and Reliable
Proven
• 15 Years IOT/M2M Experience
• >20 Network Operators Integrated
• 500+ Enterprise/Solution Providers
Open
• Connectivity Agnostic
• Industry Standard API’s
• Rapid Development Cycles
171
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
• Nigel Chadwick – CEO (Founder)
• Kevin McDowell – COO (Founder)
• Tracy Hopkins – SVP LPWA
• Mellissa Jenkins – SVP Innovation
• Kurt Kelly- VP Strategic Partnerships
• Lawrence Latham - CMO
• Susan McGee – Associate Director
• Niall Strachan – CSA
• Alan Tait - CTO
The Stream Leadership Team
172
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
IoT-X™ Recognized & Awarded - Innovation in IoT
173
IoT-X recognized by ABI Research as
“one of the most disruptive technologies to hit the IoT market in years,”
Hot Tech Innovators Report
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
Glasgow
Miami
Amsterdam
Silicon Valley
Edinburgh Manchester London
Singapore
Miami
Points of Presence
Offices
Stream's Cellular & Satellite Global Footprint Continues to Expand & Includes
Points of Presence Worldwide
Global Footprint & Reach
174
*2016
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
Stream Industry Affiliations
175
AIOTI
Alliance for Internet of Things Innovation
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
IoT-X™ Comprises 3 Key Products:
176
IoT-Xlerate
Ecosystem will accelerate IoT
business rollout with full-stack
end-to-end IoT solutions
• Ecosystem To Xlerate the IoT business
rollout.
• Productized, Full-Stack, end-to end IoT
solutions.
• Certified & pre-integrated best of breed
solutions.
• Ready-to-go fully integrated
monetizable solutions that reduce time
to market & shorten time to revenue.
IoT-Xpand
Global Wireless Connectivity
Enables organizations to expand
their global IoT footprint
• To Xpand global IoT footprint with Global
Wireless Connectivity.
• Data Plans for cellular, Low Power Radio,
Satellite.
• Resilient, Scalable, Manageable & Secure.
• Up to 40% faster than most network operators.
• Global footprint on 20+ networks covering
multiple networking technologies including
Cellular, LPWA and Satellite
IoT-Xtend
Connected Device
Platform to extend IoT
capabilities
• Connected Device Platform to
monitor, manage & monetize device
endpoints.
• Subscriber Management, Billing, Data
Routing.
• Multi-Network capability in single
comprehensive platform.
• Serve and support complex multi-
tenant & multi-tiered sales channels.
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
IoT-Xtend™ Platform Services
Subscriber
Management
Billing & Monetization Data Routing
IoT-X provides these 3 primary services for all connectivity types:
£$¥€
Cellular Satellite Wi-FiLPWA
177
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
• Single click activation process
• Unified interface across all communication types
• Unique realm support allows resell to customer channels
• Enables multi-tenant & multi-tiered capabilities
• Easily integrate additional technologies
• Enables customer segregation turning private networks into
public networks (LPWA)
Subscriber Management
178
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
• Rating & billing of all traffic types
• Allows billing for complete solution bundles
• including M2M hardware, applications, and connectivity
• Create plans across communication types and networks
• Single invoice for all subscribers
Robust Billing Solution
179
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
• Define network routing
• Route data to any application/store
• Integrate new services easily
• Apply standard routing models to non-IP data
• Built in libraries for common data services
Advanced Data Routing
180
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
Manage All Connectivity on Single Pane of Glass
181
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
Consolidated Billing for Any Type of Connectivity
182
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
For Carriers that Already have a Cellular Platform
IoT-X can simply Xtend that platform to include other network technologies:
Avoids need to replace existing investments in the current platform.
Simply use IoT-X to extend platform capabilities.
IoT-X makes it simple to add satellite, low power radio, Wi-Fi, and even other cellular network to
benefit from entire scope of connectivity options. capabilities.
Additional
Cellular
Satellite Wi-FiLPWA
183
IoT-Xtend adds simplicity to LPWA networks
• Provides subscription and network management, data routing, and billing
• Multiple Backhaul options to LPWA base stations/gateway from the same platform
• Future Proofing: enables LPWA networks to be agnostic to gateway or end device.
• Any LPWA wireless protocol can be used as the ‘over the air’ communication
• ‘Real Time’ transformation of data from all end points – conversion of any wireless protocol
including legacy or prototyping variants.
• The Complex value chain and IoT ecosystem is made simple
• LPWA networks can be deployed end to end with pre-integrated technology partners
• Removes risk as multiple technologies can be deployed individually or simultaneously
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
Cellular Coverage Map
Unsteered
2G & 3G Roaming
with 592 partners
worldwide
IoT-Xpand™ For Global Wireless Connectivity
185
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
Local 2G, 3G, & 4G Map
Local
2G, 3G & 4G LTE
Xpand Local Coverage
186
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
Satellite Coverage Map
Store & Forward
Satellite
Connectivity
TCP/IP Based
Satellite
Connectivity
Xpand Satellite
187
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
LPWA Coverage Map
Low Power
Radio
Networks
Xpand LPWA
188
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
Stream’s Xchange program consists of
• Xpand Platform
• Xlerate Connectivity
• Xchange Global SIM
The Xchange program allows MNOs and Global Enterprises to exchange
connectivity without having to deal directly with each other.
• MNOs to retain control of their Enterprise customers
• MNOs capture wholesale business with no customer acquisition costs
• Multi-National Enterprises can become a MVNO on a global scale
IoT-Xchange™
189
Xpand Core Values
• Un-steered roaming SIM card that works across
2G/3G Network roaming partners
• Coverage is paramount and designed so that
data can be transferred securely over any
network to your infrastructure and applications.
• Stream provides a high level of resilience with
Multi-site infrastructure and N+1 service
redundancy
• Can be used with GSM, CDMA, Satellite and Low
Powered Radio for a mixture of technologies into
their solutions.
• Stream also provides location based services (LBS)
which track and geo fence remote devices and
report location to customers’ applications
throughout the UK, Europe and globally.
• Real-Time management and reporting of
SIMs. View connectivity, data usage levels, set
monitoring alerts and manage invoices.
• Troubleshoot and diagnose problems or get
help with any SIMs.
• Provides real-time GSM, WIFI or Satellite
network based lookup or triangulation.
• Stream’s network monitoring and
diagnostics along with technical &
operational support expertise ensure
optimal network management and
connectivity of devices.
ManageableResilient
Scalable Secure
190
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
• 99.999% APN uptime in the last year
• Operators can offer custom APN purpose built for M2M and IoT data traffic
• Fixed Private IP Addressing with VPN Access
• Dynamic IP Addressing, both private pooled & unpooled
• Stream provides a high level of resilience
• Multi-site infrastructure
• Built on an N+1 box redundancy scheme.
• Stream customers benefit from unparalleled Quality of Service (QoS)
• Two-way IP traffic to devices.
• A fault tolerant self-healing network
• A higher level of data statistics available in IoT-X™
• Data limiting and data warnings via Email, SMS or API calls
Xpand - Advanced Network Services
191
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
Xlerate™ – A Complete IoT Business in a Box
192
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD 193
Xlerate - Our Customers become our Partners
Construction
Manufacturing & Distribution
Utilities
Retail
Healthcare
Transportation
Government
Wireless Backup
Digital Signage
Remote Monitoring
Wi-Fi for Public Transportation
Video Communication
Fleet Tracking
Smart Metering
Xlerate Productized Solutions
• Complete Turnkey solutions made easy to sell for operators
• Over 500+ existing service providers
• Best of breed partners for hardware, software &
applications
• Covering 16 Verticals
• Cellular, Satellite, Dual Mode, and Low Power Radio
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
• Xtend Platform - IoT Scale revenue share
• Xpand
• Data Plans for direct customers
• IoT scale revenue share where the platform is used
to broker connectivity between MNOs
• Xlerate – revenue & margin share
Revenue Model
195
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
Connectivity Platform Competitive Comparison
CELLULAR SATELLITE LPWA USR
Stream
Ericsson
Jasper
1%
10%
16%
63%
2020 Market Share
SATELLITE CELLULAR LPWA USR
By 2020, cellular will be only 10% of all IoT connections*
196
* Source: James Brehm & Associates
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
IoT-Xpand ™ Global Wireless Connectivity
CELLULAR SATELLITE LPWA Wi-Fi/USR
Stream √ √ √ √
Kore √ √
Jasper Alliance √
Bridge Alliance √
Vodafone √
Sat Providers √
SIGFOX √
Hubble √
Stream Uniquely offers
global approach to connectivity
across all network types
197
PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD
• Stream are a wireless internet operator designed for IoT
technology & scale
• IoT-X enables swift commercialization of data networks
• Stream are a data routing company, from the device to the
many various applications
• IoT-X treats network problems like software problems
Think - Amazon Web Services (AWS) for IoT
Final Thoughts…..
198
The Big Money Internet of Things
A case study from 4 years in the US shale Oil & Gas business
Tim Everitt
www.tfe.expert
working for
Key points from the Thing sprint:
Scale – millions of Things
Value – $billions
Mobility – 20% fixed, 80% in slow/medium/fast motion
Sensors – low-risk, public Internet ok
Actuators – high-risk, regulation, private Internets only
Rip & Replace – not possible
Roadmaps – must support legacy and convert to Things
Key points from the Internet sprint:
Laws – Physics implemented as technology and products
Laws – Government, FCC, classification societies
Laws – Money realism
Public Internet – ok for sensors
Private Internets – needed for actuators
Industrial Grade – 5x9, high-capacity, all IP, secure, managed
Customer Demarcation – at tier 1 communications hub
Rip & Replace – not possible
Roadmaps – accept legacy networks and transition to IoT
Killer apps – for high-end IoT:
Sensors – Tag data historians, e.g. PI, Proficy, Wonderware, etc.
Actuators – SCADA/DCS, e.g. ABB, Siemens, Honeywell, etc.
but that’s enough about …
Thank you… and an offer
Any questions
Tim Everitt
www.tfe.expert
working for
CENSIS & IoT
Derek Liddle – Technical Director
Kevin Power – Software Architect
Agenda
CENSIS
IoT & Bluemix
Connected Devices Development Centre
The Innovation Centres
Our HEI Partners
ABERDEEN
INVERNESS
DUNDEE
ST ANDREWS
EDINBURGH
STIRLING
GLASGOW
About CENSIS
Industry-led with Sensor and Imaging
Systems (SIS) focus to generate GVA
Bringing researchers and industry
together for knowledge-driven
innovation
In-house team of engineers
and project managers
Straightforward commercial
framework
Shaping long-term R&D
in key sectors
Hub and Spoke Model
Articulate
industry need
Hub: CENSIS office
Spokes: Virtual
communities of
interest
Understand research
landscape
Identify and shape
potential interventions
Advanced
Data
Analysis &
Visualisation
Advanced
Devices &
Fabrication
Imaging
& Optics
Remote &
Distributed
Systems
Signal
Processing,
Networking
& Comms
Hub: CENSIS
Spokes:Virtual
Communities
Systems
Engineering,
Management,
Integration
The Sensor Systems Stack
From raw data to informed business decisions
Product evolutiondemands
connectedsensing
The value of sensor and
imaging systems is in
transforming raw datainto
meaningful information
Applications/
Software
Thisenables
businessesto:
• assess the value ofdata
• be targeted indata
gathering
• gaininsights
• act on theresults
Devices/
Hardware
Visualisation &
Presentation
Analysis &
Post Processing
Data Repository
Communications
& Networking
Transductance &
Pre-processing
Sensor Element
Presentinginformation to
informdecisions
Converting the measured data
to meaningful information
Storing, managing and
organising data and its content
Transporting the data to a
storagelocation
Converting changes to signals
& prioritising valuable data
Detecting and measuring a change
e.g. vibration, impacts, heart, light,
energy, colour, temperatureetc.
Information
RawData
POWER CONTROL MANAGE
Value Proposition
Incremental and step changes in industrial
competitiveness driven by the proliferation
of innovative SIS solutions targeting real
industry and challenges throughout the
supply chain
We aim to:
Inform and optimise
R&D choices
Enable new products
and markets
Anchor high value
elements of Scottish
supplychain
Address societal and
industrialchallenges
Demonstrate HEI
research impact
Reduce costs, risks,
time to market
Markets we support
From the built environment, manufacturing, gaming, agriculture and defence
to aerospace, water management, consumer, ocean science, food and drink,
life sciences and pharma, offshore, healthcare, renewables and energy generation
Importance of IoT for CENSIS
Hydrocarbon Detection
&Exploration
Gas monitoring CO2 –
Carbon Capture and
Storage
Asset monitoring and
condition monitoring
Multiphase flow, and
particledetection
Subsea position
detection and
communications
Super High Pressure
and High Temperature
Energy
Asset monitoring and
condition monitoring.
Smartgrid
CO2 Emissions
Ageing infrastructure /
PartialDischarge
MolecularSpectroscopy
Consumer health and
fitness
Implantable /
ingestable diagnostics
Medical Imaging and
diagnostics
Telehealth – remote
medicaldiagnostics
Environmental
Remote mapping of
large areas e.g. costal
aquaflora
Low cost – ubiquitous
air quality
measurement
Intelligent Transport –
dynamic optimisation
of transport systems
Smart Cities –open
systems / value add
services / decision
making
Infrastructure condition
monitoring
roads/railways/bridges
Defence
Target recognition in
low visibility
environments
Stand-off threat
detection
Low power / low
weight systems
Infantry super sensing
Food quality non-
invasive measurement
Traceability and
provenance(brand
protection)
Open systemsfor
environmental
management
Smart Farming –
targeted crop and
animal fertilisation.
Animal welfare and
remote monitoring
Manufacturing
Process real time
measurements – e.g.
pills / composites.
Industry 4.0 - smart
manufacturing.
Widget monitoring and
in lifeservice
Aero – Wireless
systems / high
temp./high pressure
1 2
Food &
Agriculture
3 4 5
Medical&
Health
6 7
Offshore &
Subsea
Connected Device Dev. Centre
Open to SME’s &
HEI’s to develop proof of concept
Industrial investment required
Connected Device Development
Centre (CDDC)
 Access to full range of
hardware, comms and
software building blocks to
prove concepts
 Full stack development for
prototype creation and
benchmarking purposes
 Full time engineering support
from dedicated CDDC
engineers
 Access to product and service
training material from various
vendors supporting the centre
HEI
CENSIS
INDUSTRY
CDDC
Twitter @CENSIS121 www.censis.org.uk
Smart Office
Lighting
Analytics
Storage
Visualisation
Light
HVAC
Temp
Humidity
Motion
Displays
CO2
Drinks
WiFi AP Ti CC3200
RS232
Converter
Overhead
Projector
Light
Sensor
COTS
components
COTS
software
services
Existing
IT
Existing
Infrastructure
Architecture
IBM IoT Foundation
MQTT
Publish/Subscribe
Smart OfficeApp
Node.jsRuntime
MQTT
Publish/Subscribe
Architecture
Monitoring &
Analytics
Meeting room booking system
Experience
• A true rapid prototyping
experience
• Significantly reduced
time to demonstration
• End to end IoT
application that we know
can scale
https://ibm.biz/BdXNj5
• Improves operating and
energy efficiency in the
office
Connected Device Dev. Centre
QUESTIONS….
Wearable Agri-Tech - from Lab to Market
IoT Scotland September 2015 Alan Faichney
www.silentherdsman
Contents
• A very little about me
• A little about cows
• A little about the product
• More about getting the company going
www.silentherdsman
About Alan Faichney
• 37 years in software & technology
• Founder & CTO of Concept Systems 1983 -
2007
• Start-up & turnaround management
• DEM Solutions, Rapid Quality Software,
Edinburgh Instruments,
Rock Solid Images, Adrok, Ion Geophysical
• NXD, then interim CEO of Silent Herdsman,
now CTO
• Currently also Chairman of Arrayjet &
Pufferfish, co-owner of The Pantry
A little about cows…
www.silentherdsman
About dairy Cows
• 1 billion cows
• 380 billion l/year
• Dairy is A very
high tech industry
It uses robotics, genetics, genomics… and
software to get cows pregnant!
www.silentherdsman
cows…
• … only produce milk when breeding, & for less than a year
after calving
• … are only fertile (in œstrus) once a month
• failing to get a cow pregnant will lose 1 month’s production
• a UK cow produces ~8000 l of milk per lactation (per year) @
25p / L
• 1 year’s production = £2,000, 1 month’s lost production = £167
/ cow
• Noticing œstrus is easy… for very small herds
• Herds sizes > 1000 can be managed by 2 or 3 people…
• … But you need a system to manage pregnancy for < £100 /
cow…
www.silentherdsman
Business value proposition
A Little about the Product…
www.silentherdsman
Activity monitoring
• 3-axis head mounted
accelerometer
built-in processor, ZigBee
comms
• 1 Hz enough to identify
“Bulling”
• 10 Hz allows discrimination
of many more activities, like
eating, limping
• Long term SRUC research
to characterise activity
signals
www.silentherdsman
System design
www.silentherdsman
PC Housing
• PC with Touch sensitive
screen
• IP67 Dirt resistant &
hoseable
• or on regular PC (in
farmhouse)
• & on any browser…
www.silentherdsman
Multiplatform User interface
www.silentherdsman
Mission critical Cloud architecture
More about the company…
www.silentherdsman
From Science to Commerce
• Company spun out of Strathclyde University in
2007
• Founded on £5m of SRUC / ITI research
• Significant expertise in
• wireless communications, signal
processing, electronics, cows!
• However, the new company had no expertise in
• Sales. Distributors. Pricing. International.
Marketing. Manufacturing. Design for
manufacture. Quality systems. Customer
www.silentherdsman
2007 - 2010 The Early Years
www.silentherdsman
2007 - 2010 The Early Years
Sales✓. Distributors✓. Pricing. International. Marketing. Manufacturing✓.
Design for manufacture. Quality systems. Customer support. Product
development✓. Product Roadmaps. PR. HR. IP✓. HSE. Competition. Investors.
www.silentherdsman
First sales. First customers. First problems.
Sales✓. Distributors✓. Pricing. International. Marketing. Manufacturing✓.
Design for manufacture. Quality systems. Customer support. Product
development✓. Product Roadmaps. PR. HR. IP✓. HSE. Competition.
Investors.
“If it wasn’t for staff, suppliers & customers, running a
company would be easy”
- Anonymous CEO.
“Never buy version 1.0”
- Anonymous pundit.
www.silentherdsman
First sales. First customers. First problems.
Sales✓. Distributors✓. Pricing. International. Marketing. Manufacturing✓.
Design for manufacture✗. Quality systems✗. Customer Support✗. Product
development✓. Product Roadmaps. PR. HR. IP✓. HSE. Competition.
Investors.
“If it wasn’t for staff, suppliers & customers, running a
company would be easy”
- Anonymous CEO.
“Never buy version 1.0”
- Anonymous pundit.
“Why doesn’t this work?”
- Anonymous customer.
www.silentherdsman
First sales. First customers. First problems.
• Version 1 had worked very well on trial farms, when
every collar had been lovingly hand built. But
making thousands was a different matter.
• The design of the electronics was sound. The
design of the quality system was not, and neither
was the robustness of the mechanicals.
• 50% of V1 collars either never worked, or broke in
the field. All had to be replaced
Now, that figure is 0.05%
www.silentherdsman
2010 - 2013 The Grind
• We learned the hard way on quality
• …but it hit our margins
• We secured a major distributor in Germany
• …but we met price competition from inferior
systems
• We had a team
• …jammed into a one room incubator in Duke
Street
• We had a dream
• …but we needed funding to build the Cloud
www.silentherdsman
Valuation
• Hardware manufacturer
• 1x to 2x revenues
• Perpetual licence software
• 2x to 3x revenues
• 5x in financial or security
• SAAS consumer
• 3x to 4x revenues
• SAAS Enterprise
• 5x to 10x revenues
0
2.5
5
7.5
10
12.5
Hardware Software SAAS
www.silentherdsman
October 2013
• For three years, still struggling with sales and
quality, we built our vision…
• “Data providing actionable events to improve farm profitability, animal
health, milk yield, fertility & reduce labour costs, using Big Data, IoT and
the Cloud to drive digital marketing & differentiated services”
• … and pitched it countless times. Eventually,
we raised £3m
• Scottish Equity Partners, Albion Ventures,
Scottish Investment Bank
• As well as money, investors bring much else…
• Professional management. Advisors. NXDS.
www.silentherdsman
New challenges - i - HR
• The company trebled in
headcount
• Three new senior
executives
• Three new functions
• Three small teams
become large teams
• Structure becomes
an issue
• The founders have to
x2x5
x2
www.silentherdsman
New challenges - Ii - Competition
• Whilst we built our cloud system, our
competitors were busy, too
• upgraded their systems. Added new features.
• Dropped prices. Poached our German
distributor. Consolidated the USA
• By the time our Cloud system was ready in mid
2014, we were “behind”
• Competitors had redefined the minimum
offering to include animal Health
www.silentherdsman
Conclusion - where we are now
• 50,000 collars, on 300 farms, ranging from 50 to
1,700 head, in UK, EU, USA
• Successful 2nd round funding (total £4m)
• Built first rate engineering team, & re-established
technical lead
• Built Product pipeline / roadmap
• TWO patents granted, another in process
• World-class branding
• Really nice premises
• Recruited World-class CEO & Chairman
• Successful transition from hardware company to
SAAS company
www.silentherdsman
RAw data
Discrete Görtzel
algorithm
www.silentherdsman
Potted history
• 2006 ITI Scotland, Strathclyde Uni & SRUC invest £5m in
developing technology
• 2007 Company incorporated, Spun out from Strathclyde
• 2009 Exclusive licence to ITI technology. Outsource
manufacturing.
• 2010 UK Distribution agreement with National Milk Records,
1st sales
• 2011 Eu Distribution agreement with Semex Germany
• 2012 Raising funding…. a virtual team working for nothing!
• 2013 £3m funding from SEP, SIB & Albion Ventures.
Premises & professional Board
• 2014 Rebranding, Hiring, cloud development & launch, 1st US
farm (1,700 cows),
• 2015 Health ALERT SaaS product launch, new CEO, push
into USA
www.silentherdsman
Lead Investor - Scottish Equity Partners
• probably now the largest UK indigenous Growth
Investor.
• 150 investments over 20 years. 35 current companies.
• 6 partners & 35 staff in Glasgow, Edinburgh & London.
• Multiple “Unicorn” outcomes ($1bn) from start-
up. CSR Plc, Biovex, Skyscanner…
• Core focus is growth companies £5m to £20m equity
with min £5m of revenues.
• selective <£2m Venture Deals, if capital efficient & high
upside.
• raised over $1b of capital from investors
• “We love to do deals in Scotland!” Skyscanner, Orbital
Software, Voxar, Indigo Vision, Wolfson, Craneware,
Atlantech Technologies etc…
Innovate, Expand, Deliver
Manny Rivelo
EVP, Strategic Solutions
IoT is easy. Security, privacy and
scale of IoT are the real challenges
Michael Brown – F5 Networks
Systems Engineering Manager, UK Channel and Territory
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
TODAY’S THREAT LANDSCAPE
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
What’s the Point?
• We are not starting from ground zero
• The core principles of Data Centre security are still applicable
• BYOD is an example of this
• IoT devices can be managed and secured within your BYOD framework
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
Considerations in an IoT World
• The IoT Device
• The Cloud
• The Mobile Application
• The Network Interfaces
• The Software
• Use of Encryption
• Use of Authentication
• Physical Security
• Exposed Physical Interfaces (e.g. USB Ports)
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
IoT Vulnerability Categories1
1. Web Interface
2. Authentication/Authorisation
3. Network Services
4. Data Transport
5. Data Privacy
6. Cloud Interface
7. Mobile Interface
8. Device Configuration
9. Software/Firmware
10. Physical Device
1Source: OWASP Internet of Things Top Ten Project
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
IoT Vulnerability Categories1
1. Web Interface
2. Authentication/Authorisation
3. Network Services
4. Data Transport
5. Data Privacy
6. Cloud Interface
7. Mobile Interface
8. Device Configuration
9. Software/Firmware
10. Physical Device
1Source: OWASP Internet of Things Top Ten Project
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
IoT Vulnerability Categories1
1. Web Interface
2. Authentication/Authorisation
3. Network Services
4. Data Transport
5. Data Privacy
6. Cloud Interface
7. Mobile Interface
8. Device Configuration
9. Software/Firmware
10. Physical Device
1Source: OWASP Internet of Things Top Ten Project
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
IoT Vulnerability Categories1
1. Web Interface
2. Authentication/Authorisation
3. Network Services
4. Data Transport
5. Data Privacy
6. Cloud Interface
7. Mobile Interface
8. Device Configuration
9. Software/Firmware
10. Physical Device
1Source: OWASP Internet of Things Top Ten Project
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
IoT Vulnerability Categories1
1. Web Interface
2. Authentication/Authorisation
3. Network Services
4. Data Transport
5. Data Privacy
6. Cloud Interface
7. Mobile Interface
8. Device Configuration
9. Software/Firmware
10. Physical Device
1Source: OWASP Internet of Things Top Ten Project
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
IoT Vulnerability Categories1
1. Web Interface
2. Authentication/Authorisation
3. Network Services
4. Data Transport
5. Data Privacy
6. Cloud Interface
7. Mobile Interface
8. Device Configuration
9. Software/Firmware
10. Physical Device
1Source: OWASP Internet of Things Top Ten Project
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
IoT Vulnerability Categories1
1. Web Interface
2. Authentication/Authorisation
3. Network Services
4. Data Transport
5. Data Privacy
6. Cloud Interface
7. Mobile Interface
8. Device Configuration
9. Software/Firmware
10. Physical Device
1Source: OWASP Internet of Things Top Ten Project
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
IoT Vulnerability Categories1
1. Web Interface
2. Authentication/Authorisation
3. Network Services
4. Data Transport
5. Data Privacy
6. Cloud Interface
7. Mobile Interface
8. Device Configuration
9. Software/Firmware
10. Physical Device
1Source: OWASP Internet of Things Top Ten Project
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
IoT Vulnerability Categories1
1. Web Interface
2. Authentication/Authorisation
3. Network Services
4. Data Transport
5. Data Privacy
6. Cloud Interface
7. Mobile Interface
8. Device Configuration
9. Software/Firmware
10. Physical Device
1Source: OWASP Internet of Things Top Ten Project
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
IoT Vulnerability Categories1
1. Web Interface
2. Authentication/Authorisation
3. Network Services
4. Data Transport
5. Data Privacy
6. Cloud Interface
7. Mobile Interface
8. Device Configuration
9. Software/Firmware
10. Physical Device
1Source: OWASP Internet of Things Top Ten Project
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
IoT Vulnerability Categories1
1. Web Interface
2. Authentication/Authorisation
3. Network Services
4. Data Transport
5. Data Privacy
6. Cloud Interface
7. Mobile Interface
8. Device Configuration
9. Software/Firmware
10. Physical Device
1Source: OWASP Internet of Things Top Ten Project
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
Why are Smart Devices so Vulnerable?
• Always on
• Fairly high bandwidth
• Password weakness
• UPnP enabled devices
• Standards are lagging
• Upgrade intervals are long
• Security can be hard
• Security impedes user experience
• Encryption introduces latency
• There is no money in security
• End users
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 HelloProtocol Transport Architecture
Transport
Security
Protocol Security
CoAP UDP* Request/Response DTLS
No built in security
features
MQTT TCP Publish/Subscribe TLS/SSL
Optional
authentication, payload
encryption
MQTT-SN* UDP Publish/Subscribe DTLS
Optional
authentication, payload
encryption
XMPP TCP
Request/Response
Publish/Subscribe
TLS/SSL
Mandatory
authentication,
authorisation, payload
encryption
REST HTTP Request/Response HTTPS Optional authentication
AMQP TCP Publish/Subscribe TLS/SSL
Optional authentication
(SASL)
Web Socket TCP
Client/Server
Publish/Subscribe
TLS/SSL Optional authentication
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
DATA MANAGEMENT
IN A CONNECTED WORLD
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
4400 Exabytes1
• Average IoT organisation’s total volume of data grew by 30% over the past
year
• 54% of IoT organisations say they have insufficient data analysis capabilities
• 50% of IoT organisations failed to improve time-to-decision over the past year
1One exabyte equals one billion gigabytes
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
Exploitation of your data
• Embed data management in the device
• Data is managed as soon as it is captured
• More controlled stream into Cloud and/or Data Centre
• Leverage Stream Analytics technology
• Becoming an important capability of IoT PaaS
• Most major CSPs provide this capability
• Also open source technologies
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
Stream Analytics – a simple flow
Ingest
 Sensors
 Social
 Machine Data
 Location
 Audio
 Video
 Text
Prepare
 Transform
 Filter
 Correlate
 Aggregate
 Enrich
Detect &
Predict
 Classification
 Patterns
 Anomalies
 Scoring
 Events
Decide
 Business
Rules
 Conditional
Logic
Act
 Notify
 Publish
 Execute
 Visualise
Store
Warehouse, Data Reservoir, Operational Store, Files
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
FINAL THOUGHTS AND
REITERATION
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
• There is no guide for securing the IoT
• IoT security will leverage old and new technologies
• Blended approach: mobile, cloud, traditional data centre combined with industrial control,
automation, and physical security
• The IoT is redrawing the lines of IT responsibilities
• Deconstruct traditional IT security approaches
• Protecting information alone is too limiting
• Information is “fuel”
© F5 Networks, Inc
The Current Threat Landscape
• News headline here
 Hello
Thank you.
© 2015 Pure Storage, Inc. | 300Pure Storage UNCLASSIFIED
Title Slide
The rise of Data
Datacentre Transformation
Alex D’Anna EMEA PreSales
© 2015 Pure Storage, Inc. | 301Pure Storage UNCLASSIFIED
The New Expectations of IT – “competing with a bookseller”
Accelerate the
Business
Constantly Improve
Efficiency
Evolve IT into
a Service
Faster
Applications
Harness
Data
Speed
Time-to-Market
Reduce
Cost Annually
Employee
Productivity
Self-Service
Provisioning
Predictable
SLAs
…with public cloud as the new yardstick for measurement
Always Secure
& Available
Data Center
Efficiency
© 2014 Pure Storage, Inc. | 301
© 2015 Pure Storage, Inc. | 302Pure Storage UNCLASSIFIED
Seeing Flash in every Application
Private Cloud
IaaS
Accelerating
Business Apps
Improving
User Productivity
Unlocking
Data Analytics
Modernizing
Legacy
30
3
| © 2015 Pure Storage Inc.
FLASH INNOVATION CHANGES THE DATACENTRE
LIMIT GROWTH WITH
DATA REDUCTION
RAISING THE BAR ON
RESILIENCY
WORKLOAD
CONSOLIDATION
ELIMINATE
MULTIPLE COPIES
© 2015 Pure Storage, Inc. | 304Pure Storage UNCLASSIFIED
Accelerate the Virtualized Apps that Drive Your Business
Transform Offline Analytics
into Real-Time Decisions
Deliver Services that
Weren’t Possible with Disk
Architect More Efficient
Production & Dev/Test Environments
Virtualize DBs
No tuning, ever!
Reduce server
infrastructure
Reduce instance
proliferation
Empower dev/test with
snapshot based clones of
production data
• Remove IO as the bottleneck
• 2-10x transactional improvement
• Design applications to expect <1ms IO
• What can your app teams do now?
• Move from batch to real-time analytics
• Enable broader, deeper questions
• Empower your business with data
• What value is trapped in your data?
© 2015 Pure Storage, Inc. | 305Pure Storage UNCLASSIFIED
As Cloud Use Cases Expand, Higher-Performance Flash Storage is
Increasingly Required
Enterprise Private Cloud Public Cloud IaaS Dev / Test Environments
Performance
Requirements
Disk
Flash
Test Deployments
2nd Tier Apps
1000s of Apps
Mixed Workloads
Horizontally
Scaled Apps
Web-Centric Apps
Content &
Object Stores
Dev / Test
Block Storage
Services & Apps
Hybrid Cloud
Differentiated
Services
Departmental Pilot
Basic Development
Functional Testing
Enterprise-Wide
Deployments
1,000s of Developers
Testing at Scale
 Tomorrow’s deployments require the performance of flash
Business Critical
Applications
© 2015 Pure Storage, Inc. | 306Pure Storage UNCLASSIFIED
(Yet another) Big Data definition…
A lot of it
gives
Volume
Created quickly
brings
Velocity
No structure
means
Variability
Needs data processing
to find
Business Value
© 2015 Pure Storage, Inc. | 307Pure Storage UNCLASSIFIED
How big is big data ?
Byte of data: one grain of rice
Zettabyte: fills the Pacific ocean
Exabyte: covers the UK (3 times)
Petabyte: covers Manhattan
Terabyte: 2 container ships
Gigabyte: 3 container lorries
Megabyte: 8 bags of rice
Kilobyte: cup of rice
H/T to David Wellman @ Myriad Genetics
© 2015 Pure Storage, Inc. | 308Pure Storage UNCLASSIFIED
History lesson: big doesn’t mean good
For the 1936 US presidential election, Liberty
Digest magazine carried out the most
expensive poll in history, writing to 10million
voters asking who they would vote for; 2.4
million voters responded
The prediction was a narrow Republican
victory, but the result was a Democrat
landslide 46 states to 2 because of a flawed
sample set
© 2015 Pure Storage, Inc. | 309Pure Storage UNCLASSIFIED
History lesson: big doesn’t mean good
Liberty Digest magazine closed down after the
results were announced as political expertise was
how it made a reputation
The poll had excluded most of the population on low
incomes, where Roosevelt was more popular during
the Great Depression of the 1930s
The newly formed Gallup company correctly
predicted the result with a poll of only 50,000 voters.
They are a world famous election polling company
nearly 100 years later
© 2015 Pure Storage, Inc. | 310Pure Storage UNCLASSIFIED
A big data project still needs to observe
rules on population, samples, bias,
variance etc.
The dataset must be representative to
get the complete picture
It’s ok to start small and grow the
dataset over time
© 2015 Pure Storage, Inc. | 311Pure Storage UNCLASSIFIED
The Google index of the Internet is 60
trillion pages, 100 Petabytes of data,
and is rewritten daily
Recent statistics from Google show the
amount of content on the Internet
doubled from 2008-2010, and
continues to double every 2 years
© 2015 Pure Storage, Inc. | 312Pure Storage UNCLASSIFIED
The World Bank projects that 50% of the world
population will have a smartphone by 2016, and
80% by 2020 [4 billion today]
The total number of SMS messages sent globally
in 2014 was 7.5 trillion, WhatsApp sent 7.2 trillion
from one app
In 2000, 80 billion photos were processed from
camera film. In 2014, 800 billion photos from
smartphones were shared on social networks
The Zettabyte generation
© 2015 Pure Storage, Inc. | 313Pure Storage UNCLASSIFIED
Facebook, Google, ebay, Amazon, Yahoo
are all operating at Exabyte scale today,
and have created a new class of
applications to deal with this
Products such as Hadoop, Cassandra,
MongoDB, CouchDB, other NoSQL have
evolved to deal with larger datasets by
creating parallel tasks to split the dataset
between servers
© 2015 Pure Storage, Inc. | 314Pure Storage UNCLASSIFIED
The cost of creating data has dropped to
almost nothing for consumers and
businesses
With cloud storage, the cost of storing
this data has also dropped to “free” at
the start
The cost of getting real insight and value
from the increasing amounts of data has
not dropped very much at all
© 2015 Pure Storage, Inc. | 315Pure Storage UNCLASSIFIED
higher yield
lower margin
get the message
miss the point
market leader
underwater
find answers
more questions
Data-driven value
© 2015 Pure Storage, Inc. | 316Pure Storage UNCLASSIFIED
A big data project can lead to 3
types of result as its output
Interesting, not valuable
Interesting, maybe valuable with
more analysis or new filters
Interesting and valuable
© 2015 Pure Storage, Inc. | 317Pure Storage UNCLASSIFIED
Interesting, yes
Valuable, no
Locations of Wikipedia edits
© 2015 Pure Storage, Inc. | 318Pure Storage UNCLASSIFIED
Locations of all Volcanoes
Interesting, yes
Valuable, no
© 2015 Pure Storage, Inc. | 319Pure Storage UNCLASSIFIED
Interesting, yes
Valuable, maybe
All NYC taxi journeys 2013
© 2015 Pure Storage, Inc. | 320Pure Storage UNCLASSIFIED
Interesting, yes
Valuable, yes
Twitter sentiment analysis by keyword
Seric Logo Slide
Securing the Internet of Things (IoT)
Stuart Macdonald - MANAGING DIRECTOR
SEPTEMBER 30TH 2015 - DYNAMIC EARTH, EDINBURGH
#SERICCANHELP
#IOTSCOTLAND
#SericCanHelp
SECURITY ANTI-FRAUD
INFRASTRUCTURE DATA MANAGEMENT
Team Accolades
Seric teams and individuals have won a number of awards from
vendors and external organisations
TECHNICAL
• IBM (Global Technical Excellence)
• Microsoft (HPC Club Winners)
• BCS (Consultant of the Year Silver Medal)
• IBM (BP of the Year)
• NetApp (Outstanding Achievement for UK&I)
MANAGEMENT
• IoD Director of the Year (West of Scotland)
• IoD Young Director of the Year (UK – Highly Commended Runner Up)
• Prince’s Trust (Growth Mentor of the Year)
• E&Y Entrepreneur of the Year (Scottish Finalist)
ETHICAL/CSR
• Youth Business International (Global Ambassador of the Year)
• Prince’s Trust Scotland (Volunteer of the Year)
• IBM (Global Award for Citizenship - Volunteering)
• Inspiring Cities Awards (Commended for Best CSR, Winner for Youth Development)
Ethical Stance
• FIVE % of our Profits
• FIVE days of our Time
• #DigitalParticipation
• #SericCanHelp
• #HowSericHelp
• #SmartSTEMs
Global Beacon
SmartSTEMs
Seric Overview
Seric’s main focus is to deliver Security and Anti-Fraud
Solutions underpinned by robust resilient Infrastructure,
sound Governance and Data Management
Seric deliver Product and Project Services and for much of
their portfolio provide fully managed Service &
Support Offerings
Seric are working across the UK & Europe to assist
organisations in Public Sector, Oil & Gas, Manufacturing,
Retail and the Financial Services Sector
Areas of Expertise
• Data Loss Prevention
• Anti-Fraud Technology
• Data Management
• Encryption-as-a-Service
• Integrated Systems
• Secure Storage
• Fraud Case Management
• Insider Threat Detection
• Intrusion Prevention/Detection Systems
• Governance Risk & Compliance
• Web Application Security
• Mobile Application Security
• Enterprise Single Sign On
• Information Governance
The Security Assessments
Cyber Essentials
• 34 Questions/Controls
• Work with a qualified consultant to get ready and apply
• Certifying body will check application and award
certification
Cyber Essentials Plus
• As above but also includes yearly external audit
Cyber Essentials - Basics
Some of our clients
Seric Logo Slide
Securing the Internet of Things (IoT)
Stuart Macdonald - MANAGING DIRECTOR
SEPTEMBER 30TH 2015 - DYNAMIC EARTH, EDINBURGH
#SERICCANHELP
#IOTSCOTLAND
… a decent guide to SMART
IoT – some little thunkettes
• Opportunity
• Risk
• Background/Landscape
• Practical Steps
Opportunity
Use new fangled IoT thing to…
• Increase Sales
• Cut Costs
• Improve Efficiency
• Raise Profile / Get Famous
• Differentiate ourselves
• Save the World / Do Everything
Potholing!
A simple man will now attempt to
have a video play in full screen.
Try to be patient.
A man will now attempt to have a video play in
full screen.
Try to be patient.
Risks
Use new fangled IoT thing to
• Lose YOUR data
• Learn about Unintended Consequences
• Lose your CUSTOMERS’ data
• Get Amazing Press Coverage (about your mistake)
• Lose a fortune
• Get Fired
• Panic about IoT / Blame Ashley Madison
Those who do not learn from history
are condemned to repeat it
Personal Computers Mobile Devices
Those who have not yet learned from history
are condemned to repeat it
IoT ICS (Industrial
Evolving Risk Landscape – TCP/IP Enabled
Devices Migrating to TCP/IP networks
– Move from Wired to Wireless
– Many rely typically upon “wrapped” protocols
– Analog control and reporting protocols embedded in digital
protocols
– Encryption and command integrity limitations
– Poor selection of TCP/IP protocols
 Problems with patching embedded
operating systems
– Controllers typically running outdated OS’s
– Controllers unable to support security CPU loading
– Security patches and updates not applied
– Difficulty patching the controllers
– Unacceptable downtime
Evolving Risk Landscape – Bridged Networks
 Softest targets appear to be the control
centers
– Greatest use of “PC” systems
– Frequent external connectivity
– Entry-point to critical plant systems
– Vulnerable to insecure remote access ports (dial-up)
 Bridging control centers and the plant
operational framework
– Network connectivity for ease of operational control
– Vulnerable to malware - proxy remote attacks
Evolving Risk Landscape
– Networked Device Proliferation
 Replacement SKU parts
include new “free features”
– Additional features may be
“on” by default
– OR, may be turned on by
engineers
 Switch from analog to digital controls
 Incorporation of network standards
– TCP/IP communications
– Wireless communications
From analog to
digital
(+ networked)
Wireless integration
Evolving Risk Landscape
– Wireless RF/ WiFi Attacks
A 14.6 dBi Yagi antenna that can make
a WiFi connection from miles away
 Increased use of wireless technologies
 Large security research focus
– Common topic/stream at hacking conferences
 Packet Radio Software
– New tools and software to attack &
eavesdrop on any RF transmission
– Community-based sharing of findings
 Tools and guides on long-range
interception of wireless technologies
Evolving Risk Landscape
1. Systems designed 20 years ago when isolation was assumed
2. IoT often not built for Enterprise
=>Changes in corporate infrastructure and device capability bolt-ons
have enabled an entire array of new attack vectors
Control/Office Infrastructure Control Bridge Plant Infrastructure
Wireless (WiFi)
Attacks
Wireless RF AttacksDirect Internet Attacks
Vulnerable
Networked
Services
Malware Infected
Hosts
VPN Attacks
Portable Media
Attacks
Guessed / Stolen
Credentials
Embedded
Command Attacks
Device Contamination
Telephony / Modem
Attacks
External
Indirect Malware
Infections
So here is an cynical and overarching view...
IoT v1.0 – Rebaked for IP Connectivity
IoT v2.0 – Ground up with little/no Enterprise
awareness
IoT v3.0 – ??
So what does all that mean?
A Fresh Approach …
...requires specilaized knowledge and skill in IoT and in general adopts the
following practices:
 Leverage security techniques from the IT domain where appropriate and effective
 Segregate networks to provide better logical isolation of devices unable to support host-
based security solutions
 Increase the amount of network-based monitoring in strategic locations such that network
sensors will be much better positioned to detect malicious or anomalous behavior
 Monitor protocols as well as traffic (i.e MODBUS, ...)
 Reduce the number of POPs to only a tightly controlled few (e.g. Network, WiFi, and
telephony / modem)
 Increase logging and correlate into corporate security information and event monitoring
systems (attacks into the process control domain are typically preceeded or accompianied by
attacks into the corporate networks)
 Implement a governance structure that clearly assigns responsibilities
 Impose strict control over configuration, new system introduction and vendor access
Mind the Gap
Seric work with methodologies that are based on internationally accepted security
frameworks designed to meet industry requirements, regulatory requirements and risk-
based criteria.
Over the course of these engagements, we have learned no single industry framework
or security standard addresses the full scope of the problem.
The ISO/IEC 27000 family and NIST SP 800-53 are:
– IT-centric and cover multiple domains for people, process and technology for Information
Systems
– Do not support specific industry requirements and constraints dealing with limited
computation power, storage, environmental variances, and networking capability
Industry standards such as IEC 62351, IEC 62443 and NERC-CIP:
– Provide specific technical recommendations and requirements for industry controls and
protection/safety systems based on very specific operational constraints
– Do not support the people and process requirements of a information security management
system (ISMS) as defined by ISO/IEC 27000 and NIST.
Top 20 Critical Security Controls - v5
1: Inventory of Authorized and Unauthorized Devices
2: Inventory of Authorized and Unauthorized Software
3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations,
and Servers
4: Continuous Vulnerability Assessment and Remediation
5: Malware Defenses
6: Application Software Security
7: Wireless Access Control
8: Data Recovery Capability
9: Security Skills Assessment and Appropriate Training to Fill Gaps
10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
11: Limitation and Control of Network Ports, Protocols, and Services
12: Controlled Use of Administrative Privileges
13: Boundary Defense
14: Maintenance, Monitoring, and Analysis of Audit Logs
15: Controlled Access Based on the Need to Know
16: Account Monitoring and Control
17: Data Protection
18: Incident Response and Management
19: Secure Network Engineering
20: Penetration Tests and Red Team Exercises
IoT Security - Practical Steps
• Look at your Defined Opportunities
• Get Started on the Security front
• First Principles … & SANS!
• In-house and/or External Support
• Quantify your risk
• Understand your risk posture
• Remember it is a journey
• Oh and Seric Can Help!
Just one more thing….
Presentation Title
Presentation Sub-Title or Date
#SericCanHelp
Thank-you
@SericSystems www.seric.co.uk

More Related Content

What's hot

IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingLisa Waddell
 
IIoT : Old Wine in a New Bottle?
IIoT : Old Wine in a New Bottle?IIoT : Old Wine in a New Bottle?
IIoT : Old Wine in a New Bottle?Venu Vasudevan
 
IoT Developer Survey 2016
IoT Developer Survey 2016IoT Developer Survey 2016
IoT Developer Survey 2016Ian Skerrett
 
IoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of ITIoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of ITSolarWinds
 
Internet of Things Ecosystem
Internet of Things Ecosystem Internet of Things Ecosystem
Internet of Things Ecosystem CompTIA
 
Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0Dr. Mazlan Abbas
 
Addressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTAddressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTDr.Vetrivelan Pandu
 
The Ultimate Things About IoT
The Ultimate Things About IoTThe Ultimate Things About IoT
The Ultimate Things About IoTDr. Mazlan Abbas
 
Awareness on IoT Adoption for SMEs and Business Intelligence
Awareness on IoT Adoption for SMEs and Business IntelligenceAwareness on IoT Adoption for SMEs and Business Intelligence
Awareness on IoT Adoption for SMEs and Business IntelligenceDr. Mazlan Abbas
 
The Impact of Industrial IoT (IIoT) on Fourth Industrial Revolution (4FR) and...
The Impact of Industrial IoT (IIoT) on Fourth Industrial Revolution (4FR) and...The Impact of Industrial IoT (IIoT) on Fourth Industrial Revolution (4FR) and...
The Impact of Industrial IoT (IIoT) on Fourth Industrial Revolution (4FR) and...Colin Koh (許国仁)
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTSemyon Teplisky
 
Edge patterns in the IIoT
Edge patterns in the IIoTEdge patterns in the IIoT
Edge patterns in the IIoTBrad Nicholas
 
Internet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and OpportunitiesInternet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and OpportunitiesDr. Mazlan Abbas
 
IoT and BD Introduction
IoT and BD IntroductionIoT and BD Introduction
IoT and BD IntroductionWayne Sun
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things WGroup
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Francisco Maroto
 
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (EN) <...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (EN) <...EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (EN) <...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (EN) <...Dell Technologies
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 

What's hot (20)

IIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturingIIoT - A data-driven future for manufacturing
IIoT - A data-driven future for manufacturing
 
IIoT : Old Wine in a New Bottle?
IIoT : Old Wine in a New Bottle?IIoT : Old Wine in a New Bottle?
IIoT : Old Wine in a New Bottle?
 
IoT Developer Survey 2016
IoT Developer Survey 2016IoT Developer Survey 2016
IoT Developer Survey 2016
 
IoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of ITIoT Report 2015: Business at the Speed of IT
IoT Report 2015: Business at the Speed of IT
 
Internet of Things Ecosystem
Internet of Things Ecosystem Internet of Things Ecosystem
Internet of Things Ecosystem
 
Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0Realising Society 5.0 and its Relation to Industry 4.0
Realising Society 5.0 and its Relation to Industry 4.0
 
Addressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTAddressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoT
 
The Ultimate Things About IoT
The Ultimate Things About IoTThe Ultimate Things About IoT
The Ultimate Things About IoT
 
Awareness on IoT Adoption for SMEs and Business Intelligence
Awareness on IoT Adoption for SMEs and Business IntelligenceAwareness on IoT Adoption for SMEs and Business Intelligence
Awareness on IoT Adoption for SMEs and Business Intelligence
 
The Impact of Industrial IoT (IIoT) on Fourth Industrial Revolution (4FR) and...
The Impact of Industrial IoT (IIoT) on Fourth Industrial Revolution (4FR) and...The Impact of Industrial IoT (IIoT) on Fourth Industrial Revolution (4FR) and...
The Impact of Industrial IoT (IIoT) on Fourth Industrial Revolution (4FR) and...
 
Data Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoTData Value Creation in the Industrial IoT
Data Value Creation in the Industrial IoT
 
Edge patterns in the IIoT
Edge patterns in the IIoTEdge patterns in the IIoT
Edge patterns in the IIoT
 
Internet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and OpportunitiesInternet of Things (IoT) - Trends, Challenges and Opportunities
Internet of Things (IoT) - Trends, Challenges and Opportunities
 
IoT and BD Introduction
IoT and BD IntroductionIoT and BD Introduction
IoT and BD Introduction
 
11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things 11 things IT leaders need to know about the internet of things
11 things IT leaders need to know about the internet of things
 
Oies IoT World Europe 20170615
Oies IoT World Europe 20170615Oies IoT World Europe 20170615
Oies IoT World Europe 20170615
 
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (EN) <...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (EN) <...EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (EN) <...
EMC Solutions for the Internet of Things and Industrie 4.0 - Platforms (EN) <...
 
IoT ecosystem
IoT ecosystemIoT ecosystem
IoT ecosystem
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
IoT PPT
IoT PPTIoT PPT
IoT PPT
 

Viewers also liked

Chris Beanland - Getting IoT into the Hands of 150k Customers - British Gas' ...
Chris Beanland - Getting IoT into the Hands of 150k Customers - British Gas' ...Chris Beanland - Getting IoT into the Hands of 150k Customers - British Gas' ...
Chris Beanland - Getting IoT into the Hands of 150k Customers - British Gas' ...Business of Software Conference
 
Telefónica Smart Metering Value Proposition
Telefónica Smart Metering Value PropositionTelefónica Smart Metering Value Proposition
Telefónica Smart Metering Value PropositionTelefónica IoT
 
Design for Learning: The Future of the Web (Well, for 5 Years)
Design for Learning: The Future of the Web (Well, for 5 Years)Design for Learning: The Future of the Web (Well, for 5 Years)
Design for Learning: The Future of the Web (Well, for 5 Years)Andrew Boardman
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015Ray Bugg
 
Classes of Words
Classes of WordsClasses of Words
Classes of WordsTutik SR
 
Characterizing High-Speed Serial Communications Links Requires Some Analog Sa...
Characterizing High-Speed Serial Communications Links Requires Some Analog Sa...Characterizing High-Speed Serial Communications Links Requires Some Analog Sa...
Characterizing High-Speed Serial Communications Links Requires Some Analog Sa...Hamed M. Sanogo
 
Profil Wirausahawan Sukses - KI Ageng Widyanto Suryo Buwono
Profil Wirausahawan Sukses - KI Ageng Widyanto Suryo BuwonoProfil Wirausahawan Sukses - KI Ageng Widyanto Suryo Buwono
Profil Wirausahawan Sukses - KI Ageng Widyanto Suryo BuwonoTutik SR
 
Social Construction of Nature
Social Construction of Nature Social Construction of Nature
Social Construction of Nature Mary Schaeffer
 
High Level Conference on Jordan’s Water Crisis - December 2, 2013
High Level Conference on Jordan’s Water Crisis - December 2, 2013High Level Conference on Jordan’s Water Crisis - December 2, 2013
High Level Conference on Jordan’s Water Crisis - December 2, 2013Nicholas Harnish
 
The Top Down
The Top Down The Top Down
The Top Down Tutik SR
 
The power of pretending
The power of pretendingThe power of pretending
The power of pretendingTutik SR
 
AN ANALYSIS OF CHILD ABUSE IN INDIAN SCENARIO
AN ANALYSIS OF CHILD ABUSE IN INDIAN SCENARIOAN ANALYSIS OF CHILD ABUSE IN INDIAN SCENARIO
AN ANALYSIS OF CHILD ABUSE IN INDIAN SCENARIOIJMR Journal
 
Ijciss1 april2612 A STUDY ON CELLULAR SERVICE INDUSTRY ON ITS SERVICE QUALITY...
Ijciss1 april2612 A STUDY ON CELLULAR SERVICE INDUSTRY ON ITS SERVICE QUALITY...Ijciss1 april2612 A STUDY ON CELLULAR SERVICE INDUSTRY ON ITS SERVICE QUALITY...
Ijciss1 april2612 A STUDY ON CELLULAR SERVICE INDUSTRY ON ITS SERVICE QUALITY...IJMR Journal
 
12 Months of Awesome (Content) for Socially Responsible Businesses
12 Months of Awesome (Content) for Socially Responsible Businesses12 Months of Awesome (Content) for Socially Responsible Businesses
12 Months of Awesome (Content) for Socially Responsible BusinessesAndrew Boardman
 
IT In The Park 2016
IT In The Park 2016IT In The Park 2016
IT In The Park 2016Ray Bugg
 

Viewers also liked (20)

Chris Beanland - Getting IoT into the Hands of 150k Customers - British Gas' ...
Chris Beanland - Getting IoT into the Hands of 150k Customers - British Gas' ...Chris Beanland - Getting IoT into the Hands of 150k Customers - British Gas' ...
Chris Beanland - Getting IoT into the Hands of 150k Customers - British Gas' ...
 
Telefónica Smart Metering Value Proposition
Telefónica Smart Metering Value PropositionTelefónica Smart Metering Value Proposition
Telefónica Smart Metering Value Proposition
 
Motion and Speed
Motion and SpeedMotion and Speed
Motion and Speed
 
Design for Learning: The Future of the Web (Well, for 5 Years)
Design for Learning: The Future of the Web (Well, for 5 Years)Design for Learning: The Future of the Web (Well, for 5 Years)
Design for Learning: The Future of the Web (Well, for 5 Years)
 
Scot-Cloud 2015
Scot-Cloud 2015Scot-Cloud 2015
Scot-Cloud 2015
 
Classes of Words
Classes of WordsClasses of Words
Classes of Words
 
Fiori
FioriFiori
Fiori
 
Characterizing High-Speed Serial Communications Links Requires Some Analog Sa...
Characterizing High-Speed Serial Communications Links Requires Some Analog Sa...Characterizing High-Speed Serial Communications Links Requires Some Analog Sa...
Characterizing High-Speed Serial Communications Links Requires Some Analog Sa...
 
Profil Wirausahawan Sukses - KI Ageng Widyanto Suryo Buwono
Profil Wirausahawan Sukses - KI Ageng Widyanto Suryo BuwonoProfil Wirausahawan Sukses - KI Ageng Widyanto Suryo Buwono
Profil Wirausahawan Sukses - KI Ageng Widyanto Suryo Buwono
 
Social Construction of Nature
Social Construction of Nature Social Construction of Nature
Social Construction of Nature
 
IPTEK
IPTEKIPTEK
IPTEK
 
High Level Conference on Jordan’s Water Crisis - December 2, 2013
High Level Conference on Jordan’s Water Crisis - December 2, 2013High Level Conference on Jordan’s Water Crisis - December 2, 2013
High Level Conference on Jordan’s Water Crisis - December 2, 2013
 
The Top Down
The Top Down The Top Down
The Top Down
 
The power of pretending
The power of pretendingThe power of pretending
The power of pretending
 
AN ANALYSIS OF CHILD ABUSE IN INDIAN SCENARIO
AN ANALYSIS OF CHILD ABUSE IN INDIAN SCENARIOAN ANALYSIS OF CHILD ABUSE IN INDIAN SCENARIO
AN ANALYSIS OF CHILD ABUSE IN INDIAN SCENARIO
 
Ijciss1 april2612 A STUDY ON CELLULAR SERVICE INDUSTRY ON ITS SERVICE QUALITY...
Ijciss1 april2612 A STUDY ON CELLULAR SERVICE INDUSTRY ON ITS SERVICE QUALITY...Ijciss1 april2612 A STUDY ON CELLULAR SERVICE INDUSTRY ON ITS SERVICE QUALITY...
Ijciss1 april2612 A STUDY ON CELLULAR SERVICE INDUSTRY ON ITS SERVICE QUALITY...
 
SITE Institute
SITE InstituteSITE Institute
SITE Institute
 
12 Months of Awesome (Content) for Socially Responsible Businesses
12 Months of Awesome (Content) for Socially Responsible Businesses12 Months of Awesome (Content) for Socially Responsible Businesses
12 Months of Awesome (Content) for Socially Responsible Businesses
 
Motion and Speed
Motion and SpeedMotion and Speed
Motion and Speed
 
IT In The Park 2016
IT In The Park 2016IT In The Park 2016
IT In The Park 2016
 

Similar to Internet of Things IoT Scotland 2015

El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCODomotys
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...gogo6
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014Bessie Wang
 
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)MicheleNati
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoTCisco Canada
 
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14Mark Morley, MBA
 
33977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_1433977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_14Alex Blanter
 
IoT Implementation and Security Best Practices
IoT Implementation and Security Best PracticesIoT Implementation and Security Best Practices
IoT Implementation and Security Best PracticesKellton Tech Solutions Ltd
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & ChallengesDr. Mazlan Abbas
 
Wireless Global Congress: 2020 is not that far away
Wireless Global Congress:  2020 is not that far awayWireless Global Congress:  2020 is not that far away
Wireless Global Congress: 2020 is not that far awayRob Van Den Dam
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.Atanu Roy Chowdhury
 
PIF2019 - A06 - Rodrigo M Tutilo - Advantech
PIF2019 - A06 - Rodrigo M Tutilo - AdvantechPIF2019 - A06 - Rodrigo M Tutilo - Advantech
PIF2019 - A06 - Rodrigo M Tutilo - AdvantechEvandro Gama (Prof. Dr.)
 
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...Lounge47
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
 
Digital Transformation in a World of Connected Devices
Digital Transformation in a World of Connected DevicesDigital Transformation in a World of Connected Devices
Digital Transformation in a World of Connected DevicesMuleSoft
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingTonex
 
Track 3 session 2 - st dev con 2016 - arrow - identifying business challeng...
Track 3   session 2 - st dev con 2016 - arrow - identifying business challeng...Track 3   session 2 - st dev con 2016 - arrow - identifying business challeng...
Track 3 session 2 - st dev con 2016 - arrow - identifying business challeng...ST_World
 
The Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationThe Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationAditya Basu
 
Internet Of Things (IOT) For Beginners
Internet Of Things (IOT) For BeginnersInternet Of Things (IOT) For Beginners
Internet Of Things (IOT) For BeginnersSrashti Jain
 

Similar to Internet of Things IoT Scotland 2015 (20)

El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCOEl IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
El IoT y la gestión de las empresas del futuro, IGNASI ERRANDO, CISCO
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
IoTMeetupGuildford#2: The IoT Ecosystem - Justin Anderson (FlexEye)
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
 
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
 
33977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_1433977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_14
 
IoT Implementation and Security Best Practices
IoT Implementation and Security Best PracticesIoT Implementation and Security Best Practices
IoT Implementation and Security Best Practices
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & Challenges
 
IoT-Use-Case-eBook
IoT-Use-Case-eBookIoT-Use-Case-eBook
IoT-Use-Case-eBook
 
Wireless Global Congress: 2020 is not that far away
Wireless Global Congress:  2020 is not that far awayWireless Global Congress:  2020 is not that far away
Wireless Global Congress: 2020 is not that far away
 
Who will buy IOT products and why.
Who will buy IOT products and why.Who will buy IOT products and why.
Who will buy IOT products and why.
 
PIF2019 - A06 - Rodrigo M Tutilo - Advantech
PIF2019 - A06 - Rodrigo M Tutilo - AdvantechPIF2019 - A06 - Rodrigo M Tutilo - Advantech
PIF2019 - A06 - Rodrigo M Tutilo - Advantech
 
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
Who will pay for IoT and why? - Atanu Roy Chowdhury, Senior Product Manager a...
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
 
Digital Transformation in a World of Connected Devices
Digital Transformation in a World of Connected DevicesDigital Transformation in a World of Connected Devices
Digital Transformation in a World of Connected Devices
 
Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
 
Track 3 session 2 - st dev con 2016 - arrow - identifying business challeng...
Track 3   session 2 - st dev con 2016 - arrow - identifying business challeng...Track 3   session 2 - st dev con 2016 - arrow - identifying business challeng...
Track 3 session 2 - st dev con 2016 - arrow - identifying business challeng...
 
The Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationThe Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT Implementation
 
Internet Of Things (IOT) For Beginners
Internet Of Things (IOT) For BeginnersInternet Of Things (IOT) For Beginners
Internet Of Things (IOT) For Beginners
 

More from Ray Bugg

Digit Leaders 2023
Digit Leaders 2023 Digit Leaders 2023
Digit Leaders 2023 Ray Bugg
 
DIGIT North 2022
DIGIT North 2022DIGIT North 2022
DIGIT North 2022Ray Bugg
 
Digital Transformation Summit 2021
Digital Transformation Summit 2021Digital Transformation Summit 2021
Digital Transformation Summit 2021Ray Bugg
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020Ray Bugg
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Ray Bugg
 
DIGIT Expo 2019
DIGIT Expo 2019DIGIT Expo 2019
DIGIT Expo 2019Ray Bugg
 
DIGIT Expo 2019
DIGIT Expo 2019DIGIT Expo 2019
DIGIT Expo 2019Ray Bugg
 
Scotland's FinTech Summit 2019
Scotland's FinTech Summit 2019Scotland's FinTech Summit 2019
Scotland's FinTech Summit 2019Ray Bugg
 
Intelligent Automation 2019
Intelligent Automation 2019Intelligent Automation 2019
Intelligent Automation 2019Ray Bugg
 
DIGIT Leader 2019
DIGIT Leader 2019DIGIT Leader 2019
DIGIT Leader 2019Ray Bugg
 
DIgital Energy 2019
DIgital Energy 2019DIgital Energy 2019
DIgital Energy 2019Ray Bugg
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Ray Bugg
 
Digital Transformation Scotland 2019
Digital Transformation Scotland 2019Digital Transformation Scotland 2019
Digital Transformation Scotland 2019Ray Bugg
 
GDPR Scotland 2018
GDPR Scotland 2018GDPR Scotland 2018
GDPR Scotland 2018Ray Bugg
 
Fintech 2018 Edinburgh
Fintech 2018 EdinburghFintech 2018 Edinburgh
Fintech 2018 EdinburghRay Bugg
 
DIGIT Leader Summit 2018 - Edinburgh
DIGIT Leader Summit 2018 - EdinburghDIGIT Leader Summit 2018 - Edinburgh
DIGIT Leader Summit 2018 - EdinburghRay Bugg
 
IoT Scotland 2018
IoT Scotland 2018IoT Scotland 2018
IoT Scotland 2018Ray Bugg
 
Digital Energy 2018 Day 1
Digital Energy 2018 Day 1Digital Energy 2018 Day 1
Digital Energy 2018 Day 1Ray Bugg
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Ray Bugg
 

More from Ray Bugg (20)

Digit Leaders 2023
Digit Leaders 2023 Digit Leaders 2023
Digit Leaders 2023
 
DIGIT North 2022
DIGIT North 2022DIGIT North 2022
DIGIT North 2022
 
Digital Transformation Summit 2021
Digital Transformation Summit 2021Digital Transformation Summit 2021
Digital Transformation Summit 2021
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019
 
DIGIT Expo 2019
DIGIT Expo 2019DIGIT Expo 2019
DIGIT Expo 2019
 
DIGIT Expo 2019
DIGIT Expo 2019DIGIT Expo 2019
DIGIT Expo 2019
 
Scotland's FinTech Summit 2019
Scotland's FinTech Summit 2019Scotland's FinTech Summit 2019
Scotland's FinTech Summit 2019
 
Intelligent Automation 2019
Intelligent Automation 2019Intelligent Automation 2019
Intelligent Automation 2019
 
DIGIT Leader 2019
DIGIT Leader 2019DIGIT Leader 2019
DIGIT Leader 2019
 
DIgital Energy 2019
DIgital Energy 2019DIgital Energy 2019
DIgital Energy 2019
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)
 
Digital Transformation Scotland 2019
Digital Transformation Scotland 2019Digital Transformation Scotland 2019
Digital Transformation Scotland 2019
 
GDPR Scotland 2018
GDPR Scotland 2018GDPR Scotland 2018
GDPR Scotland 2018
 
Fintech 2018 Edinburgh
Fintech 2018 EdinburghFintech 2018 Edinburgh
Fintech 2018 Edinburgh
 
DIGIT Leader Summit 2018 - Edinburgh
DIGIT Leader Summit 2018 - EdinburghDIGIT Leader Summit 2018 - Edinburgh
DIGIT Leader Summit 2018 - Edinburgh
 
IoT Scotland 2018
IoT Scotland 2018IoT Scotland 2018
IoT Scotland 2018
 
Digital Energy 2018 Day 1
Digital Energy 2018 Day 1Digital Energy 2018 Day 1
Digital Energy 2018 Day 1
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2
 

Recently uploaded

Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 

Recently uploaded (20)

Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 

Internet of Things IoT Scotland 2015

  • 4. I Predict A (R)IOT Why everything is connected and everything will change Theo Priestley IOT Scotland 2015 Our Dynamic Earth
  • 5. Theo Priestley Technology Analyst, Advisor, Forbes Twitter: @ITredux http://www.linkedin.com/in/theopriestley
  • 7. Where Do You Even Begin ?
  • 8. Three Things Will Occur • Data will become open to all • Real-time analysis will occur at source • Blockchain technology will become a critical component for security
  • 9. Change Driven By Open Data Not Things
  • 10. Planning For Change Plan Do Check Act Devices Data Insight Action
  • 11. Changing Of The Guard This is not a place for your Grandfather’s Data Protection Act Privacy today is not the privacy of 1998
  • 12. Business Models Will Change DIGITAL INTERNET OF STUFF
  • 13. The Customer Will See You Now
  • 14. The Customer Will Own Their Data And You Will Rent It From Them
  • 15. Internal And External Opportunities Appirio gives all employees Fitbit trackers Google Hangouts offer employees live video sessions with a trainer Data mined from Chatter groups and Fitbit devices lead to 5% reduction in annual insurance premiums at approx. $300k
  • 16.
  • 17. Theo Priestley Technology Analyst, Advisor, Strategist Twitter: @ITredux http://www.linkedin.com/in/theopriestley
  • 20. The past & future of connected devices …from my perspective
  • 27. A couple of IoT lessons
  • 29.
  • 32. © 2014 All rights reserved. Do not distribute. Hosted by Driving Real Business Outcomes with IoT Steve McKee Solution Architect
  • 33. © 2014 Cisco and/or its affiliates. All rights reserved. 33 IoT is Here Now. And it’s Growing ! TIMELINE 2010 2015 2020 BILLIONSOFDEVICES 0 10 20 30 50 Adoption rate of digital infrastructure: 5X faster than electricity and telephony 25 12.5 7.26.8 7.6 World Population 50+ Billion Smart Objects Inflection point
  • 34. © 2014 Cisco and/or its affiliates. All rights reserved. 34 IoT Investments Are Growing Source: Cisco IoT Survey 2014; % of survey respondents N=1230 86% 76% 86% 79% 91% 89% 77% % of Respondents Increasing IoT Investments in the Next 3 Years
  • 35. © 2014 Cisco and/or its affiliates. All rights reserved. 35 2014 Microsoft Entered the IoT Market Schnieder and ioBridge Announce Partnership Siemens Announces $100M IoT Fund UK Creates £45m IoT Fund Zebra Acquires Motorola Wireless $3.45B June 2014 Apple Announces Their First Home Automation Initiative Feb 2014 AT&T and IBM Announce Join IoT Vision Barcelona Smart City: $3.6B Value Creation Google Buys Nest for $3.2B Announces IoT Group IoT Market Is Here Now 0 1 2 3 4 5 6 7 8 9 10 11 Estimated Potential Economic Impact of Technologies Across Sized Applications in 2025 ($ Trillion, Annual) A Gallery of Disruptive Technologies Source: McKinsey Global Institute Mobile Internet Automation of Knowledge Work Internet of Things Cloud Advanced Robotics Autonomous / Near-Autonomous Vehicles Next-Generation Genomics Energy Storage 3-D Printing Advanced Materials Oil and Gas Exploration and Recovery Renewable Energy
  • 36. Applications Things App Enablement Workflow / Rules Engine Event Management Video Sensing Data Normalization and Modeling Protocol Mediation Enterprise App Integration Infrastructure Software Defined Networking Network Compute Storage Applications App Enablement Workflow / Rules Engine Event Management Video Sensing Data Normalization and Modeling Protocol Mediation Enterprise App Integration Cloud and Fog Analytics Security and Identity Management Open and Programmability (APIs) Ease of use and Management Infrastructure Software Defined Networking Network Compute Storage Things IoT Technology Platform – Accelerating Adoption
  • 37. © 2014 Cisco and/or its affiliates. All rights reserved. 37 Environment Great Barrier Reef in Australia Buoys equipped with sensors collect biological, physical, and chemical data to minimize and prevent reef damage.
  • 38. © 2014 Cisco and/or its affiliates. All rights reserved. 38 Healthcare Medication in The United States Smart pill bottles remind patients to take their medication and records that the patient has taken the correct dosage.
  • 39. © 2014 Cisco and/or its affiliates. All rights reserved. 39 Smart Buses Smart Bus Stop Smart Water Smart Lighting Smart Parking Smart Citizens Smart Waste Revenue Citizen Experiences Productivity Cost Avoidance Jobs Barcelona: Smart City $3.6 Billion Value Creation “We are obsessed with building quality of life for our citizens. That is our present and the future of our city.” Antoni Vives Deputy Vice Mayor City of Barcelona, Spain
  • 40. © 2014 Cisco and/or its affiliates. All rights reserved. 40 TRANSPORTATION Reduced Traffic Congestion in SF Deployed 20,000 Smart Parking Spaces Innovative Demand- Responsive Pricing 40© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential San Francisco Gets Smarter Parking Spaces IoE Solution Parking, garage and roadway sensors for real- time parking and traffic analysis San Francisco, CA
  • 41. © 2014 Cisco and/or its affiliates. All rights reserved. 41 Harley-Davidson Accelerates Product Cycles Manufacturing York, PA Manufacturing flexibility across supply chain IoT Solution Solution Partners Sped up Product Cycles by 10–20% Accelerated Triage and Troubleshooting Improved Working Culture
  • 42. © 2014 Cisco and/or its affiliates. All rights reserved. 42 Hamburg Is on Its Way to Becoming a Smarter City Smart Cities Hamburg, Germany Citywide traffic incident management solution, Smart Street lighting and environmental sensing, smart shipping container management IoT Solution Solution Partners Deployed Smart Traffic and Street Lights Improved Traffic Flow Optimized Power Consumption
  • 43. © 2014 Cisco and/or its affiliates. All rights reserved. 43 And Many, Many, More………. Becoming an Engaged and Connected City Driving new levels of Utility efficiency and uptime Gaining Double Digits Manufacturing Productivity
  • 44. IoTWF Working Groups Horizontal Working Groups Vertical Working Groups Security, Privacy, Compliance Standards & Interoperabilit y Architecture, Management, Analytics Innovations, Start-Ups Sensors & Embedded OS GTM: New Business Models Marketing Education Health Manufacturing Energy Retail Transportation Smart City
  • 45. © 2014 Cisco and/or its affiliates. All rights reserved. 45 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45 Prof. Michael Nelson, Georgetown University “Trying to determine the market size for the Internet of Things is like trying to calculate the market for plastics, circa 1940. At the time, it was difficult to imagine that plastics could be in everything.”
  • 46. © 2014 Cisco and/or its affiliates. All rights reserved. 46 The Internet of Things. Here. Now.
  • 47. #iotscotland John Swinney MSP The Scottish Government
  • 54. © Erion Ltd 2015 - All rights reserved IoT: Integration and Standardisation Making your way through the “Fog” Dr David Holder CEng FIET MIEEE david.holder@erion.co.uk http://www.erion.co.uk IoT Scotland 2015
  • 55. Profile: David Holder  CEO and Chief Consultant Erion  Author of numerous reports and whitepapers including recent CGN and IPv6 studies for Ofcom  Chairman of IPv6 Task Force Scotland  Regular speaker at global conferences on IPv6  Extensive experience of IPv6 spanning over 17 years  Builds sensor networks for fun! • PhD in electronic engineering • (Microwave Semiconductor Devices) • Fellow of IET (FIET) • Member of IEEE (MIEEE) • Chartered Engineer (CEng) © Erion Ltd 2015 - All rights reserved
  • 56. Integration & Standardisation Why you should care The consequences of getting it wrong Standards Take your pick What will the future be? Predicting the future is difficult Backing the “right” standard/s How to make the “right” choice © Erion Ltd 2015 - All rights reserved
  • 57. Why Standards are Important  Compatibility  Interoperability  Functionality  Flexibility  Longevity  Ease of use  Maintainability  Manageability  Ease of application development Impact on bottom line © Erion Ltd 2015 - All rights reserved
  • 58. Bewildering Array of IoT Standards to Choose From Examples of standards bodies and standards How do you choose? © Erion Ltd 2015 - All rights reserved 802.15.4 CoAP HTTP
  • 59. The Ideal  Devices talk directly to each other (the “Fog”)  No complex translators, gateways or “Upperware”  Devices communicate directly with the Internet © Erion Ltd 2015 - All rights reserved Internet
  • 60. The Reality  “Vertical Silos” – islands of standards  “Upperware” necessary for interoperability  Devices cannot talk to each other or to the Internet Incompatible datalinks, WiFi, IEEE 802.15.4, NFC, Bluetooth etc cannot communicate directly © Erion Ltd 2015 - All rights reserved Upperware Upperware X
  • 61. The Solution  One standard beings all together © Erion Ltd 2015 - All rights reserved 802.15.4 ?
  • 62.  The current Internet Protocol IPv4 is not suitable  IPv4 addresses are exhausted* – none left for IoT (* IPv4 never have had enough, as it only supports 4 billion addresses)  Address conservation using NAT/CGN* break connectivity to other IoT devices and the Internet (* Network Address Translation / Carrier Grade NAT )  Backwards support for IPv4 is often provided usually through some form of translator or gateway 50 Billion Why IPv4 is NOT the Solution © Erion Ltd 2015 - All rights reserved Devices by 2020
  • 63. IPv6 a Solution for IoT 340,282,366,920,938,463,463,374,607,431,768,211,456  Practically unlimited number of addresses  No Network Address Translation (NAT or CGN)  Better performance  End-to-end Internet connectivity is possible  Network layer security is possible  6LowPAN is IPv6 designed for IoT  Works across many technologies  Internet standards have a long shelf life  Internet is over 30 years old © Erion Ltd 2015 - All rights reserved 802.15.4 etc...
  • 64. Why is 6LowPAN Good?  Uses standard Internet Protocols  Interoperates across many radio types  Designed for Low-power, Lossy IoT networks  Familiar APIs for software developers  Allows direct connection between devices  Allows connection to global Internet © Erion Ltd 2015 - All rights reserved 802.15.4 Internet(IPv6) 802.15.4 etc...
  • 65. IPv6 Status Today  No more IPv4 addresses  Today 70% of a dual-stack user’s traffic is IPv6  Over 50% of top web sites are IPv6 enabled  IPv6 connections are faster – no NAT/CGN  UK ISPs are rolling out IPv6  Number of IPv6-capable users doubles annually At this rate everyone will be using IPv6 by 2020 © Erion Ltd 2015 - All rights reserved Please sir can I have some more? RIPE
  • 66. The Future of IoT Standards  Many contenders  Historically Zigbee was the biggest player  6LowPAN is taking off rapidly  A number of big players are 6LowPAN based  Zigbee-IP brings together Zigbee and 6LowPAN  Thread is 6LowPAN (Wide industry support)  Longevity of installed devices and significant investments by players may make the move to a common set of standard/s a long process © Erion Ltd 2015 - All rights reserved
  • 67. Preparing for IoT  Be aware of the huge range of options  Understand the consequences  Choose your standards carefully  Include 6LowPAN in your options  Prepare for IoT by deploying IPv6 © Erion Ltd 2015 - All rights reserved
  • 68. Personal Example  Bespoke IoT network house & grounds  Avoided commercial options due to vertical tie-in  Chose Zigbee initially due to immaturity of 6LowPAN products at time of deployment  Downside learning new standards and APIs  Currently migrating to 6LowPAN  Gates, door bells, temperature, security, weather, garden etc... © Erion Ltd 2015 - All rights reserved
  • 69. Thank you for listening Further Information  6LowPAN  6LowPAN and IoT http://www.erion.co.uk/Training/6lowpanandtheinternetofthings.html  IPv6 Training http://www.ipv6training.com  IPv6 Consultancy http://www.ipv6consultancy.com © Erion Ltd 2015 - All rights reserved
  • 71. ABERDEEN • EDINBURGH • GLASGOW • BRUSSELS www.brodies.com Internet of Things Retaining privacy and security in an ever connected world Martin Sloan, Partner, Brodies LLP Blog: http://techblog.brodies.com Twitter: @Brodies TechBlog 30 September 2015
  • 72. What data is being collected?
  • 73. "We, Siemens, have the technology to record [energy consumption] every minute, second, microsecond, more or less live... From that we can infer how many people are in the house, what they do, whether they're upstairs, downstairs, do you have a dog, when do you habitually get up, when did you get up this morning, when do you have a shower: masses of private data.” Martin Pollack, Director of M&A, Siemens Energy Smart Grids and Cleanpower Conference 2010 (as reported by Reuters)
  • 74. Or…. BBC News: Not in front of the telly: Warning over 'listening' TV http://www.bbc.co.uk/news/technology-31296188
  • 75. What data is being collected?
  • 76. Privacy and security – what does the law say?
  • 78. What does the law say? • EU-wide laws on data protection • Other rules apply elsewhere – understand your markets • Data Protection Act 1998 – imposes obligations on data controllers – in connection with processing – of personal data – about living individuals, known as data subjects, who have certain corresponding rights under the DPA • If you are not processing personal data then DPA will not apply
  • 79.
  • 80. Data protection principles • Principle 1 – processed fairly and lawfully • Principle 2 – processed only for specified and lawful purposes • Principle 3 – adequate, relevant and not excessive • Principle 4 – accurate and (where necessary) up to date • Principle 5 – kept only for so long as is necessary • Principle 6 – processed in accordance with rights of the data subject • Principle 7 – kept secure • Principle 8 – not transferred outside EEA, unless the country ensures “adequate” protection
  • 81. Fair and lawful processing • Must satisfy a Schedule 1 condition – includes: – consent – necessary for pursuit of legitimate interests • Sensitive personal data – more limited conditions (Schedule 2) • Fair processing code – must ensure “so far as practicable” that data subject is informed of the processing • Processing must otherwise be fair and lawful in all the circumstances
  • 82. Secure processing • Obligation to put in place “appropriate” technical and organisational measures to prevent unauthorised/unlawful processing and accidental loss, damage or destruction • “Appropriate” depends on nature of data and consequences of a security breach • ISO 27001 and other relevant standards? • Techical and organisational measures: – not just IT – Needs holistic approach – Use of third party processors
  • 83. Where is the law going? • New Data Protection Regulation • European Commission – Digital Single Market Initiative – Alliance for Internet of Things Innovation • ICO guidance – ANPR, body worn cameras, drones • Article 29 Working Party – Opinions to date on geolocation, smart metering
  • 84. It’s not just about privacy • CMA investigation into consumer data • Liability – what if – your fridge orders too much milk? – your health monitoring device fails to report an issue? – your connected car crashes? • Cyber attacks – Not just about personal data – also reputational • IP – Who owns the IP? What can you do with it?
  • 85. What should you be doing to protect personal privacy?
  • 86. BBC News: Smart devices to get security tune-up http://www.bbc.co.uk/news/technology-34324247
  • 87. Key issues to consider • Consumer understanding • Privacy by Design • How do you enable ongoing security improvements? • Will you collect data about/from children? • Will you collect sensitive personal data? • Will you share data with third parties? • Privacy impact assessments • Privacy policy/fair processing notice – What does it say? – How do you future proof? – How do you communicate that to individuals?
  • 88. Developing a privacy aware product • Conduct a privacy impact assessment • Anonymisation – do you need to process personal data at all? Can it be anonymised? • Repurposing – is the processing consistent with the original purpose? Do you need consent? • Data minimsation – how do you achieve this? • Transparency – how do you convey what you are doing? • Subject access requests – design your system to enable you to comply with rules on subject access rights • Data management policy
  • 89. Online Trust Alliance • Alliance of technology businesses • Industry initiative to address privacy concerns • Draft framework on best practices • Covers: – Transparency – Limitations on use of data and data retention – Rights of the individual – Security • Consultation closed 14 September 2015
  • 91. Questions? • Blog: http://techblog.brodies.com/ • Twitter: – @BrodiesTechBlog – @lawyer_martin • Email: martin.sloan@brodies.com
  • 92. ABERDEEN • EDINBURGH • GLASGOW • BRUSSELS www.brodies.com Internet of Things Retaining privacy and security in an ever connected world Martin Sloan, Partner, Brodies LLP Blog: http://techblog.brodies.com Twitter: @Brodies TechBlog 30 September 2015
  • 94. Internet of Things in the City of the Future http://futurecity.glasgow.gov.ukColin Birchenall Glasgow City Council 30th September 2015
  • 96. Quality of Life Economic Growth Environment City Priorities
  • 99. Research Moisture & Temperature Insight Insulation Retrofit Sensors
  • 101. Energy Smart Grid/Building Integration Insight Demand-Side Management
  • 102. Energy Maintenance Public Safety Insight Intelligent Street Lighting
  • 103. New Sensors New Insight Air Quality Sensors
  • 104. Re-Use of Existing & New Sensors New Insight Footfall Sensors
  • 105. Re-Use of Existing Sensors New Insight Traffic Sensors
  • 107.
  • 109. Better Outcomes Economy Learning Vulnerable Environment Vibrancy
  • 110. Better Services Improved Efficiency Better Customer Experience
  • 112. New Opportunities New Markets New Industries Economic Growth
  • 117. Push to pull markets
  • 118. Push to pull markets
  • 119. Push to pull markets
  • 121. !"#$%"&' ()*!"#$%"&' ()* Domestic markets: Verticals
  • 122. ! " $%"&' ()*! " #$%"&' ()* Domestic markets: Horizontals
  • 125. Domestic markets: Hub of All Things
  • 126. Domestic markets: Hub of All Things
  • 127. Domestic markets: Hub of All Things
  • 128. Domestic markets: Hub of All Things
  • 129. Domestic markets: Hub of All Things
  • 130. Domestic markets: Hub of All Things
  • 131. Domestic markets: Hub of All Things
  • 132. Domestic markets: Hub of All Things
  • 133. Domestic markets: Hub of All Things
  • 134. Domestic markets: Hub of All Things
  • 135. Domestic markets: Hub of All Things
  • 136. Domestic markets: Hub of All Things
  • 137. Doors were closed Domestic markets: Hub of All Things
  • 138. Domestic markets: Hub of All Things
  • 139. Domestic markets: Hub of All Things
  • 140. Domestic markets: Hub of All Things
  • 142. What would 20,000 Things design?What would 20,000 Things design? Dat a Things Patterns Usages Ideas Prototypes Publications Patents NewThings Data hings Patterns Usages deas Prototypes Publications Patents NewThings Tactics and horizontals
  • 143. What would 20,000 Things design?What would 20,000 Things design? Dat a Things Patterns Usages Ideas Prototypes Publications Patents NewThings Data hings Patterns Usages deas Prototypes Publications Patents NewThings Tactics and horizontals
  • 144. What would 20,000 Things design?What would 20,000 Things design? Dat a Things Patterns Usages Ideas Prototypes Publications Patents NewThings Data hings Patterns Usages deas Prototypes Publications Patents NewThings Tactics and horizontals
  • 146. ThingTank “By 2017, asignificant disruptive digital businesswill belaunched that wasconceivedbya computer algorithm.” Gartner Report 2014, www.networkedworld.com, October 2014 More than human horizontals: ThingTank.org
  • 147. ThingTank Solo Designer The Crowd Things More than human horizontals: ThingTank.org
  • 148. ThingTank Solo Designer The Crowd Things More than human horizontals: ThingTank.org
  • 149. 853 people designed this 854 people invented Pivot Power http://www.quirky.com More than human horizontals: ThingTank.org
  • 150. What would 20,000 Things design?More than human horizontals: ThingTank.org
  • 151. More than human horizontals: ThingTank.org
  • 152. More than human horizontals: ThingTank.org
  • 153. More than human horizontals: ThingTank.org
  • 154. More than human horizontals: ThingTank.org
  • 155. More than human horizontals: ThingTank.org
  • 156. More than human horizontals: ThingTank.org
  • 157. What would 20,000 Things design?More than human horizontals: ThingTank.org
  • 158. ! " $%"&' ()*! " #$%"&' ()* More than human horizontals: ThingTank.org
  • 159. ! " $%"&' ()*! " #$%"&' ()* More than human horizontals: ThingTank.org
  • 160. Stefan Michel More than human horizontals: ThingTank.org
  • 161. Stefan Michel Algorithm More than human horizontals: ThingTank.org
  • 164. Vision To be THE Leading Global enabler for Managing, Monitoring and Monetizing IoT across all Connectivity Technologies Cellular Satellite Wi-FiLPWA Simplifying the Complex
  • 165. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD We started with the concept of a Customer in the Stream environment that subscribes to multiple networks using various technologies. We treat network problems like software problems. Scale • Integration • Speed • Efficiency Stream: A completely differentiated approach 165
  • 166. Data Routing & Transit: Device to Enterprise Device Device Device Device Enterprise Applications Data Stores IT Services
  • 167. Stream’s Customers Stream’s Customers Comprise Leading Companies from the following sectors: MNOs Solution & Service Providers Enterprise Government
  • 168. IoT-X™ Development Timeline 2002 ENTERPRISE CLIENTS MNO’s SP’s 2005 2009 2011 2013 2014 2015 Wholesale Agreements Cellular + + Telefonica Vodafone EE Satellite LPRN Wi-Fi + + + Predictive Analytics Platform & Billing Backhaul Infrastructure Network Optimisation + + Iridium Avanti Inmarsat Data Services Exchange + LoRa NWave B&B Wizzard Orion Application Enablement
  • 169. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD Services all Verticals & Solutions Construction Manufacturing & Distribution Utilities Retail Healthcare Transportation Government Wireless Backup Digital Signage Remote Monitoring Wi-Fi for Public Transportation Video Communication Fleet Tracking Smart Metering 169
  • 170. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD IoT-X™ Network Partners 170
  • 171. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD Stream Technologies – Since 2000 Comprehensive • Industry Leading Platform • Deep Technical Expertise • Highly Flexible and Reliable Proven • 15 Years IOT/M2M Experience • >20 Network Operators Integrated • 500+ Enterprise/Solution Providers Open • Connectivity Agnostic • Industry Standard API’s • Rapid Development Cycles 171
  • 172. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD • Nigel Chadwick – CEO (Founder) • Kevin McDowell – COO (Founder) • Tracy Hopkins – SVP LPWA • Mellissa Jenkins – SVP Innovation • Kurt Kelly- VP Strategic Partnerships • Lawrence Latham - CMO • Susan McGee – Associate Director • Niall Strachan – CSA • Alan Tait - CTO The Stream Leadership Team 172
  • 173. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD IoT-X™ Recognized & Awarded - Innovation in IoT 173 IoT-X recognized by ABI Research as “one of the most disruptive technologies to hit the IoT market in years,” Hot Tech Innovators Report
  • 174. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD Glasgow Miami Amsterdam Silicon Valley Edinburgh Manchester London Singapore Miami Points of Presence Offices Stream's Cellular & Satellite Global Footprint Continues to Expand & Includes Points of Presence Worldwide Global Footprint & Reach 174 *2016
  • 175. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD Stream Industry Affiliations 175 AIOTI Alliance for Internet of Things Innovation
  • 176. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD IoT-X™ Comprises 3 Key Products: 176 IoT-Xlerate Ecosystem will accelerate IoT business rollout with full-stack end-to-end IoT solutions • Ecosystem To Xlerate the IoT business rollout. • Productized, Full-Stack, end-to end IoT solutions. • Certified & pre-integrated best of breed solutions. • Ready-to-go fully integrated monetizable solutions that reduce time to market & shorten time to revenue. IoT-Xpand Global Wireless Connectivity Enables organizations to expand their global IoT footprint • To Xpand global IoT footprint with Global Wireless Connectivity. • Data Plans for cellular, Low Power Radio, Satellite. • Resilient, Scalable, Manageable & Secure. • Up to 40% faster than most network operators. • Global footprint on 20+ networks covering multiple networking technologies including Cellular, LPWA and Satellite IoT-Xtend Connected Device Platform to extend IoT capabilities • Connected Device Platform to monitor, manage & monetize device endpoints. • Subscriber Management, Billing, Data Routing. • Multi-Network capability in single comprehensive platform. • Serve and support complex multi- tenant & multi-tiered sales channels.
  • 177. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD IoT-Xtend™ Platform Services Subscriber Management Billing & Monetization Data Routing IoT-X provides these 3 primary services for all connectivity types: £$¥€ Cellular Satellite Wi-FiLPWA 177
  • 178. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD • Single click activation process • Unified interface across all communication types • Unique realm support allows resell to customer channels • Enables multi-tenant & multi-tiered capabilities • Easily integrate additional technologies • Enables customer segregation turning private networks into public networks (LPWA) Subscriber Management 178
  • 179. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD • Rating & billing of all traffic types • Allows billing for complete solution bundles • including M2M hardware, applications, and connectivity • Create plans across communication types and networks • Single invoice for all subscribers Robust Billing Solution 179
  • 180. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD • Define network routing • Route data to any application/store • Integrate new services easily • Apply standard routing models to non-IP data • Built in libraries for common data services Advanced Data Routing 180
  • 181. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD Manage All Connectivity on Single Pane of Glass 181
  • 182. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD Consolidated Billing for Any Type of Connectivity 182
  • 183. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD For Carriers that Already have a Cellular Platform IoT-X can simply Xtend that platform to include other network technologies: Avoids need to replace existing investments in the current platform. Simply use IoT-X to extend platform capabilities. IoT-X makes it simple to add satellite, low power radio, Wi-Fi, and even other cellular network to benefit from entire scope of connectivity options. capabilities. Additional Cellular Satellite Wi-FiLPWA 183
  • 184. IoT-Xtend adds simplicity to LPWA networks • Provides subscription and network management, data routing, and billing • Multiple Backhaul options to LPWA base stations/gateway from the same platform • Future Proofing: enables LPWA networks to be agnostic to gateway or end device. • Any LPWA wireless protocol can be used as the ‘over the air’ communication • ‘Real Time’ transformation of data from all end points – conversion of any wireless protocol including legacy or prototyping variants. • The Complex value chain and IoT ecosystem is made simple • LPWA networks can be deployed end to end with pre-integrated technology partners • Removes risk as multiple technologies can be deployed individually or simultaneously
  • 185. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD Cellular Coverage Map Unsteered 2G & 3G Roaming with 592 partners worldwide IoT-Xpand™ For Global Wireless Connectivity 185
  • 186. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD Local 2G, 3G, & 4G Map Local 2G, 3G & 4G LTE Xpand Local Coverage 186
  • 187. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD Satellite Coverage Map Store & Forward Satellite Connectivity TCP/IP Based Satellite Connectivity Xpand Satellite 187
  • 188. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD LPWA Coverage Map Low Power Radio Networks Xpand LPWA 188
  • 189. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD Stream’s Xchange program consists of • Xpand Platform • Xlerate Connectivity • Xchange Global SIM The Xchange program allows MNOs and Global Enterprises to exchange connectivity without having to deal directly with each other. • MNOs to retain control of their Enterprise customers • MNOs capture wholesale business with no customer acquisition costs • Multi-National Enterprises can become a MVNO on a global scale IoT-Xchange™ 189
  • 190. Xpand Core Values • Un-steered roaming SIM card that works across 2G/3G Network roaming partners • Coverage is paramount and designed so that data can be transferred securely over any network to your infrastructure and applications. • Stream provides a high level of resilience with Multi-site infrastructure and N+1 service redundancy • Can be used with GSM, CDMA, Satellite and Low Powered Radio for a mixture of technologies into their solutions. • Stream also provides location based services (LBS) which track and geo fence remote devices and report location to customers’ applications throughout the UK, Europe and globally. • Real-Time management and reporting of SIMs. View connectivity, data usage levels, set monitoring alerts and manage invoices. • Troubleshoot and diagnose problems or get help with any SIMs. • Provides real-time GSM, WIFI or Satellite network based lookup or triangulation. • Stream’s network monitoring and diagnostics along with technical & operational support expertise ensure optimal network management and connectivity of devices. ManageableResilient Scalable Secure 190
  • 191. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD • 99.999% APN uptime in the last year • Operators can offer custom APN purpose built for M2M and IoT data traffic • Fixed Private IP Addressing with VPN Access • Dynamic IP Addressing, both private pooled & unpooled • Stream provides a high level of resilience • Multi-site infrastructure • Built on an N+1 box redundancy scheme. • Stream customers benefit from unparalleled Quality of Service (QoS) • Two-way IP traffic to devices. • A fault tolerant self-healing network • A higher level of data statistics available in IoT-X™ • Data limiting and data warnings via Email, SMS or API calls Xpand - Advanced Network Services 191
  • 192. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD Xlerate™ – A Complete IoT Business in a Box 192
  • 193. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD 193 Xlerate - Our Customers become our Partners Construction Manufacturing & Distribution Utilities Retail Healthcare Transportation Government Wireless Backup Digital Signage Remote Monitoring Wi-Fi for Public Transportation Video Communication Fleet Tracking Smart Metering
  • 194. Xlerate Productized Solutions • Complete Turnkey solutions made easy to sell for operators • Over 500+ existing service providers • Best of breed partners for hardware, software & applications • Covering 16 Verticals • Cellular, Satellite, Dual Mode, and Low Power Radio
  • 195. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD • Xtend Platform - IoT Scale revenue share • Xpand • Data Plans for direct customers • IoT scale revenue share where the platform is used to broker connectivity between MNOs • Xlerate – revenue & margin share Revenue Model 195
  • 196. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD Connectivity Platform Competitive Comparison CELLULAR SATELLITE LPWA USR Stream Ericsson Jasper 1% 10% 16% 63% 2020 Market Share SATELLITE CELLULAR LPWA USR By 2020, cellular will be only 10% of all IoT connections* 196 * Source: James Brehm & Associates
  • 197. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD IoT-Xpand ™ Global Wireless Connectivity CELLULAR SATELLITE LPWA Wi-Fi/USR Stream √ √ √ √ Kore √ √ Jasper Alliance √ Bridge Alliance √ Vodafone √ Sat Providers √ SIGFOX √ Hubble √ Stream Uniquely offers global approach to connectivity across all network types 197
  • 198. PROPRIETARY AND CONFIDENTIAL © 2015 STREAM TECHNOLOGIES LTD • Stream are a wireless internet operator designed for IoT technology & scale • IoT-X enables swift commercialization of data networks • Stream are a data routing company, from the device to the many various applications • IoT-X treats network problems like software problems Think - Amazon Web Services (AWS) for IoT Final Thoughts….. 198
  • 199. The Big Money Internet of Things A case study from 4 years in the US shale Oil & Gas business Tim Everitt www.tfe.expert working for
  • 200.
  • 201.
  • 202.
  • 203.
  • 204.
  • 205.
  • 206.
  • 207. Key points from the Thing sprint: Scale – millions of Things Value – $billions Mobility – 20% fixed, 80% in slow/medium/fast motion Sensors – low-risk, public Internet ok Actuators – high-risk, regulation, private Internets only Rip & Replace – not possible Roadmaps – must support legacy and convert to Things
  • 208.
  • 209.
  • 210.
  • 211.
  • 212.
  • 213.
  • 214.
  • 215.
  • 216.
  • 217. Key points from the Internet sprint: Laws – Physics implemented as technology and products Laws – Government, FCC, classification societies Laws – Money realism Public Internet – ok for sensors Private Internets – needed for actuators Industrial Grade – 5x9, high-capacity, all IP, secure, managed Customer Demarcation – at tier 1 communications hub Rip & Replace – not possible Roadmaps – accept legacy networks and transition to IoT
  • 218. Killer apps – for high-end IoT: Sensors – Tag data historians, e.g. PI, Proficy, Wonderware, etc. Actuators – SCADA/DCS, e.g. ABB, Siemens, Honeywell, etc. but that’s enough about …
  • 219.
  • 220. Thank you… and an offer Any questions Tim Everitt www.tfe.expert working for
  • 221. CENSIS & IoT Derek Liddle – Technical Director Kevin Power – Software Architect
  • 222. Agenda CENSIS IoT & Bluemix Connected Devices Development Centre
  • 224. Our HEI Partners ABERDEEN INVERNESS DUNDEE ST ANDREWS EDINBURGH STIRLING GLASGOW
  • 225. About CENSIS Industry-led with Sensor and Imaging Systems (SIS) focus to generate GVA Bringing researchers and industry together for knowledge-driven innovation In-house team of engineers and project managers Straightforward commercial framework Shaping long-term R&D in key sectors
  • 226. Hub and Spoke Model Articulate industry need Hub: CENSIS office Spokes: Virtual communities of interest Understand research landscape Identify and shape potential interventions Advanced Data Analysis & Visualisation Advanced Devices & Fabrication Imaging & Optics Remote & Distributed Systems Signal Processing, Networking & Comms Hub: CENSIS Spokes:Virtual Communities Systems Engineering, Management, Integration
  • 227. The Sensor Systems Stack From raw data to informed business decisions Product evolutiondemands connectedsensing The value of sensor and imaging systems is in transforming raw datainto meaningful information Applications/ Software Thisenables businessesto: • assess the value ofdata • be targeted indata gathering • gaininsights • act on theresults Devices/ Hardware Visualisation & Presentation Analysis & Post Processing Data Repository Communications & Networking Transductance & Pre-processing Sensor Element Presentinginformation to informdecisions Converting the measured data to meaningful information Storing, managing and organising data and its content Transporting the data to a storagelocation Converting changes to signals & prioritising valuable data Detecting and measuring a change e.g. vibration, impacts, heart, light, energy, colour, temperatureetc. Information RawData POWER CONTROL MANAGE
  • 228. Value Proposition Incremental and step changes in industrial competitiveness driven by the proliferation of innovative SIS solutions targeting real industry and challenges throughout the supply chain We aim to: Inform and optimise R&D choices Enable new products and markets Anchor high value elements of Scottish supplychain Address societal and industrialchallenges Demonstrate HEI research impact Reduce costs, risks, time to market
  • 229. Markets we support From the built environment, manufacturing, gaming, agriculture and defence to aerospace, water management, consumer, ocean science, food and drink, life sciences and pharma, offshore, healthcare, renewables and energy generation
  • 230. Importance of IoT for CENSIS Hydrocarbon Detection &Exploration Gas monitoring CO2 – Carbon Capture and Storage Asset monitoring and condition monitoring Multiphase flow, and particledetection Subsea position detection and communications Super High Pressure and High Temperature Energy Asset monitoring and condition monitoring. Smartgrid CO2 Emissions Ageing infrastructure / PartialDischarge MolecularSpectroscopy Consumer health and fitness Implantable / ingestable diagnostics Medical Imaging and diagnostics Telehealth – remote medicaldiagnostics Environmental Remote mapping of large areas e.g. costal aquaflora Low cost – ubiquitous air quality measurement Intelligent Transport – dynamic optimisation of transport systems Smart Cities –open systems / value add services / decision making Infrastructure condition monitoring roads/railways/bridges Defence Target recognition in low visibility environments Stand-off threat detection Low power / low weight systems Infantry super sensing Food quality non- invasive measurement Traceability and provenance(brand protection) Open systemsfor environmental management Smart Farming – targeted crop and animal fertilisation. Animal welfare and remote monitoring Manufacturing Process real time measurements – e.g. pills / composites. Industry 4.0 - smart manufacturing. Widget monitoring and in lifeservice Aero – Wireless systems / high temp./high pressure 1 2 Food & Agriculture 3 4 5 Medical& Health 6 7 Offshore & Subsea
  • 231. Connected Device Dev. Centre Open to SME’s & HEI’s to develop proof of concept Industrial investment required Connected Device Development Centre (CDDC)  Access to full range of hardware, comms and software building blocks to prove concepts  Full stack development for prototype creation and benchmarking purposes  Full time engineering support from dedicated CDDC engineers  Access to product and service training material from various vendors supporting the centre HEI CENSIS INDUSTRY CDDC
  • 234. WiFi AP Ti CC3200 RS232 Converter Overhead Projector Light Sensor COTS components COTS software services Existing IT Existing Infrastructure Architecture
  • 235. IBM IoT Foundation MQTT Publish/Subscribe Smart OfficeApp Node.jsRuntime MQTT Publish/Subscribe Architecture Monitoring & Analytics Meeting room booking system
  • 236. Experience • A true rapid prototyping experience • Significantly reduced time to demonstration • End to end IoT application that we know can scale https://ibm.biz/BdXNj5 • Improves operating and energy efficiency in the office
  • 239. Wearable Agri-Tech - from Lab to Market IoT Scotland September 2015 Alan Faichney
  • 240. www.silentherdsman Contents • A very little about me • A little about cows • A little about the product • More about getting the company going
  • 241. www.silentherdsman About Alan Faichney • 37 years in software & technology • Founder & CTO of Concept Systems 1983 - 2007 • Start-up & turnaround management • DEM Solutions, Rapid Quality Software, Edinburgh Instruments, Rock Solid Images, Adrok, Ion Geophysical • NXD, then interim CEO of Silent Herdsman, now CTO • Currently also Chairman of Arrayjet & Pufferfish, co-owner of The Pantry
  • 242. A little about cows…
  • 243. www.silentherdsman About dairy Cows • 1 billion cows • 380 billion l/year • Dairy is A very high tech industry It uses robotics, genetics, genomics… and software to get cows pregnant!
  • 244. www.silentherdsman cows… • … only produce milk when breeding, & for less than a year after calving • … are only fertile (in œstrus) once a month • failing to get a cow pregnant will lose 1 month’s production • a UK cow produces ~8000 l of milk per lactation (per year) @ 25p / L • 1 year’s production = £2,000, 1 month’s lost production = £167 / cow • Noticing œstrus is easy… for very small herds • Herds sizes > 1000 can be managed by 2 or 3 people… • … But you need a system to manage pregnancy for < £100 / cow…
  • 246. A Little about the Product…
  • 247. www.silentherdsman Activity monitoring • 3-axis head mounted accelerometer built-in processor, ZigBee comms • 1 Hz enough to identify “Bulling” • 10 Hz allows discrimination of many more activities, like eating, limping • Long term SRUC research to characterise activity signals
  • 249. www.silentherdsman PC Housing • PC with Touch sensitive screen • IP67 Dirt resistant & hoseable • or on regular PC (in farmhouse) • & on any browser…
  • 252. More about the company…
  • 253. www.silentherdsman From Science to Commerce • Company spun out of Strathclyde University in 2007 • Founded on £5m of SRUC / ITI research • Significant expertise in • wireless communications, signal processing, electronics, cows! • However, the new company had no expertise in • Sales. Distributors. Pricing. International. Marketing. Manufacturing. Design for manufacture. Quality systems. Customer
  • 254. www.silentherdsman 2007 - 2010 The Early Years
  • 255. www.silentherdsman 2007 - 2010 The Early Years Sales✓. Distributors✓. Pricing. International. Marketing. Manufacturing✓. Design for manufacture. Quality systems. Customer support. Product development✓. Product Roadmaps. PR. HR. IP✓. HSE. Competition. Investors.
  • 256. www.silentherdsman First sales. First customers. First problems. Sales✓. Distributors✓. Pricing. International. Marketing. Manufacturing✓. Design for manufacture. Quality systems. Customer support. Product development✓. Product Roadmaps. PR. HR. IP✓. HSE. Competition. Investors. “If it wasn’t for staff, suppliers & customers, running a company would be easy” - Anonymous CEO. “Never buy version 1.0” - Anonymous pundit.
  • 257. www.silentherdsman First sales. First customers. First problems. Sales✓. Distributors✓. Pricing. International. Marketing. Manufacturing✓. Design for manufacture✗. Quality systems✗. Customer Support✗. Product development✓. Product Roadmaps. PR. HR. IP✓. HSE. Competition. Investors. “If it wasn’t for staff, suppliers & customers, running a company would be easy” - Anonymous CEO. “Never buy version 1.0” - Anonymous pundit. “Why doesn’t this work?” - Anonymous customer.
  • 258. www.silentherdsman First sales. First customers. First problems. • Version 1 had worked very well on trial farms, when every collar had been lovingly hand built. But making thousands was a different matter. • The design of the electronics was sound. The design of the quality system was not, and neither was the robustness of the mechanicals. • 50% of V1 collars either never worked, or broke in the field. All had to be replaced Now, that figure is 0.05%
  • 259. www.silentherdsman 2010 - 2013 The Grind • We learned the hard way on quality • …but it hit our margins • We secured a major distributor in Germany • …but we met price competition from inferior systems • We had a team • …jammed into a one room incubator in Duke Street • We had a dream • …but we needed funding to build the Cloud
  • 260. www.silentherdsman Valuation • Hardware manufacturer • 1x to 2x revenues • Perpetual licence software • 2x to 3x revenues • 5x in financial or security • SAAS consumer • 3x to 4x revenues • SAAS Enterprise • 5x to 10x revenues 0 2.5 5 7.5 10 12.5 Hardware Software SAAS
  • 261. www.silentherdsman October 2013 • For three years, still struggling with sales and quality, we built our vision… • “Data providing actionable events to improve farm profitability, animal health, milk yield, fertility & reduce labour costs, using Big Data, IoT and the Cloud to drive digital marketing & differentiated services” • … and pitched it countless times. Eventually, we raised £3m • Scottish Equity Partners, Albion Ventures, Scottish Investment Bank • As well as money, investors bring much else… • Professional management. Advisors. NXDS.
  • 262. www.silentherdsman New challenges - i - HR • The company trebled in headcount • Three new senior executives • Three new functions • Three small teams become large teams • Structure becomes an issue • The founders have to x2x5 x2
  • 263. www.silentherdsman New challenges - Ii - Competition • Whilst we built our cloud system, our competitors were busy, too • upgraded their systems. Added new features. • Dropped prices. Poached our German distributor. Consolidated the USA • By the time our Cloud system was ready in mid 2014, we were “behind” • Competitors had redefined the minimum offering to include animal Health
  • 264. www.silentherdsman Conclusion - where we are now • 50,000 collars, on 300 farms, ranging from 50 to 1,700 head, in UK, EU, USA • Successful 2nd round funding (total £4m) • Built first rate engineering team, & re-established technical lead • Built Product pipeline / roadmap • TWO patents granted, another in process • World-class branding • Really nice premises • Recruited World-class CEO & Chairman • Successful transition from hardware company to SAAS company
  • 265.
  • 267. www.silentherdsman Potted history • 2006 ITI Scotland, Strathclyde Uni & SRUC invest £5m in developing technology • 2007 Company incorporated, Spun out from Strathclyde • 2009 Exclusive licence to ITI technology. Outsource manufacturing. • 2010 UK Distribution agreement with National Milk Records, 1st sales • 2011 Eu Distribution agreement with Semex Germany • 2012 Raising funding…. a virtual team working for nothing! • 2013 £3m funding from SEP, SIB & Albion Ventures. Premises & professional Board • 2014 Rebranding, Hiring, cloud development & launch, 1st US farm (1,700 cows), • 2015 Health ALERT SaaS product launch, new CEO, push into USA
  • 268. www.silentherdsman Lead Investor - Scottish Equity Partners • probably now the largest UK indigenous Growth Investor. • 150 investments over 20 years. 35 current companies. • 6 partners & 35 staff in Glasgow, Edinburgh & London. • Multiple “Unicorn” outcomes ($1bn) from start- up. CSR Plc, Biovex, Skyscanner… • Core focus is growth companies £5m to £20m equity with min £5m of revenues. • selective <£2m Venture Deals, if capital efficient & high upside. • raised over $1b of capital from investors • “We love to do deals in Scotland!” Skyscanner, Orbital Software, Voxar, Indigo Vision, Wolfson, Craneware, Atlantech Technologies etc…
  • 269. Innovate, Expand, Deliver Manny Rivelo EVP, Strategic Solutions IoT is easy. Security, privacy and scale of IoT are the real challenges Michael Brown – F5 Networks Systems Engineering Manager, UK Channel and Territory
  • 270. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello TODAY’S THREAT LANDSCAPE
  • 271. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello
  • 272. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello
  • 273. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello
  • 274. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello
  • 275. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello
  • 276. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello
  • 277. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello
  • 278. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello What’s the Point? • We are not starting from ground zero • The core principles of Data Centre security are still applicable • BYOD is an example of this • IoT devices can be managed and secured within your BYOD framework
  • 279. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello Considerations in an IoT World • The IoT Device • The Cloud • The Mobile Application • The Network Interfaces • The Software • Use of Encryption • Use of Authentication • Physical Security • Exposed Physical Interfaces (e.g. USB Ports)
  • 280. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello IoT Vulnerability Categories1 1. Web Interface 2. Authentication/Authorisation 3. Network Services 4. Data Transport 5. Data Privacy 6. Cloud Interface 7. Mobile Interface 8. Device Configuration 9. Software/Firmware 10. Physical Device 1Source: OWASP Internet of Things Top Ten Project
  • 281. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello IoT Vulnerability Categories1 1. Web Interface 2. Authentication/Authorisation 3. Network Services 4. Data Transport 5. Data Privacy 6. Cloud Interface 7. Mobile Interface 8. Device Configuration 9. Software/Firmware 10. Physical Device 1Source: OWASP Internet of Things Top Ten Project
  • 282. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello IoT Vulnerability Categories1 1. Web Interface 2. Authentication/Authorisation 3. Network Services 4. Data Transport 5. Data Privacy 6. Cloud Interface 7. Mobile Interface 8. Device Configuration 9. Software/Firmware 10. Physical Device 1Source: OWASP Internet of Things Top Ten Project
  • 283. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello IoT Vulnerability Categories1 1. Web Interface 2. Authentication/Authorisation 3. Network Services 4. Data Transport 5. Data Privacy 6. Cloud Interface 7. Mobile Interface 8. Device Configuration 9. Software/Firmware 10. Physical Device 1Source: OWASP Internet of Things Top Ten Project
  • 284. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello IoT Vulnerability Categories1 1. Web Interface 2. Authentication/Authorisation 3. Network Services 4. Data Transport 5. Data Privacy 6. Cloud Interface 7. Mobile Interface 8. Device Configuration 9. Software/Firmware 10. Physical Device 1Source: OWASP Internet of Things Top Ten Project
  • 285. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello IoT Vulnerability Categories1 1. Web Interface 2. Authentication/Authorisation 3. Network Services 4. Data Transport 5. Data Privacy 6. Cloud Interface 7. Mobile Interface 8. Device Configuration 9. Software/Firmware 10. Physical Device 1Source: OWASP Internet of Things Top Ten Project
  • 286. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello IoT Vulnerability Categories1 1. Web Interface 2. Authentication/Authorisation 3. Network Services 4. Data Transport 5. Data Privacy 6. Cloud Interface 7. Mobile Interface 8. Device Configuration 9. Software/Firmware 10. Physical Device 1Source: OWASP Internet of Things Top Ten Project
  • 287. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello IoT Vulnerability Categories1 1. Web Interface 2. Authentication/Authorisation 3. Network Services 4. Data Transport 5. Data Privacy 6. Cloud Interface 7. Mobile Interface 8. Device Configuration 9. Software/Firmware 10. Physical Device 1Source: OWASP Internet of Things Top Ten Project
  • 288. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello IoT Vulnerability Categories1 1. Web Interface 2. Authentication/Authorisation 3. Network Services 4. Data Transport 5. Data Privacy 6. Cloud Interface 7. Mobile Interface 8. Device Configuration 9. Software/Firmware 10. Physical Device 1Source: OWASP Internet of Things Top Ten Project
  • 289. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello IoT Vulnerability Categories1 1. Web Interface 2. Authentication/Authorisation 3. Network Services 4. Data Transport 5. Data Privacy 6. Cloud Interface 7. Mobile Interface 8. Device Configuration 9. Software/Firmware 10. Physical Device 1Source: OWASP Internet of Things Top Ten Project
  • 290. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello IoT Vulnerability Categories1 1. Web Interface 2. Authentication/Authorisation 3. Network Services 4. Data Transport 5. Data Privacy 6. Cloud Interface 7. Mobile Interface 8. Device Configuration 9. Software/Firmware 10. Physical Device 1Source: OWASP Internet of Things Top Ten Project
  • 291. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello Why are Smart Devices so Vulnerable? • Always on • Fairly high bandwidth • Password weakness • UPnP enabled devices • Standards are lagging • Upgrade intervals are long • Security can be hard • Security impedes user experience • Encryption introduces latency • There is no money in security • End users
  • 292. © F5 Networks, Inc The Current Threat Landscape • News headline here  HelloProtocol Transport Architecture Transport Security Protocol Security CoAP UDP* Request/Response DTLS No built in security features MQTT TCP Publish/Subscribe TLS/SSL Optional authentication, payload encryption MQTT-SN* UDP Publish/Subscribe DTLS Optional authentication, payload encryption XMPP TCP Request/Response Publish/Subscribe TLS/SSL Mandatory authentication, authorisation, payload encryption REST HTTP Request/Response HTTPS Optional authentication AMQP TCP Publish/Subscribe TLS/SSL Optional authentication (SASL) Web Socket TCP Client/Server Publish/Subscribe TLS/SSL Optional authentication
  • 293. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello DATA MANAGEMENT IN A CONNECTED WORLD
  • 294. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello 4400 Exabytes1 • Average IoT organisation’s total volume of data grew by 30% over the past year • 54% of IoT organisations say they have insufficient data analysis capabilities • 50% of IoT organisations failed to improve time-to-decision over the past year 1One exabyte equals one billion gigabytes
  • 295. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello Exploitation of your data • Embed data management in the device • Data is managed as soon as it is captured • More controlled stream into Cloud and/or Data Centre • Leverage Stream Analytics technology • Becoming an important capability of IoT PaaS • Most major CSPs provide this capability • Also open source technologies
  • 296. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello Stream Analytics – a simple flow Ingest  Sensors  Social  Machine Data  Location  Audio  Video  Text Prepare  Transform  Filter  Correlate  Aggregate  Enrich Detect & Predict  Classification  Patterns  Anomalies  Scoring  Events Decide  Business Rules  Conditional Logic Act  Notify  Publish  Execute  Visualise Store Warehouse, Data Reservoir, Operational Store, Files
  • 297. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello FINAL THOUGHTS AND REITERATION
  • 298. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello • There is no guide for securing the IoT • IoT security will leverage old and new technologies • Blended approach: mobile, cloud, traditional data centre combined with industrial control, automation, and physical security • The IoT is redrawing the lines of IT responsibilities • Deconstruct traditional IT security approaches • Protecting information alone is too limiting • Information is “fuel”
  • 299. © F5 Networks, Inc The Current Threat Landscape • News headline here  Hello Thank you.
  • 300. © 2015 Pure Storage, Inc. | 300Pure Storage UNCLASSIFIED Title Slide The rise of Data Datacentre Transformation Alex D’Anna EMEA PreSales
  • 301. © 2015 Pure Storage, Inc. | 301Pure Storage UNCLASSIFIED The New Expectations of IT – “competing with a bookseller” Accelerate the Business Constantly Improve Efficiency Evolve IT into a Service Faster Applications Harness Data Speed Time-to-Market Reduce Cost Annually Employee Productivity Self-Service Provisioning Predictable SLAs …with public cloud as the new yardstick for measurement Always Secure & Available Data Center Efficiency © 2014 Pure Storage, Inc. | 301
  • 302. © 2015 Pure Storage, Inc. | 302Pure Storage UNCLASSIFIED Seeing Flash in every Application Private Cloud IaaS Accelerating Business Apps Improving User Productivity Unlocking Data Analytics Modernizing Legacy
  • 303. 30 3 | © 2015 Pure Storage Inc. FLASH INNOVATION CHANGES THE DATACENTRE LIMIT GROWTH WITH DATA REDUCTION RAISING THE BAR ON RESILIENCY WORKLOAD CONSOLIDATION ELIMINATE MULTIPLE COPIES
  • 304. © 2015 Pure Storage, Inc. | 304Pure Storage UNCLASSIFIED Accelerate the Virtualized Apps that Drive Your Business Transform Offline Analytics into Real-Time Decisions Deliver Services that Weren’t Possible with Disk Architect More Efficient Production & Dev/Test Environments Virtualize DBs No tuning, ever! Reduce server infrastructure Reduce instance proliferation Empower dev/test with snapshot based clones of production data • Remove IO as the bottleneck • 2-10x transactional improvement • Design applications to expect <1ms IO • What can your app teams do now? • Move from batch to real-time analytics • Enable broader, deeper questions • Empower your business with data • What value is trapped in your data?
  • 305. © 2015 Pure Storage, Inc. | 305Pure Storage UNCLASSIFIED As Cloud Use Cases Expand, Higher-Performance Flash Storage is Increasingly Required Enterprise Private Cloud Public Cloud IaaS Dev / Test Environments Performance Requirements Disk Flash Test Deployments 2nd Tier Apps 1000s of Apps Mixed Workloads Horizontally Scaled Apps Web-Centric Apps Content & Object Stores Dev / Test Block Storage Services & Apps Hybrid Cloud Differentiated Services Departmental Pilot Basic Development Functional Testing Enterprise-Wide Deployments 1,000s of Developers Testing at Scale  Tomorrow’s deployments require the performance of flash Business Critical Applications
  • 306. © 2015 Pure Storage, Inc. | 306Pure Storage UNCLASSIFIED (Yet another) Big Data definition… A lot of it gives Volume Created quickly brings Velocity No structure means Variability Needs data processing to find Business Value
  • 307. © 2015 Pure Storage, Inc. | 307Pure Storage UNCLASSIFIED How big is big data ? Byte of data: one grain of rice Zettabyte: fills the Pacific ocean Exabyte: covers the UK (3 times) Petabyte: covers Manhattan Terabyte: 2 container ships Gigabyte: 3 container lorries Megabyte: 8 bags of rice Kilobyte: cup of rice H/T to David Wellman @ Myriad Genetics
  • 308. © 2015 Pure Storage, Inc. | 308Pure Storage UNCLASSIFIED History lesson: big doesn’t mean good For the 1936 US presidential election, Liberty Digest magazine carried out the most expensive poll in history, writing to 10million voters asking who they would vote for; 2.4 million voters responded The prediction was a narrow Republican victory, but the result was a Democrat landslide 46 states to 2 because of a flawed sample set
  • 309. © 2015 Pure Storage, Inc. | 309Pure Storage UNCLASSIFIED History lesson: big doesn’t mean good Liberty Digest magazine closed down after the results were announced as political expertise was how it made a reputation The poll had excluded most of the population on low incomes, where Roosevelt was more popular during the Great Depression of the 1930s The newly formed Gallup company correctly predicted the result with a poll of only 50,000 voters. They are a world famous election polling company nearly 100 years later
  • 310. © 2015 Pure Storage, Inc. | 310Pure Storage UNCLASSIFIED A big data project still needs to observe rules on population, samples, bias, variance etc. The dataset must be representative to get the complete picture It’s ok to start small and grow the dataset over time
  • 311. © 2015 Pure Storage, Inc. | 311Pure Storage UNCLASSIFIED The Google index of the Internet is 60 trillion pages, 100 Petabytes of data, and is rewritten daily Recent statistics from Google show the amount of content on the Internet doubled from 2008-2010, and continues to double every 2 years
  • 312. © 2015 Pure Storage, Inc. | 312Pure Storage UNCLASSIFIED The World Bank projects that 50% of the world population will have a smartphone by 2016, and 80% by 2020 [4 billion today] The total number of SMS messages sent globally in 2014 was 7.5 trillion, WhatsApp sent 7.2 trillion from one app In 2000, 80 billion photos were processed from camera film. In 2014, 800 billion photos from smartphones were shared on social networks The Zettabyte generation
  • 313. © 2015 Pure Storage, Inc. | 313Pure Storage UNCLASSIFIED Facebook, Google, ebay, Amazon, Yahoo are all operating at Exabyte scale today, and have created a new class of applications to deal with this Products such as Hadoop, Cassandra, MongoDB, CouchDB, other NoSQL have evolved to deal with larger datasets by creating parallel tasks to split the dataset between servers
  • 314. © 2015 Pure Storage, Inc. | 314Pure Storage UNCLASSIFIED The cost of creating data has dropped to almost nothing for consumers and businesses With cloud storage, the cost of storing this data has also dropped to “free” at the start The cost of getting real insight and value from the increasing amounts of data has not dropped very much at all
  • 315. © 2015 Pure Storage, Inc. | 315Pure Storage UNCLASSIFIED higher yield lower margin get the message miss the point market leader underwater find answers more questions Data-driven value
  • 316. © 2015 Pure Storage, Inc. | 316Pure Storage UNCLASSIFIED A big data project can lead to 3 types of result as its output Interesting, not valuable Interesting, maybe valuable with more analysis or new filters Interesting and valuable
  • 317. © 2015 Pure Storage, Inc. | 317Pure Storage UNCLASSIFIED Interesting, yes Valuable, no Locations of Wikipedia edits
  • 318. © 2015 Pure Storage, Inc. | 318Pure Storage UNCLASSIFIED Locations of all Volcanoes Interesting, yes Valuable, no
  • 319. © 2015 Pure Storage, Inc. | 319Pure Storage UNCLASSIFIED Interesting, yes Valuable, maybe All NYC taxi journeys 2013
  • 320. © 2015 Pure Storage, Inc. | 320Pure Storage UNCLASSIFIED Interesting, yes Valuable, yes Twitter sentiment analysis by keyword
  • 321. Seric Logo Slide Securing the Internet of Things (IoT) Stuart Macdonald - MANAGING DIRECTOR SEPTEMBER 30TH 2015 - DYNAMIC EARTH, EDINBURGH #SERICCANHELP #IOTSCOTLAND
  • 323. Team Accolades Seric teams and individuals have won a number of awards from vendors and external organisations TECHNICAL • IBM (Global Technical Excellence) • Microsoft (HPC Club Winners) • BCS (Consultant of the Year Silver Medal) • IBM (BP of the Year) • NetApp (Outstanding Achievement for UK&I) MANAGEMENT • IoD Director of the Year (West of Scotland) • IoD Young Director of the Year (UK – Highly Commended Runner Up) • Prince’s Trust (Growth Mentor of the Year) • E&Y Entrepreneur of the Year (Scottish Finalist) ETHICAL/CSR • Youth Business International (Global Ambassador of the Year) • Prince’s Trust Scotland (Volunteer of the Year) • IBM (Global Award for Citizenship - Volunteering) • Inspiring Cities Awards (Commended for Best CSR, Winner for Youth Development)
  • 324. Ethical Stance • FIVE % of our Profits • FIVE days of our Time • #DigitalParticipation • #SericCanHelp • #HowSericHelp • #SmartSTEMs
  • 325.
  • 328. Seric Overview Seric’s main focus is to deliver Security and Anti-Fraud Solutions underpinned by robust resilient Infrastructure, sound Governance and Data Management Seric deliver Product and Project Services and for much of their portfolio provide fully managed Service & Support Offerings Seric are working across the UK & Europe to assist organisations in Public Sector, Oil & Gas, Manufacturing, Retail and the Financial Services Sector
  • 329. Areas of Expertise • Data Loss Prevention • Anti-Fraud Technology • Data Management • Encryption-as-a-Service • Integrated Systems • Secure Storage • Fraud Case Management • Insider Threat Detection • Intrusion Prevention/Detection Systems • Governance Risk & Compliance • Web Application Security • Mobile Application Security • Enterprise Single Sign On • Information Governance
  • 331. Cyber Essentials • 34 Questions/Controls • Work with a qualified consultant to get ready and apply • Certifying body will check application and award certification Cyber Essentials Plus • As above but also includes yearly external audit Cyber Essentials - Basics
  • 332. Some of our clients
  • 333. Seric Logo Slide Securing the Internet of Things (IoT) Stuart Macdonald - MANAGING DIRECTOR SEPTEMBER 30TH 2015 - DYNAMIC EARTH, EDINBURGH #SERICCANHELP #IOTSCOTLAND
  • 334.
  • 335.
  • 336.
  • 337. … a decent guide to SMART
  • 338. IoT – some little thunkettes • Opportunity • Risk • Background/Landscape • Practical Steps
  • 339. Opportunity Use new fangled IoT thing to… • Increase Sales • Cut Costs • Improve Efficiency • Raise Profile / Get Famous • Differentiate ourselves • Save the World / Do Everything
  • 341. A simple man will now attempt to have a video play in full screen. Try to be patient.
  • 342. A man will now attempt to have a video play in full screen. Try to be patient.
  • 343. Risks Use new fangled IoT thing to • Lose YOUR data • Learn about Unintended Consequences • Lose your CUSTOMERS’ data • Get Amazing Press Coverage (about your mistake) • Lose a fortune • Get Fired • Panic about IoT / Blame Ashley Madison
  • 344. Those who do not learn from history are condemned to repeat it Personal Computers Mobile Devices
  • 345. Those who have not yet learned from history are condemned to repeat it IoT ICS (Industrial
  • 346. Evolving Risk Landscape – TCP/IP Enabled Devices Migrating to TCP/IP networks – Move from Wired to Wireless – Many rely typically upon “wrapped” protocols – Analog control and reporting protocols embedded in digital protocols – Encryption and command integrity limitations – Poor selection of TCP/IP protocols  Problems with patching embedded operating systems – Controllers typically running outdated OS’s – Controllers unable to support security CPU loading – Security patches and updates not applied – Difficulty patching the controllers – Unacceptable downtime
  • 347. Evolving Risk Landscape – Bridged Networks  Softest targets appear to be the control centers – Greatest use of “PC” systems – Frequent external connectivity – Entry-point to critical plant systems – Vulnerable to insecure remote access ports (dial-up)  Bridging control centers and the plant operational framework – Network connectivity for ease of operational control – Vulnerable to malware - proxy remote attacks
  • 348. Evolving Risk Landscape – Networked Device Proliferation  Replacement SKU parts include new “free features” – Additional features may be “on” by default – OR, may be turned on by engineers  Switch from analog to digital controls  Incorporation of network standards – TCP/IP communications – Wireless communications From analog to digital (+ networked) Wireless integration
  • 349. Evolving Risk Landscape – Wireless RF/ WiFi Attacks A 14.6 dBi Yagi antenna that can make a WiFi connection from miles away  Increased use of wireless technologies  Large security research focus – Common topic/stream at hacking conferences  Packet Radio Software – New tools and software to attack & eavesdrop on any RF transmission – Community-based sharing of findings  Tools and guides on long-range interception of wireless technologies
  • 350. Evolving Risk Landscape 1. Systems designed 20 years ago when isolation was assumed 2. IoT often not built for Enterprise =>Changes in corporate infrastructure and device capability bolt-ons have enabled an entire array of new attack vectors Control/Office Infrastructure Control Bridge Plant Infrastructure Wireless (WiFi) Attacks Wireless RF AttacksDirect Internet Attacks Vulnerable Networked Services Malware Infected Hosts VPN Attacks Portable Media Attacks Guessed / Stolen Credentials Embedded Command Attacks Device Contamination Telephony / Modem Attacks External Indirect Malware Infections So here is an cynical and overarching view... IoT v1.0 – Rebaked for IP Connectivity IoT v2.0 – Ground up with little/no Enterprise awareness IoT v3.0 – ?? So what does all that mean?
  • 351. A Fresh Approach … ...requires specilaized knowledge and skill in IoT and in general adopts the following practices:  Leverage security techniques from the IT domain where appropriate and effective  Segregate networks to provide better logical isolation of devices unable to support host- based security solutions  Increase the amount of network-based monitoring in strategic locations such that network sensors will be much better positioned to detect malicious or anomalous behavior  Monitor protocols as well as traffic (i.e MODBUS, ...)  Reduce the number of POPs to only a tightly controlled few (e.g. Network, WiFi, and telephony / modem)  Increase logging and correlate into corporate security information and event monitoring systems (attacks into the process control domain are typically preceeded or accompianied by attacks into the corporate networks)  Implement a governance structure that clearly assigns responsibilities  Impose strict control over configuration, new system introduction and vendor access
  • 352. Mind the Gap Seric work with methodologies that are based on internationally accepted security frameworks designed to meet industry requirements, regulatory requirements and risk- based criteria. Over the course of these engagements, we have learned no single industry framework or security standard addresses the full scope of the problem. The ISO/IEC 27000 family and NIST SP 800-53 are: – IT-centric and cover multiple domains for people, process and technology for Information Systems – Do not support specific industry requirements and constraints dealing with limited computation power, storage, environmental variances, and networking capability Industry standards such as IEC 62351, IEC 62443 and NERC-CIP: – Provide specific technical recommendations and requirements for industry controls and protection/safety systems based on very specific operational constraints – Do not support the people and process requirements of a information security management system (ISMS) as defined by ISO/IEC 27000 and NIST.
  • 353. Top 20 Critical Security Controls - v5 1: Inventory of Authorized and Unauthorized Devices 2: Inventory of Authorized and Unauthorized Software 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers 4: Continuous Vulnerability Assessment and Remediation 5: Malware Defenses 6: Application Software Security 7: Wireless Access Control 8: Data Recovery Capability 9: Security Skills Assessment and Appropriate Training to Fill Gaps 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches 11: Limitation and Control of Network Ports, Protocols, and Services 12: Controlled Use of Administrative Privileges 13: Boundary Defense 14: Maintenance, Monitoring, and Analysis of Audit Logs 15: Controlled Access Based on the Need to Know 16: Account Monitoring and Control 17: Data Protection 18: Incident Response and Management 19: Secure Network Engineering 20: Penetration Tests and Red Team Exercises
  • 354. IoT Security - Practical Steps • Look at your Defined Opportunities • Get Started on the Security front • First Principles … & SANS! • In-house and/or External Support • Quantify your risk • Understand your risk posture • Remember it is a journey • Oh and Seric Can Help!
  • 355. Just one more thing….
  • 356. Presentation Title Presentation Sub-Title or Date #SericCanHelp Thank-you @SericSystems www.seric.co.uk