3. Machine-to-machine communication, or M2M, is
exactly as it sounds:
two machines “communicating,” or exchanging
data, without human interfacing or interaction.
This includes serial connection, powerline
connection (PLC), or wireless communications in the
Internet of Things (IoT)
How it all began…
5. • 1982: students at Carnegie Mellon University
invented an ARPANET-connected soda machine.
• 1999: MIT’s Kevin Ashton coined the “Internet of
Things.”
• 2000s: more wireless devices connected to the
internet
• 2008: the first International Conference of the
Internet of Things.
• 2011: Gartner added IoT to its Hype Cycle, proving
IoT had become a staple in the enterprise.
7. The Internet of Things is a
constantly evolving & expanding
ecosystem..
IoT Platforms bridge between
Operations Technology (OT) and
Information Technology (IT)…
IoT Now Comes in Flavors…
13. Questions To Ask Before Deploying
1. What is the purpose of the sensors?
2. How will the data from sensors get transmitted?
3. How are you securing the connected devices?
4. Do you have a buy-in from C-suite for these projects?
5. What is your organizational structure for these projects?
It’s not really about the sensors. It’s about the DATA.
And this is taking us to the edge, to an increase in edge computing to improve processing times.
14. DO YOU LIKE TO WATCH SCARY MOVIES?
HOW ABOUT A SCARY REALITY SHOW?
Take a look at “Shodan…” and
millions of unprotected devices
15. 12 IoT Security Challenges
To Watch
1. The Rise Of Botnets
2. More IoT Devices, More Risk
3. Lack Of Encryption
4. Outdated Legacy Security
5. Weak Default Passwords
6. Unreliable Threat Detection Methods
7. Small Scale Attacks In IoT
8. Phishing Attacks
9. Inability To Predict Threats
10. Infrequent Updates
11. IoT Financial-Related Breaches
12. User Privacy
16. Expect more and more IoT.
Expect security breaches. Public. Loud and messy.
Expect industry consolidation.
Expect the gap to grow between have and have nots.
Expect IoT-as-a-service.
Bob Snyder, Editor-in-Chief, CHANNEL MEDIA EUROPE