SlideShare a Scribd company logo
1 of 31
Download to read offline
© Copyright Fortinet Inc. All rights reserved.
The Internet of Things – Good, Bad or Just Plain Ugly?
Patrick Grillo, Senior Director, Security Strategy
2
IoT – What is it?
The Internet of Things (IoT) is the
network of physical objects—devices,
vehicles, buildings and other items—
embedded with electronics, software,
sensors, and network connectivity that
enables these objects to collect and
exchange data.*
*Internet of Things Global Standards Initiative
3
IoT – Is it Real?
4
 Trash bin posts to Facebook
 Connected egg tray
 ICPooch - Dog treat dispenser
with video chat
 Dog fitness tracker
 Connected “doggie” door
 WiFi connected beer home
brewing kit
 Spectator worn sports jersey
that vibrates
 Connected “piggy” bank with
mobile app
Would You Believe?
Just Because They Can
5
 Nuclear Facilities (US)
» More than 150 successful cyber
attacks between 2010 & 2014
 Steel Mills (Germany)
» Uncontrollable blast furnace
 Energy Grid (US)
» More than 150 successful cyber
attacks between 2010 & 2014
 Water Supply
 Hospital
» Remotely hack drug pumps
 Building Infrastructure
» Temperature and fire control systems
 Oil Rigs
» Hacker induced instability
 Firearms
» Smart weapons with WiFi
 Airplanes
» Access flight control via entertainment
system
 Kitchen
» Toaster refusing to toast white break
Did You Know?
Top 10 Scariest IoT Data Breaches
6
Trend: Device Growth Continues
 33 Billion endpoints projected to
be connected by 2020 – Gartner
 New device types entering the
network
» ‘headless’ IoT, wireless sensor
nodes, beacons, wearables
More devices and newer device types are entering the network
7
Best Two out of Three?
IoT Challenge
SecureCheap
Fast
8
IoT Security is a BIG STORY!
9
“CEO’s Guide to IoT Security” – AT&T, March 2016
of global organizations are
considering, exploring, or
implementing an IoT
strategy
85%
IoT deployments are on the rise
How many connected devices do you
have in your organization?
of organizations are fully
confident that their
connected devices are
secure
10%
1%
8%
20%
35% 32%
5%
None Fewer than 100
100-999 1,000-4,999
5,000+ Don't know
Source:AT&T, March 2016
10
“CEO’s Guide to IoT Security” – AT&T, March 2016
Source:AT&T, March 2016
44%
32%
14%
4%
6%
IoT share of IT Security Budget
0 - 25% 26-50% 51-75% 76% Not sure
11
Threat Agents in the IoT
Criminals Hackivists Industrial Spies Nation States
Terrorists Insiders Chaotic Actors &
Vigilantes
Regulators
12
IoT Use-case Examples: Consumer and Enterprise
Automated
prescription
ordering
Micro-payments
for ad hoc
home heating
P2P lending
– through
the TV
Re-fill the
fridge
13
IoT Use-case Examples: Consumer and Enterprise
Automated
prescription
ordering
Micro-payments
for ad hoc
home heating
P2P lending
– through
the TV
Re-fill the
fridge
Stored value
and loyalty
Energy
Spot-market
settlement
Pay as you go feed
stock by inventory
managers
Fuel currencies
(block chains)
14
Big Threat #1 – Device to Device Attacks
 Infected device enters the home and attacks
adjacent devices – which in turn launch attacks
 Infected/ compromised devices attack
internally and externally
15
Big Threat #1 – Device to Device Attacks
 Infected device enters the home and attacks
adjacent devices – which in turn launch attacks
 Infected/ compromised devices attack
internally and externally
16
Big Threat #2 – IoT as the Weakest Link
Personally
Identifiable
Info
Sabotage or
privacy invasions
Attack on
information-rich
devices
IoT Cloud services
 Compromise of one device leads to
all adjacent systems
 Social engineering in the IoT
17
Big Threat #2 – IoT as the Weakest Link
Personally
Identifiable
Info
Sabotage or
privacy invasions
Attack on
information-rich
devices
IoT Cloud services
Man-in-the-Middle or
compromise Cloud
Messages pushed to device manager
“Upgrade now for your own safety”
Fetch “patches” = malware
Malware
Drop
 Compromise of one device leads to
all adjacent systems
 Social engineering in the IoT
18
Big Threat #3 – Interdependency and Complexity
 IoT ecosystem has many stakeholders and
service providers at each point in the
architecture
 Cascading impacts almost
impossible to project or monitor
 Assumptions will fail
End point
Device user(s)
Device owner
Device manager
Device maker
Supply chain
19
Big Threat #3 – Interdependency and Complexity
 IoT ecosystem has many stakeholders and
service providers at each point in the
architecture
 Cascading impacts almost
impossible to project or monitor
 Assumptions will fail
1
Gateway
Service function owner
Gateway owner
Gateway manager
Gateway maker
Supply chain
End point
Device user(s)
Device owner
Device manager
Device maker
Supply chain
20
Big Threat #3 – Interdependency and Complexity
 IoT ecosystem has many stakeholders and
service providers at each point in the
architecture
 Cascading impacts almost
impossible to project or monitor
 Assumptions will fail
1 2
Gateway
Service function owner
Gateway owner
Gateway manager
Gateway maker
Supply chain
Network
Network provider Equipment maker
Network owner Supply chain
Network manager
End point
Device user(s)
Device owner
Device manager
Device maker
Supply chain
21
3
Big Threat #3 – Interdependency and Complexity
 IoT ecosystem has many stakeholders and
service providers at each point in the
architecture
 Cascading impacts almost
impossible to project or monitor
 Assumptions will fail
1 2
Gateway
Service function owner
Gateway owner
Gateway manager
Gateway maker
Supply chain
Cloud / DC
Service tenant Platform vendor
Software owner
Infrastructure
owner
Software manager
Infrastructure
manage
Software vendor
Infrastructure
vendors
Platform owner Supply chain
Platform manager
Network
Network provider Equipment maker
Network owner Supply chain
Network manager
End point
Device user(s)
Device owner
Device manager
Device maker
Supply chain
22
3
Big Threat #3 – Interdependency and Complexity
 IoT ecosystem has many stakeholders and
service providers at each point in the
architecture
 Cascading impacts almost
impossible to project or monitor
 Assumptions will fail
1 2
Gateway
Service function owner
Gateway owner
Gateway manager
Gateway maker
Supply chain
Cloud / DC
Service tenant Platform vendor
Software owner
Infrastructure
owner
Software manager
Infrastructure
manage
Software vendor
Infrastructure
vendors
Platform owner Supply chain
Platform manager
Network
Network provider Equipment maker
Network owner Supply chain
Network manager
End point
Device user(s)
Device owner
Device manager
Device maker
Supply chain
4
23
WHERE DO THE
IOT SECURITY
ANSWERS LIE?
24
WHERE DO THE
IOT SECURITY
ANSWERS LIE?
PARTIALLY WITH
THE IOT DEVICES
THEMSELVES.
25
WHERE DO THE
IOT SECURITY
ANSWERS LIE?
PARTIALLY WITH
THE IOT DEVICES
THEMSELVES.
BUT MOSTLY
WITH THE
NETWORK.
26
End-to-End: IoT Security Reference Model
End point Gateways Network Data Center and Cloud
Control & Visibility
Security Services & Framework
END POINTS
(Wireless/Fixed)
NETWORK
DATA CENTER
& CLOUD
(Smart)
GATEWAYS
27
An Equal Opportunity Problem
28
An Equal Opportunity Problem
29
An Equal Opportunity Problem
30
Thumbs Up or Thumps Down?
 IoT is here to stay
 Understand its advantages and liabilities
 Put security in the forefront when considering IoT
The Internet of Things – Good, Bad or Just Plain Ugly?

More Related Content

What's hot

"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT SecurityCableLabs
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoTVasco Veloso
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at ScaleWinston Morton
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Ravindra Dastikop
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...Dataconomy Media
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT SecurityRyan Wilson
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay KumarOWASP Delhi
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016David Glover
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTBarcoding, Inc.
 

What's hot (20)

"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
"The State of IoT Security" Keynote by Shawn Henry at Inform[ED] IoT Security
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le..."Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
Ryan Wilson - ryanwilson.com - IoT Security
Ryan Wilson - ryanwilson.com -  IoT SecurityRyan Wilson - ryanwilson.com -  IoT Security
Ryan Wilson - ryanwilson.com - IoT Security
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
Microsoft IoT Security @ Xpand:X:ED Meetup Sydney Feb 2016
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
 
Your data is showing
Your data is showingYour data is showing
Your data is showing
 

Similar to The Internet of Things – Good, Bad or Just Plain Ugly?

Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)SecPod Technologies
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT Ahmed Banafa
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxvrickens
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesJohn D. Johnson
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.Spiceworks Ziff Davis
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxtjane3
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxlmelaine
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxvoversbyobersby
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Somasundaram Jambunathan
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxmariuse18nolet
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTvishal dineshkumar soni
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemCA Technologies
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 

Similar to The Internet of Things – Good, Bad or Just Plain Ugly? (20)

Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)Hacking Internet of Things (IoT)
Hacking Internet of Things (IoT)
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
A Wake-Up Call for IoT
A Wake-Up Call for IoT A Wake-Up Call for IoT
A Wake-Up Call for IoT
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
All The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected DevicesAll The Things: Security, Privacy & Safety in a World of Connected Devices
All The Things: Security, Privacy & Safety in a World of Connected Devices
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.The Devices are Coming! How the “Internet of Things” will affect IT.
The Devices are Coming! How the “Internet of Things” will affect IT.
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docxFinal Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4Addressing security and privacy in io t ecosystem v0.4
Addressing security and privacy in io t ecosystem v0.4
 
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docxIoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
IoT Referenceshttpswww.techrepublic.comarticlehow-to-secur.docx
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT EcosystemProtecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
Protecting Our Cyber-Identity in a Physical and Virtual World for IoT Ecosystem
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 

More from Yasmin AbdelAziz

Strategic Performance Index- OnStrategy
Strategic Performance Index- OnStrategyStrategic Performance Index- OnStrategy
Strategic Performance Index- OnStrategyYasmin AbdelAziz
 
Pharma IQ Serialization Deadlines Updated
Pharma IQ Serialization Deadlines UpdatedPharma IQ Serialization Deadlines Updated
Pharma IQ Serialization Deadlines UpdatedYasmin AbdelAziz
 
Developing Emotional Intelligence for Healthcare Leaders
Developing Emotional Intelligence for Healthcare LeadersDeveloping Emotional Intelligence for Healthcare Leaders
Developing Emotional Intelligence for Healthcare LeadersYasmin AbdelAziz
 
A Theoretical Framework (Modelling) for International Business Management
A Theoretical Framework (Modelling) for International Business ManagementA Theoretical Framework (Modelling) for International Business Management
A Theoretical Framework (Modelling) for International Business ManagementYasmin AbdelAziz
 
WHO Report, the third meeting of the Member State mechanism on substandard/sp...
WHO Report, the third meeting of the Member State mechanism on substandard/sp...WHO Report, the third meeting of the Member State mechanism on substandard/sp...
WHO Report, the third meeting of the Member State mechanism on substandard/sp...Yasmin AbdelAziz
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacyYasmin AbdelAziz
 
Patheon meaningful metrics_whitepaper
Patheon meaningful metrics_whitepaperPatheon meaningful metrics_whitepaper
Patheon meaningful metrics_whitepaperYasmin AbdelAziz
 
Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...
Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...
Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...Yasmin AbdelAziz
 
Managing OEE o optimize factory performance
Managing OEE o optimize factory performanceManaging OEE o optimize factory performance
Managing OEE o optimize factory performanceYasmin AbdelAziz
 
Riskmitigationwhitepaperweb 1
Riskmitigationwhitepaperweb 1Riskmitigationwhitepaperweb 1
Riskmitigationwhitepaperweb 1Yasmin AbdelAziz
 
How to Increase the Value of the PMMMs as a Business-oriented Framework
How to Increase the Value of the PMMMs as a Business-oriented FrameworkHow to Increase the Value of the PMMMs as a Business-oriented Framework
How to Increase the Value of the PMMMs as a Business-oriented FrameworkYasmin AbdelAziz
 
Cmrgo wp prd_fordvlpmnt_4pnl_sml
Cmrgo wp prd_fordvlpmnt_4pnl_smlCmrgo wp prd_fordvlpmnt_4pnl_sml
Cmrgo wp prd_fordvlpmnt_4pnl_smlYasmin AbdelAziz
 
Women's rights in the middle east and noth africa, gulf edition
Women's rights in the middle east and noth africa, gulf editionWomen's rights in the middle east and noth africa, gulf edition
Women's rights in the middle east and noth africa, gulf editionYasmin AbdelAziz
 
Sf guide moving_mountains_us_02
Sf guide moving_mountains_us_02Sf guide moving_mountains_us_02
Sf guide moving_mountains_us_02Yasmin AbdelAziz
 
3960 alkermes case_study8_fa7
3960 alkermes case_study8_fa73960 alkermes case_study8_fa7
3960 alkermes case_study8_fa7Yasmin AbdelAziz
 
Africa Supply Chain April 2012
Africa Supply Chain April 2012Africa Supply Chain April 2012
Africa Supply Chain April 2012Yasmin AbdelAziz
 

More from Yasmin AbdelAziz (20)

Research Gate: Sun Tzu
Research Gate: Sun TzuResearch Gate: Sun Tzu
Research Gate: Sun Tzu
 
Strategic Performance Index- OnStrategy
Strategic Performance Index- OnStrategyStrategic Performance Index- OnStrategy
Strategic Performance Index- OnStrategy
 
Pharma IQ Serialization Deadlines Updated
Pharma IQ Serialization Deadlines UpdatedPharma IQ Serialization Deadlines Updated
Pharma IQ Serialization Deadlines Updated
 
Developing Emotional Intelligence for Healthcare Leaders
Developing Emotional Intelligence for Healthcare LeadersDeveloping Emotional Intelligence for Healthcare Leaders
Developing Emotional Intelligence for Healthcare Leaders
 
A Theoretical Framework (Modelling) for International Business Management
A Theoretical Framework (Modelling) for International Business ManagementA Theoretical Framework (Modelling) for International Business Management
A Theoretical Framework (Modelling) for International Business Management
 
WHO Report, the third meeting of the Member State mechanism on substandard/sp...
WHO Report, the third meeting of the Member State mechanism on substandard/sp...WHO Report, the third meeting of the Member State mechanism on substandard/sp...
WHO Report, the third meeting of the Member State mechanism on substandard/sp...
 
Social media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacySocial media impact on freedom of expression and privacy
Social media impact on freedom of expression and privacy
 
Patheon meaningful metrics_whitepaper
Patheon meaningful metrics_whitepaperPatheon meaningful metrics_whitepaper
Patheon meaningful metrics_whitepaper
 
Who oct 2014
Who oct 2014Who oct 2014
Who oct 2014
 
Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...
Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...
Securing the Global Pharmaceutical Supply Chain against the Threat of Counter...
 
2014 october newsletter
2014 october newsletter2014 october newsletter
2014 october newsletter
 
Managing OEE o optimize factory performance
Managing OEE o optimize factory performanceManaging OEE o optimize factory performance
Managing OEE o optimize factory performance
 
Riskmitigationwhitepaperweb 1
Riskmitigationwhitepaperweb 1Riskmitigationwhitepaperweb 1
Riskmitigationwhitepaperweb 1
 
How to Increase the Value of the PMMMs as a Business-oriented Framework
How to Increase the Value of the PMMMs as a Business-oriented FrameworkHow to Increase the Value of the PMMMs as a Business-oriented Framework
How to Increase the Value of the PMMMs as a Business-oriented Framework
 
Di 27 1
Di 27 1Di 27 1
Di 27 1
 
Cmrgo wp prd_fordvlpmnt_4pnl_sml
Cmrgo wp prd_fordvlpmnt_4pnl_smlCmrgo wp prd_fordvlpmnt_4pnl_sml
Cmrgo wp prd_fordvlpmnt_4pnl_sml
 
Women's rights in the middle east and noth africa, gulf edition
Women's rights in the middle east and noth africa, gulf editionWomen's rights in the middle east and noth africa, gulf edition
Women's rights in the middle east and noth africa, gulf edition
 
Sf guide moving_mountains_us_02
Sf guide moving_mountains_us_02Sf guide moving_mountains_us_02
Sf guide moving_mountains_us_02
 
3960 alkermes case_study8_fa7
3960 alkermes case_study8_fa73960 alkermes case_study8_fa7
3960 alkermes case_study8_fa7
 
Africa Supply Chain April 2012
Africa Supply Chain April 2012Africa Supply Chain April 2012
Africa Supply Chain April 2012
 

Recently uploaded

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

The Internet of Things – Good, Bad or Just Plain Ugly?

  • 1. © Copyright Fortinet Inc. All rights reserved. The Internet of Things – Good, Bad or Just Plain Ugly? Patrick Grillo, Senior Director, Security Strategy
  • 2. 2 IoT – What is it? The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings and other items— embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data.* *Internet of Things Global Standards Initiative
  • 3. 3 IoT – Is it Real?
  • 4. 4  Trash bin posts to Facebook  Connected egg tray  ICPooch - Dog treat dispenser with video chat  Dog fitness tracker  Connected “doggie” door  WiFi connected beer home brewing kit  Spectator worn sports jersey that vibrates  Connected “piggy” bank with mobile app Would You Believe? Just Because They Can
  • 5. 5  Nuclear Facilities (US) » More than 150 successful cyber attacks between 2010 & 2014  Steel Mills (Germany) » Uncontrollable blast furnace  Energy Grid (US) » More than 150 successful cyber attacks between 2010 & 2014  Water Supply  Hospital » Remotely hack drug pumps  Building Infrastructure » Temperature and fire control systems  Oil Rigs » Hacker induced instability  Firearms » Smart weapons with WiFi  Airplanes » Access flight control via entertainment system  Kitchen » Toaster refusing to toast white break Did You Know? Top 10 Scariest IoT Data Breaches
  • 6. 6 Trend: Device Growth Continues  33 Billion endpoints projected to be connected by 2020 – Gartner  New device types entering the network » ‘headless’ IoT, wireless sensor nodes, beacons, wearables More devices and newer device types are entering the network
  • 7. 7 Best Two out of Three? IoT Challenge SecureCheap Fast
  • 8. 8 IoT Security is a BIG STORY!
  • 9. 9 “CEO’s Guide to IoT Security” – AT&T, March 2016 of global organizations are considering, exploring, or implementing an IoT strategy 85% IoT deployments are on the rise How many connected devices do you have in your organization? of organizations are fully confident that their connected devices are secure 10% 1% 8% 20% 35% 32% 5% None Fewer than 100 100-999 1,000-4,999 5,000+ Don't know Source:AT&T, March 2016
  • 10. 10 “CEO’s Guide to IoT Security” – AT&T, March 2016 Source:AT&T, March 2016 44% 32% 14% 4% 6% IoT share of IT Security Budget 0 - 25% 26-50% 51-75% 76% Not sure
  • 11. 11 Threat Agents in the IoT Criminals Hackivists Industrial Spies Nation States Terrorists Insiders Chaotic Actors & Vigilantes Regulators
  • 12. 12 IoT Use-case Examples: Consumer and Enterprise Automated prescription ordering Micro-payments for ad hoc home heating P2P lending – through the TV Re-fill the fridge
  • 13. 13 IoT Use-case Examples: Consumer and Enterprise Automated prescription ordering Micro-payments for ad hoc home heating P2P lending – through the TV Re-fill the fridge Stored value and loyalty Energy Spot-market settlement Pay as you go feed stock by inventory managers Fuel currencies (block chains)
  • 14. 14 Big Threat #1 – Device to Device Attacks  Infected device enters the home and attacks adjacent devices – which in turn launch attacks  Infected/ compromised devices attack internally and externally
  • 15. 15 Big Threat #1 – Device to Device Attacks  Infected device enters the home and attacks adjacent devices – which in turn launch attacks  Infected/ compromised devices attack internally and externally
  • 16. 16 Big Threat #2 – IoT as the Weakest Link Personally Identifiable Info Sabotage or privacy invasions Attack on information-rich devices IoT Cloud services  Compromise of one device leads to all adjacent systems  Social engineering in the IoT
  • 17. 17 Big Threat #2 – IoT as the Weakest Link Personally Identifiable Info Sabotage or privacy invasions Attack on information-rich devices IoT Cloud services Man-in-the-Middle or compromise Cloud Messages pushed to device manager “Upgrade now for your own safety” Fetch “patches” = malware Malware Drop  Compromise of one device leads to all adjacent systems  Social engineering in the IoT
  • 18. 18 Big Threat #3 – Interdependency and Complexity  IoT ecosystem has many stakeholders and service providers at each point in the architecture  Cascading impacts almost impossible to project or monitor  Assumptions will fail End point Device user(s) Device owner Device manager Device maker Supply chain
  • 19. 19 Big Threat #3 – Interdependency and Complexity  IoT ecosystem has many stakeholders and service providers at each point in the architecture  Cascading impacts almost impossible to project or monitor  Assumptions will fail 1 Gateway Service function owner Gateway owner Gateway manager Gateway maker Supply chain End point Device user(s) Device owner Device manager Device maker Supply chain
  • 20. 20 Big Threat #3 – Interdependency and Complexity  IoT ecosystem has many stakeholders and service providers at each point in the architecture  Cascading impacts almost impossible to project or monitor  Assumptions will fail 1 2 Gateway Service function owner Gateway owner Gateway manager Gateway maker Supply chain Network Network provider Equipment maker Network owner Supply chain Network manager End point Device user(s) Device owner Device manager Device maker Supply chain
  • 21. 21 3 Big Threat #3 – Interdependency and Complexity  IoT ecosystem has many stakeholders and service providers at each point in the architecture  Cascading impacts almost impossible to project or monitor  Assumptions will fail 1 2 Gateway Service function owner Gateway owner Gateway manager Gateway maker Supply chain Cloud / DC Service tenant Platform vendor Software owner Infrastructure owner Software manager Infrastructure manage Software vendor Infrastructure vendors Platform owner Supply chain Platform manager Network Network provider Equipment maker Network owner Supply chain Network manager End point Device user(s) Device owner Device manager Device maker Supply chain
  • 22. 22 3 Big Threat #3 – Interdependency and Complexity  IoT ecosystem has many stakeholders and service providers at each point in the architecture  Cascading impacts almost impossible to project or monitor  Assumptions will fail 1 2 Gateway Service function owner Gateway owner Gateway manager Gateway maker Supply chain Cloud / DC Service tenant Platform vendor Software owner Infrastructure owner Software manager Infrastructure manage Software vendor Infrastructure vendors Platform owner Supply chain Platform manager Network Network provider Equipment maker Network owner Supply chain Network manager End point Device user(s) Device owner Device manager Device maker Supply chain 4
  • 23. 23 WHERE DO THE IOT SECURITY ANSWERS LIE?
  • 24. 24 WHERE DO THE IOT SECURITY ANSWERS LIE? PARTIALLY WITH THE IOT DEVICES THEMSELVES.
  • 25. 25 WHERE DO THE IOT SECURITY ANSWERS LIE? PARTIALLY WITH THE IOT DEVICES THEMSELVES. BUT MOSTLY WITH THE NETWORK.
  • 26. 26 End-to-End: IoT Security Reference Model End point Gateways Network Data Center and Cloud Control & Visibility Security Services & Framework END POINTS (Wireless/Fixed) NETWORK DATA CENTER & CLOUD (Smart) GATEWAYS
  • 30. 30 Thumbs Up or Thumps Down?  IoT is here to stay  Understand its advantages and liabilities  Put security in the forefront when considering IoT