SlideShare a Scribd company logo
1 of 97
Download to read offline
Innovation Network event
1 October 2015
Innovation Network event
1 October 2015
Jim Pennycook
CDE Head of Operations
Military capability
Advantage
Persistent
The aim of CDE
Rapid technology change
Defence
Other markets
Utilisation
CDE Evolution
Years
CDE directive
Prove the value of innovative,
high-risk, high-potential-benefit
research to enable
development of cost-effective
military capability advantage
Defence White Paper – National Security Through Technology Feb 2012
Defence and security
First point of contact
‘CDE remains our first point of
contact for those who wish to
submit a research idea to the
MOD.’
Defence White Paper – National Security Through Technology Feb 2012
Support to SMEs
Routes to market
CDE operating principles
Engage with innovators
Funded opportunities
Participation costs
Risk
Intellectual property
Compliance
Regulated
Transparent
Auditable
Managing innovation
Proof of
concept
Development
Innovation Future capability
CDE MOD + investors
CDE competition space
Technology innovation lifecycle
Original idea Capability
Technology innovation lifecycle
Uptake /
commercialisation
Pre-commercial
development
TRL 1 TRL 2 TRL 3 TRL 4 TRL 5 TRL 6 TRL 7 TRL8 TRL 9
Experimental
research
Technology
implementation
Applied research
Curiosity
driven
research
CDE competition space
Pre-commercial development
TRL 3 TRL 4 TRL 5 TRL 6
Applied research
Solution exploration Prototyping/test products
Phase 1 Phase 2
Phase 1
TRL
7
TRL
2
CDE competition space
Phase 2
TRL
3
TRL
4
TRL
5
TRL
6
Two routes to funding
Enduring
Themed
Not classified
Enduring
competition
Themed
competition
£ 7M
Enduring competition
Enduring challenges
Challenge framework
ProtectionLethality
Human performance
Mobility
Situational awareness
CommunicationData
Power
Lower cost of ownership
Themed competition
Competitions this year
Theme Value
Open-source big data insight £2.25M
Persistent surveillance from the air £2.25M
Agile, immersive training £2.25M
What's inside that building? £1.15M
Understand and interact with cyberspace £1.00M
Current competitions
Theme Value
Security for the internet of things £2M
Autonomy and big data for defence £4M
Online bid submission
Portal upgrade
How has CDE performed?
CDE in numbers
5933
proposals received 57%
CDE in numbers
17%
of proposals funded
20%13%
E T
CDE in numbers
934
contracts placed 43%
CDE in numbers
£57.9M
invested
1 2 3 4 5 6 7 8
What’s next for CDE?
Innovation Network events
Innovation Network events
Next event: 21 October 2015
Sign up to get updates
www.gov.uk/dstl/cde
A successful proposal
A successful proposal
Innovation Network event
1 October 2015
The security challenges
of the internet of things
1
Relentless growth
2
Connected devices growth graphic by HP forecasting
Government working online
3
IoT vulnerabilities
4
The challenge
5
There are a number of
routes into the SIA, this
campaign is just one:
The SIA invests well over £10m per year in research and innovation through industryand
academicpartnerships
The SIA must cast
the net wide, from
blue-sky thinking
to mature ideas, to
tackle today’s
problems
Other innovationand research contract competitions
Through ourPrime industry partners
Direct relationships
External engagement
6
This is the 3rd SIA open competition to reach out to new suppliers.
Importantly, this competition is about building relationships,
20 new organisations now have an ongoing relationship with the SIA
2012
‘Finding the Threat’, saw the
biggest response to a CDE
competition:
• 24 proposals funded at phase 1
• 9 projects taken to phase 2
• 3 projects successfully made it onto
the SIA business baseline
2014
‘Secure Working in Insecure
Environments’ resulted in:
• 14 proposals funded at phase 1
• 5 projects taken to phase 2
• 2 projects hoped to make it onto the
SIA business baseline
Innovation Network event
1 October 2015
Encouraging
innovation and the
internet of things
future
55
Innovation is hard
• “Innovation is hard because ‘solving problems people didn’t
know they had’ and ‘building something no one needs’ look
identical at first ” - Aaron Levie, CEO at Box
• “You can't solve a problem on the same level that it was
created. You have to rise above it to the next level" - Albert
Einstein
• Innovation in the national security area is even harder:
- tradition
- high cost of failure
- security culture
56
But strong imperatives
• “My sharpest concern as Director General is the growing
gap between the increasingly challenging threat and the
decreasing availability of capabilities to address it” –
Andrew Parker
• Move towards ubiquitous encryption
• Nimble adversaries
eg ISIL’s strategic use of social media
57
Need to be outward looking
58
• Innovation relies on being
receptive to ideas from outside
• In particular, we need to engage
with non-traditional partners and
this CDE competition is an
important part of that
Connected future
59
Connected future
60
The IoT’s significance
61
“The internet of things is a transformative development.
We are on the brink of a new industrial revolution.
I want the UK to lead it.”
Exciting capabilities
62
Smart cities Smart home Wearable tech
Smart
parking
saving time
and cutting
congestion
Neurio sensor
capable of tracking
and controlling the
power of every
device in a home
Tzukuri sunglasses
capable of notifying
an owner when
they’ve left them
behind
Emerging risks
63
Smart cities Smart home Wearable tech
In increasingly
computer-controlled
cities, critical
infrastructure has a
growing
vulnerability to
cyberterrorism
Hacking smart home
security systems can
facilitate criminal
entry
Perceived threat to
pacemakers/
defibrilators
This competition: security for the IoT
• Increasing product security without reducing
capability
• Connecting diverse data into a coherent
whole
• Defence of critical national infrastructure
64
Innovation Network event
1 October 2015
Security for the internet of
things
1
To improve the security of devices and sensors, that connect to one or more
physical and/or virtual hubs, in either a critical infrastructure or consumer
environment
To know when this security has been threatened and the impact this may have
on the authenticity, integrity and availability of data
Solutions must demonstrate:
• how to manage the security of IoT devices
• how to manage the privacy of data collected by devices
While enabling the management of systems and the protection of privacy of the
data shared beyond the network, you should consider protocols that provide:
• authentication
• integrity
• availability supervisory control
Challenge 1: security of IoT devices
Challenge 2: linking and understanding
IoT data
To understand what’s happening from apparently unrelated data. How to gather
and visualize data from a diverse, sensor-rich, loosely connected environment
that operates across different protocols and standards
Demonstrate how, based on the data gathered, 2 or more events/users/devices
could be linked and how to indicate a level of confidence in that connection
Demonstrate how you might identify malicious activities from the behaviour
and/or performance of the network nodes themselves. Where wireless is used,
you should demonstrate the vulnerabilities it presents and how this can be made
more secure at the physical layer
Challenge 2: linking and understanding
IoT data
You should consider:
• gaps in dissecting and analyzing protocols
• how value can be brought from auditing IoT devices
• how data from IoT devices could enhance existing security, eg the presence of
an IoT device as an additional authentication factor, using sensor monitoring to
build patterns of life to inform security decisions
• how vulnerable to attack are the IoT devices in different markets, eg medical,
financial, automotive etc
• what value could be gained by attackers from IoT devices, eg payment details,
location
What we want
We are looking for innovative proof-of-concept technology developments, at
technology readiness level (TRL) 3 to 4
Phase-1 project deliverables must be completed by 31 March 2016
A successful proposal will clearly demonstrate how the new techniques and
methods could provide a more comprehensive solution
Proposals should be for novel research and innovation that result in a
demonstration and have a realistic exploitation route. Solutions can either be
software or hardware
What we don’t want
The SIA don’t want paper-based studies, consultancy work, proposals that aren’t
innovative, or demonstrations of mature technologies, ie TRL 6 and above
The SIA don’t want technologies that can only be used for gathering intelligence
Gemma Moxham
Competition Manager
Security for
the internet of things
How will it work?
What’s different?
Assessors
Technical Partners
Up to £1 million
Up to 3 months
Proof of concept
CDE contract with Dstl
Phase 1
Cost
Scope
Time
£1 million
Longer research
projects
Not Dstl contracts
Phase 2
What’s the same?
www.gov.uk/dstl/cde
Funded opportunities
Awareness
Network
Funding
Fair
Accessible
100%
Compliance
Regulated
Transparent
Auditable
Intellectual property
Defcon 705
Rights of use
Online bid submission
CDE portal
Only route
Low overhead
A successful proposal
Clear
Concise
Evidence based
What do we want?
Challenge 1:
security of IoT devices
Challenge 2:
linking and understanding
IoT data
What we want
Innovative proof-of-concept
Software or hardware
Completed by 31 March 2016.
Demonstrations
What we don’t want
Studies
Consultancy
Incremental
Mature technologies
Technical queries
ogdinnovation@dstl.gov.uk
Dates
Webinar:
8 October 2015
Dates
Contract placement initiated:
Early December 2015
Dates
Phase-1 research deadline:
31 March 2016
Competition deadline
29 October 2015 at 5pm
www.gov.uk/dstl/cde
Innovation Network event
1 October 2015

More Related Content

What's hot

R&D Projects and Emerging Technology Due Diligence using NASA/DoD Technology ...
R&D Projects and Emerging Technology Due Diligence using NASA/DoD Technology ...R&D Projects and Emerging Technology Due Diligence using NASA/DoD Technology ...
R&D Projects and Emerging Technology Due Diligence using NASA/DoD Technology ...UCICove
 
IoT Community - MassTLC - Harvard Business School joint open forum
IoT Community -  MassTLC - Harvard Business School joint open forumIoT Community -  MassTLC - Harvard Business School joint open forum
IoT Community - MassTLC - Harvard Business School joint open forumMassTLC
 
Responsible AI: An Example AI Development Process with Focus on Risks and Con...
Responsible AI: An Example AI Development Process with Focus on Risks and Con...Responsible AI: An Example AI Development Process with Focus on Risks and Con...
Responsible AI: An Example AI Development Process with Focus on Risks and Con...Patrick Van Renterghem
 
David Winickoff, Session 1
David Winickoff, Session 1David Winickoff, Session 1
David Winickoff, Session 1OECD Governance
 
Nick Malyshev, Session 1
Nick Malyshev, Session 1Nick Malyshev, Session 1
Nick Malyshev, Session 1OECD Governance
 
Data 4 AI: For European Economic Competitiveness and Societal Progress
Data 4 AI: For European Economic Competitiveness and Societal ProgressData 4 AI: For European Economic Competitiveness and Societal Progress
Data 4 AI: For European Economic Competitiveness and Societal ProgressEdward Curry
 
Lorenzo Allio, Session 3
Lorenzo Allio, Session 3Lorenzo Allio, Session 3
Lorenzo Allio, Session 3OECD Governance
 
IP Due Diligence-What Investors Want To See | Quan Nguyen | Lunch & Learn
IP Due Diligence-What Investors Want To See | Quan Nguyen | Lunch & Learn IP Due Diligence-What Investors Want To See | Quan Nguyen | Lunch & Learn
IP Due Diligence-What Investors Want To See | Quan Nguyen | Lunch & Learn UCICove
 
20190528 - Guidelines for Trustworthy AI
20190528 - Guidelines for Trustworthy AI20190528 - Guidelines for Trustworthy AI
20190528 - Guidelines for Trustworthy AIBrussels Legal Hackers
 
e-SIDES and Ethical AI
e-SIDES and Ethical AIe-SIDES and Ethical AI
e-SIDES and Ethical AIIDC4EU
 
Startup Building Blocks, Challenges, and Pitfalls From Formation to Growth | ...
Startup Building Blocks, Challenges, and Pitfalls From Formation to Growth | ...Startup Building Blocks, Challenges, and Pitfalls From Formation to Growth | ...
Startup Building Blocks, Challenges, and Pitfalls From Formation to Growth | ...UCICove
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAnsgar Koene
 
Europe 2014-2020: programme de recherche & innovation Horizon 2020
Europe 2014-2020: programme de recherche & innovation Horizon 2020Europe 2014-2020: programme de recherche & innovation Horizon 2020
Europe 2014-2020: programme de recherche & innovation Horizon 2020UNITEC
 
Pistoia Alliance USA Conference 2016
Pistoia Alliance USA Conference 2016Pistoia Alliance USA Conference 2016
Pistoia Alliance USA Conference 2016Pistoia Alliance
 
Cyber Resilient Energy Delivery Consortium - Overview
Cyber Resilient Energy Delivery Consortium - OverviewCyber Resilient Energy Delivery Consortium - Overview
Cyber Resilient Energy Delivery Consortium - OverviewCheri Soliday
 
Disruptive innovation and technology
Disruptive innovation and technologyDisruptive innovation and technology
Disruptive innovation and technologyAlain Nkoyock
 
AI-SDV 2021: Lucy Antunes; Muriel Bourgeois Tassanary - Project Management Ch...
AI-SDV 2021: Lucy Antunes; Muriel Bourgeois Tassanary - Project Management Ch...AI-SDV 2021: Lucy Antunes; Muriel Bourgeois Tassanary - Project Management Ch...
AI-SDV 2021: Lucy Antunes; Muriel Bourgeois Tassanary - Project Management Ch...Dr. Haxel Consult
 

What's hot (20)

R&D Projects and Emerging Technology Due Diligence using NASA/DoD Technology ...
R&D Projects and Emerging Technology Due Diligence using NASA/DoD Technology ...R&D Projects and Emerging Technology Due Diligence using NASA/DoD Technology ...
R&D Projects and Emerging Technology Due Diligence using NASA/DoD Technology ...
 
IoT Community - MassTLC - Harvard Business School joint open forum
IoT Community -  MassTLC - Harvard Business School joint open forumIoT Community -  MassTLC - Harvard Business School joint open forum
IoT Community - MassTLC - Harvard Business School joint open forum
 
Responsible AI: An Example AI Development Process with Focus on Risks and Con...
Responsible AI: An Example AI Development Process with Focus on Risks and Con...Responsible AI: An Example AI Development Process with Focus on Risks and Con...
Responsible AI: An Example AI Development Process with Focus on Risks and Con...
 
David Winickoff, Session 1
David Winickoff, Session 1David Winickoff, Session 1
David Winickoff, Session 1
 
AM Briefing: Autonomy and big data for defence
AM Briefing: Autonomy and big data for defenceAM Briefing: Autonomy and big data for defence
AM Briefing: Autonomy and big data for defence
 
Nick Malyshev, Session 1
Nick Malyshev, Session 1Nick Malyshev, Session 1
Nick Malyshev, Session 1
 
Toward Trustworthy AI
Toward Trustworthy AIToward Trustworthy AI
Toward Trustworthy AI
 
Data 4 AI: For European Economic Competitiveness and Societal Progress
Data 4 AI: For European Economic Competitiveness and Societal ProgressData 4 AI: For European Economic Competitiveness and Societal Progress
Data 4 AI: For European Economic Competitiveness and Societal Progress
 
Sfit1
Sfit1Sfit1
Sfit1
 
Lorenzo Allio, Session 3
Lorenzo Allio, Session 3Lorenzo Allio, Session 3
Lorenzo Allio, Session 3
 
IP Due Diligence-What Investors Want To See | Quan Nguyen | Lunch & Learn
IP Due Diligence-What Investors Want To See | Quan Nguyen | Lunch & Learn IP Due Diligence-What Investors Want To See | Quan Nguyen | Lunch & Learn
IP Due Diligence-What Investors Want To See | Quan Nguyen | Lunch & Learn
 
20190528 - Guidelines for Trustworthy AI
20190528 - Guidelines for Trustworthy AI20190528 - Guidelines for Trustworthy AI
20190528 - Guidelines for Trustworthy AI
 
e-SIDES and Ethical AI
e-SIDES and Ethical AIe-SIDES and Ethical AI
e-SIDES and Ethical AI
 
Startup Building Blocks, Challenges, and Pitfalls From Formation to Growth | ...
Startup Building Blocks, Challenges, and Pitfalls From Formation to Growth | ...Startup Building Blocks, Challenges, and Pitfalls From Formation to Growth | ...
Startup Building Blocks, Challenges, and Pitfalls From Formation to Growth | ...
 
AI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry StandardsAI Governance and Ethics - Industry Standards
AI Governance and Ethics - Industry Standards
 
Europe 2014-2020: programme de recherche & innovation Horizon 2020
Europe 2014-2020: programme de recherche & innovation Horizon 2020Europe 2014-2020: programme de recherche & innovation Horizon 2020
Europe 2014-2020: programme de recherche & innovation Horizon 2020
 
Pistoia Alliance USA Conference 2016
Pistoia Alliance USA Conference 2016Pistoia Alliance USA Conference 2016
Pistoia Alliance USA Conference 2016
 
Cyber Resilient Energy Delivery Consortium - Overview
Cyber Resilient Energy Delivery Consortium - OverviewCyber Resilient Energy Delivery Consortium - Overview
Cyber Resilient Energy Delivery Consortium - Overview
 
Disruptive innovation and technology
Disruptive innovation and technologyDisruptive innovation and technology
Disruptive innovation and technology
 
AI-SDV 2021: Lucy Antunes; Muriel Bourgeois Tassanary - Project Management Ch...
AI-SDV 2021: Lucy Antunes; Muriel Bourgeois Tassanary - Project Management Ch...AI-SDV 2021: Lucy Antunes; Muriel Bourgeois Tassanary - Project Management Ch...
AI-SDV 2021: Lucy Antunes; Muriel Bourgeois Tassanary - Project Management Ch...
 

Viewers also liked

Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityThom. Poole
 
How & Why SME's Go On The Internet
How & Why SME's Go On The InternetHow & Why SME's Go On The Internet
How & Why SME's Go On The InternetThom. Poole
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Internet of Things Security Patterns
Internet of Things Security PatternsInternet of Things Security Patterns
Internet of Things Security PatternsMark Benson
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things SecurityTutun Juhana
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Thingsteam-WIBU
 
RootedCon 2017 - Workshop: IoT Insecurity of Things?
RootedCon 2017 - Workshop: IoT Insecurity of Things?RootedCon 2017 - Workshop: IoT Insecurity of Things?
RootedCon 2017 - Workshop: IoT Insecurity of Things?Internet Security Auditors
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
The competitive landscape of the Internet of Things
The competitive landscape of the Internet of ThingsThe competitive landscape of the Internet of Things
The competitive landscape of the Internet of ThingsIoTAnalytics
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend BriefBill Chamberlin
 
Iot gateway dream team - Eclipse Kura and Apache Camel
Iot gateway dream team - Eclipse Kura and Apache CamelIot gateway dream team - Eclipse Kura and Apache Camel
Iot gateway dream team - Eclipse Kura and Apache CamelHenryk Konsek
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 

Viewers also liked (17)

Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
How & Why SME's Go On The Internet
How & Why SME's Go On The InternetHow & Why SME's Go On The Internet
How & Why SME's Go On The Internet
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Internet of Things Security Patterns
Internet of Things Security PatternsInternet of Things Security Patterns
Internet of Things Security Patterns
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
PCI DSS en la Nube
PCI DSS en la NubePCI DSS en la Nube
PCI DSS en la Nube
 
Hardware Security
Hardware SecurityHardware Security
Hardware Security
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
RootedCon 2017 - Workshop: IoT Insecurity of Things?
RootedCon 2017 - Workshop: IoT Insecurity of Things?RootedCon 2017 - Workshop: IoT Insecurity of Things?
RootedCon 2017 - Workshop: IoT Insecurity of Things?
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
The competitive landscape of the Internet of Things
The competitive landscape of the Internet of ThingsThe competitive landscape of the Internet of Things
The competitive landscape of the Internet of Things
 
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
Internet of Things Security:  IBM HorizonWatch 2016 Trend BriefInternet of Things Security:  IBM HorizonWatch 2016 Trend Brief
Internet of Things Security: IBM HorizonWatch 2016 Trend Brief
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Iot gateway dream team - Eclipse Kura and Apache Camel
Iot gateway dream team - Eclipse Kura and Apache CamelIot gateway dream team - Eclipse Kura and Apache Camel
Iot gateway dream team - Eclipse Kura and Apache Camel
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Similar to Security for IoT devices and data

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleForgeRock
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-securityskumartarget
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfyashapnt
 
IoT: Overcoming Barriers to a Connected World
IoT: Overcoming Barriers to a Connected WorldIoT: Overcoming Barriers to a Connected World
IoT: Overcoming Barriers to a Connected WorldCharles Mok
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueDeloitte United States
 
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...MicheleNati
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsLionel Briand
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIxonos Plc
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityPro Mrkt
 
Vibrant Gujarat Summit profile on Disruptive Technologies
Vibrant Gujarat Summit profile on Disruptive TechnologiesVibrant Gujarat Summit profile on Disruptive Technologies
Vibrant Gujarat Summit profile on Disruptive TechnologiesVibrant Gujarat
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
ISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptxISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptxYekoyeTigabuYeko
 
Cybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join NowCybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join Nowasmeerana605
 
Blockchain testing
Blockchain testingBlockchain testing
Blockchain testingMaitrikpaida
 
7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain TestingCygnet Infotech
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Digital Catapult
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Peter Bihr
 

Similar to Security for IoT devices and data (20)

Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Ravi i ot-security
Ravi i ot-securityRavi i ot-security
Ravi i ot-security
 
ico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdfico-future-tech-report-20221214.pdf
ico-future-tech-report-20221214.pdf
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
 
IoT: Overcoming Barriers to a Connected World
IoT: Overcoming Barriers to a Connected WorldIoT: Overcoming Barriers to a Connected World
IoT: Overcoming Barriers to a Connected World
 
Internet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for valueInternet of things ecosystem: The quest for value
Internet of things ecosystem: The quest for value
 
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...
IoTMeetupGuildford#13: Michele Nati - Open Innovation in the UK - Digital Cat...
 
Secure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech ApplicationsSecure and Compliant Data Management in FinTech Applications
Secure and Compliant Data Management in FinTech Applications
 
Industrial Internet Nothing or Everything
Industrial Internet Nothing or EverythingIndustrial Internet Nothing or Everything
Industrial Internet Nothing or Everything
 
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT SecurityDr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
Dr Alisdair Ritchie | Research: The Answer to the Problem of IoT Security
 
Vibrant Gujarat Summit profile on Disruptive Technologies
Vibrant Gujarat Summit profile on Disruptive TechnologiesVibrant Gujarat Summit profile on Disruptive Technologies
Vibrant Gujarat Summit profile on Disruptive Technologies
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
ISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptxISOC-PolicyBrief-Slides-IoT-20161115.pptx
ISOC-PolicyBrief-Slides-IoT-20161115.pptx
 
Cybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join NowCybersecurity Course in Chandigarh Join Now
Cybersecurity Course in Chandigarh Join Now
 
Blockchain testing
Blockchain testingBlockchain testing
Blockchain testing
 
7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing7 Industries Influencing Blockchain Testing
7 Industries Influencing Blockchain Testing
 
The fourth industrial revolution
The fourth industrial revolutionThe fourth industrial revolution
The fourth industrial revolution
 
Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group Industry 4.0 Plymouth Manufacturing Group
Industry 4.0 Plymouth Manufacturing Group
 
Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)Towards a Trustmark for IoT (April 2018)
Towards a Trustmark for IoT (April 2018)
 

More from Defence and Security Accelerator

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDefence and Security Accelerator
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDefence and Security Accelerator
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Defence and Security Accelerator
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017Defence and Security Accelerator
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposalDefence and Security Accelerator
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator Defence and Security Accelerator
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...Defence and Security Accelerator
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Defence and Security Accelerator
 

More from Defence and Security Accelerator (20)

DASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade PresentationDASA Security Showcase - Department for International Trade Presentation
DASA Security Showcase - Department for International Trade Presentation
 
DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation DASA Security Showcase - UK Fire Service Presentation
DASA Security Showcase - UK Fire Service Presentation
 
DASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office PresentationDASA Security Showcase - Department for Transport and Home Office Presentation
DASA Security Showcase - Department for Transport and Home Office Presentation
 
DASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA PresentationDASA Security Showcase - DASA Presentation
DASA Security Showcase - DASA Presentation
 
DASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England PresentationDASA Security Showcase - Bank of England Presentation
DASA Security Showcase - Bank of England Presentation
 
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...Finding, funding and exploiting innovation for the benefit of UK Defence and ...
Finding, funding and exploiting innovation for the benefit of UK Defence and ...
 
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017DASA Jim Pennycook - challenge and opportunity - DSEI 2017
DASA Jim Pennycook - challenge and opportunity - DSEI 2017
 
27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal27 July 2017 Innovation nework event: how to create a great proposal
27 July 2017 Innovation nework event: how to create a great proposal
 
27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator 27 July 2017 Innovation nework event: Working with the Accelerator
27 July 2017 Innovation nework event: Working with the Accelerator
 
Improving crowd resilience themed competition slides
Improving crowd resilience themed competition slidesImproving crowd resilience themed competition slides
Improving crowd resilience themed competition slides
 
Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1Accelerator First Innovation Fund network event Session 1
Accelerator First Innovation Fund network event Session 1
 
CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2CDE themed comp -syn-bio part 2
CDE themed comp -syn-bio part 2
 
CDE themed comp - synbio part 1
CDE themed comp  - synbio part 1CDE themed comp  - synbio part 1
CDE themed comp - synbio part 1
 
Beyond battery power: future autonomy
Beyond battery power: future autonomy Beyond battery power: future autonomy
Beyond battery power: future autonomy
 
CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...CDE themed challenge - Beyond battery power: the technical challenge and futu...
CDE themed challenge - Beyond battery power: the technical challenge and futu...
 
Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2Beyond battery power - CDE themed competition part 2
Beyond battery power - CDE themed competition part 2
 
Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1Beyond battery power - CDE themed competition part 1
Beyond battery power - CDE themed competition part 1
 
Beyond battery power - how the competition will work
Beyond battery power - how the competition will workBeyond battery power - how the competition will work
Beyond battery power - how the competition will work
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1CDE Competition on FASS - technology challenge 1
CDE Competition on FASS - technology challenge 1
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 

Security for IoT devices and data