SlideShare a Scribd company logo
Gemalto
Trusted Service – Bringing
Trust to the IoT World
SVP Mobile & IoT Services
13.10.2017
2
The Internet of Things has great potential
3
The Drone Economy
With drones, a whole site can be mapped
daily, in high detail, for as little as $25 a day.
4
The Autonomous Vehicle
Autonomous vehicles could save up to 50
minutes a day for drivers
5
But “things” can go wrong
6
The Dallas Sirens Attack
156 Emergency sirens went off at around
midnight, leading to panic
7
The Teddy who was a Spy
Connected Teddy Bears leaked 2 million
parent and kids message recordings
800,000 user
account
credentials
leaked
8
Hackers kill a jeep, remotely
Hackers took control of the vehicle at 70mph; the
driver lost total control of the car
1.4 million
vehicles recalled
to patch the
vulnerability
9
The Cameras broke the Internet
A botnet attack disrupted services of Amazon,
Twitter, Reddit, Netflix, to name a few
14,000 Internet
domains stopped
using this DNS
after attack
10
Governments are reacting
Regulations are emerging across the globe
11
Internet of Things
Cybersecurity
Improvement Act
introduced in U.S
Congress
EU considering a
security label for
certification of IoT
devices
Singapore released
Cybersecurity Bill to public
for Critical Information
Infrastructures
Cyberspace Administration
of China (CAC) also
introducing new
cybersecurity laws
Device manufacturers (OEM) and software
developers will be affected by these
regulations.
12
Developers must understand how security
works in IoT Solutions
It’s about (a) securing the device (b) securing the cloud
13
BIG DATA AT REST
DATA
LIFECYCLE
DATA IN MOTION
DATA IN MOTION
SECURE
THE DEVICE
SECURE
THE CLOUD
Security needs
to be built from
the device to the
cloud.
14
Securing the device.
Multiple solutions for multiple needs
15
Tamper resistant hardware on dedicated chip.
Dedicated hardware on generic
processor
Software
only
Mixed
hard/software
Dedicated
hardware
Security
Impact on
device
Minimum security on
generic processor
Security solutions have to be adapted to the use-case
LOGO
LOGO IN BLACK
LOGO COLOR VERSIONS
LOGO ON BLACK
Secure
Element
Embedded
UICC
Trusted
Execution
Environment
16
Securing the cloud.
On-Premise and On-Demand
17
ENCRYPTION KEY MANAGEMENT
AND PROTECTION
IDENTITY AND ACCESS
MANAGEMENT
• Data-at-rest encryption
• Data-in-motion encryption
• Enterprise key lifecycle
management
• High assurance key
protection
• HSM orchestration and crypto
operations
• Access management
• Multi-factor authentication
• PKI credential
management
18
Alibaba & Gemalto: Securing IoT together
ID2 in action with Gemalto
19
Security
Impact on
device
Software
only
Mixed
hard/software
Dedicated
hardware
Use Case:
Smartphone Mobile Payment
Endpoint Type:
Complex
Network Type:
High bandwidth, public
Security Level:
High
Secure
Element
ID2 in action with Gemalto
20
Security
Impact on
device
Software
only
Mixed
hard/software
Dedicated
hardware
Use Case:
Smart Watch Mobile Payment
Endpoint Type:
Complex, size-constrained
Network Type:
High bandwidth, public
Security Level:
High
Secure
Element
ID2 in action with Gemalto
21
Security
Impact on
device
Software
only
Mixed
hard/software
Dedicated
hardware
Use Case:
Personal Drone
Endpoint Type:
Complex, highly mobile
Network Type:
High bandwidth, public
Security Level:
Medium*
eSIM/
eUICC
* For industrial drone, this could be High
ID2 in action with Gemalto
22
Security
Impact on
device
Software
only
Mixed
hard/software
Dedicated
hardware
Use Case:
Smart lighting – Street lamp
Endpoint Type:
Simple, resource constrained
Network Type:
Low bandwidth, private
Security Level:
Medium
Use Case:
Smart lighting – Gateway
Endpoint Type:
Complex, tamper-proof
Network Type:
High bandwidth, public
Security Level:
High
LOGO
LOGO IN BLACK
LOGO COLOR VERSIONS
LOGO ON BLACK
Trusted
Execution
Environment
Secure
Element
Gemalto & Aliyun – Securing the Internet of Things
23
Trusted
Application Manager
Trusted
Service Manager
Trusted
Key Manager
HSM &
Key Management
Remote management of
secure applications on
mobile devices
Remote administration of
credentials on secure
elements
Remote management
credentials for resource
constrained networks and
devices
LOGO
LOGO IN BLACK
LOGO COLOR VERSIONS
LOGO ON BLACK
Aliyun – Alibaba Cloud
24
About Gemalto
We enable trust in two interlocking ways…
…by developing secure, innovative software.
WE
AUTHENTICATE
PEOPLE AND
DEVICES
WE
PROTECT
DATA ACROSS
NETWORKS AND
THE CLOUD
25
Bringing trust to connected devices, payment, online banking, cloud access,
transport ticketing, eGovernment, vehicle telematics, software licensing and more.
We enable secure services in six main markets
Enterprise Security
Internet of ThingsMobileFinancial Services
& Retail
Government Software Monetization
26
Building trust in IoT, by Gemalto

More Related Content

What's hot

IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
Belal Ashraf
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
Ericsson
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
Avinash Sinha
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
David Wood
 
5G Edge Computing IoT Presentation
5G Edge Computing IoT Presentation 5G Edge Computing IoT Presentation
5G Edge Computing IoT Presentation
Rick Stomphorst
 
IoT Trends
IoT Trends IoT Trends
IoT Trends
Ria Katiyar
 
IoT Challenges ZLotfi
IoT Challenges ZLotfiIoT Challenges ZLotfi
IoT Challenges ZLotfi
Zahra L
 
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
Overcoming Security Vulnerabilities and Cyberattacks in IoT EnvironmentOvercoming Security Vulnerabilities and Cyberattacks in IoT Environment
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
Farah Baharuddin
 
IoT for Smarter Health Care
IoT for Smarter Health CareIoT for Smarter Health Care
IoT for Smarter Health Care
Dr. Wilfred Lin (Ph.D.)
 
NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021
Antenna Manufacturer Coco
 
IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
Ahmed Banafa
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
Belal Ashraf
 
Ita 2000
Ita 2000Ita 2000
Ita 2000
SheikhFiroz1
 
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
Ed Hightower
 
Simple things about Internet of Things
Simple things about Internet of ThingsSimple things about Internet of Things
Simple things about Internet of Things
Muhammad Nasr
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
Sharpe Smith
 
Ivanti threat thursday deck july final - read-only
Ivanti threat thursday deck july final  -  read-onlyIvanti threat thursday deck july final  -  read-only
Ivanti threat thursday deck july final - read-only
Ivanti
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
Witekio
 
Nucleus vision onepager
Nucleus vision onepagerNucleus vision onepager
Nucleus vision onepager
Deepika Jha
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
MITEF México
 

What's hot (20)

IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
 
White Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked SocietyWhite Paper: IoT Security – Protecting the Networked Society
White Paper: IoT Security – Protecting the Networked Society
 
Dissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinhaDissecting internet of things by avinash sinha
Dissecting internet of things by avinash sinha
 
Internet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchainInternet of Things (IoT) two-factor authentication using blockchain
Internet of Things (IoT) two-factor authentication using blockchain
 
5G Edge Computing IoT Presentation
5G Edge Computing IoT Presentation 5G Edge Computing IoT Presentation
5G Edge Computing IoT Presentation
 
IoT Trends
IoT Trends IoT Trends
IoT Trends
 
IoT Challenges ZLotfi
IoT Challenges ZLotfiIoT Challenges ZLotfi
IoT Challenges ZLotfi
 
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
Overcoming Security Vulnerabilities and Cyberattacks in IoT EnvironmentOvercoming Security Vulnerabilities and Cyberattacks in IoT Environment
Overcoming Security Vulnerabilities and Cyberattacks in IoT Environment
 
IoT for Smarter Health Care
IoT for Smarter Health CareIoT for Smarter Health Care
IoT for Smarter Health Care
 
NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021NB-IoT and LoRa of LPWAN Market Analysis in 2021
NB-IoT and LoRa of LPWAN Market Analysis in 2021
 
IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
 
Ita 2000
Ita 2000Ita 2000
Ita 2000
 
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
IoT and Low Power WANs Can Enable Smart Cities and Smart Health 4-8-17
 
Simple things about Internet of Things
Simple things about Internet of ThingsSimple things about Internet of Things
Simple things about Internet of Things
 
Security 2 Q 07[1]
Security 2 Q 07[1]Security 2 Q 07[1]
Security 2 Q 07[1]
 
Ivanti threat thursday deck july final - read-only
Ivanti threat thursday deck july final  -  read-onlyIvanti threat thursday deck july final  -  read-only
Ivanti threat thursday deck july final - read-only
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Nucleus vision onepager
Nucleus vision onepagerNucleus vision onepager
Nucleus vision onepager
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 

Similar to Building trust in IoT, by Gemalto

NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
North Texas Chapter of the ISSA
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Cyren, Inc
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
Kenny Huang Ph.D.
 
Cybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile WorldCybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile World
Ahmed Abu Eldahab
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
Hans Klos
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
Bellaj Badr
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Vikalp Sharma
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
Cigdem Sengul
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
Pierluigi Paganini
 
Life going beyond the smart home
Life going beyond the smart homeLife going beyond the smart home
Life going beyond the smart home
COMPUTEX TAIPEI
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
1SI19IS064TEJASS
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
Vasco Veloso
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
OKsystem
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
journalBEEI
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
Md.Imtiaz Ahmed
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
John D. Johnson
 
MASSIVE SCALE SECURITY FOR THE IoT
MASSIVE SCALE SECURITY FOR THE IoTMASSIVE SCALE SECURITY FOR THE IoT
MASSIVE SCALE SECURITY FOR THE IoT
Juanjo MARTINEZ PAGAN
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
Michel de Goede
 
The application security controller
The application security controllerThe application security controller
The application security controller
Chris Swan
 
How to Meet MFA Mandates in Air Gap Networks
How to Meet MFA Mandates in Air Gap NetworksHow to Meet MFA Mandates in Air Gap Networks
How to Meet MFA Mandates in Air Gap Networks
Secret Double Octopus
 

Similar to Building trust in IoT, by Gemalto (20)

NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
Cybersecurity and Internet Governance
Cybersecurity and Internet GovernanceCybersecurity and Internet Governance
Cybersecurity and Internet Governance
 
Cybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile WorldCybersecurity in an IoT and Mobile World
Cybersecurity in an IoT and Mobile World
 
Grapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure CommunicationGrapeboard - Enabling Secure Communication
Grapeboard - Enabling Secure Communication
 
beware of Thing Bot
beware of Thing Botbeware of Thing Bot
beware of Thing Bot
 
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
Trylogic- Cyber security by Vikalp Sharma- FDP Presentation July 9 2020
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Life going beyond the smart home
Life going beyond the smart homeLife going beyond the smart home
Life going beyond the smart home
 
Chapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptxChapter 3_Cyber Security-ccdf.pptx
Chapter 3_Cyber Security-ccdf.pptx
 
Privacy and security in IoT
Privacy and security in IoTPrivacy and security in IoT
Privacy and security in IoT
 
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
Smart Cards & Devices Forum 2013 - Protecting enterprise sensitive informatio...
 
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
Rasefiberry: Secure and efficient Raspberry-Pi based gateway for smarthome Io...
 
Evolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoTEvolution of Mobile Communication(1G-6G) and IoT
Evolution of Mobile Communication(1G-6G) and IoT
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
MASSIVE SCALE SECURITY FOR THE IoT
MASSIVE SCALE SECURITY FOR THE IoTMASSIVE SCALE SECURITY FOR THE IoT
MASSIVE SCALE SECURITY FOR THE IoT
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 
The application security controller
The application security controllerThe application security controller
The application security controller
 
How to Meet MFA Mandates in Air Gap Networks
How to Meet MFA Mandates in Air Gap NetworksHow to Meet MFA Mandates in Air Gap Networks
How to Meet MFA Mandates in Air Gap Networks
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

Building trust in IoT, by Gemalto

  • 1. Gemalto Trusted Service – Bringing Trust to the IoT World SVP Mobile & IoT Services 13.10.2017
  • 2. 2 The Internet of Things has great potential
  • 3. 3 The Drone Economy With drones, a whole site can be mapped daily, in high detail, for as little as $25 a day.
  • 4. 4 The Autonomous Vehicle Autonomous vehicles could save up to 50 minutes a day for drivers
  • 6. 6 The Dallas Sirens Attack 156 Emergency sirens went off at around midnight, leading to panic
  • 7. 7 The Teddy who was a Spy Connected Teddy Bears leaked 2 million parent and kids message recordings 800,000 user account credentials leaked
  • 8. 8 Hackers kill a jeep, remotely Hackers took control of the vehicle at 70mph; the driver lost total control of the car 1.4 million vehicles recalled to patch the vulnerability
  • 9. 9 The Cameras broke the Internet A botnet attack disrupted services of Amazon, Twitter, Reddit, Netflix, to name a few 14,000 Internet domains stopped using this DNS after attack
  • 11. Regulations are emerging across the globe 11 Internet of Things Cybersecurity Improvement Act introduced in U.S Congress EU considering a security label for certification of IoT devices Singapore released Cybersecurity Bill to public for Critical Information Infrastructures Cyberspace Administration of China (CAC) also introducing new cybersecurity laws Device manufacturers (OEM) and software developers will be affected by these regulations.
  • 12. 12 Developers must understand how security works in IoT Solutions
  • 13. It’s about (a) securing the device (b) securing the cloud 13 BIG DATA AT REST DATA LIFECYCLE DATA IN MOTION DATA IN MOTION SECURE THE DEVICE SECURE THE CLOUD Security needs to be built from the device to the cloud.
  • 15. Multiple solutions for multiple needs 15 Tamper resistant hardware on dedicated chip. Dedicated hardware on generic processor Software only Mixed hard/software Dedicated hardware Security Impact on device Minimum security on generic processor Security solutions have to be adapted to the use-case LOGO LOGO IN BLACK LOGO COLOR VERSIONS LOGO ON BLACK Secure Element Embedded UICC Trusted Execution Environment
  • 17. On-Premise and On-Demand 17 ENCRYPTION KEY MANAGEMENT AND PROTECTION IDENTITY AND ACCESS MANAGEMENT • Data-at-rest encryption • Data-in-motion encryption • Enterprise key lifecycle management • High assurance key protection • HSM orchestration and crypto operations • Access management • Multi-factor authentication • PKI credential management
  • 18. 18 Alibaba & Gemalto: Securing IoT together
  • 19. ID2 in action with Gemalto 19 Security Impact on device Software only Mixed hard/software Dedicated hardware Use Case: Smartphone Mobile Payment Endpoint Type: Complex Network Type: High bandwidth, public Security Level: High Secure Element
  • 20. ID2 in action with Gemalto 20 Security Impact on device Software only Mixed hard/software Dedicated hardware Use Case: Smart Watch Mobile Payment Endpoint Type: Complex, size-constrained Network Type: High bandwidth, public Security Level: High Secure Element
  • 21. ID2 in action with Gemalto 21 Security Impact on device Software only Mixed hard/software Dedicated hardware Use Case: Personal Drone Endpoint Type: Complex, highly mobile Network Type: High bandwidth, public Security Level: Medium* eSIM/ eUICC * For industrial drone, this could be High
  • 22. ID2 in action with Gemalto 22 Security Impact on device Software only Mixed hard/software Dedicated hardware Use Case: Smart lighting – Street lamp Endpoint Type: Simple, resource constrained Network Type: Low bandwidth, private Security Level: Medium Use Case: Smart lighting – Gateway Endpoint Type: Complex, tamper-proof Network Type: High bandwidth, public Security Level: High LOGO LOGO IN BLACK LOGO COLOR VERSIONS LOGO ON BLACK Trusted Execution Environment Secure Element
  • 23. Gemalto & Aliyun – Securing the Internet of Things 23 Trusted Application Manager Trusted Service Manager Trusted Key Manager HSM & Key Management Remote management of secure applications on mobile devices Remote administration of credentials on secure elements Remote management credentials for resource constrained networks and devices LOGO LOGO IN BLACK LOGO COLOR VERSIONS LOGO ON BLACK Aliyun – Alibaba Cloud
  • 25. We enable trust in two interlocking ways… …by developing secure, innovative software. WE AUTHENTICATE PEOPLE AND DEVICES WE PROTECT DATA ACROSS NETWORKS AND THE CLOUD 25
  • 26. Bringing trust to connected devices, payment, online banking, cloud access, transport ticketing, eGovernment, vehicle telematics, software licensing and more. We enable secure services in six main markets Enterprise Security Internet of ThingsMobileFinancial Services & Retail Government Software Monetization 26

Editor's Notes

  1. …for most part
  2. https://hbr.org/cover-story/2017/05/drones-go-to-work
  3. http://www.mckinsey.com/industries/automotive-and-assembly/our-insights/ten-ways-autonomous-driving-could-redefine-the-automotive-world
  4. https://hbr.org/cover-story/2017/05/drones-go-to-work Drone economics are classically disruptive. Already drones can accomplish in hours tasks that take people days. They can provide deeply detailed visual data for a tiny fraction of the cost of acquiring the same data by other means. They’re becoming crucial in workplace safety, removing people from precarious processes such as cell-tower inspection. And they offer, literally, a new view into business: Their low-overhead perspective is bringing new insights and capabilities to fields and factories alike. The construction industry is the world’s second largest (after agriculture), worth $8 trillion a year. But it’s remarkably inefficient. The typical commercial construction project runs 80% over budget and 20 months behind schedule, according to McKinsey. On-screen, in the architect’s CAD file, everything looks perfect. But on-site, in the mud and dust, things are different. And the difference between concept and reality is where about $3 trillion of that $8 trillion gets lost, in a cascade of change orders, rework, and schedule slips. Drones are meant to close that gap. The one buzzing outside my window, taking passes at the site, is capturing images with a high-performance camera mounted on a precision gimbal. It’s taking regular photos (albeit at very high resolution), which are sent to the cloud and, using photogrammetry techniques to derive geometries from visual data, are turned into photo-realistic 2-D and 3-D models. (Google does the same thing in Google Maps, at lower resolution and with data that might be two or three years old. To see this, switch to Google Earth view and click on the “3-D” button.) In the construction site trailer, the drone’s data shows up by mid-morning as an overhead view of the site, which can be zoomed in for detail the size of a U.S. quarter or rotated at any angle, like a video game or virtual reality scene. Superimposed on the scans are the CAD files used to guide the construction — an “as designed” view overlaid on an “as built” view. It’s like an augmented reality lens into what should be versus what is, and the difference between the two can be worth thousands of dollars a day in cost savings on each site — billions across the industry. So the site superintendent monitors progress daily.
  5. https://www.engadget.com/2017/04/14/dallas-siren-hack-coming-to-a-city-near-you/
  6. https://motherboard.vice.com/en_us/article/pgwean/internet-of-things-teddy-bear-leaked-2-million-parent-and-kids-message-recordings A company that sells “smart” teddy bears leaked 800,000 user account credentials—and then hackers locked it and held it for ransom
  7. https://www.wired.com/2015/07/jeep-hack-chrysler-recalls-1-4m-vehicles-bug-fix/  Chrysler announced that it’s issuing a formal recall for 1.4 million vehicles that may be affected by a hackable software vulnerability in Chrysler’s Uconnect dashboard computers.
  8. https://www.wired.com/2016/12/botnet-broke-internet-isnt-going-away/ WHEN THE BOTNET named Mirai first appeared in September, it announced its existence with dramatic flair. After flooding a prominent security journalist's website with traffic from zombie Internet of Things devices, it managed to make much of the internet unavailable for millions of people by overwhelming Dyn, a company that provides a significant portion of the US internet's backbone. Since then, the number attacks have only increased. What's increasingly clear is that Mirai is a powerfully disruptive force. What's increasingly not? How to stop it. Mirai is a type of malware that automatically finds Internet of Things devices to infect and conscripts them into a botnet—a group of computing devices that can be centrally controlled. From there this IoT army can be used to mount distributed denial of service (DDoS) attacks in which a firehose of junk traffic floods a target's servers with malicious traffic. In just the past few weeks, Mirai disrupted internet service for more than 900,000 Deutsche Telekom customers in Germany, and infected almost 2,400 TalkTalk routers in the UK. This week, researchers published evidencethat 80 models of Sony cameras are vulnerable to a Mirai takeover.
  9. U.S Bill on IoT Security: https://www.warner.senate.gov/public/index.cfm/2017/8/enators-introduce-bipartisan-legislation-to-improve-cybersecurity-of-internet-of-things-iot-devices EC considering “Trusted IoT” label: https://ec.europa.eu/digital-single-market/en/news/internet-things-privacy-security-workshop Singapore Cybersecurity Bill: http://www.straitstimes.com/singapore/singapore-releases-omnibus-cybersecurity-bill-for-public-consultation China Cybersecurity Laws: https://www.theregister.co.uk/2017/06/01/china_cybersecurity_law/
  10. The developer community needs to understand that security cannot be thought of in isolation. It’s a mix of securing the device and the cloud – that’s how you achieve the security of an IoT “solution”. The more connected devices out there, the greater will be the surge of data. We present the lifecycle of data in a connected use case through one of the fastest growing connected technology industry – the connected car. Self-driving and autonomous vehicles, in particular, are much closer to reality than most people think. By 2020 one in five cars on the road worldwide will have some form of wireless connection – managing everything from entertainment, driver’s personal diaries to routes and security to speed controls and accident reports. Data at rest is the data either exists locally within a device or in a cloud resource. This could be the vehicle’s data residing the car computer or the data that has been sent back and now stored in the cloud infrastructure of the vehicle manufacturer. Data in motion is that data that is in transit. This data could be moving from one vehicle to the other (for example, proximity between vehicles), or it could be data that is being exchanged over a cellular network between the car and some cloud resource.
  11. Let’s look at a few examples of ID2 in motion for different use cases.
  12. Let’s look at a few examples of ID2 in motion for different use cases.