SlideShare a Scribd company logo
1 of 15
Download to read offline
TACKLING DATA SECURITY AND
PRIVACY CHALLENGES OF THE IOT
Björn Peters
Head of Segment M2M/IoT – Exceet Secure Solutions
06-10-2016
2
The digitization of the economy, also known as machine-to-machine (M2M), the Internet of Things
(IoT) or Industry 4.0, is happening as we speak. In an age when objects, people and organizations
exchange data automatically, security becomes the decisive success factor. This means that for
professional applications, it is vital to create a digital sphere of trust.
In this context, exceet Secure Solutions speaks of the digital identification and authentication of all
participants and objects, as well as secure end-to-end encryption of all communication.
How? With the aid of Trusted Ecosystems.
“
“
MOTIVATION
3
„Automation pyramid“
First step:
Continous integration &
digitalization
Vision Industrie 4.0:
Decentralized
controlled modules (no
conventional hirarchy)
ERP
MES
Automation technics
(SPS, Sensoren,
Aktoren)
MES as an
information hub
Different
planning and
control Applications
production processes
with different
control components
Internet of Services
Internet of Things („Cyber-
Physical“ Systems)
IT ARCHITECTURE IS CHANGING
4
COLLECTION OF DATA IN THE PAST
5
COLLECTION OF DATA TODAY
6
Datenerfassung in ZukunftCOLLECTION OF DATA IN THE FUTURE
7
AGENDA
• Firma XY
Security Is A
Barrier In Each
IoT Project
Security Is A
Barrier In Each
IoT Project
>50% of our IoT projects have middle or high security needs
Today enterprises are forced to realize individual security solutions
For data driven business models trust is vital
Authorities drive stronger regulation to enable trust in markets
An easy adoptable secure IOT solution helps the market to develop
1
2
3
4
5
8
Approach:
 Systematic derivation and formulation of all relevant
categories for attack scenarios.
 Allocation of attack potentials.
Attack scenarios result from a threat to a specific object due
to an exploitation of vulnerability by an attacker.
Objective & Result:
 Specific, clearly formulated attack scenarios and associated
attack potentials as basis for security analysis.
INITIAL CONSIDERATIONS
Asset – Protected Object – Development Phase –
Environmental Assumptions
Threat AttackerVulnerability
Attack Scenario and Attack Potential
Threat and Vulnerability Analysis
IoT and Security / Smart & Secure: The Secure Approach To Digital Transformation
THREAT AN VULNERABILITY ANALYSIS
9
TRUSTED IDENTITY-
LIFECYCLE-
MANAGEMENT
FOR INDUSTRIALIZED IOT SOLUTIONS
10
1010/14/2016I exceet Secure Solutions I Slide
VALUE CHAIN
• Closed trusted ecosystem
Established solution
in Germany.
Reduced complexity due
to unique exceet portfolio.
100% Vendor agnostic.
11
1110/14/2016I exceet Secure Solutions I Slide
THE TRUSTED INDUSTRIALIZED IOT SOLUTION
• Fully integrated
Trusted Management
• Unique identification
• Mutual authentication
• End-2-End encryption
• Secure software &
configuration management
• Rights & rules management
Trusted Platform
• Full support of
the IoT Platform
• Fully integrated
• Business process
• support
• Business logic aligned
Secure Element
• Hardware-based
and tamper resistant
storage
• Form factor agnostic
• Lifecycle management
of the Secure Element
12
SENSORS GATEWAY
+ Secure Element
IOT PLATFORM
Trusted Ecosystem
Driver
Insurance
Workshop
Supplier
Fleet Operator
INTERFACE
EXAMPLE – SECURE FLEET MANAGEMENT
13
ORGANIZATIONS
PEOPLE
THINGS/COMPONENTS
Secure, closed user systems thanks to digital identities for:
End-to-end encryption
Unambiguous identification
Mutual authentication
BENEFITS OF A TRUSTED ECOSYSTEM
14
AGENDA
• Firma XY
Security Is No
Question Of
Willingness.
It’s A Question
Of Readiness.
Security Is No
Question Of
Willingness.
It’s A Question
Of Readiness.
exceet Secure Solutions AG
Rethelstraße 47
40237 Düsseldorf
Germany
Björn Peters
Head of Segment M2M/IoT
Phone: +49 211 436989 35
Email: bjoern.peters@exceet.de
Web: www.exceet-secure-solutions.de

More Related Content

What's hot

Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Bosnia Agile
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEurotech
 
IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)Dania Rashid
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2MEurotech
 
Internet of Things, Cloud and Big Data
Internet of Things, Cloud and Big DataInternet of Things, Cloud and Big Data
Internet of Things, Cloud and Big DataEurotech
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityThibault Cantegrel
 
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex TrainingAdvanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex TrainingBryan Len
 
Manufacturing and the Industrial Internet of Things (IIoT)
Manufacturing and the Industrial Internet of Things (IIoT)Manufacturing and the Industrial Internet of Things (IIoT)
Manufacturing and the Industrial Internet of Things (IIoT)Plex Systems
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEurotech
 
Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)3G4G
 
A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks GlobalSign
 
IoT: Understanding its potential and what makes it tick! by Mark Torr
IoT: Understanding its potential and what makes it tick! by Mark TorrIoT: Understanding its potential and what makes it tick! by Mark Torr
IoT: Understanding its potential and what makes it tick! by Mark TorrBosnia Agile
 
Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Bosnia Agile
 
Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)MachinePulse
 
Real World IoT Architecture Use Cases
Real World IoT Architecture Use CasesReal World IoT Architecture Use Cases
Real World IoT Architecture Use CasesEurotech
 
IoT Business Perspectives
IoT Business Perspectives IoT Business Perspectives
IoT Business Perspectives Eurotech
 
Iot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityIot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityKAILASH CHAUHAN
 
The Industrial Internet of Things
The Industrial Internet of ThingsThe Industrial Internet of Things
The Industrial Internet of ThingsON Semiconductor
 
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachInnovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachAtanu Roy Chowdhury
 
GETTING STARTED WITH IOT DATA MANAGEMENT
GETTING STARTED WITH IOT DATA MANAGEMENTGETTING STARTED WITH IOT DATA MANAGEMENT
GETTING STARTED WITH IOT DATA MANAGEMENTBarnaba Accardi
 

What's hot (20)

Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
Internet of Things, Cloud and Big Data
Internet of Things, Cloud and Big DataInternet of Things, Cloud and Big Data
Internet of Things, Cloud and Big Data
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivity
 
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex TrainingAdvanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
 
Manufacturing and the Industrial Internet of Things (IIoT)
Manufacturing and the Industrial Internet of Things (IIoT)Manufacturing and the Industrial Internet of Things (IIoT)
Manufacturing and the Industrial Internet of Things (IIoT)
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)Beginners: What is Industrial IoT (IIoT)
Beginners: What is Industrial IoT (IIoT)
 
A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks A History of IIoT Cyber-Attacks
A History of IIoT Cyber-Attacks
 
IoT: Understanding its potential and what makes it tick! by Mark Torr
IoT: Understanding its potential and what makes it tick! by Mark TorrIoT: Understanding its potential and what makes it tick! by Mark Torr
IoT: Understanding its potential and what makes it tick! by Mark Torr
 
Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...Verso IoT experience – What have we learned from implementations all over the...
Verso IoT experience – What have we learned from implementations all over the...
 
Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)
 
Real World IoT Architecture Use Cases
Real World IoT Architecture Use CasesReal World IoT Architecture Use Cases
Real World IoT Architecture Use Cases
 
IoT Business Perspectives
IoT Business Perspectives IoT Business Perspectives
IoT Business Perspectives
 
Iot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityIot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivity
 
The Industrial Internet of Things
The Industrial Internet of ThingsThe Industrial Internet of Things
The Industrial Internet of Things
 
Innovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit ApproachInnovating with IoT: A Toolkit Approach
Innovating with IoT: A Toolkit Approach
 
GETTING STARTED WITH IOT DATA MANAGEMENT
GETTING STARTED WITH IOT DATA MANAGEMENTGETTING STARTED WITH IOT DATA MANAGEMENT
GETTING STARTED WITH IOT DATA MANAGEMENT
 

Similar to Tackling Data Security and Privacy Challenges of the IoT

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersCyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersGerd Meier zu Koecker
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxSonaliG6
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationPaula Koziol
 
L’IoT industriale e i vantaggi competitivi della trasformazione digitale
L’IoT  industriale e i vantaggi competitivi della trasformazione digitale L’IoT  industriale e i vantaggi competitivi della trasformazione digitale
L’IoT industriale e i vantaggi competitivi della trasformazione digitale Eurotech
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)Gerardo Pardo-Castellote
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlockArmour1
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Dr Rachel O'Connell
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationStefane Mouille
 

Similar to Tackling Data Security and Privacy Challenges of the IoT (20)

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading ClustersCyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
CyberSecurity in Germany: Research Trends, Industrial Hub and Leading Clusters
 
Top Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptxTop Cybersecurity vendors.pptx
Top Cybersecurity vendors.pptx
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
L’IoT industriale e i vantaggi competitivi della trasformazione digitale
L’IoT  industriale e i vantaggi competitivi della trasformazione digitale L’IoT  industriale e i vantaggi competitivi della trasformazione digitale
L’IoT industriale e i vantaggi competitivi della trasformazione digitale
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
 

More from M2M Alliance e.V.

Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0M2M Alliance e.V.
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - OverviewM2M Alliance e.V.
 
IoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentIoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentM2M Alliance e.V.
 
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...M2M Alliance e.V.
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System M2M Alliance e.V.
 
Completely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsCompletely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsM2M Alliance e.V.
 
Sustainable Business Advantage
Sustainable Business AdvantageSustainable Business Advantage
Sustainable Business AdvantageM2M Alliance e.V.
 
Secure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserSecure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserM2M Alliance e.V.
 
NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology M2M Alliance e.V.
 
Internet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingInternet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingM2M Alliance e.V.
 
Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living M2M Alliance e.V.
 
Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation M2M Alliance e.V.
 
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...M2M Alliance e.V.
 
Quantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsQuantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsM2M Alliance e.V.
 
You Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesYou Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesM2M Alliance e.V.
 
Cloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteCloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteM2M Alliance e.V.
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthM2M Alliance e.V.
 

More from M2M Alliance e.V. (20)

M2M Journal 2017
M2M Journal 2017M2M Journal 2017
M2M Journal 2017
 
Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - Overview
 
VR Industry Solutions
VR Industry Solutions VR Industry Solutions
VR Industry Solutions
 
IoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentIoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M Environment
 
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System
 
Completely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsCompletely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory Applications
 
Sustainable Business Advantage
Sustainable Business AdvantageSustainable Business Advantage
Sustainable Business Advantage
 
Secure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserSecure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA Teaser
 
NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology
 
Internet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingInternet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device Hacking
 
Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living
 
Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
 
Quantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsQuantified Self and the Social Internet of Things
Quantified Self and the Social Internet of Things
 
You Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesYou Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future Revenues
 
Cloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteCloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from Remote
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential Growth
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Tackling Data Security and Privacy Challenges of the IoT

  • 1. TACKLING DATA SECURITY AND PRIVACY CHALLENGES OF THE IOT Björn Peters Head of Segment M2M/IoT – Exceet Secure Solutions 06-10-2016
  • 2. 2 The digitization of the economy, also known as machine-to-machine (M2M), the Internet of Things (IoT) or Industry 4.0, is happening as we speak. In an age when objects, people and organizations exchange data automatically, security becomes the decisive success factor. This means that for professional applications, it is vital to create a digital sphere of trust. In this context, exceet Secure Solutions speaks of the digital identification and authentication of all participants and objects, as well as secure end-to-end encryption of all communication. How? With the aid of Trusted Ecosystems. “ “ MOTIVATION
  • 3. 3 „Automation pyramid“ First step: Continous integration & digitalization Vision Industrie 4.0: Decentralized controlled modules (no conventional hirarchy) ERP MES Automation technics (SPS, Sensoren, Aktoren) MES as an information hub Different planning and control Applications production processes with different control components Internet of Services Internet of Things („Cyber- Physical“ Systems) IT ARCHITECTURE IS CHANGING
  • 4. 4 COLLECTION OF DATA IN THE PAST
  • 7. 7 AGENDA • Firma XY Security Is A Barrier In Each IoT Project Security Is A Barrier In Each IoT Project >50% of our IoT projects have middle or high security needs Today enterprises are forced to realize individual security solutions For data driven business models trust is vital Authorities drive stronger regulation to enable trust in markets An easy adoptable secure IOT solution helps the market to develop 1 2 3 4 5
  • 8. 8 Approach:  Systematic derivation and formulation of all relevant categories for attack scenarios.  Allocation of attack potentials. Attack scenarios result from a threat to a specific object due to an exploitation of vulnerability by an attacker. Objective & Result:  Specific, clearly formulated attack scenarios and associated attack potentials as basis for security analysis. INITIAL CONSIDERATIONS Asset – Protected Object – Development Phase – Environmental Assumptions Threat AttackerVulnerability Attack Scenario and Attack Potential Threat and Vulnerability Analysis IoT and Security / Smart & Secure: The Secure Approach To Digital Transformation THREAT AN VULNERABILITY ANALYSIS
  • 10. 10 1010/14/2016I exceet Secure Solutions I Slide VALUE CHAIN • Closed trusted ecosystem Established solution in Germany. Reduced complexity due to unique exceet portfolio. 100% Vendor agnostic.
  • 11. 11 1110/14/2016I exceet Secure Solutions I Slide THE TRUSTED INDUSTRIALIZED IOT SOLUTION • Fully integrated Trusted Management • Unique identification • Mutual authentication • End-2-End encryption • Secure software & configuration management • Rights & rules management Trusted Platform • Full support of the IoT Platform • Fully integrated • Business process • support • Business logic aligned Secure Element • Hardware-based and tamper resistant storage • Form factor agnostic • Lifecycle management of the Secure Element
  • 12. 12 SENSORS GATEWAY + Secure Element IOT PLATFORM Trusted Ecosystem Driver Insurance Workshop Supplier Fleet Operator INTERFACE EXAMPLE – SECURE FLEET MANAGEMENT
  • 13. 13 ORGANIZATIONS PEOPLE THINGS/COMPONENTS Secure, closed user systems thanks to digital identities for: End-to-end encryption Unambiguous identification Mutual authentication BENEFITS OF A TRUSTED ECOSYSTEM
  • 14. 14 AGENDA • Firma XY Security Is No Question Of Willingness. It’s A Question Of Readiness. Security Is No Question Of Willingness. It’s A Question Of Readiness.
  • 15. exceet Secure Solutions AG Rethelstraße 47 40237 Düsseldorf Germany Björn Peters Head of Segment M2M/IoT Phone: +49 211 436989 35 Email: bjoern.peters@exceet.de Web: www.exceet-secure-solutions.de