Successfully reported this slideshow.
Your SlideShare is downloading. ×

Andy thurai iot security

Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Ad
Upcoming SlideShare
IoT - Internet of Things
IoT - Internet of Things
Loading in …3
×

Check these out next

1 of 19 Ad

More Related Content

Slideshows for you (20)

Viewers also liked (17)

Advertisement

Similar to Andy thurai iot security (20)

More from MassTLC (20)

Advertisement

Andy thurai iot security

  1. 1. IoT Security Andy Thurai/ (@andythurai) SaneIoT.com "Bringing sanity to the IoT/API chaos"
  2. 2. "Smaht" Things...Ya Baby! We will Internet ("IP") enable our sensitive devices and call them "Wicked Smaht"
  3. 3. IoT infestation... Photo courtsety Intel SmartTraffic, SmartCity, SmartGrid, SmartHome, SmartToilet,SmartEnergy .....SmarterPlanet
  4. 4. IoT in the news lately...
  5. 5. Are you worried?
  6. 6. Pure Numbers • Billions of devices. – Currently we are about 10 B devices* – Expected to grow to 50 B devices in 2020* • Trillions of dollars. – Revenue by IoT is expected to be $9 T** – That doesn't include the monetization of the data that these IoTs help collect * Cisco estimation ** IDC estimation - Cisco estimation is $19 T
  7. 7. Data Economy Data is the new commodity
  8. 8. End to End Data Economy • Data need to be collected (IoT, Devices, Sensors) • Data need to be securely transported • Data needs to be sanitized • Data needs to be processed (Big Data) • Data needs to be stored • Data needs to be exposed (API) • Actionable results from Data (Analytics)
  9. 9. Pain or Gain? • Monetization attack - Gain – Disrupt the supply chain – Disrupt the food/water supply chain – Disrupt the manufacturing chain • Cause disruption and Chaos - Pain – (Cyber) terrorism
  10. 10. Maginot Line
  11. 11. Strategy or Execution?
  12. 12. Smart Energy/ Smart Grid
  13. 13. Control Freak!!! photo courtesy of rtcmagazine
  14. 14. Stuxnet
  15. 15. So what now? • With Billions of devices end point protection is not easy. • Доверяй, но проверяй doveryai no proveryai (russian) - Trust, but Verify. • Dont trust always verify.
  16. 16. Defense in Depth
  17. 17. Advise • Design with failure and vulnerability in mind • Data quality matters, not just quantity. • Clean, Trusted data should be weighted more. • Digitally sign device firmware. • Dont run anything from untrusted source, especially firmware updates. • New generation of nano scanners. • Vouch for data integrity.
  18. 18. Different planes
  19. 19. IoT Security Andy Thurai/ (@andythurai) SaneIoT.com "Bringing sanity to the IoT/API chaos"

×