Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

A Smarter, More Secure Internet of Things

3,061 views

Published on

Presented at the Gartner Identity & Access Management Summit, London, Travis Greene discussed the opportunities and challenges of the Internet of Things (IoT), as well as the early indicators of what the IoT world will look like. He also addressed IoT security and privacy, and the critical role that identity will play in the future.

Published in: Internet, Technology
  • ➤➤ How Long Does She Want You to Last? Here's the link to the FREE report ●●● https://tinyurl.com/rockhardxx
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Increase Penis Size - Secrets to Increase Penis Size Revealed. ◆◆◆ https://tinyurl.com/ydaetwbk
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Forget about surgery, pills and weights, they DONT work! This DOES work, but you need to follow the methods contained in the guide. Let's be honest, penis size is an important aspect of any man's life whether they want to admit it or not. The market is flooded with products and solutions that claim to have the answer to making your member bigger, but usually these products fail to deliver. Luckily, I happened to come across what might be the "Holy Grail of Penis Enlargement", it's written by this guy named John Collins and it's called the Penis Enlargement Bible. What I found mind blowing about John's program is that he backs up his claims with actual video proof and testimonials from customers who have used the product. It's said that a picture is worth a thousand words, but I would say most of these videos are worth 3 to 4 inches! Forget extenders, pills, suction devices and surgery. They are either expensive, too painful or they just don't work. The Penis Enlargement Bible is a proven two step program that combines natural over the counter supplements with a specially designed exercise regime to achieve up to 4" of growth within just a few months. If you are serious about getting bigger, check out the Penis Enlargement Bible here ▲▲▲ https://tinyurl.com/ydaetwbk
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • BREAK UP or MAKE UP? The #1 phrase that will make your man come running back, READ MORE NOW... ▲▲▲ http://tinyurl.com/y4b2om2w
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • How to use "The Scrambler" ot get a girl obsessed with BANGING you... ♥♥♥ https://tinyurl.com/unlockherlegss
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

A Smarter, More Secure Internet of Things

  1. 1. A smarter, more secure Internet of Things Travis Greene Identity Solutions Strategist, NetIQ
  2. 2. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.2 Internet of Things
  3. 3. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.3 Internet of Things What “things” and how did we get there? Goldman Sachs, What is the Internet of Things?, September 2014
  4. 4. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.4 Two Critical Components Things People behind the “Things”
  5. 5. The Internet of Things - A Few Examples
  6. 6. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.6
  7. 7. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.7
  8. 8. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.8
  9. 9. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.9
  10. 10. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.10
  11. 11. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.11
  12. 12. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.12
  13. 13. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.13
  14. 14. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.14
  15. 15. The Risk Presented by the Internet of Things
  16. 16. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.16
  17. 17. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.17
  18. 18. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.18 • The Internet of Things will change the way we use and interact with technology. • Devices will constantly monitor and respond both to us and to each other. • We must learn to manage this interaction.
  19. 19. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.19
  20. 20. “Another evolving area of risk lies in physical objects—industrial components, automobiles, home automation products, and consumer devices, to name a few—that are being integrated into the information network, a trend typically referred to as the ‘Internet of Things.’ The interconnection of billions of devices with IT and operational systems will introduce a new world of security risks for businesses, consumers, and governments.” 2014 PwC State of Cybercrime Survey
  21. 21. “The development towards an IoT is likely to give rise to a number of ethical issues and debates in society, many of which have already surfaced in connection with the current Internet and ICT in general, such as loss of trust, violations of privacy, misuse of data, ambiguity of copyright, digital divide, identity theft, problems of control and of access to information and freedom of speech and expression. However, in IoT, many of these problems gain a new dimension in light of the increased complexity.” 2013 European Commission Report on the IoT
  22. 22. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.22 Gartner Hype Cycle
  23. 23. So, how do we do that?
  24. 24. Focus on the identities
  25. 25. Too many users with too much access
  26. 26. Too many users with too much access devices
  27. 27. We can’t leave it to the manufacturers’ plan
  28. 28. We can’t stop attacks, but we can mitigate the damage
  29. 29. Focus on the basics Enforce access controls Monitor user activity Minimize rights
  30. 30. But how do we understand if the activity is appropriate?
  31. 31. 31 The answer is NOT more data • Security teams already have too much data to deal with • New tools and new infrastructures compound the problem
  32. 32. Simply put… There’s too much noise and not enough insight
  33. 33. Security needs context… What access? Access okay? Normal? Where? Who? Identity?
  34. 34. 35 What is the key? Identity
  35. 35. We must adopt identity-centric thinking if we want to have any chance of maintaining control over the world we are building
  36. 36. Identity of Everything
  37. 37. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.38 The Identity of Everything allows the creation of a unique set of attributes • Who or what every connected item or person is • What permissions those objects and people have • What they do with those entitlements • Who granted the permissions • How other people and devices may interact
  38. 38. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.39 • Google Nest, a home automation hub • Collects data from other appliances & sensors • But there is a homeowner identity behind it that Google wants to market to • And that owner will have relationships to many other things The Identity of Everything will be both Hierarchical and Matrixed
  39. 39. © 2014 NetIQ Corporation. All rights reserved.40 NetIQ provides a unique combination of Identity, Access and Security solutions that will scale to address the future demands on identity
  40. 40. © 2015 NetIQ Corporation and its affiliates. All Rights Reserved.41 Actions for Today, Tomorrow, Next Year • Understand the identity stores you already have • Examine how identity information is used in your organization • Look for ways to integrate identity context into your product design to protect data collected by IoT sensors • Start to build a framework to handle more sophisticated, aggregate identity, that can scale • Work towards an extensible identity framework that will encompass people, products, devices and services
  41. 41. +1 713.548.1700 (Worldwide) 888.323.6768 (Toll-free) info@netiq.com NetIQ.com Worldwide Headquarters 515 Post Oak Blvd., Suite 1200 Houston, TX 77027 USA www.netiq.com/communities
  42. 42. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. NetIQ Corporation may make improvements in or changes to the software described in this document at any time. Copyright © 2015 NetIQ Corporation. All rights reserved. ActiveAudit, ActiveView, Aegis, AppManager, Change Administrator, Change Guardian, Compliance Suite, the cube logo design, Directory and Resource Administrator, Directory Security Administrator, Domain Migration Administrator, Exchange Administrator, File Security Administrator, Group Policy Administrator, Group Policy Guardian, Group Policy Suite, IntelliPolicy, Knowledge Scripts, NetConnect, NetIQ, the NetIQ logo, PSAudit, PSDetect, PSPasswordManager, PSSecure, Secure Configuration Manager, Security Administration Suite, Security Manager, Server Consolidator, VigilEnt, and Vivinet are trademarks or registered trademarks of NetIQ Corporation or its subsidiaries in the United States and other countries.

×