Today’s Growing IoT Problem:
Embedded Software Security
This presentation consists of highlights from an
interview with: Peter Thorne, Director of Cambashi
PETER THORNE INTERVIEW HIGHLIGHTS:
Peter Thorne
Director of Cambashi
Introducing Special Guest:
Peter Thorne is director at Cambashi, a Cambridge, England-based independent industry analyst firm.
Peter’s research focuses on the business needs of engineering and manufacturing organizations, and
the way these needs are addressed by information and communications technology. His client
assignments include strategic, forecasting, and segmentation projects including the role of industry
networks; tools and processes for product development and introduction; and focused analysis of the
market for systems engineering and embedded software development tools. Peter has applied
information technology to engineering and manufacturing enterprises for more than 30 years, holding
development, marketing and management positions with both user and vendor organizations.
1
• The worldwide market for embedded security software is forecasted to rise
to $2.95 billion by 2019 at a growth rate of 17.9%. (source: VDC Research)
Click to read the interview or call 888.310.4540 to learn more
State of IoT Security Market
1
• The worldwide market for embedded security software is forecasted to rise
to $2.95 billion by 2019 at a growth rate of 17.9%. (source: VDC Research)
• More than 50 percent of consumers and 90 percent of developers are
skeptical about IoT security. (source: Auth0)
Click to read the interview or call 888.310.4540 to learn more
State of IoT Security Market
1
• The worldwide market for embedded security software is forecasted to rise
to $2.95 billion by 2019 at a growth rate of 17.9%. (source: VDC Research)
• More than 50 percent of consumers and 90 percent of developers are
skeptical about IoT security. (source: Auth0)
• Software engineers recently ranked embedded software security high in
importance. (source: VDC Research)
Click to read the interview or call 888.310.4540 to learn more
State of IoT Security Market
1
• The worldwide market for embedded security software is forecasted to rise
to $2.95 billion by 2019 at a growth rate of 17.9%. (source: VDC Research)
• More than 50 percent of consumers and 90 percent of developers are
skeptical about IoT security. (source: Auth0)
• Software engineers recently ranked embedded software security high in
importance. (source: VDC Research)
• 90% of developers do not believe IoT devices on the market currently
have the necessary security in place. (source: Auth0)
Click to read the interview or call 888.310.4540 to learn more
State of IoT Security Market
2
• To better understand this growing issue of embedded software security,
you must first look at the growth of the interconnection of everything.
Today, we want all our things connected.
Click to read the interview or call 888.310.4540 to learn more
Reasons for IoT Security Issues
2
• To better understand this growing issue of embedded software security,
you must first look at the growth of the interconnection of everything.
Today, we want all our things connected.
• To add this connectivity feature into products, manufacturers must work
with third-party components which is extremely hard work.
Click to read the interview or call 888.310.4540 to learn more
Reasons for IoT Security Issues
2
• To better understand this growing issue of embedded software security,
you must first look at the growth of the interconnection of everything.
Today, we want all our things connected.
• To add this connectivity feature into products, manufacturers must work
with third-party components which is extremely hard work.
• Virtually all vulnerabilities emerge at the interface boundaries between
the code written by these different organizations.
Click to read the interview or call 888.310.4540 to learn more
Reasons for IoT Security Issues
2
• To better understand this growing issue of embedded software security,
you must first look at the growth of the interconnection of everything.
Today, we want all our things connected.
• To add this connectivity feature into products, manufacturers must work
with third-party components which is extremely hard work.
• Virtually all vulnerabilities emerge at the interface boundaries between
the code written by these different organizations.
• These vulnerabilities have little to do with using an interface in a product
correctly and more to due with incorrect usage.
Click to read the interview or call 888.310.4540 to learn more
Reasons for IoT Security Issues
2
• To better understand this growing issue of embedded software security,
you must first look at the growth of the interconnection of everything.
Today, we want all our things connected.
• To add this connectivity feature into products, manufacturers must work
with third-party components which is extremely hard work.
• Virtually all vulnerabilities emerge at the interface boundaries between
the code written by these different organizations.
• These vulnerabilities have little to do with using an interface in a product
correctly and more to due with incorrect usage.
• This makes software development exponentially harder for engineers
because they now must test how NOT to use a product.
Click to read the interview or call 888.310.4540 to learn more
Reasons for IoT Security Issues
3
• Foster a culture of prioritizing security higher in the planning and
development process.
Click to read the interview or call 888.310.4540 to learn more
Resolving IoT Security Issues
3
• Foster a culture of prioritizing security higher in the planning and
development process.
• Stay current on security issues and hacking methods that malicious
coders will exploit.
Click to read the interview or call 888.310.4540 to learn more
Resolving IoT Security Issues
3
• Foster a culture of prioritizing security higher in the planning and
development process.
• Stay current on security issues and hacking methods that malicious
coders will exploit.
• Formalize a plan into your development process that questions what
happens when an interface that you are providing is used incorrectly.
Click to read the interview or call 888.310.4540 to learn more
Resolving IoT Security Issues
3
• Foster a culture of prioritizing security higher in the planning and
development process.
• Stay current on security issues and hacking methods that malicious
coders will exploit.
• Formalize a plan into your development process that questions what
happens when an interface that you are providing is used incorrectly.
• Focus on taking incremental steps to solving security problems and we’ll
get there one day.
Click to read the interview or call 888.310.4540 to learn more
Resolving IoT Security Issues
Join the Conversation:
@spkaa
To read the full interview visit:
http://www.spkaa.com/IoTsecurity

Today's Growing IoT Problem: Embedded Software Security

  • 1.
    Today’s Growing IoTProblem: Embedded Software Security This presentation consists of highlights from an interview with: Peter Thorne, Director of Cambashi PETER THORNE INTERVIEW HIGHLIGHTS:
  • 2.
    Peter Thorne Director ofCambashi Introducing Special Guest: Peter Thorne is director at Cambashi, a Cambridge, England-based independent industry analyst firm. Peter’s research focuses on the business needs of engineering and manufacturing organizations, and the way these needs are addressed by information and communications technology. His client assignments include strategic, forecasting, and segmentation projects including the role of industry networks; tools and processes for product development and introduction; and focused analysis of the market for systems engineering and embedded software development tools. Peter has applied information technology to engineering and manufacturing enterprises for more than 30 years, holding development, marketing and management positions with both user and vendor organizations.
  • 3.
    1 • The worldwidemarket for embedded security software is forecasted to rise to $2.95 billion by 2019 at a growth rate of 17.9%. (source: VDC Research) Click to read the interview or call 888.310.4540 to learn more State of IoT Security Market
  • 4.
    1 • The worldwidemarket for embedded security software is forecasted to rise to $2.95 billion by 2019 at a growth rate of 17.9%. (source: VDC Research) • More than 50 percent of consumers and 90 percent of developers are skeptical about IoT security. (source: Auth0) Click to read the interview or call 888.310.4540 to learn more State of IoT Security Market
  • 5.
    1 • The worldwidemarket for embedded security software is forecasted to rise to $2.95 billion by 2019 at a growth rate of 17.9%. (source: VDC Research) • More than 50 percent of consumers and 90 percent of developers are skeptical about IoT security. (source: Auth0) • Software engineers recently ranked embedded software security high in importance. (source: VDC Research) Click to read the interview or call 888.310.4540 to learn more State of IoT Security Market
  • 6.
    1 • The worldwidemarket for embedded security software is forecasted to rise to $2.95 billion by 2019 at a growth rate of 17.9%. (source: VDC Research) • More than 50 percent of consumers and 90 percent of developers are skeptical about IoT security. (source: Auth0) • Software engineers recently ranked embedded software security high in importance. (source: VDC Research) • 90% of developers do not believe IoT devices on the market currently have the necessary security in place. (source: Auth0) Click to read the interview or call 888.310.4540 to learn more State of IoT Security Market
  • 7.
    2 • To betterunderstand this growing issue of embedded software security, you must first look at the growth of the interconnection of everything. Today, we want all our things connected. Click to read the interview or call 888.310.4540 to learn more Reasons for IoT Security Issues
  • 8.
    2 • To betterunderstand this growing issue of embedded software security, you must first look at the growth of the interconnection of everything. Today, we want all our things connected. • To add this connectivity feature into products, manufacturers must work with third-party components which is extremely hard work. Click to read the interview or call 888.310.4540 to learn more Reasons for IoT Security Issues
  • 9.
    2 • To betterunderstand this growing issue of embedded software security, you must first look at the growth of the interconnection of everything. Today, we want all our things connected. • To add this connectivity feature into products, manufacturers must work with third-party components which is extremely hard work. • Virtually all vulnerabilities emerge at the interface boundaries between the code written by these different organizations. Click to read the interview or call 888.310.4540 to learn more Reasons for IoT Security Issues
  • 10.
    2 • To betterunderstand this growing issue of embedded software security, you must first look at the growth of the interconnection of everything. Today, we want all our things connected. • To add this connectivity feature into products, manufacturers must work with third-party components which is extremely hard work. • Virtually all vulnerabilities emerge at the interface boundaries between the code written by these different organizations. • These vulnerabilities have little to do with using an interface in a product correctly and more to due with incorrect usage. Click to read the interview or call 888.310.4540 to learn more Reasons for IoT Security Issues
  • 11.
    2 • To betterunderstand this growing issue of embedded software security, you must first look at the growth of the interconnection of everything. Today, we want all our things connected. • To add this connectivity feature into products, manufacturers must work with third-party components which is extremely hard work. • Virtually all vulnerabilities emerge at the interface boundaries between the code written by these different organizations. • These vulnerabilities have little to do with using an interface in a product correctly and more to due with incorrect usage. • This makes software development exponentially harder for engineers because they now must test how NOT to use a product. Click to read the interview or call 888.310.4540 to learn more Reasons for IoT Security Issues
  • 12.
    3 • Foster aculture of prioritizing security higher in the planning and development process. Click to read the interview or call 888.310.4540 to learn more Resolving IoT Security Issues
  • 13.
    3 • Foster aculture of prioritizing security higher in the planning and development process. • Stay current on security issues and hacking methods that malicious coders will exploit. Click to read the interview or call 888.310.4540 to learn more Resolving IoT Security Issues
  • 14.
    3 • Foster aculture of prioritizing security higher in the planning and development process. • Stay current on security issues and hacking methods that malicious coders will exploit. • Formalize a plan into your development process that questions what happens when an interface that you are providing is used incorrectly. Click to read the interview or call 888.310.4540 to learn more Resolving IoT Security Issues
  • 15.
    3 • Foster aculture of prioritizing security higher in the planning and development process. • Stay current on security issues and hacking methods that malicious coders will exploit. • Formalize a plan into your development process that questions what happens when an interface that you are providing is used incorrectly. • Focus on taking incremental steps to solving security problems and we’ll get there one day. Click to read the interview or call 888.310.4540 to learn more Resolving IoT Security Issues
  • 16.
    Join the Conversation: @spkaa Toread the full interview visit: http://www.spkaa.com/IoTsecurity