SlideShare a Scribd company logo
Boosting IoT protection:
An enterprise risk
imperative
Christian Beckner
Senior Director, Retail
Technology
National Retail Federation
Moderator
Neil Lakomiak
Business Development Director
Underwriters Laboratories Inc.
Steve Welk
Senior Director, Loss
Prevention
Barnes & Noble College
Bookstores Inc.
Bernell Zorn
Manager of Program
Management
Nordstrom
2
The Problem
*Source: WhiteHat Security 2018 Application Security Statistics Report
Nearly 70% of every application is comprised of reusable software components, resulting in
“inherited vulnerabilities”
85% of mobile apps violated one or more of the OWASP Mobile Top 10.
As more organizations embrace agile DevOps processes, more applications are being
released faster than ever.
The quicker applications are released, particularly those that
are comprised of reusable components, the faster more vulnerabilities are introduced.
Software development is as much about developing new code as it is embedding third-party
components and leveraging existing APIs.
3
The Risks
• Cybersecurity
• Interoperability
• Performance
• Privacy
• Safety
4
*Source: WhiteHat Security 2018 Application Security Statistics Report
5
How an Attack Works
RISK
THREAT
OPPORTUNITY VULNERABILITY
Nation States
Professional Activity
Hobbyists
Insiders/Employees
Inadequate Security Attributes
Hard Coded Passwords
Improper Installation
Poorly Written Code
Building
Access Control
Control Center Control
The Attacker:
A Flaw:
The Asset to be
Appropriated:
6
UL 2900 Scope
1 Scope
1.1 This standard applies to network-connectable products that shall be
evaluated and tested for vulnerabilities, software weaknesses, and malware.
1.2 This standard describes:
a) Requirements regarding the vendor's risk
management process for their product.
b) Methods by which a product shall be
evaluated and tested for the presence of
vulnerabilities, software weaknesses, and
malware.
c) Requirements regarding the presence of
security risk controls in the architecture and
design of a product.
7
UL 2900 Contents
INTRODUCTION
1. Scope
2. Normative References
3. Glossary
DOCUMENTATION OF PRODUCT, PRODUCT
DESIGN AND PRODUCT USE
4. Product Documentation
5. Product Design Documentation
6. Documentation for Product Use
RISK CONTROLS & RISK MANAGEMENT
7. General
8. Access Control, User Authentication and
User Authorization
9. Remote Communication
10. Cryptography
11. Product Management
12. Vendor Product Risk Management Process
VULNERABILITIES AND EXPLOITS
13. Known Vulnerability Testing
14. Malware Testing
15. Malformed Input Testing (Fuzz Testing)
16. Structured Penetration Testing
SOFTWARE WEAKNESSES
17. Software Weakness Analysis
18. Static Source Code Analysis
19. Static Binary and Byte Code Analysis
APPENDICES
A1. Sources for Software Weaknesses
B1. Requirements for Secure Mechanisms for
Storing Sensitive Data and Personally
Identifiable Data
C1. Requirements for Security Functions
8
Physical Security & Life Safety Industry Landscape
Who’s Accountable?
Everyone & No One
9
Physical Security & Life Safety Industry Landscape
Who’s Accountable?
Vendors
• Cybersecurity is a significant investment – how will costs be offset – are customers willing
to pay higher prices?
• How are you managing cyber risk, while using open source code?
• Vendors don’t control the whole ecosystem in which their products are deployed. Where
does accountability start and stop?
• What do vendors have to lose?: Brand reputation, credibility, financial loss from potential
recalls/penalties, C-level positions.
• What do vendors have to gain?: differentiation, brand value, risk mitigation, avoid being
forced by overly-burdensome regulation, ability to benefit from emerging business models
10
Physical Security & Life Safety Industry Landscape
Who’s Accountable?
Resellers/Integrators
• Need to seek out, understand, be educated on cybersecurity and
responsible to the end-user
• Avoid integrating/selling technology that has not been vetted
11
Physical Security & Life Safety Industry Landscape
Who’s Accountable?
End User
• Needs to be educated
• Know what questions to ask of vendors and integrators
• Be prepared to pay for cybersecurity
• Develop and follow a robust security maintenance process
12
Some Questions Integrators, Installers, End-Users
Should be Asking About IoT Security:
1.) Are penetration tests performed by a third party? How often? Most recent?
2.) Is a formal security program in place? How is security addressed as part of the
product development lifecycle?
3.) How is access control, authentication and authorization handled?
4.) How is data protected at rest and in transit?
5.) Are there suggested prevention measures for the end-user? What are the
expectations of the integrator and end-user for security?
6.) What is your process for addressing discovered vulnerabilities?
Boosting IoT Protection: An Enterprise Risk Imperative

More Related Content

What's hot

OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
TecsyntSolutions
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
Shawn Tuma
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
Ronnie Isherwood
 
OWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-DiveOWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-Dive
Prathan Phongthiproek
 
Owasp Mobile Top 10 – 2014
Owasp Mobile Top 10 – 2014Owasp Mobile Top 10 – 2014
Owasp Mobile Top 10 – 2014
n|u - The Open Security Community
 
OWASP Top 10 for Mobile
OWASP Top 10 for MobileOWASP Top 10 for Mobile
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008
Jim Geovedi
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
OWASP Delhi
 
InfoSec Deep Learning in Action
InfoSec Deep Learning in ActionInfoSec Deep Learning in Action
InfoSec Deep Learning in Action
Satnam Singh
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Sirius
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
Priyanka Aash
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
Lumension
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
SISA Information Security Pvt.Ltd
 
Owasp mobile top 10
Owasp mobile top 10Owasp mobile top 10
Owasp mobile top 10
Pawel Rzepa
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
Asif Iqbal
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Knowledge Group
 
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile Environment
Hamilton Turner
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 Risks
Santosh Satam
 

What's hot (20)

OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
 
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
#CyberAvengers - Artificial Intelligence in the Legal and Regulatory Realm
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
OWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-DiveOWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-Dive
 
Owasp Mobile Top 10 – 2014
Owasp Mobile Top 10 – 2014Owasp Mobile Top 10 – 2014
Owasp Mobile Top 10 – 2014
 
OWASP Top 10 for Mobile
OWASP Top 10 for MobileOWASP Top 10 for Mobile
OWASP Top 10 for Mobile
 
Hacking Cracking 2008
Hacking Cracking 2008Hacking Cracking 2008
Hacking Cracking 2008
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
 
InfoSec Deep Learning in Action
InfoSec Deep Learning in ActionInfoSec Deep Learning in Action
InfoSec Deep Learning in Action
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results2014 BYOD and Mobile Security Survey Preliminary Results
2014 BYOD and Mobile Security Survey Preliminary Results
 
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & MobileNew trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
 
Owasp mobile top 10
Owasp mobile top 10Owasp mobile top 10
Owasp mobile top 10
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
Cybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile EnvironmentCybersecurity Risks In the Mobile Environment
Cybersecurity Risks In the Mobile Environment
 
Mobile Threats and Owasp Top 10 Risks
Mobile Threats  and Owasp Top 10 RisksMobile Threats  and Owasp Top 10 Risks
Mobile Threats and Owasp Top 10 Risks
 

Similar to Boosting IoT Protection: An Enterprise Risk Imperative

Developing Secure Apps
Developing Secure AppsDeveloping Secure Apps
Developing Secure Apps
Livares Technologies Pvt Ltd
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
YoisRoberthTapiadeLa
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
Arun Prabhakar
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare ☁
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
Rochester Security Summit
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
Jim Kaplan CIA CFE
 
PIRATEs of the Software Supply Chain.pdf
PIRATEs of the Software Supply Chain.pdfPIRATEs of the Software Supply Chain.pdf
PIRATEs of the Software Supply Chain.pdf
TAURUSEER
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
London School of Cyber Security
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
tmbainjr131
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
EC-Council
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
Skycure
 
Discuss Best Practices for Integrating Security Measures into Mobile App Deve...
Discuss Best Practices for Integrating Security Measures into Mobile App Deve...Discuss Best Practices for Integrating Security Measures into Mobile App Deve...
Discuss Best Practices for Integrating Security Measures into Mobile App Deve...
IPH Technologies
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
PECB
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
baoyin
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
Tim Youm
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
Michael Hidalgo
 

Similar to Boosting IoT Protection: An Enterprise Risk Imperative (20)

Developing Secure Apps
Developing Secure AppsDeveloping Secure Apps
Developing Secure Apps
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
 
PIRATEs of the Software Supply Chain.pdf
PIRATEs of the Software Supply Chain.pdfPIRATEs of the Software Supply Chain.pdf
PIRATEs of the Software Supply Chain.pdf
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020Why You'll Care More About Mobile Security in 2020
Why You'll Care More About Mobile Security in 2020
 
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
Why	You’ll Care More About Mobile Security in 2020 - Tom BainWhy	You’ll Care More About Mobile Security in 2020 - Tom Bain
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
 
How Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile DevicesHow Healthcare CISOs Can Secure Mobile Devices
How Healthcare CISOs Can Secure Mobile Devices
 
Discuss Best Practices for Integrating Security Measures into Mobile App Deve...
Discuss Best Practices for Integrating Security Measures into Mobile App Deve...Discuss Best Practices for Integrating Security Measures into Mobile App Deve...
Discuss Best Practices for Integrating Security Measures into Mobile App Deve...
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
六合彩香港-六合彩
六合彩香港-六合彩六合彩香港-六合彩
六合彩香港-六合彩
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
 
Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...Application Security Testing for Software Engineers: An approach to build sof...
Application Security Testing for Software Engineers: An approach to build sof...
 

More from National Retail Federation

Conversational digital humans: The future of retail?
Conversational digital humans: The future of retail?Conversational digital humans: The future of retail?
Conversational digital humans: The future of retail?
National Retail Federation
 
Drive enhanced customer experiences with the power of data
Drive enhanced customer experiences with the power of dataDrive enhanced customer experiences with the power of data
Drive enhanced customer experiences with the power of data
National Retail Federation
 
Driving optimal decision-making in fresh grocery
Driving optimal decision-making in fresh groceryDriving optimal decision-making in fresh grocery
Driving optimal decision-making in fresh grocery
National Retail Federation
 
Five Guys and Flybuy - Challenges, innovations, and what's next
Five Guys and Flybuy - Challenges, innovations, and what's nextFive Guys and Flybuy - Challenges, innovations, and what's next
Five Guys and Flybuy - Challenges, innovations, and what's next
National Retail Federation
 
Thermal intelligence - Advancing food safety and profitability for retailers
Thermal intelligence - Advancing food safety and profitability for retailersThermal intelligence - Advancing food safety and profitability for retailers
Thermal intelligence - Advancing food safety and profitability for retailers
National Retail Federation
 
NRF 2023 Back-to-Class Consumer Trends
NRF 2023 Back-to-Class Consumer TrendsNRF 2023 Back-to-Class Consumer Trends
NRF 2023 Back-to-Class Consumer Trends
National Retail Federation
 
Unlocking the power of in-session marketing to convert the anonymous
Unlocking the power of in-session marketing to convert the anonymousUnlocking the power of in-session marketing to convert the anonymous
Unlocking the power of in-session marketing to convert the anonymous
National Retail Federation
 
Navigating uncertainty: The art and science of learning and doing 10x in a te...
Navigating uncertainty: The art and science of learning and doing 10x in a te...Navigating uncertainty: The art and science of learning and doing 10x in a te...
Navigating uncertainty: The art and science of learning and doing 10x in a te...
National Retail Federation
 
Building deeper empathy for your customers in uncertain times and beyond
Building deeper empathy for your customers in uncertain times and beyondBuilding deeper empathy for your customers in uncertain times and beyond
Building deeper empathy for your customers in uncertain times and beyond
National Retail Federation
 
The state of commerce: Key trends and future predictions
The state of commerce: Key trends and future predictionsThe state of commerce: Key trends and future predictions
The state of commerce: Key trends and future predictions
National Retail Federation
 
Redefining intelligence: Exploring the latest advances in next-generation AI ...
Redefining intelligence: Exploring the latest advances in next-generation AI ...Redefining intelligence: Exploring the latest advances in next-generation AI ...
Redefining intelligence: Exploring the latest advances in next-generation AI ...
National Retail Federation
 
Top global consumer trends for retailers in 2023
Top global consumer trends for retailers in 2023Top global consumer trends for retailers in 2023
Top global consumer trends for retailers in 2023
National Retail Federation
 
Data-driven site selection: How understanding consumer movement drives Little...
Data-driven site selection: How understanding consumer movement drives Little...Data-driven site selection: How understanding consumer movement drives Little...
Data-driven site selection: How understanding consumer movement drives Little...
National Retail Federation
 
Can resale increase foot traffic in stores?
Can resale increase foot traffic in stores?Can resale increase foot traffic in stores?
Can resale increase foot traffic in stores?
National Retail Federation
 
Demystifying data: Profitability, people and the power of analytics
Demystifying data: Profitability, people and the power of analyticsDemystifying data: Profitability, people and the power of analytics
Demystifying data: Profitability, people and the power of analytics
National Retail Federation
 
Five reasons automation will save your restaurant
Five reasons automation will save your restaurantFive reasons automation will save your restaurant
Five reasons automation will save your restaurant
National Retail Federation
 
Retail Media Networks: How the physical store will power their next phase of ...
Retail Media Networks: How the physical store will power their next phase of ...Retail Media Networks: How the physical store will power their next phase of ...
Retail Media Networks: How the physical store will power their next phase of ...
National Retail Federation
 
Working together to combat organized retail crime
Working together to combat organized retail crimeWorking together to combat organized retail crime
Working together to combat organized retail crime
National Retail Federation
 
Voice in retail: It speaks, it listens, it’s impacting our real world businesses
Voice in retail: It speaks, it listens, it’s impacting our real world businessesVoice in retail: It speaks, it listens, it’s impacting our real world businesses
Voice in retail: It speaks, it listens, it’s impacting our real world businesses
National Retail Federation
 
A look ahead to 2023: Impasse or opportunity for a new path
A look ahead to 2023: Impasse or opportunity for a new pathA look ahead to 2023: Impasse or opportunity for a new path
A look ahead to 2023: Impasse or opportunity for a new path
National Retail Federation
 

More from National Retail Federation (20)

Conversational digital humans: The future of retail?
Conversational digital humans: The future of retail?Conversational digital humans: The future of retail?
Conversational digital humans: The future of retail?
 
Drive enhanced customer experiences with the power of data
Drive enhanced customer experiences with the power of dataDrive enhanced customer experiences with the power of data
Drive enhanced customer experiences with the power of data
 
Driving optimal decision-making in fresh grocery
Driving optimal decision-making in fresh groceryDriving optimal decision-making in fresh grocery
Driving optimal decision-making in fresh grocery
 
Five Guys and Flybuy - Challenges, innovations, and what's next
Five Guys and Flybuy - Challenges, innovations, and what's nextFive Guys and Flybuy - Challenges, innovations, and what's next
Five Guys and Flybuy - Challenges, innovations, and what's next
 
Thermal intelligence - Advancing food safety and profitability for retailers
Thermal intelligence - Advancing food safety and profitability for retailersThermal intelligence - Advancing food safety and profitability for retailers
Thermal intelligence - Advancing food safety and profitability for retailers
 
NRF 2023 Back-to-Class Consumer Trends
NRF 2023 Back-to-Class Consumer TrendsNRF 2023 Back-to-Class Consumer Trends
NRF 2023 Back-to-Class Consumer Trends
 
Unlocking the power of in-session marketing to convert the anonymous
Unlocking the power of in-session marketing to convert the anonymousUnlocking the power of in-session marketing to convert the anonymous
Unlocking the power of in-session marketing to convert the anonymous
 
Navigating uncertainty: The art and science of learning and doing 10x in a te...
Navigating uncertainty: The art and science of learning and doing 10x in a te...Navigating uncertainty: The art and science of learning and doing 10x in a te...
Navigating uncertainty: The art and science of learning and doing 10x in a te...
 
Building deeper empathy for your customers in uncertain times and beyond
Building deeper empathy for your customers in uncertain times and beyondBuilding deeper empathy for your customers in uncertain times and beyond
Building deeper empathy for your customers in uncertain times and beyond
 
The state of commerce: Key trends and future predictions
The state of commerce: Key trends and future predictionsThe state of commerce: Key trends and future predictions
The state of commerce: Key trends and future predictions
 
Redefining intelligence: Exploring the latest advances in next-generation AI ...
Redefining intelligence: Exploring the latest advances in next-generation AI ...Redefining intelligence: Exploring the latest advances in next-generation AI ...
Redefining intelligence: Exploring the latest advances in next-generation AI ...
 
Top global consumer trends for retailers in 2023
Top global consumer trends for retailers in 2023Top global consumer trends for retailers in 2023
Top global consumer trends for retailers in 2023
 
Data-driven site selection: How understanding consumer movement drives Little...
Data-driven site selection: How understanding consumer movement drives Little...Data-driven site selection: How understanding consumer movement drives Little...
Data-driven site selection: How understanding consumer movement drives Little...
 
Can resale increase foot traffic in stores?
Can resale increase foot traffic in stores?Can resale increase foot traffic in stores?
Can resale increase foot traffic in stores?
 
Demystifying data: Profitability, people and the power of analytics
Demystifying data: Profitability, people and the power of analyticsDemystifying data: Profitability, people and the power of analytics
Demystifying data: Profitability, people and the power of analytics
 
Five reasons automation will save your restaurant
Five reasons automation will save your restaurantFive reasons automation will save your restaurant
Five reasons automation will save your restaurant
 
Retail Media Networks: How the physical store will power their next phase of ...
Retail Media Networks: How the physical store will power their next phase of ...Retail Media Networks: How the physical store will power their next phase of ...
Retail Media Networks: How the physical store will power their next phase of ...
 
Working together to combat organized retail crime
Working together to combat organized retail crimeWorking together to combat organized retail crime
Working together to combat organized retail crime
 
Voice in retail: It speaks, it listens, it’s impacting our real world businesses
Voice in retail: It speaks, it listens, it’s impacting our real world businessesVoice in retail: It speaks, it listens, it’s impacting our real world businesses
Voice in retail: It speaks, it listens, it’s impacting our real world businesses
 
A look ahead to 2023: Impasse or opportunity for a new path
A look ahead to 2023: Impasse or opportunity for a new pathA look ahead to 2023: Impasse or opportunity for a new path
A look ahead to 2023: Impasse or opportunity for a new path
 

Recently uploaded

原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样
原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样
原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样
w6zyq7uj
 
Social Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdf
Social Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdfSocial Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdf
Social Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdf
Jasper Colin
 
怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样
怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样
怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样
w6zyq7uj
 
Supermarket Floral Ad Roundup- Week 22 2024.pdf
Supermarket Floral Ad Roundup- Week 22 2024.pdfSupermarket Floral Ad Roundup- Week 22 2024.pdf
Supermarket Floral Ad Roundup- Week 22 2024.pdf
KarliNelson4
 
快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样
快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样
快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样
aezncfe
 
Introducing Bliss Point by Tinuiti Webinar
Introducing Bliss Point by Tinuiti WebinarIntroducing Bliss Point by Tinuiti Webinar
Introducing Bliss Point by Tinuiti Webinar
Tinuiti
 
A Guide to Planting and Caring for Your Land
A Guide to Planting and Caring for Your LandA Guide to Planting and Caring for Your Land
A Guide to Planting and Caring for Your Land
The Green Corner
 
Supermarket Floral Ad Roundup- Week 23 2024.pdf
Supermarket Floral Ad Roundup- Week 23  2024.pdfSupermarket Floral Ad Roundup- Week 23  2024.pdf
Supermarket Floral Ad Roundup- Week 23 2024.pdf
KarliNelson4
 

Recently uploaded (8)

原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样
原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样
原版复制澳洲莫纳什大学毕业证硕士学历原版一模一样
 
Social Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdf
Social Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdfSocial Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdf
Social Media is Eating Retail- The $Trillion Trend You Can't Ignore.pdf
 
怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样
怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样
怎么购买澳洲南十字星大学毕业证文凭毕业证原版一模一样
 
Supermarket Floral Ad Roundup- Week 22 2024.pdf
Supermarket Floral Ad Roundup- Week 22 2024.pdfSupermarket Floral Ad Roundup- Week 22 2024.pdf
Supermarket Floral Ad Roundup- Week 22 2024.pdf
 
快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样
快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样
快速办理(BC毕业证书)波士顿学院毕业证PDF成绩单一模一样
 
Introducing Bliss Point by Tinuiti Webinar
Introducing Bliss Point by Tinuiti WebinarIntroducing Bliss Point by Tinuiti Webinar
Introducing Bliss Point by Tinuiti Webinar
 
A Guide to Planting and Caring for Your Land
A Guide to Planting and Caring for Your LandA Guide to Planting and Caring for Your Land
A Guide to Planting and Caring for Your Land
 
Supermarket Floral Ad Roundup- Week 23 2024.pdf
Supermarket Floral Ad Roundup- Week 23  2024.pdfSupermarket Floral Ad Roundup- Week 23  2024.pdf
Supermarket Floral Ad Roundup- Week 23 2024.pdf
 

Boosting IoT Protection: An Enterprise Risk Imperative

  • 1. Boosting IoT protection: An enterprise risk imperative Christian Beckner Senior Director, Retail Technology National Retail Federation Moderator Neil Lakomiak Business Development Director Underwriters Laboratories Inc. Steve Welk Senior Director, Loss Prevention Barnes & Noble College Bookstores Inc. Bernell Zorn Manager of Program Management Nordstrom
  • 2. 2 The Problem *Source: WhiteHat Security 2018 Application Security Statistics Report Nearly 70% of every application is comprised of reusable software components, resulting in “inherited vulnerabilities” 85% of mobile apps violated one or more of the OWASP Mobile Top 10. As more organizations embrace agile DevOps processes, more applications are being released faster than ever. The quicker applications are released, particularly those that are comprised of reusable components, the faster more vulnerabilities are introduced. Software development is as much about developing new code as it is embedding third-party components and leveraging existing APIs.
  • 3. 3 The Risks • Cybersecurity • Interoperability • Performance • Privacy • Safety
  • 4. 4 *Source: WhiteHat Security 2018 Application Security Statistics Report
  • 5. 5 How an Attack Works RISK THREAT OPPORTUNITY VULNERABILITY Nation States Professional Activity Hobbyists Insiders/Employees Inadequate Security Attributes Hard Coded Passwords Improper Installation Poorly Written Code Building Access Control Control Center Control The Attacker: A Flaw: The Asset to be Appropriated:
  • 6. 6 UL 2900 Scope 1 Scope 1.1 This standard applies to network-connectable products that shall be evaluated and tested for vulnerabilities, software weaknesses, and malware. 1.2 This standard describes: a) Requirements regarding the vendor's risk management process for their product. b) Methods by which a product shall be evaluated and tested for the presence of vulnerabilities, software weaknesses, and malware. c) Requirements regarding the presence of security risk controls in the architecture and design of a product.
  • 7. 7 UL 2900 Contents INTRODUCTION 1. Scope 2. Normative References 3. Glossary DOCUMENTATION OF PRODUCT, PRODUCT DESIGN AND PRODUCT USE 4. Product Documentation 5. Product Design Documentation 6. Documentation for Product Use RISK CONTROLS & RISK MANAGEMENT 7. General 8. Access Control, User Authentication and User Authorization 9. Remote Communication 10. Cryptography 11. Product Management 12. Vendor Product Risk Management Process VULNERABILITIES AND EXPLOITS 13. Known Vulnerability Testing 14. Malware Testing 15. Malformed Input Testing (Fuzz Testing) 16. Structured Penetration Testing SOFTWARE WEAKNESSES 17. Software Weakness Analysis 18. Static Source Code Analysis 19. Static Binary and Byte Code Analysis APPENDICES A1. Sources for Software Weaknesses B1. Requirements for Secure Mechanisms for Storing Sensitive Data and Personally Identifiable Data C1. Requirements for Security Functions
  • 8. 8 Physical Security & Life Safety Industry Landscape Who’s Accountable? Everyone & No One
  • 9. 9 Physical Security & Life Safety Industry Landscape Who’s Accountable? Vendors • Cybersecurity is a significant investment – how will costs be offset – are customers willing to pay higher prices? • How are you managing cyber risk, while using open source code? • Vendors don’t control the whole ecosystem in which their products are deployed. Where does accountability start and stop? • What do vendors have to lose?: Brand reputation, credibility, financial loss from potential recalls/penalties, C-level positions. • What do vendors have to gain?: differentiation, brand value, risk mitigation, avoid being forced by overly-burdensome regulation, ability to benefit from emerging business models
  • 10. 10 Physical Security & Life Safety Industry Landscape Who’s Accountable? Resellers/Integrators • Need to seek out, understand, be educated on cybersecurity and responsible to the end-user • Avoid integrating/selling technology that has not been vetted
  • 11. 11 Physical Security & Life Safety Industry Landscape Who’s Accountable? End User • Needs to be educated • Know what questions to ask of vendors and integrators • Be prepared to pay for cybersecurity • Develop and follow a robust security maintenance process
  • 12. 12 Some Questions Integrators, Installers, End-Users Should be Asking About IoT Security: 1.) Are penetration tests performed by a third party? How often? Most recent? 2.) Is a formal security program in place? How is security addressed as part of the product development lifecycle? 3.) How is access control, authentication and authorization handled? 4.) How is data protected at rest and in transit? 5.) Are there suggested prevention measures for the end-user? What are the expectations of the integrator and end-user for security? 6.) What is your process for addressing discovered vulnerabilities?