SlideShare a Scribd company logo
1 of 37
Download to read offline
SESSION ID:SESSION ID:
#RSAC
Jennifer Minella, CISSP
Expert Mobility: Managing the Wi-Fi
World of Wearables, Sensors and IoT
STR-R11
VP of Engineering
Carolina Advanced Digital, Inc.
www.cadinc.com and www.SecurityUncorked.com
@jjx on Twitter
#RSAC
Expert Mobility: Managing the Wi-Fi World of
Wearables, Sensors and IoT
2
Today’s connected enterprise relies on mobility for everything from
guest services to tracking user behavior. As trends in IoT grow, the
requirements of your network morph to a mobile-first environment
where availability, security and quality are key to delivering reliable
services with appropriate security from today’s threats.
IoT devices and networks have unique needs, often in contradiction to
traditional WLAN endpoints.
The needs are discussed and contrasted in terms of wireless Quality,
Security, and Availability.
#RSAC
Quality – Security – Availability
Trends in Traditional WLANs
A two-minute overview to set the stage
Traditional Wi-Fi needs for quality, security, and
availability are tailored to the current endpoints and
applications.
• Quality:
Bandwidth, Speed, Capacity,
Capability
• Security:
Accessed resources, Access
medium, Users/Devices
• Availability:
Uptime, Coverage, Capacity
#RSAC
Defining IoT
The past, the present, the future, and why IoT will affect every
enterprise in the next three years
IoT has a past, present, and future and it’s more
than just “lots of connected things.”
Things Wi-Fi
connected that
traditionally were
not.
Things Wi-Fi connected
that maybe shouldn’t be.
Our “hold my beer and
watch this” era.
Complex wireless ecosystem with
billions of connected devices,
and machine-to-machine data
sharing and analytics.
Industries and applications for IoT
Other industries using IoT:
Manufacturing
Transportation
Defense
Agriculture & Food Service
Infrastructure
Retail
Logistics
Banks
Utilities and power
Smart Buildings
Hospitality
Healthcare
41%
CAGR-
total IoT
devices
installed
#RSAC
Recursion: Trends and Cycles in
Computing
A brief look at the cyclic nature of technology trends and their
impact on IoT
We’ve Been Here Before…
Heavy -> light -> heavy
(applications, wireless, endpoints)
Centralized -> distributed -> centralized
(computing, clients, intelligence)
Divergent -> converged -> divergent
(RF, medium)
50-year progression to inter-
connectedness
#RSAC
Other Current Tech Trends Affecting IoT
Consumerization
proliferation of connected devices for home, personal use, quantified
self- reflected in commercial applications, monitors, sensors
Smart-things
not only Internet connected but usually machine-to-machine with
peers and central analytics, drives data, cloud, privacy/security
changes
Big data and analytics
IoT will be driving the bulk of data for big data analytics, IoT and big
data will be symbiotic
#RSAC
Lessons from Healthcare
How healthcare can teach us lessons learned and best practices to
prepare for IoT in other industries
Why healthcare is a great
IoT model
Familiar to everyone
Long history of telemetry
Managing critical systems and
mission-critical Wi-Fi
Using sensors and monitors for
decades
Experienced in divergent and
convergent RF
#RSAC
Radio Frequency (RF) 101
Fundaments relevant to understanding wireless needs of IoT and
hyper-connected devices
#RSAC
RF Spectrum and History
#RSAC
RF Spectrum and History
Let’s look
at specific
RF
In years past, we’ve taken RF technologies and tried to CONVERGE them
to 802.11 standards, specifically around the 2.4 band.
Now, with the discrepancies in needs of IoT and enterprise WLANs, we
see the RF DIVERGING again.




RF changes are fundamentally the
MOST DISRUPTIVE
changes in Wi-Fi
to support IoT
• Hardware changes
• Power delivery changes
• Configuration changes
• Monitoring and security changes
#RSAC
Emergent Wireless Technologies
for IoT
What’s on the horizon to address the unique and divergent needs
of RF including 802.11ah (HaLow), 802.11af, and 802.11ad
#RSAC
3 Emergent Wi-Fi Technologies Related to IoT
802.11ah HaLow
for low data rate, long-range sensors and controllers
802.11af White-Fi
for similar applications to 802.11ah, uses unused TV
spectrums instead of 2.4 GHz or 5 GHz bands for
transmission
802.11ad WiGig
for multigigabit speeds and high-performance
networking (not new)
#RSAC
Conceptual View of 802.11 Standards
#RSAC
IoT’s Unique Requirements and Effect
on Quality – Security – Availability
Exploration of why today’s designs for Quality, Security, and
Availability don’t meet tomorrow’s needs for IoT devices
#RSAC
Wireless Quality and IoT Relates to:
Bandwidth
Speed
Capacity
Capability
#RSAC
Wireless Quality and IoT Determines:
Architecture/model such as cloud, cluster, or
controller
AP type, wireless standards supported, and
capability *
AP placement for density and capacity *
Backhaul capacity *
Applications running on wireless *
Planning of shared resources, channels *
Backwards compatibility settings
* = items where IoT needs differ greatly from
current WLAN endpoint needs
#RSAC
Wireless Security and IoT Relates to:
Accessed Resources
Access Medium
Users/Devices
#RSAC
Wireless Security and IoT Determines:
Provisioning process for endpoints *
Wireless authentication methods *
Cryptography selected *
SSID broadcast settings
Traffic paths and AP connections (tunneled,
bridged)
Network segmentation *
Compliance regulations *
Access for guests/unknown users
Tolerance of configuration changes to
endpoints (e.g. FDA, SCADA devices) *
Use of Wireless IPS (WIPS) *
* = items where IoT needs differ greatly from
current WLAN endpoint needs
#RSAC
Wireless Availability and IoT Relates to:
Uptime
Coverage
Capacity
#RSAC
Wireless Availability and IoT Determines:
Channel architecture, SCA vs MCA
Downtime tolerance *
Isolated maintenance requirements *
High availability planning *
Use of Wireless IPS (WIPS) for layer 1 *
Autonomy of APs and system *
Troubleshooting tools, logging, remediation,
SLAs *
Coverage planning *
Standards used, 802.11n, 11ac, Bluetooth *
Channel and power planning and DFS *
* = items where IoT needs differ greatly from
current WLAN endpoint needs
#RSAC
Expert Mobility: IoT Take-Aways
Recap of highlights, IoT disruption in wireless, and key points to
take to your organization for discussion
#RSAC
Your IoT Take-Aways
IoT isn’t just “more connected stuff”.
IoT devices have different fundamental needs from a network perspective.
Many IoT needs are in conflict with traditional wireless endpoint needs, so
prepare for divergent RF.
Regardless of industry,most organizations will be dealing with IoT soon, if not
already.
Successful IoT most likely requires a redesign of wireless, not just an up fit.
Get inter-department resources to collaborate on early planning and help
identify trends in your industry or organization.
#RSAC
Get Ready to Support IoT
Your next steps and eight areas for thinking and planning now
#RSAC
Get Ready to Support IoT
Research & prepare for divergent RF standards in the environment
Expect mass or bulk endpoint deployments
Expect smaller form factors than traditional endpoints
Start rethinking wireless security today
Create a strategy for managing (or at least monitoring) other RF
spectrums
Begin planning wireless networks for endpoints with very different
needs
Budget additional training for staff ***
SESSION ID:SESSION ID:
#RSAC
Jennifer Minella, CISSP
Expert Mobility: Managing the Wi-Fi
World of Wearables, Sensors and IoT
STR-R11
VP of Engineering
Carolina Advanced Digital, Inc.
www.cadinc.com and www.SecurityUncorked.com
@jjx on Twitter

More Related Content

What's hot

Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shahmomoahmedabad
 
M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.Pedro Menendez-Valdes
 
IoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical IssuesIoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical IssuesBugRaptors
 
Watson IoT @Ryerson University - IEEE Chapter
Watson IoT  @Ryerson University - IEEE Chapter  Watson IoT  @Ryerson University - IEEE Chapter
Watson IoT @Ryerson University - IEEE Chapter Markus Van Kempen
 
domain specific iot system
domain specific iot systemdomain specific iot system
domain specific iot systemRadha Mahalle
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Ahmed Mahmoud
 
IoT: Understanding its potential and what makes it tick! by Mark Torr
IoT: Understanding its potential and what makes it tick! by Mark TorrIoT: Understanding its potential and what makes it tick! by Mark Torr
IoT: Understanding its potential and what makes it tick! by Mark TorrBosnia Agile
 
IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
IoT across devices with Windows 10 and Azure IoT Suite by Admir TuzovićIoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
IoT across devices with Windows 10 and Azure IoT Suite by Admir TuzovićBosnia Agile
 
Addressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTAddressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTDr.Vetrivelan Pandu
 
IoT Landscape and its Key Trends in Deployment
IoT Landscape and its Key Trends in DeploymentIoT Landscape and its Key Trends in Deployment
IoT Landscape and its Key Trends in DeploymentVincent Lau
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術ハイシンク創研 / Laboratory of Hi-Think Corporation
 
Keynote - IoT and role of Mediatek in the IoT space
Keynote - IoT and role of Mediatek in the IoT spaceKeynote - IoT and role of Mediatek in the IoT space
Keynote - IoT and role of Mediatek in the IoT spaceDr. Shivananda Koteshwar
 
Track 3 session 5 - st dev con 2016 - microsoft - from sensors to business ...
Track 3   session 5 - st dev con 2016 - microsoft - from sensors to business ...Track 3   session 5 - st dev con 2016 - microsoft - from sensors to business ...
Track 3 session 5 - st dev con 2016 - microsoft - from sensors to business ...ST_World
 
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsWhat Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsBugRaptors
 
Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration davranetworks
 

What's hot (20)

Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shah
 
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George IosifIoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
 
M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.M2M transitioning to IoT opportunity for telcos. Success references.
M2M transitioning to IoT opportunity for telcos. Success references.
 
IoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical IssuesIoT Testing Services- Uncover All Critical Issues
IoT Testing Services- Uncover All Critical Issues
 
Watson IoT @Ryerson University - IEEE Chapter
Watson IoT  @Ryerson University - IEEE Chapter  Watson IoT  @Ryerson University - IEEE Chapter
Watson IoT @Ryerson University - IEEE Chapter
 
domain specific iot system
domain specific iot systemdomain specific iot system
domain specific iot system
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
 
IoT: Understanding its potential and what makes it tick! by Mark Torr
IoT: Understanding its potential and what makes it tick! by Mark TorrIoT: Understanding its potential and what makes it tick! by Mark Torr
IoT: Understanding its potential and what makes it tick! by Mark Torr
 
IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
IoT across devices with Windows 10 and Azure IoT Suite by Admir TuzovićIoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
IoT across devices with Windows 10 and Azure IoT Suite by Admir Tuzović
 
Addressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoTAddressing Global Chanllenges Through IoT
Addressing Global Chanllenges Through IoT
 
IoT Landscape and its Key Trends in Deployment
IoT Landscape and its Key Trends in DeploymentIoT Landscape and its Key Trends in Deployment
IoT Landscape and its Key Trends in Deployment
 
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
社会におけるIoTとセキュリティ、匿名化技術: 産業IoTのサイバーセキュリティ技術
 
Iot how it works
Iot   how it worksIot   how it works
Iot how it works
 
IOT
IOTIOT
IOT
 
Watson IoT - IBM
Watson IoT - IBMWatson IoT - IBM
Watson IoT - IBM
 
Internet of Things (IoT
Internet of Things (IoTInternet of Things (IoT
Internet of Things (IoT
 
Keynote - IoT and role of Mediatek in the IoT space
Keynote - IoT and role of Mediatek in the IoT spaceKeynote - IoT and role of Mediatek in the IoT space
Keynote - IoT and role of Mediatek in the IoT space
 
Track 3 session 5 - st dev con 2016 - microsoft - from sensors to business ...
Track 3   session 5 - st dev con 2016 - microsoft - from sensors to business ...Track 3   session 5 - st dev con 2016 - microsoft - from sensors to business ...
Track 3 session 5 - st dev con 2016 - microsoft - from sensors to business ...
 
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptorsWhat Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
What Is IoT, IoT Testing And What Are Its Challenges | BugRaptors
 
Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration Davra IOT Solution -- Oil & Gas Remote Collaboration
Davra IOT Solution -- Oil & Gas Remote Collaboration
 

Similar to Expert mobility managing wi-fi wearables sensors iot for availability quality security

Cisco dna for mobility introduction
Cisco dna for mobility introductionCisco dna for mobility introduction
Cisco dna for mobility introductionIT Tech
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTMuhammad Ahad
 
Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Dr. Aloknath De
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformationSANDEEP MITTAPALLY
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksAmy Moore
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsPratul Sharma
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaCodeOps Technologies LLP
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide EthernetRockwell Automation
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfAnil
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksAerohive Networks
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enableneelamsanjeevkumar
 
The Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperThe Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperAerohive Networks
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Midhul N
 

Similar to Expert mobility managing wi-fi wearables sensors iot for availability quality security (20)

Cisco dna for mobility introduction
Cisco dna for mobility introductionCisco dna for mobility introduction
Cisco dna for mobility introduction
 
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoTINTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
INTEROPERABILITY, FLEXIBILITY AND INDUSTRIAL DESIGN REQUIREMENTS IN THE IoT
 
Iot
IotIot
Iot
 
Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016Io t a_de_techgigwebinar_04nov2016
Io t a_de_techgigwebinar_04nov2016
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
IOT technology-standards
IOT technology-standardsIOT technology-standards
IOT technology-standards
 
Global IoT Technology and Digital transformation
Global IoT Technology and Digital transformationGlobal IoT Technology and Digital transformation
Global IoT Technology and Digital transformation
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
Key Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systemsKey Open Standards for inter-operable IoT systems
Key Open Standards for inter-operable IoT systems
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
Building Converged Plantwide Ethernet
Building Converged Plantwide EthernetBuilding Converged Plantwide Ethernet
Building Converged Plantwide Ethernet
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networks
 
the connection of iot with lora pan which enable
the connection of iot with lora pan which enablethe connection of iot with lora pan which enable
the connection of iot with lora pan which enable
 
The Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperThe Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White Paper
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Web of things
Web of thingsWeb of things
Web of things
 
8 iot
8 iot8 iot
8 iot
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Recently uploaded (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

Expert mobility managing wi-fi wearables sensors iot for availability quality security

  • 1. SESSION ID:SESSION ID: #RSAC Jennifer Minella, CISSP Expert Mobility: Managing the Wi-Fi World of Wearables, Sensors and IoT STR-R11 VP of Engineering Carolina Advanced Digital, Inc. www.cadinc.com and www.SecurityUncorked.com @jjx on Twitter
  • 2. #RSAC Expert Mobility: Managing the Wi-Fi World of Wearables, Sensors and IoT 2 Today’s connected enterprise relies on mobility for everything from guest services to tracking user behavior. As trends in IoT grow, the requirements of your network morph to a mobile-first environment where availability, security and quality are key to delivering reliable services with appropriate security from today’s threats. IoT devices and networks have unique needs, often in contradiction to traditional WLAN endpoints. The needs are discussed and contrasted in terms of wireless Quality, Security, and Availability.
  • 3. #RSAC Quality – Security – Availability Trends in Traditional WLANs A two-minute overview to set the stage
  • 4. Traditional Wi-Fi needs for quality, security, and availability are tailored to the current endpoints and applications. • Quality: Bandwidth, Speed, Capacity, Capability • Security: Accessed resources, Access medium, Users/Devices • Availability: Uptime, Coverage, Capacity
  • 5. #RSAC Defining IoT The past, the present, the future, and why IoT will affect every enterprise in the next three years
  • 6. IoT has a past, present, and future and it’s more than just “lots of connected things.”
  • 7. Things Wi-Fi connected that traditionally were not. Things Wi-Fi connected that maybe shouldn’t be. Our “hold my beer and watch this” era. Complex wireless ecosystem with billions of connected devices, and machine-to-machine data sharing and analytics.
  • 8. Industries and applications for IoT Other industries using IoT: Manufacturing Transportation Defense Agriculture & Food Service Infrastructure Retail Logistics Banks Utilities and power Smart Buildings Hospitality Healthcare 41% CAGR- total IoT devices installed
  • 9. #RSAC Recursion: Trends and Cycles in Computing A brief look at the cyclic nature of technology trends and their impact on IoT
  • 10. We’ve Been Here Before… Heavy -> light -> heavy (applications, wireless, endpoints) Centralized -> distributed -> centralized (computing, clients, intelligence) Divergent -> converged -> divergent (RF, medium) 50-year progression to inter- connectedness
  • 11. #RSAC Other Current Tech Trends Affecting IoT Consumerization proliferation of connected devices for home, personal use, quantified self- reflected in commercial applications, monitors, sensors Smart-things not only Internet connected but usually machine-to-machine with peers and central analytics, drives data, cloud, privacy/security changes Big data and analytics IoT will be driving the bulk of data for big data analytics, IoT and big data will be symbiotic
  • 12. #RSAC Lessons from Healthcare How healthcare can teach us lessons learned and best practices to prepare for IoT in other industries
  • 13. Why healthcare is a great IoT model Familiar to everyone Long history of telemetry Managing critical systems and mission-critical Wi-Fi Using sensors and monitors for decades Experienced in divergent and convergent RF
  • 14. #RSAC Radio Frequency (RF) 101 Fundaments relevant to understanding wireless needs of IoT and hyper-connected devices
  • 16. #RSAC RF Spectrum and History Let’s look at specific RF
  • 17. In years past, we’ve taken RF technologies and tried to CONVERGE them to 802.11 standards, specifically around the 2.4 band. Now, with the discrepancies in needs of IoT and enterprise WLANs, we see the RF DIVERGING again.    
  • 18.
  • 19.
  • 20. RF changes are fundamentally the MOST DISRUPTIVE changes in Wi-Fi to support IoT • Hardware changes • Power delivery changes • Configuration changes • Monitoring and security changes
  • 21. #RSAC Emergent Wireless Technologies for IoT What’s on the horizon to address the unique and divergent needs of RF including 802.11ah (HaLow), 802.11af, and 802.11ad
  • 22. #RSAC 3 Emergent Wi-Fi Technologies Related to IoT 802.11ah HaLow for low data rate, long-range sensors and controllers 802.11af White-Fi for similar applications to 802.11ah, uses unused TV spectrums instead of 2.4 GHz or 5 GHz bands for transmission 802.11ad WiGig for multigigabit speeds and high-performance networking (not new)
  • 23. #RSAC Conceptual View of 802.11 Standards
  • 24.
  • 25.
  • 26. #RSAC IoT’s Unique Requirements and Effect on Quality – Security – Availability Exploration of why today’s designs for Quality, Security, and Availability don’t meet tomorrow’s needs for IoT devices
  • 27. #RSAC Wireless Quality and IoT Relates to: Bandwidth Speed Capacity Capability
  • 28. #RSAC Wireless Quality and IoT Determines: Architecture/model such as cloud, cluster, or controller AP type, wireless standards supported, and capability * AP placement for density and capacity * Backhaul capacity * Applications running on wireless * Planning of shared resources, channels * Backwards compatibility settings * = items where IoT needs differ greatly from current WLAN endpoint needs
  • 29. #RSAC Wireless Security and IoT Relates to: Accessed Resources Access Medium Users/Devices
  • 30. #RSAC Wireless Security and IoT Determines: Provisioning process for endpoints * Wireless authentication methods * Cryptography selected * SSID broadcast settings Traffic paths and AP connections (tunneled, bridged) Network segmentation * Compliance regulations * Access for guests/unknown users Tolerance of configuration changes to endpoints (e.g. FDA, SCADA devices) * Use of Wireless IPS (WIPS) * * = items where IoT needs differ greatly from current WLAN endpoint needs
  • 31. #RSAC Wireless Availability and IoT Relates to: Uptime Coverage Capacity
  • 32. #RSAC Wireless Availability and IoT Determines: Channel architecture, SCA vs MCA Downtime tolerance * Isolated maintenance requirements * High availability planning * Use of Wireless IPS (WIPS) for layer 1 * Autonomy of APs and system * Troubleshooting tools, logging, remediation, SLAs * Coverage planning * Standards used, 802.11n, 11ac, Bluetooth * Channel and power planning and DFS * * = items where IoT needs differ greatly from current WLAN endpoint needs
  • 33. #RSAC Expert Mobility: IoT Take-Aways Recap of highlights, IoT disruption in wireless, and key points to take to your organization for discussion
  • 34. #RSAC Your IoT Take-Aways IoT isn’t just “more connected stuff”. IoT devices have different fundamental needs from a network perspective. Many IoT needs are in conflict with traditional wireless endpoint needs, so prepare for divergent RF. Regardless of industry,most organizations will be dealing with IoT soon, if not already. Successful IoT most likely requires a redesign of wireless, not just an up fit. Get inter-department resources to collaborate on early planning and help identify trends in your industry or organization.
  • 35. #RSAC Get Ready to Support IoT Your next steps and eight areas for thinking and planning now
  • 36. #RSAC Get Ready to Support IoT Research & prepare for divergent RF standards in the environment Expect mass or bulk endpoint deployments Expect smaller form factors than traditional endpoints Start rethinking wireless security today Create a strategy for managing (or at least monitoring) other RF spectrums Begin planning wireless networks for endpoints with very different needs Budget additional training for staff ***
  • 37. SESSION ID:SESSION ID: #RSAC Jennifer Minella, CISSP Expert Mobility: Managing the Wi-Fi World of Wearables, Sensors and IoT STR-R11 VP of Engineering Carolina Advanced Digital, Inc. www.cadinc.com and www.SecurityUncorked.com @jjx on Twitter