SlideShare a Scribd company logo
Internet of Things
Security of Things?
Agenda
What is this all about?
Who am I?
Different views
Now what?
IoT, what is it about?
Grid of (inter)connected data sources and sinks
Ubiquitous (even pervasive?)
Monitoring most (or all?) aspects of your daily
live
Who am I?
Interested in info sec, technology and
organisation
Trainer for PECB (ISO27001, 27005, 31000)
Concerned citizen with respect to privacy (also
for the next generation)
arthur@itsx.com
Managing expectations
This webinar contains some opinions and
personal views that are meant to trigger your
own questions and considerations.
There is a lot of information available on the
Internet on the technology of IoT, but
technology is just a very small part of ‘the
problem’.
Managing expectations
IoT challenges are present on more fundamental
levels:
Data ownership, trust, responsible actions etc…
Managing expectations
This is not a presentation on how great
Internet of Things is!
Internet of Things
Philosophical view
Internet of Things
Nowadays anything can generate data:
Internet of Things
And one man’s data is a company’s information!
Information has value, it provides insights and
can be used for profiling and predictive
modelling
Internet of Things
Expected value in 2020 of Internet of Things
Remember, this is the estimated value of the
information, not the actual devices…
Internet of Things
You should wonder:
Are you the user or the product?
Internet of Things
Technological view
Internet of Things
Sensors (environment, location, health etc)
Connectivity (bluetooth, wifi, WAN)
Storage (Big Data)
Cloud
Control (remote and local)
Internet of Things
Internet of Things
Lot’s of devices (estimation: > 20 billion in 2020)
Embedded technology
IPv6 (large address space)
Devices can be stationary and/or mobile
(wearable)
Internet of Things
How secure are communications?
How secure is the embedded software?
How about patches and updates?
What about the CIA triangle?
What about accountability?
Internet of Things
How do devices authenticate?
How are devices authorised?
What do devices log and for how long?
Internet of Things
Do devices monitor more than advertised?
Who can can control the devices?
(smart TV’s listening to conversations in your living
room)
Internet of Things
Technological threats and risks are no different
from the ones we currently know and see.
Due to the vast amount of devices and data,
(large scale) breaches are inevitable!
Prevention is an illusion, (responsible) reaction
often the only option.
Internet of Things
How would you even detect a breach on an IoT
device?
Does your fridge suddenly order 10 kegs of beer?
Internet of Things
Data / information view
Internet of Things
20 billion IoT devices generate a LOT of data!
Thus: Big Data
Internet of Things
Fundamental question:
Who own this data?
The data source(s)?
The data sink(s)?
Other parties?
Internet of Things
Additional complications:
Privacy laws are national, IoT is global
How to enforce these laws?
What exactly are personal data?
Internet of Things
Example: difference between US and EU:
“Under EU law, personal data can be collected only under strict conditions and
for a legitimate purpose. The main component of the EU data protection law
is the Data Protection Directive 1995/46/EC.
In the US, there is no all-encompassing law regulating the collection and
processing of personal data. Instead, data protection is regulated by many
state and federal laws.”
Source: http://resources.infosecinstitute.com/differences-privacy-laws-in-eu-
and-us/
Internet of Things
Data vs metadata
“In a sufficiently large data set, metadata
becomes more valuable than actual data” (me)
Internet of Things
IoT metadata:
Locations (especially sequences)
Timing (frequency, duration)
Proximity to other IoT devices
Collection of device types
Internet of Things
IoT metadata patterns allow for easy
identification of people, their preferences and
living situation.
Internet of Things
It is surprising how small a sample needs to be
to uniquely identify a person.
For more information (OPSEC intelligence):
The Grugq
http://grugq.github.io/
Internet of Things
Wrapping up…
IoT offers a lot of new and exciting opportunities
Big value and big data
Privacy will be an issue
Infosec will be an issue
What is the price you are willing to pay?

More Related Content

What's hot

Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
Tonex
 
Iot Market Readiness
Iot Market ReadinessIot Market Readiness
Iot Market Readiness
Murali Munagapati
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
Anh-Dung LE
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscapeSamir SEHIL
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
Amjat Shaikh
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
Tauseef Naquishbandi
 
Internet of Things Iot presentation with module
Internet of Things Iot presentation with moduleInternet of Things Iot presentation with module
Internet of Things Iot presentation with module
Isp university Multan
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptx
LamisaFaria
 
Presentation on Internet of Things
Presentation on Internet of ThingsPresentation on Internet of Things
Presentation on Internet of Things
Pranay Prabhat
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
university of education,Lahore
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018
Mario Drobics
 
Internet of Things IoT
Internet of Things IoTInternet of Things IoT
Internet of Things IoT
FURQAN M LODHI
 
Technical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT SystemsTechnical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT Systems
Emil Kirilov
 
TQL - an IoT application platform
TQL - an IoT application platformTQL - an IoT application platform
TQL - an IoT application platform
Jane Ren
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
Startup Europe IoT Accelerator
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
YogeshIJTSRD
 
Internet of things
Internet of things Internet of things
Internet of things
RachadESSOURI
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
Dennis Jacob
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)
FabMinds
 

What's hot (20)

Internet of Things ( IoT ) Training
Internet of Things ( IoT ) TrainingInternet of Things ( IoT ) Training
Internet of Things ( IoT ) Training
 
Iot Market Readiness
Iot Market ReadinessIot Market Readiness
Iot Market Readiness
 
IoT Introduction
IoT IntroductionIoT Introduction
IoT Introduction
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Smart city landscape
Smart city landscapeSmart city landscape
Smart city landscape
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
SMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  OpportunitiesSMART HEALTH AND Internet of Things (IoT) 	-  RESEARCH  Opportunities
SMART HEALTH AND Internet of Things (IoT) - RESEARCH Opportunities
 
Internet of Things Iot presentation with module
Internet of Things Iot presentation with moduleInternet of Things Iot presentation with module
Internet of Things Iot presentation with module
 
The internet of things.pptx
The internet of things.pptxThe internet of things.pptx
The internet of things.pptx
 
Presentation on Internet of Things
Presentation on Internet of ThingsPresentation on Internet of Things
Presentation on Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018IoT Trends in Industrial IoT for 2018
IoT Trends in Industrial IoT for 2018
 
Internet of Things IoT
Internet of Things IoTInternet of Things IoT
Internet of Things IoT
 
Technical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT SystemsTechnical Challenges - How To Design IoT Systems
Technical Challenges - How To Design IoT Systems
 
TQL - an IoT application platform
TQL - an IoT application platformTQL - an IoT application platform
TQL - an IoT application platform
 
Internet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for futureInternet of Things: Trends and challenges for future
Internet of Things: Trends and challenges for future
 
Internet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything ConnectivityInternet of Things IoT Anytime Anywhere Anything Connectivity
Internet of Things IoT Anytime Anywhere Anything Connectivity
 
Internet of things
Internet of things Internet of things
Internet of things
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)Overview of IoT (JNTUK - UNIT 1)
Overview of IoT (JNTUK - UNIT 1)
 

Similar to PECB Webinar: The Internet of Things

The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The Internet
Michelle Singh
 
IOT- information Technology
IOT- information Technology IOT- information Technology
IOT- information Technology
khushi pokharna
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
ImXaib
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar ppt
Nishant Kayal
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
Jayanth Vinay
 
Iot - Internet of Things
Iot - Internet of ThingsIot - Internet of Things
Iot - Internet of Things
KIET Group of Institutions, Ghaziabad
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
Gaurav Sumer Singh
 
Iot
IotIot
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
AnkitThakkar46
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
shashankvaidyar2
 
IoT and Big Data internet of thingd .pdf
IoT and Big Data internet of thingd .pdfIoT and Big Data internet of thingd .pdf
IoT and Big Data internet of thingd .pdf
NileshChocha1
 
IOT DEVENDRA SHRIVASH.pptx
IOT DEVENDRA SHRIVASH.pptxIOT DEVENDRA SHRIVASH.pptx
IOT DEVENDRA SHRIVASH.pptx
DEVENDRA SHRIVASH
 
(IoT) Internet of Things, The Ultimate Guide
(IoT) Internet of Things, The Ultimate Guide(IoT) Internet of Things, The Ultimate Guide
(IoT) Internet of Things, The Ultimate Guide
RR IT Zone
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
cetabac
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
Sampath737246
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
ssuser2cc0d4
 
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Anil
 
L1-Intro-IoT.pptx
L1-Intro-IoT.pptxL1-Intro-IoT.pptx
L1-Intro-IoT.pptx
jayakumar703719
 

Similar to PECB Webinar: The Internet of Things (20)

The Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The InternetThe Internet Of Things ( Iot And The Internet
The Internet Of Things ( Iot And The Internet
 
IOT- information Technology
IOT- information Technology IOT- information Technology
IOT- information Technology
 
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdfInternet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
Internet of Things (IoT) - Hafedh Alyahmadi - May 29, 2015.pdf
 
Internet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar pptInternet of Things (IoT) - Seminar ppt
Internet of Things (IoT) - Seminar ppt
 
The future of IoT paper
The future of IoT paperThe future of IoT paper
The future of IoT paper
 
Iot - Internet of Things
Iot - Internet of ThingsIot - Internet of Things
Iot - Internet of Things
 
IoT Intro.pptx
IoT Intro.pptxIoT Intro.pptx
IoT Intro.pptx
 
Iot
IotIot
Iot
 
The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy The internet of things (io t) : IoT academy
The internet of things (io t) : IoT academy
 
The internet of things (io t)
The internet of things (io t)The internet of things (io t)
The internet of things (io t)
 
IoT and Big Data internet of thingd .pdf
IoT and Big Data internet of thingd .pdfIoT and Big Data internet of thingd .pdf
IoT and Big Data internet of thingd .pdf
 
IOT DEVENDRA SHRIVASH.pptx
IOT DEVENDRA SHRIVASH.pptxIOT DEVENDRA SHRIVASH.pptx
IOT DEVENDRA SHRIVASH.pptx
 
Future of Internet.pptx
Future of Internet.pptxFuture of Internet.pptx
Future of Internet.pptx
 
(IoT) Internet of Things, The Ultimate Guide
(IoT) Internet of Things, The Ultimate Guide(IoT) Internet of Things, The Ultimate Guide
(IoT) Internet of Things, The Ultimate Guide
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
IoT and Big Data.pptx
IoT and Big Data.pptxIoT and Big Data.pptx
IoT and Big Data.pptx
 
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
Analyzing IoT’s significance when combined with Big Data Analytics, AI, Edge ...
 
L1-Intro-IoT.pptx
L1-Intro-IoT.pptxL1-Intro-IoT.pptx
L1-Intro-IoT.pptx
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 

More from PECB

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
PECB
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
PECB
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
PECB
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
PECB
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
PECB
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
PECB
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
PECB
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
PECB
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
PECB
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
PECB
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
PECB
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
PECB
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
PECB
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
PECB
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
PECB
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
PECB
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

More from PECB (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of CybersecurityDORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
DORA, ISO/IEC 27005, and the Rise of AI: Securing the Future of Cybersecurity
 
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI GovernanceSecuring the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
Securing the Future: ISO/IEC 27001, ISO/IEC 42001, and AI Governance
 
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
ISO/IEC 27032, ISO/IEC 27002, and CMMC Frameworks - Achieving Cybersecurity M...
 
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
ISO/IEC 27001 and ISO/IEC 27035: Building a Resilient Cybersecurity Strategy ...
 
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks EffectivelyISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
ISO/IEC 27001 and ISO/IEC 27005: Managing AI Risks Effectively
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital TransformationISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
ISO/IEC 27001 and ISO/IEC 27032:2023 - Safeguarding Your Digital Transformation
 
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulationsManaging ISO 31000 Framework in AI Systems - The EU ACT and other regulations
Managing ISO 31000 Framework in AI Systems - The EU ACT and other regulations
 
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
Impact of Generative AI in Cybersecurity - How can ISO/IEC 27032 help?
 
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
GDPR and Data Protection: Ensure compliance and minimize the risk of penaltie...
 
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
How Can ISO/IEC 27001 Help Organizations Align With the EU Cybersecurity Regu...
 
Student Information Session University KTMC
Student Information Session University KTMC Student Information Session University KTMC
Student Information Session University KTMC
 
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
ISO/IEC 27001 and ISO 22301 - How to ensure business survival against cyber a...
 
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
Integrating ISO/IEC 27001 and ISO 31000 for Effective Information Security an...
 
Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA Student Information Session University CREST ADVISORY AFRICA
Student Information Session University CREST ADVISORY AFRICA
 
IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?IT Governance and Information Security – How do they map?
IT Governance and Information Security – How do they map?
 
Information Session University Egybyte.pptx
Information Session University Egybyte.pptxInformation Session University Egybyte.pptx
Information Session University Egybyte.pptx
 
Student Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptxStudent Information Session University Digital Encode.pptx
Student Information Session University Digital Encode.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 

Recently uploaded

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 

Recently uploaded (20)

The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 

PECB Webinar: The Internet of Things

  • 2. Agenda What is this all about? Who am I? Different views Now what?
  • 3. IoT, what is it about? Grid of (inter)connected data sources and sinks Ubiquitous (even pervasive?) Monitoring most (or all?) aspects of your daily live
  • 4. Who am I? Interested in info sec, technology and organisation Trainer for PECB (ISO27001, 27005, 31000) Concerned citizen with respect to privacy (also for the next generation) arthur@itsx.com
  • 5. Managing expectations This webinar contains some opinions and personal views that are meant to trigger your own questions and considerations. There is a lot of information available on the Internet on the technology of IoT, but technology is just a very small part of ‘the problem’.
  • 6. Managing expectations IoT challenges are present on more fundamental levels: Data ownership, trust, responsible actions etc…
  • 7. Managing expectations This is not a presentation on how great Internet of Things is!
  • 9. Internet of Things Nowadays anything can generate data:
  • 10. Internet of Things And one man’s data is a company’s information! Information has value, it provides insights and can be used for profiling and predictive modelling
  • 11. Internet of Things Expected value in 2020 of Internet of Things Remember, this is the estimated value of the information, not the actual devices…
  • 12. Internet of Things You should wonder: Are you the user or the product?
  • 14. Internet of Things Sensors (environment, location, health etc) Connectivity (bluetooth, wifi, WAN) Storage (Big Data) Cloud Control (remote and local)
  • 16. Internet of Things Lot’s of devices (estimation: > 20 billion in 2020) Embedded technology IPv6 (large address space) Devices can be stationary and/or mobile (wearable)
  • 17. Internet of Things How secure are communications? How secure is the embedded software? How about patches and updates? What about the CIA triangle? What about accountability?
  • 18. Internet of Things How do devices authenticate? How are devices authorised? What do devices log and for how long?
  • 19. Internet of Things Do devices monitor more than advertised? Who can can control the devices? (smart TV’s listening to conversations in your living room)
  • 20. Internet of Things Technological threats and risks are no different from the ones we currently know and see. Due to the vast amount of devices and data, (large scale) breaches are inevitable! Prevention is an illusion, (responsible) reaction often the only option.
  • 21. Internet of Things How would you even detect a breach on an IoT device? Does your fridge suddenly order 10 kegs of beer?
  • 22. Internet of Things Data / information view
  • 23. Internet of Things 20 billion IoT devices generate a LOT of data! Thus: Big Data
  • 24. Internet of Things Fundamental question: Who own this data? The data source(s)? The data sink(s)? Other parties?
  • 25. Internet of Things Additional complications: Privacy laws are national, IoT is global How to enforce these laws? What exactly are personal data?
  • 26. Internet of Things Example: difference between US and EU: “Under EU law, personal data can be collected only under strict conditions and for a legitimate purpose. The main component of the EU data protection law is the Data Protection Directive 1995/46/EC. In the US, there is no all-encompassing law regulating the collection and processing of personal data. Instead, data protection is regulated by many state and federal laws.” Source: http://resources.infosecinstitute.com/differences-privacy-laws-in-eu- and-us/
  • 27. Internet of Things Data vs metadata “In a sufficiently large data set, metadata becomes more valuable than actual data” (me)
  • 28. Internet of Things IoT metadata: Locations (especially sequences) Timing (frequency, duration) Proximity to other IoT devices Collection of device types
  • 29. Internet of Things IoT metadata patterns allow for easy identification of people, their preferences and living situation.
  • 30. Internet of Things It is surprising how small a sample needs to be to uniquely identify a person. For more information (OPSEC intelligence): The Grugq http://grugq.github.io/
  • 31. Internet of Things Wrapping up… IoT offers a lot of new and exciting opportunities Big value and big data Privacy will be an issue Infosec will be an issue What is the price you are willing to pay?