SlideShare a Scribd company logo
Internet of Things
It-sikkerhed 2014
Copenhagen
5-6. February 2014
Agenda
1.  Introduction
2.  Protecting the PC
3.  Cloud security
4.  Internet of things
5.  New security risks 
6.  Openness and transparency
7.  Legal responses
8.  Conclusions
9.  Debate
Page 2
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
1. Introduction
●  Martin von Haller Grønbæk
•  Partner, Bird & Bird
•  Bird & Bird – only international law
firm in Denmark
•  Leading law firm on Cyber- and
network security
•  Former member of Danish IT
Security Council
•  "Open source advocate"
Page 3
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
2. PC as the node in the network
●  PC revolution brought “power to the people”
●  And to businesses and government – small
and large
●  Rise of the general purpose computer
●  Open for attack
●  Defence of the home front
●  Internet and the network effects
●  PC as the attacked and tool for the attacker

Page 4
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
2. The birth of the IT Security
industry
● 
● 
● 
● 
● 
● 
● 
● 
● 

Critical mass market
Large number of new customers
Large losses looming
Loss of data and downtime
Inconvenience and lost productivity
(and big corporate monetary losses)
Malware
Spam
Date theft

Page 5
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
2. “Thou Shall Protect Thyself”
●  Self-protection
●  Liability rests with the PC-user
●  Hardware and software comes with no
warranties
●  No legal protection
●  Little market for “safe IT” among consumers
●  Large market for add-on IT security software
●  Large numbers of small payments makes big
profits
●  Many small and large providers
Page 6
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
3. New market conditions
● 
● 
● 
● 
● 
● 
● 
● 

Cloud computing!
No more local applications
Computing takes places in the cloud
Less asymmetric information
Much fewer customers
Dramatic shift in bargaining power
And technical challenges!
Goodbye, many small and large IT-security
firms

Page 7
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
3. Is the cloud more “secure”?
● 
● 
● 
● 
● 
● 
● 

Fewer amateurs and more professionals
Very specialized cloud service providers
Cloud as “the fog”
An “oligopoly” of Clouds
User has even less bargaining power
Very little control of data
Very little contractual and legal protection

Page 8
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
4. Internet of Things
● 
● 
● 
● 
● 
● 
● 

Not everything is moving into the Cloud
Moore Law
Mobile devices
Quantified self
Health, Energy, Automotive etc.
Nano
Gartner: $1.9 trillion to the global economy
by 2020
●  Nest acquired for $3.2 billion in cash

Page 9
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
4. The “true” Internet
● 
● 
● 
● 
● 
● 
● 

The Internet today is asymmetric
More download, less upload
New medium for broadcasting
The Internet is decentralized by nature
Read/Write
Social media: Blogs before Facebook
Mesh or Grid computing

Page 10
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
4. Towards the “real” Internet?
● 
● 
● 
● 
● 
● 
● 
● 
● 

Free software vs. cloud computing
(Cloud is based on open source software)
Plug servers
Every device = a server = a node = equal
Cloud computing backlash
New computing models
Peer2Peer data and processor sharing
Mesh or Grid computing
Innovation!

Page 11
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
5. Before Cloud computing
revisited
● 
● 
● 
● 
● 
● 
● 
● 
● 

Computing moves from cloud to devices
Devicesn
Processing Powern
Internet enabled
Always on
AI or Autonomous
Remotely accessed and controlled
Who’s the user?
Self-protection?

Page 12
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
5. Same but bigger security risks
● 
● 
● 
● 
● 
● 
● 
● 
● 

Bigger threats than PC
Obvious network effects
Inconvenience and lost productivity?
Critical functions: Health, Auto etc.
No checks on AI and automatic functions
Life and death
Systemic risks
DDoS attacks
“To Big to Fail”

Page 13
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
5. Unsecure today!
● 
● 
● 
● 
● 
● 
● 
● 
● 

Starting point: Very unsecure
Devices are shamelessly unpatched
No standards
Little press attention
Before tipping point
But it’ll come!
Industry initiatives
AllSeen, OpenDaylight
Open Auto Alliance, Genivi

Page 14
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
6. Open and transparent
● 
● 
● 
● 
● 
● 
● 
● 
● 

Most devices run on open source software
“Closed” is not an option
One platform: Linux
Less diversity
Economies of scale for malware
Open access promotes discovery
Open use lower barriers of entry for fixes
Huge user advantages from open platforms
Closed options where appropriate

Page 15
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
7. Legislation
● 
● 
● 
● 
● 
● 
● 
● 
● 

Starting point: No legislation
Industry standards
Contractual demands
Open source security services
Industry and device specific legislation
Heath care
Transportation
Privacy
Service provider, not “technology”

Page 16
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
7. Liability
● 
● 
● 
● 
● 
● 
● 
● 
● 
● 

Who assume the risk of loss?
Who is the better at prevention?
Consumer?
Reversed burden of proof
Strict liability
Who should liable? Vendor, producer, provider?
Don’t kill innovation!
More disclosure of insecurity and breach
Standards of “Good IoT IT security practices”
Strict liability of certain types of devises

Page 17
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
7. Conclusions
●  The IT security industry as we know it will change
dramatically
●  Cloud computed will see a backlash
●  Internet of Things will increase number of Internet
connected computers
●  Old type security threats will re-emerge with a
vengeance
●  Solutions will be based on open source software
●  Maybe new legislation on disclosure and strict liability
for certain devices
●  Invest your money in new IT security start-ups with
IoT solutions!
Page 18
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
8. Questions
●  And maybe some answers…

Page 19
© Bird & Bird LLP 2014

Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
Thank You
Martin von Haller Grønbæk
Mobile: +45 40 73 19 14
Email: Martin.vonhaller@twobirds.com
Bird & Bird is an international legal practice comprising Bird & Bird LLP and its affiliated and associated businesses.
Bird & Bird LLP is a limited liability partnership, registered in England and Wales with registered number OC340318 and is authorised and regulated by the
Solicitors Regulation Authority. Its registered office and principal place of business is at 15 Fetter Lane, London EC4A 1JP. A list of members of Bird & Bird LLP and
of any non-members who are designated as partners, and of their respective professional qualifications, is open to inspection at that address.
twobirds.com

More Related Content

What's hot

Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
IoT Tunisia
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
Bill Harpley
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
Anchises Moraes
 
Neotel
Neotel Neotel
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
Yokogawa1
 
What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?
Digital Transformation EXPO Event Series
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your Devices
Peter Waher
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
blogzilla
 
Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016
Bob Radvanovsky
 
Cl16 wit io_t
Cl16 wit io_tCl16 wit io_t
Cl16 wit io_t
Shubha Govil
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides
Francisco Maroto
 
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
3G4G
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greenebmcmenemy
 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial Things
Senrio
 
Industry 4.0 and the Industrial Internet of Things (IIoT) - e+h june 2018 ...
Industry 4.0 and the Industrial Internet of Things (IIoT) -  e+h june 2018   ...Industry 4.0 and the Industrial Internet of Things (IIoT) -  e+h june 2018   ...
Industry 4.0 and the Industrial Internet of Things (IIoT) - e+h june 2018 ...
PROFIBUS and PROFINET InternationaI - PI UK
 
Attack and Defence in Mobile Apps
Attack and Defence in Mobile AppsAttack and Defence in Mobile Apps
Attack and Defence in Mobile Apps
David Johansson
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention Approaches
CipherCloud
 
Internet of manufacturing and Open Source
Internet of manufacturing and Open SourceInternet of manufacturing and Open Source
Internet of manufacturing and Open Source
Ian Skerrett
 
Rapid Prototyping for IoT
Rapid Prototyping for IoT Rapid Prototyping for IoT
Rapid Prototyping for IoT
M2M Alliance e.V.
 

What's hot (20)

Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
Neotel
Neotel Neotel
Neotel
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?
 
Smart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your DevicesSmart City Lab 6 - Decision Support for your Devices
Smart City Lab 6 - Decision Support for your Devices
 
Privacy by design
Privacy by designPrivacy by design
Privacy by design
 
Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016Ics2016 scidmark-27oct2016
Ics2016 scidmark-27oct2016
 
Cl16 wit io_t
Cl16 wit io_tCl16 wit io_t
Cl16 wit io_t
 
Internet of Things in 10 slides
Internet of Things in 10 slides Internet of Things in 10 slides
Internet of Things in 10 slides
 
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
Scenarios for Smart Devices in 2025: Brave New Smartphone and/or Black Mirror?
 
CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101CipherCloud Webinar - Cloud Encryption & Tokenization 101
CipherCloud Webinar - Cloud Encryption & Tokenization 101
 
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greeneA smarter, more secure io t  gartner iam summit uk 2015 - netiq - travis greene
A smarter, more secure io t gartner iam summit uk 2015 - netiq - travis greene
 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial Things
 
Industry 4.0 and the Industrial Internet of Things (IIoT) - e+h june 2018 ...
Industry 4.0 and the Industrial Internet of Things (IIoT) -  e+h june 2018   ...Industry 4.0 and the Industrial Internet of Things (IIoT) -  e+h june 2018   ...
Industry 4.0 and the Industrial Internet of Things (IIoT) - e+h june 2018 ...
 
Attack and Defence in Mobile Apps
Attack and Defence in Mobile AppsAttack and Defence in Mobile Apps
Attack and Defence in Mobile Apps
 
Cloud Visibility & Cloud Data Loss Prevention Approaches
 Cloud Visibility & Cloud Data Loss Prevention Approaches Cloud Visibility & Cloud Data Loss Prevention Approaches
Cloud Visibility & Cloud Data Loss Prevention Approaches
 
Internet of manufacturing and Open Source
Internet of manufacturing and Open SourceInternet of manufacturing and Open Source
Internet of manufacturing and Open Source
 
Rapid Prototyping for IoT
Rapid Prototyping for IoT Rapid Prototyping for IoT
Rapid Prototyping for IoT
 

Similar to Internet of Things and new security challenges for the IT industry

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
Liwei Ren任力偉
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
gogo6
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)Gerardo Pardo-Castellote
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
Hildebrand Technology
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
HildebrandTech
 
Ignite 2015 - IoT Security and Privacy
Ignite 2015 - IoT Security and PrivacyIgnite 2015 - IoT Security and Privacy
Ignite 2015 - IoT Security and Privacy
joshuacooper
 
IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022
The Digital Insurer
 
How does a Modern Integration Platform Innovate
How does a Modern Integration Platform InnovateHow does a Modern Integration Platform Innovate
How does a Modern Integration Platform Innovate
SEEBURGER
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
HP Enterprise Italia
 
IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022
The Digital Insurer
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
Bessie Wang
 
Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Bessie Wang
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
ForgeRock
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
FIDO Alliance
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud Native Day Tel Aviv
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
Sridhar Karnam
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
Michael Lew
 
Cloudera for Internet of Things
Cloudera for Internet of ThingsCloudera for Internet of Things
Cloudera for Internet of Things
Cloudera, Inc.
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
Christian Milde
 
Debunking IoT Security Myths
Debunking IoT Security MythsDebunking IoT Security Myths
Debunking IoT Security Myths
cumulocity
 

Similar to Internet of Things and new security challenges for the IT industry (20)

IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
The IoT Food Chain – Picking the Right Dining Partner is Important with Dean ...
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Ignite 2015 - IoT Security and Privacy
Ignite 2015 - IoT Security and PrivacyIgnite 2015 - IoT Security and Privacy
Ignite 2015 - IoT Security and Privacy
 
IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022
 
How does a Modern Integration Platform Innovate
How does a Modern Integration Platform InnovateHow does a Modern Integration Platform Innovate
How does a Modern Integration Platform Innovate
 
Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022IntellectEU - InsurTech Innovation Award 2022
IntellectEU - InsurTech Innovation Award 2022
 
IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014IoT World Forum Press Conference - 10.14.2014
IoT World Forum Press Conference - 10.14.2014
 
Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15Wed Sponsor Press Conf - 10.15
Wed Sponsor Press Conf - 10.15
 
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at ScaleDigital Identities in the Internet of Things - Securely Manage Devices at Scale
Digital Identities in the Internet of Things - Securely Manage Devices at Scale
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
 
Top 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integrationTop 10 tips for effective SOC/NOC collaboration or integration
Top 10 tips for effective SOC/NOC collaboration or integration
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
Cloudera for Internet of Things
Cloudera for Internet of ThingsCloudera for Internet of Things
Cloudera for Internet of Things
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Debunking IoT Security Myths
Debunking IoT Security MythsDebunking IoT Security Myths
Debunking IoT Security Myths
 

More from Martin von Haller Groenbaek

Joomladay 2014 - Open source licenses
Joomladay 2014 - Open source licensesJoomladay 2014 - Open source licenses
Joomladay 2014 - Open source licenses
Martin von Haller Groenbaek
 
Sophienberg 2012 (20 04-2012)
Sophienberg 2012 (20 04-2012) Sophienberg 2012 (20 04-2012)
Sophienberg 2012 (20 04-2012)
Martin von Haller Groenbaek
 
Sophienberg 2012 (19 04-2012)
Sophienberg 2012 (19 04-2012)Sophienberg 2012 (19 04-2012)
Sophienberg 2012 (19 04-2012)
Martin von Haller Groenbaek
 
Making Open Source More Open (23 02-2012)
Making Open Source More Open (23 02-2012)Making Open Source More Open (23 02-2012)
Making Open Source More Open (23 02-2012)
Martin von Haller Groenbaek
 
BAG om Creative Commons (13 01-2012)
BAG om Creative Commons (13 01-2012)BAG om Creative Commons (13 01-2012)
BAG om Creative Commons (13 01-2012)
Martin von Haller Groenbaek
 
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Martin von Haller Groenbaek
 
Going local (08-12-2011)
Going local (08-12-2011)Going local (08-12-2011)
Going local (08-12-2011)
Martin von Haller Groenbaek
 
Åbne Forretningsmodeller ITU (06-12-2011)
Åbne Forretningsmodeller ITU (06-12-2011)Åbne Forretningsmodeller ITU (06-12-2011)
Åbne Forretningsmodeller ITU (06-12-2011)
Martin von Haller Groenbaek
 
Åbne forretningsmodeller TI (30-11-2011)
Åbne forretningsmodeller TI (30-11-2011)Åbne forretningsmodeller TI (30-11-2011)
Åbne forretningsmodeller TI (30-11-2011)
Martin von Haller Groenbaek
 
Sharing is caring (11-11-2011)
Sharing is caring (11-11-2011)Sharing is caring (11-11-2011)
Sharing is caring (11-11-2011)
Martin von Haller Groenbaek
 
Advokaters brug af sociale medier (01 11-2011)
Advokaters brug af sociale medier (01 11-2011)Advokaters brug af sociale medier (01 11-2011)
Advokaters brug af sociale medier (01 11-2011)
Martin von Haller Groenbaek
 
CC UnConvention (08-10-2011)
CC UnConvention (08-10-2011)CC UnConvention (08-10-2011)
CC UnConvention (08-10-2011)
Martin von Haller Groenbaek
 
Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)
Martin von Haller Groenbaek
 
Åbne Forretningsmodeller (31-03-2011)
Åbne Forretningsmodeller (31-03-2011)Åbne Forretningsmodeller (31-03-2011)
Åbne Forretningsmodeller (31-03-2011)
Martin von Haller Groenbaek
 
Creative commons webgrrls (22 02-2011)
Creative commons webgrrls (22 02-2011)Creative commons webgrrls (22 02-2011)
Creative commons webgrrls (22 02-2011)
Martin von Haller Groenbaek
 
Open source i det offentlige (24 11-2010)
Open source i det offentlige (24 11-2010)Open source i det offentlige (24 11-2010)
Open source i det offentlige (24 11-2010)
Martin von Haller Groenbaek
 
Creative commons ebøger etc (02 11-2010)
Creative commons ebøger etc (02 11-2010)Creative commons ebøger etc (02 11-2010)
Creative commons ebøger etc (02 11-2010)
Martin von Haller Groenbaek
 
Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)
Martin von Haller Groenbaek
 

More from Martin von Haller Groenbaek (20)

Joomladay 2014 - Open source licenses
Joomladay 2014 - Open source licensesJoomladay 2014 - Open source licenses
Joomladay 2014 - Open source licenses
 
Sophienberg 2012 (20 04-2012)
Sophienberg 2012 (20 04-2012) Sophienberg 2012 (20 04-2012)
Sophienberg 2012 (20 04-2012)
 
Sophienberg 2012 (19 04-2012)
Sophienberg 2012 (19 04-2012)Sophienberg 2012 (19 04-2012)
Sophienberg 2012 (19 04-2012)
 
Making Open Source More Open (23 02-2012)
Making Open Source More Open (23 02-2012)Making Open Source More Open (23 02-2012)
Making Open Source More Open (23 02-2012)
 
BAG om Creative Commons (13 01-2012)
BAG om Creative Commons (13 01-2012)BAG om Creative Commons (13 01-2012)
BAG om Creative Commons (13 01-2012)
 
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
Temadag om Ophavsret på Gentofte bibliotek (16-12-2011)
 
Going local (08-12-2011)
Going local (08-12-2011)Going local (08-12-2011)
Going local (08-12-2011)
 
Åbne Forretningsmodeller ITU (06-12-2011)
Åbne Forretningsmodeller ITU (06-12-2011)Åbne Forretningsmodeller ITU (06-12-2011)
Åbne Forretningsmodeller ITU (06-12-2011)
 
Åbne forretningsmodeller TI (30-11-2011)
Åbne forretningsmodeller TI (30-11-2011)Åbne forretningsmodeller TI (30-11-2011)
Åbne forretningsmodeller TI (30-11-2011)
 
Sharing is caring (11-11-2011)
Sharing is caring (11-11-2011)Sharing is caring (11-11-2011)
Sharing is caring (11-11-2011)
 
Advokaters brug af sociale medier (01 11-2011)
Advokaters brug af sociale medier (01 11-2011)Advokaters brug af sociale medier (01 11-2011)
Advokaters brug af sociale medier (01 11-2011)
 
CC UnConvention (08-10-2011)
CC UnConvention (08-10-2011)CC UnConvention (08-10-2011)
CC UnConvention (08-10-2011)
 
IDC Skyen eller Tågen (29-09-2011)
IDC Skyen eller Tågen (29-09-2011)IDC Skyen eller Tågen (29-09-2011)
IDC Skyen eller Tågen (29-09-2011)
 
Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)Open source jura CBS (03 11-2010)
Open source jura CBS (03 11-2010)
 
Åbne Forretningsmodeller (31-03-2011)
Åbne Forretningsmodeller (31-03-2011)Åbne Forretningsmodeller (31-03-2011)
Åbne Forretningsmodeller (31-03-2011)
 
Creative commons webgrrls (22 02-2011)
Creative commons webgrrls (22 02-2011)Creative commons webgrrls (22 02-2011)
Creative commons webgrrls (22 02-2011)
 
Open source i det offentlige (24 11-2010)
Open source i det offentlige (24 11-2010)Open source i det offentlige (24 11-2010)
Open source i det offentlige (24 11-2010)
 
Creative commons ebøger etc (02 11-2010)
Creative commons ebøger etc (02 11-2010)Creative commons ebøger etc (02 11-2010)
Creative commons ebøger etc (02 11-2010)
 
Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)Creative commons juridisk diskussionsklub (04 11-2010)
Creative commons juridisk diskussionsklub (04 11-2010)
 
Scl open source (15 10-2010)
Scl open source (15 10-2010)Scl open source (15 10-2010)
Scl open source (15 10-2010)
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Internet of Things and new security challenges for the IT industry

  • 1. Internet of Things It-sikkerhed 2014 Copenhagen 5-6. February 2014
  • 2. Agenda 1.  Introduction 2.  Protecting the PC 3.  Cloud security 4.  Internet of things 5.  New security risks  6.  Openness and transparency 7.  Legal responses 8.  Conclusions 9.  Debate Page 2 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 3. 1. Introduction ●  Martin von Haller Grønbæk •  Partner, Bird & Bird •  Bird & Bird – only international law firm in Denmark •  Leading law firm on Cyber- and network security •  Former member of Danish IT Security Council •  "Open source advocate" Page 3 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 4. 2. PC as the node in the network ●  PC revolution brought “power to the people” ●  And to businesses and government – small and large ●  Rise of the general purpose computer ●  Open for attack ●  Defence of the home front ●  Internet and the network effects ●  PC as the attacked and tool for the attacker Page 4 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 5. 2. The birth of the IT Security industry ●  ●  ●  ●  ●  ●  ●  ●  ●  Critical mass market Large number of new customers Large losses looming Loss of data and downtime Inconvenience and lost productivity (and big corporate monetary losses) Malware Spam Date theft Page 5 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 6. 2. “Thou Shall Protect Thyself” ●  Self-protection ●  Liability rests with the PC-user ●  Hardware and software comes with no warranties ●  No legal protection ●  Little market for “safe IT” among consumers ●  Large market for add-on IT security software ●  Large numbers of small payments makes big profits ●  Many small and large providers Page 6 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 7. 3. New market conditions ●  ●  ●  ●  ●  ●  ●  ●  Cloud computing! No more local applications Computing takes places in the cloud Less asymmetric information Much fewer customers Dramatic shift in bargaining power And technical challenges! Goodbye, many small and large IT-security firms Page 7 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 8. 3. Is the cloud more “secure”? ●  ●  ●  ●  ●  ●  ●  Fewer amateurs and more professionals Very specialized cloud service providers Cloud as “the fog” An “oligopoly” of Clouds User has even less bargaining power Very little control of data Very little contractual and legal protection Page 8 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 9. 4. Internet of Things ●  ●  ●  ●  ●  ●  ●  Not everything is moving into the Cloud Moore Law Mobile devices Quantified self Health, Energy, Automotive etc. Nano Gartner: $1.9 trillion to the global economy by 2020 ●  Nest acquired for $3.2 billion in cash Page 9 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 10. 4. The “true” Internet ●  ●  ●  ●  ●  ●  ●  The Internet today is asymmetric More download, less upload New medium for broadcasting The Internet is decentralized by nature Read/Write Social media: Blogs before Facebook Mesh or Grid computing Page 10 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 11. 4. Towards the “real” Internet? ●  ●  ●  ●  ●  ●  ●  ●  ●  Free software vs. cloud computing (Cloud is based on open source software) Plug servers Every device = a server = a node = equal Cloud computing backlash New computing models Peer2Peer data and processor sharing Mesh or Grid computing Innovation! Page 11 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 12. 5. Before Cloud computing revisited ●  ●  ●  ●  ●  ●  ●  ●  ●  Computing moves from cloud to devices Devicesn Processing Powern Internet enabled Always on AI or Autonomous Remotely accessed and controlled Who’s the user? Self-protection? Page 12 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 13. 5. Same but bigger security risks ●  ●  ●  ●  ●  ●  ●  ●  ●  Bigger threats than PC Obvious network effects Inconvenience and lost productivity? Critical functions: Health, Auto etc. No checks on AI and automatic functions Life and death Systemic risks DDoS attacks “To Big to Fail” Page 13 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 14. 5. Unsecure today! ●  ●  ●  ●  ●  ●  ●  ●  ●  Starting point: Very unsecure Devices are shamelessly unpatched No standards Little press attention Before tipping point But it’ll come! Industry initiatives AllSeen, OpenDaylight Open Auto Alliance, Genivi Page 14 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 15. 6. Open and transparent ●  ●  ●  ●  ●  ●  ●  ●  ●  Most devices run on open source software “Closed” is not an option One platform: Linux Less diversity Economies of scale for malware Open access promotes discovery Open use lower barriers of entry for fixes Huge user advantages from open platforms Closed options where appropriate Page 15 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 16. 7. Legislation ●  ●  ●  ●  ●  ●  ●  ●  ●  Starting point: No legislation Industry standards Contractual demands Open source security services Industry and device specific legislation Heath care Transportation Privacy Service provider, not “technology” Page 16 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 17. 7. Liability ●  ●  ●  ●  ●  ●  ●  ●  ●  ●  Who assume the risk of loss? Who is the better at prevention? Consumer? Reversed burden of proof Strict liability Who should liable? Vendor, producer, provider? Don’t kill innovation! More disclosure of insecurity and breach Standards of “Good IoT IT security practices” Strict liability of certain types of devises Page 17 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 18. 7. Conclusions ●  The IT security industry as we know it will change dramatically ●  Cloud computed will see a backlash ●  Internet of Things will increase number of Internet connected computers ●  Old type security threats will re-emerge with a vengeance ●  Solutions will be based on open source software ●  Maybe new legislation on disclosure and strict liability for certain devices ●  Invest your money in new IT security start-ups with IoT solutions! Page 18 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 19. 8. Questions ●  And maybe some answers… Page 19 © Bird & Bird LLP 2014 Dansk IT – IT-Sikkerhed 2014 (6 February 2014)
  • 20. Thank You Martin von Haller Grønbæk Mobile: +45 40 73 19 14 Email: Martin.vonhaller@twobirds.com Bird & Bird is an international legal practice comprising Bird & Bird LLP and its affiliated and associated businesses. Bird & Bird LLP is a limited liability partnership, registered in England and Wales with registered number OC340318 and is authorised and regulated by the Solicitors Regulation Authority. Its registered office and principal place of business is at 15 Fetter Lane, London EC4A 1JP. A list of members of Bird & Bird LLP and of any non-members who are designated as partners, and of their respective professional qualifications, is open to inspection at that address. twobirds.com