SlideShare a Scribd company logo
1 of 11
Download to read offline
©Advent IM Ltd 2016
Mike Gillespie
The Internet of Everything
Or How to overcome the challenges of IoT security and what are the
practical steps that an organisation should take
©Advent IM Ltd 2016
Coming up
• Introduction
• The Internet of Everything, surely?
• Automatic for the people?
• Where does the accountability lie?
• Managing Risk and achieving
Resilience
• What we know – a summary
• Questions
©Advent IM Ltd 2016
The Internet of Everything?
96
1,842.10
395.2 698.7
189.6
2,244.50
479.4
836.5
372.3
2874.9
623.9
1,009.40
3,511.10
13,172.50
5,158.60
3,164.40
Automotive Consumer Generic Business Vertical Business
Internet of Things Units Installed Base by Category.
Source: Gartner 2014
2013 2014 2015 2020
forecast
Total Forecast:
4.9billion 2015
25billion 2020
©Advent IM Ltd 2016
Some IoT is automated or semi-automated
including security and fire & life systems…
• security systems
• thermostats
• cars
• electronic appliances
• lights in household and commercial
environments
• alarm clocks
• speaker systems
• vending machines
©Advent IM Ltd 2016
Challenges of Securing Everything
• Developers and innovation
• Manufacturers
• Equipment
• Installers
• Boardrooms
• Communication
• Regulation
• Because we can or because we should?
©Advent IM Ltd 2016
A manufacturer guarantee as part of statutory
rights?
Product built
insecure
Product
installed
insecurely
End users
responsibility
to secure?
Built on
Windows CE?
Installed with
‘Admin’ and
‘Password’?
If I had bought a kettle that
exploded, would it be my
fault it was unsafe?
Installers with security awareness
training as standard – no default
settings!
Upgradable firmware, patchable,
secure.
Security aware users with system
managed as a corporate asset
©Advent IM Ltd 2016
Hmm, cars and hacking – an un-patchable
match made in…cyberspace?
Jaguar Pay-At-Pump
©Advent IM Ltd 2016
Organisational resilience – understanding the assets
INFORMATION TECHNOLOGY
people places
©Advent IM Ltd 2016
Cyber Resilience and IoT
• All elements properly risk assessed
• Part of a corporate change and configuration management strategy
• Part of patching regime
• Part of a protective monitoring regime
• Part of an incident management regime
• Part of a forensic readiness regime
smarts m a r t
©Advent IM Ltd 2016
Summing up
• The IoT is only ever going to get bigger – connecting, impacting and
automating
• Manufacturers and installers can help mitigate the resulting threat and risk
• Security Awareness needs to be raised across the board – we need to
champion and drive this in our organisations
• Risk-based approach to assets must be adopted – do we know what we
don’t know?
• IoT assets need specified with full understanding and oversight of security
teams and must be included in vital security protocols and processes
• Collaboration and communication will be required across many disciplines
to make this effective.
©Advent IM Ltd 2016
Questions

More Related Content

What's hot

WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityMarketing Team
 
Open source IoT
Open source IoTOpen source IoT
Open source IoTIoT613
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoePlus
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosErin_Jelecos
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is RealePlus
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegifyflashnewsrelease
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityThibault Cantegrel
 
"Azure is the new black”
"Azure is the new black” "Azure is the new black”
"Azure is the new black” Marketing Team
 
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceWebinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceCipherCloud
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalAccenture Technology
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021Heidelberg India
 
Preview: 3 Steps to Monitoring in a Connected Enterprise
Preview: 3 Steps to Monitoring in a Connected Enterprise Preview: 3 Steps to Monitoring in a Connected Enterprise
Preview: 3 Steps to Monitoring in a Connected Enterprise xMatters Inc
 
Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your NetworkePlus
 
Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...
Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...
Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...Alan Quayle
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationGareth Niblett
 
Innovation Summit 2015 - 10 - linear dust
Innovation Summit 2015 - 10 - linear dustInnovation Summit 2015 - 10 - linear dust
Innovation Summit 2015 - 10 - linear dustThibault Cantegrel
 
Innovation Summit 2015 - 11 - morpho
Innovation Summit 2015 - 11 - morphoInnovation Summit 2015 - 11 - morpho
Innovation Summit 2015 - 11 - morphoThibault Cantegrel
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Securitybryanpsu
 
You Sold Your First 1,000 Devices? Now What?
You Sold Your First 1,000 Devices? Now What?You Sold Your First 1,000 Devices? Now What?
You Sold Your First 1,000 Devices? Now What?Aeris
 

What's hot (20)

WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network Security
 
Open source IoT
Open source IoTOpen source IoT
Open source IoT
 
End Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and CiscoEnd Your Security Nightmares with ePlus and Cisco
End Your Security Nightmares with ePlus and Cisco
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
Integra presentation
Integra presentationIntegra presentation
Integra presentation
 
Security Risks: The Threat is Real
Security Risks: The Threat is RealSecurity Risks: The Threat is Real
Security Risks: The Threat is Real
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivity
 
"Azure is the new black”
"Azure is the new black” "Azure is the new black”
"Azure is the new black”
 
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and ComplianceWebinar: Enable ServiceNow with Data Security, Visibility, and Compliance
Webinar: Enable ServiceNow with Data Security, Visibility, and Compliance
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New NormalContinuous Cyber Attacks: Engaging Business Leaders for the New Normal
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal
 
4 video surveillance technology trends 2021
4 video surveillance technology trends 20214 video surveillance technology trends 2021
4 video surveillance technology trends 2021
 
Preview: 3 Steps to Monitoring in a Connected Enterprise
Preview: 3 Steps to Monitoring in a Connected Enterprise Preview: 3 Steps to Monitoring in a Connected Enterprise
Preview: 3 Steps to Monitoring in a Connected Enterprise
 
Securing Your Network
Securing Your NetworkSecuring Your Network
Securing Your Network
 
Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...
Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...
Forget Mobile-First … Move your customers to IoT-First, Drew Johnson, Aeris C...
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber Innovation
 
Innovation Summit 2015 - 10 - linear dust
Innovation Summit 2015 - 10 - linear dustInnovation Summit 2015 - 10 - linear dust
Innovation Summit 2015 - 10 - linear dust
 
Innovation Summit 2015 - 11 - morpho
Innovation Summit 2015 - 11 - morphoInnovation Summit 2015 - 11 - morpho
Innovation Summit 2015 - 11 - morpho
 
Brochure Security
Brochure SecurityBrochure Security
Brochure Security
 
You Sold Your First 1,000 Devices? Now What?
You Sold Your First 1,000 Devices? Now What?You Sold Your First 1,000 Devices? Now What?
You Sold Your First 1,000 Devices? Now What?
 

Viewers also liked

Internet of Things - how secure is it?
Internet of Things - how secure is it?Internet of Things - how secure is it?
Internet of Things - how secure is it?IISPEastMids
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways IISPEastMids
 
Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark ChimelyIISPEastMids
 
nquiring minds
nquiring mindsnquiring minds
nquiring mindsIoTUK
 
IISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISPEastMids
 
IISP Sept 2014 presentation
IISP Sept 2014 presentationIISP Sept 2014 presentation
IISP Sept 2014 presentationIISPEastMids
 
Governance - the Role of the Board
Governance - the Role of the BoardGovernance - the Role of the Board
Governance - the Role of the BoardQonex
 
Redscan - Insider threat case study
Redscan - Insider threat case studyRedscan - Insider threat case study
Redscan - Insider threat case studyIISPEastMids
 
Horizon introduction
Horizon introductionHorizon introduction
Horizon introductionIISPEastMids
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials Qonex
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesIISPEastMids
 
Trustworthy Software
Trustworthy SoftwareTrustworthy Software
Trustworthy SoftwareQonex
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...IISPEastMids
 
The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016IISPEastMids
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...IISPEastMids
 
Internet of things –
Internet of things –Internet of things –
Internet of things –Mathews Job
 
How to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareHow to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareIISPEastMids
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentationIISPEastMids
 

Viewers also liked (20)

Internet of Things - how secure is it?
Internet of Things - how secure is it?Internet of Things - how secure is it?
Internet of Things - how secure is it?
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
 
Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark Chimely
 
nquiring minds
nquiring mindsnquiring minds
nquiring minds
 
IISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentation
 
IISP Sept 2014 presentation
IISP Sept 2014 presentationIISP Sept 2014 presentation
IISP Sept 2014 presentation
 
Governance - the Role of the Board
Governance - the Role of the BoardGovernance - the Role of the Board
Governance - the Role of the Board
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Redscan - Insider threat case study
Redscan - Insider threat case studyRedscan - Insider threat case study
Redscan - Insider threat case study
 
Horizon introduction
Horizon introductionHorizon introduction
Horizon introduction
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
Trustworthy Software
Trustworthy SoftwareTrustworthy Software
Trustworthy Software
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016The Impact of the General Data Protection Regulation - 10th May 2016
The Impact of the General Data Protection Regulation - 10th May 2016
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
Internet of things –
Internet of things –Internet of things –
Internet of things –
 
How to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareHow to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomware
 
Insider threat event presentation
Insider threat event presentationInsider threat event presentation
Insider threat event presentation
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 

Similar to Mike Gillespie - The Internet of Everything

Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Threat Modeling for IoT Systems
Threat Modeling for IoT SystemsThreat Modeling for IoT Systems
Threat Modeling for IoT SystemsDenim Group
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsUL Transaction Security
 
Security in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveSecurity in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveaccenture
 
Automation and Security Company Profile
Automation and Security Company ProfileAutomation and Security Company Profile
Automation and Security Company ProfileBenjie Fabro
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityDistil Networks
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del cisoCSA Argentina
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMOAMETIC
 
WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptxRachatrinTongrungroj1
 
Security Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteSecurity Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteMobiloitte
 
IoT business models for Insurance
IoT business models for InsuranceIoT business models for Insurance
IoT business models for InsuranceUpgrade-Code.org
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Markerstudy Group Drives Growth and Innovation
Markerstudy Group Drives Growth and InnovationMarkerstudy Group Drives Growth and Innovation
Markerstudy Group Drives Growth and InnovationCloudera, Inc.
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsZeshan Sattar
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020TestingXperts
 
My apps comprehensive corporate overview
My apps   comprehensive corporate overviewMy apps   comprehensive corporate overview
My apps comprehensive corporate overviewmyApps-Solutions
 
DoBig Webinar - How #IoT can transform your business - Omkar Malage, Frost & ...
DoBig Webinar - How #IoT can transform your business - Omkar Malage, Frost & ...DoBig Webinar - How #IoT can transform your business - Omkar Malage, Frost & ...
DoBig Webinar - How #IoT can transform your business - Omkar Malage, Frost & ...Tata Tele Business Services
 
Let's build platforms, and not potholes!
Let's build platforms, and not potholes!Let's build platforms, and not potholes!
Let's build platforms, and not potholes!Vrajesh Bhavsar
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT PatternsWSO2
 

Similar to Mike Gillespie - The Internet of Everything (20)

Attinad Software IoT offerings
Attinad Software IoT offeringsAttinad Software IoT offerings
Attinad Software IoT offerings
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Threat Modeling for IoT Systems
Threat Modeling for IoT SystemsThreat Modeling for IoT Systems
Threat Modeling for IoT Systems
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
Security in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotiveSecurity in the driver's seat: Achieving cyber resilience in automotive
Security in the driver's seat: Achieving cyber resilience in automotive
 
Automation and Security Company Profile
Automation and Security Company ProfileAutomation and Security Company Profile
Automation and Security Company Profile
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API Security
 
Csa summit la transformación digital y el nuevo rol del ciso
Csa summit   la transformación digital y el nuevo rol del cisoCsa summit   la transformación digital y el nuevo rol del ciso
Csa summit la transformación digital y el nuevo rol del ciso
 
Antonio Rojas, PREMO
Antonio Rojas, PREMOAntonio Rojas, PREMO
Antonio Rojas, PREMO
 
WatchGuard Corporate Presentation.pptx
WatchGuard  Corporate Presentation.pptxWatchGuard  Corporate Presentation.pptx
WatchGuard Corporate Presentation.pptx
 
Security Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - MobiloitteSecurity Challenges in Internet of Things - Mobiloitte
Security Challenges in Internet of Things - Mobiloitte
 
IoT business models for Insurance
IoT business models for InsuranceIoT business models for Insurance
IoT business models for Insurance
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Markerstudy Group Drives Growth and Innovation
Markerstudy Group Drives Growth and InnovationMarkerstudy Group Drives Growth and Innovation
Markerstudy Group Drives Growth and Innovation
 
CompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity ApprenticeshipsCompTIA powered Cybersecurity Apprenticeships
CompTIA powered Cybersecurity Apprenticeships
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020
 
My apps comprehensive corporate overview
My apps   comprehensive corporate overviewMy apps   comprehensive corporate overview
My apps comprehensive corporate overview
 
DoBig Webinar - How #IoT can transform your business - Omkar Malage, Frost & ...
DoBig Webinar - How #IoT can transform your business - Omkar Malage, Frost & ...DoBig Webinar - How #IoT can transform your business - Omkar Malage, Frost & ...
DoBig Webinar - How #IoT can transform your business - Omkar Malage, Frost & ...
 
Let's build platforms, and not potholes!
Let's build platforms, and not potholes!Let's build platforms, and not potholes!
Let's build platforms, and not potholes!
 
Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 

Recently uploaded

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Mike Gillespie - The Internet of Everything

  • 1. ©Advent IM Ltd 2016 Mike Gillespie The Internet of Everything Or How to overcome the challenges of IoT security and what are the practical steps that an organisation should take
  • 2. ©Advent IM Ltd 2016 Coming up • Introduction • The Internet of Everything, surely? • Automatic for the people? • Where does the accountability lie? • Managing Risk and achieving Resilience • What we know – a summary • Questions
  • 3. ©Advent IM Ltd 2016 The Internet of Everything? 96 1,842.10 395.2 698.7 189.6 2,244.50 479.4 836.5 372.3 2874.9 623.9 1,009.40 3,511.10 13,172.50 5,158.60 3,164.40 Automotive Consumer Generic Business Vertical Business Internet of Things Units Installed Base by Category. Source: Gartner 2014 2013 2014 2015 2020 forecast Total Forecast: 4.9billion 2015 25billion 2020
  • 4. ©Advent IM Ltd 2016 Some IoT is automated or semi-automated including security and fire & life systems… • security systems • thermostats • cars • electronic appliances • lights in household and commercial environments • alarm clocks • speaker systems • vending machines
  • 5. ©Advent IM Ltd 2016 Challenges of Securing Everything • Developers and innovation • Manufacturers • Equipment • Installers • Boardrooms • Communication • Regulation • Because we can or because we should?
  • 6. ©Advent IM Ltd 2016 A manufacturer guarantee as part of statutory rights? Product built insecure Product installed insecurely End users responsibility to secure? Built on Windows CE? Installed with ‘Admin’ and ‘Password’? If I had bought a kettle that exploded, would it be my fault it was unsafe? Installers with security awareness training as standard – no default settings! Upgradable firmware, patchable, secure. Security aware users with system managed as a corporate asset
  • 7. ©Advent IM Ltd 2016 Hmm, cars and hacking – an un-patchable match made in…cyberspace? Jaguar Pay-At-Pump
  • 8. ©Advent IM Ltd 2016 Organisational resilience – understanding the assets INFORMATION TECHNOLOGY people places
  • 9. ©Advent IM Ltd 2016 Cyber Resilience and IoT • All elements properly risk assessed • Part of a corporate change and configuration management strategy • Part of patching regime • Part of a protective monitoring regime • Part of an incident management regime • Part of a forensic readiness regime smarts m a r t
  • 10. ©Advent IM Ltd 2016 Summing up • The IoT is only ever going to get bigger – connecting, impacting and automating • Manufacturers and installers can help mitigate the resulting threat and risk • Security Awareness needs to be raised across the board – we need to champion and drive this in our organisations • Risk-based approach to assets must be adopted – do we know what we don’t know? • IoT assets need specified with full understanding and oversight of security teams and must be included in vital security protocols and processes • Collaboration and communication will be required across many disciplines to make this effective.
  • 11. ©Advent IM Ltd 2016 Questions