SlideShare a Scribd company logo
1 of 13
Managing the security challenges
presented by OTT
Monetising OTT
London March 26th 2015
Ben Schwarz - bs@ctoic.net
Workshop agenda
Security concerns may be considered ‘old hat’ to telecoms
operators, we’ve always had them!
However, the age of IoT and OTT delivery has changed this. In
this workshop we will discuss YOUR OTT security concerns,
and work to try and solve these, whilst also:
– Identifying the drivers of concern amongst both operators and
consumers of OTT security – is it all about privacy?
– Determining to what extent security can delight customers in
the age of IoT, despite the fact that early DRM systems were
considered a hindrance
– Establishing whether analytics can and should be run through
the security system
– Debating whether security should be connected, as OTT services
are
Ben Schwarz - bs@ctoic.net
Some security challenges
• Speed up provisioning
• Increase agility to adapt to new threats
• Develop and maintain ever deeper expertise
• Improve Cost effectiveness
• Don’t miss the Analytics boat
• Adapt security to evolving risk level (inc.
during a single session)
Ben Schwarz - bs@ctoic.net
DRM at the turn of the century
Ben Schwarz - bs@ctoic.net
But DRM must also be …
• About making users’ lives easier
– Addressing privacy concerns
– Facilitating sharing, testing/tasting
• For managing & promoting Digital Rights
– The original goal of DRM
• Connected
– experience continuity, adaptability
• Security domains are merging
– E.g. pay TV and Smart Home, …
Ben Schwarz - bs@ctoic.net
So what is Security?
• It depends who you ask:
– Authentication, Authorization, Rights management
– Deterrent, preventive, detective, corrective
– Encryption & protection?
– Emergency response? Processes ?
• Security / identity / Privacy
– Why is there still a plethora of password management
companies out there?
• Despite SSO, authentication still needs work and Identity
theft still righty scares people
Ben Schwarz - bs@ctoic.net
Physical
Conceptual
Contextual
Logical
Component
An IT Architects view on security
Ben Schwarz - bs@ctoic.net
Physical or Virtual
Cloud
Component
A pragmatist pay TV view
Ben Schwarz - bs@ctoic.net
Server
infrastructure
Content
creation
Distribution /
broadcast
Service
consumption
Content
Storage
So where does security come in for
OTT delivery of pay TV
Ben Schwarz - bs@ctoic.net
Security
domain 1
Security
domain 2
Security
domain 3
Security
domain 4
Security and product lifecycles
Design Build TestSpecify
Establish
security
requirements
Identify
Key
threats
Remove
unsafe
features
Analyze risk
vs.
security
Incident
response
plan
Training
Run
Ben Schwarz - bs@ctoic.net
Real-world and digital resources
Content
security
Authorization
Authentication
Analytics
Rights
management
Ben Schwarz - bs@ctoic.net
Content
security
Authorization
Analytics
Rights
management
Authentication
1
4
Start
VoD
session
2
…
6
5
3
Content
store
Big data
Analytics
Fully in-
house
Fully outsourced
In-house &/or outsourced
Entitlements
database
Subscriber
managemen
t system
Abstraction layer
The importance of an abstraction layer
Components can
be delocalized as
required
Ben Schwarz - bs@ctoic.net
Does OTT change risk?
• In an OTT environment, the content
protection risks themselves are similar, only
the impact of a breach can be greater.
• When operator aggregates an OTT service
through their controlled infrastructure (e.g.
Netflix) the aggregator carrier little or no risk.
• Whether OTT or not the risk on user data has
much longer-term impact than the risk on
content.
Ben Schwarz - bs@ctoic.net

More Related Content

What's hot

Ericsson Technology Review - Issue1 2015
Ericsson Technology Review - Issue1 2015Ericsson Technology Review - Issue1 2015
Ericsson Technology Review - Issue1 2015Ericsson
 
The path to 5G mobile networks
The path to 5G mobile networksThe path to 5G mobile networks
The path to 5G mobile networksBearingPoint
 
Accelerating IoT
Accelerating IoTAccelerating IoT
Accelerating IoTEricsson
 
Connected Vineyards
Connected VineyardsConnected Vineyards
Connected VineyardsEricsson
 
5G – How to enable change-makers in the Networked Society
5G – How to enable change-makers in the Networked Society5G – How to enable change-makers in the Networked Society
5G – How to enable change-makers in the Networked SocietyEricsson Latin America
 
Digiturk_TV_Connect_2015
Digiturk_TV_Connect_2015Digiturk_TV_Connect_2015
Digiturk_TV_Connect_2015Ozgur Ertem
 
Ericsson 5g services infographic
Ericsson 5g services infographicEricsson 5g services infographic
Ericsson 5g services infographicEricsson
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson
 
Accelerated network build
Accelerated network build Accelerated network build
Accelerated network build Ericsson
 
The Ericsson Experiece at Mobile World Congress 2016
The Ericsson Experiece at Mobile World Congress 2016The Ericsson Experiece at Mobile World Congress 2016
The Ericsson Experiece at Mobile World Congress 2016Ericsson Latin America
 
Ericsson Networks Software 15B
Ericsson Networks Software 15BEricsson Networks Software 15B
Ericsson Networks Software 15BEricsson
 
TMT Value Chain - Digital Futures 2025
TMT Value Chain - Digital Futures 2025TMT Value Chain - Digital Futures 2025
TMT Value Chain - Digital Futures 2025Ovum
 
TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...
TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...
TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...Alan Quayle
 
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIMData Driven Innovation
 
IoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do businessIoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do businessM2M Alliance e.V.
 
Cost-efficient smart metering, a dynamic model for optimization of costs and ...
Cost-efficient smart metering, a dynamic model for optimization of costs and ...Cost-efficient smart metering, a dynamic model for optimization of costs and ...
Cost-efficient smart metering, a dynamic model for optimization of costs and ...Brightwell
 
Платформа создания инновационных услуг для телекоммуникационного оператора и ...
Платформа создания инновационных услуг для телекоммуникационного оператора и ...Платформа создания инновационных услуг для телекоммуникационного оператора и ...
Платформа создания инновационных услуг для телекоммуникационного оператора и ...Ericsson Russia
 
Diversifying cellular for massive IoT
Diversifying cellular for massive IoTDiversifying cellular for massive IoT
Diversifying cellular for massive IoTEricsson
 

What's hot (20)

Ericsson Technology Review - Issue1 2015
Ericsson Technology Review - Issue1 2015Ericsson Technology Review - Issue1 2015
Ericsson Technology Review - Issue1 2015
 
The path to 5G mobile networks
The path to 5G mobile networksThe path to 5G mobile networks
The path to 5G mobile networks
 
Accelerating IoT
Accelerating IoTAccelerating IoT
Accelerating IoT
 
Connected Vineyards
Connected VineyardsConnected Vineyards
Connected Vineyards
 
David Walker - Hyperoptic
David Walker - HyperopticDavid Walker - Hyperoptic
David Walker - Hyperoptic
 
Robert Curran - Aria Networks - INCA SDN/NFV Workshop
Robert Curran - Aria Networks  - INCA SDN/NFV WorkshopRobert Curran - Aria Networks  - INCA SDN/NFV Workshop
Robert Curran - Aria Networks - INCA SDN/NFV Workshop
 
5G – How to enable change-makers in the Networked Society
5G – How to enable change-makers in the Networked Society5G – How to enable change-makers in the Networked Society
5G – How to enable change-makers in the Networked Society
 
Digiturk_TV_Connect_2015
Digiturk_TV_Connect_2015Digiturk_TV_Connect_2015
Digiturk_TV_Connect_2015
 
Ericsson 5g services infographic
Ericsson 5g services infographicEricsson 5g services infographic
Ericsson 5g services infographic
 
Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016Ericsson Technology Review, issue #1, 2016
Ericsson Technology Review, issue #1, 2016
 
Accelerated network build
Accelerated network build Accelerated network build
Accelerated network build
 
The Ericsson Experiece at Mobile World Congress 2016
The Ericsson Experiece at Mobile World Congress 2016The Ericsson Experiece at Mobile World Congress 2016
The Ericsson Experiece at Mobile World Congress 2016
 
Ericsson Networks Software 15B
Ericsson Networks Software 15BEricsson Networks Software 15B
Ericsson Networks Software 15B
 
TMT Value Chain - Digital Futures 2025
TMT Value Chain - Digital Futures 2025TMT Value Chain - Digital Futures 2025
TMT Value Chain - Digital Futures 2025
 
TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...
TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...
TADSummit, Enterprise & IIoT (Industrial Internet of Things) Mobile networks:...
 
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
5G: the context, use cases, privacy, security and rules. Attilio Somma, TIM
 
IoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do businessIoT–How it revolutionizes the way we do business
IoT–How it revolutionizes the way we do business
 
Cost-efficient smart metering, a dynamic model for optimization of costs and ...
Cost-efficient smart metering, a dynamic model for optimization of costs and ...Cost-efficient smart metering, a dynamic model for optimization of costs and ...
Cost-efficient smart metering, a dynamic model for optimization of costs and ...
 
Платформа создания инновационных услуг для телекоммуникационного оператора и ...
Платформа создания инновационных услуг для телекоммуникационного оператора и ...Платформа создания инновационных услуг для телекоммуникационного оператора и ...
Платформа создания инновационных услуг для телекоммуникационного оператора и ...
 
Diversifying cellular for massive IoT
Diversifying cellular for massive IoTDiversifying cellular for massive IoT
Diversifying cellular for massive IoT
 

Viewers also liked

Ip cable london_oct_2011_ben_schwarz_v1.0
Ip cable london_oct_2011_ben_schwarz_v1.0Ip cable london_oct_2011_ben_schwarz_v1.0
Ip cable london_oct_2011_ben_schwarz_v1.0Benjamin SCHWARZ
 
IPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben Schwarz
IPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben SchwarzIPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben Schwarz
IPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben SchwarzBenjamin SCHWARZ
 
OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014
OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014
OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014Benjamin SCHWARZ
 
Gamining strategies for operators v2
Gamining strategies for operators v2Gamining strategies for operators v2
Gamining strategies for operators v2Benjamin SCHWARZ
 
Over the top: Operator Threat and Opportunity
Over the top: Operator Threat and OpportunityOver the top: Operator Threat and Opportunity
Over the top: Operator Threat and OpportunityCartesian (formerly CSMG)
 
Incendio backtobasics1-2007
Incendio backtobasics1-2007Incendio backtobasics1-2007
Incendio backtobasics1-2007Valentino Graiff
 
Gaming strategies for TV operators Updated presentation
Gaming strategies for TV operators Updated presentation Gaming strategies for TV operators Updated presentation
Gaming strategies for TV operators Updated presentation Benjamin SCHWARZ
 
Книги о Заречном
Книги о ЗаречномКниги о Заречном
Книги о ЗаречномBurovaevg
 
Indonesia strategy! research
Indonesia strategy! researchIndonesia strategy! research
Indonesia strategy! researchastronacci
 
Ultra HD Forum NAB 2016 Press Conference
Ultra HD Forum NAB 2016 Press ConferenceUltra HD Forum NAB 2016 Press Conference
Ultra HD Forum NAB 2016 Press ConferenceBenjamin SCHWARZ
 
The role of satellite in OTT
The role of satellite in OTTThe role of satellite in OTT
The role of satellite in OTTBenjamin SCHWARZ
 

Viewers also liked (19)

Home network & ott 2.1
Home network & ott 2.1Home network & ott 2.1
Home network & ott 2.1
 
Ip cable london_oct_2011_ben_schwarz_v1.0
Ip cable london_oct_2011_ben_schwarz_v1.0Ip cable london_oct_2011_ben_schwarz_v1.0
Ip cable london_oct_2011_ben_schwarz_v1.0
 
Ott TV strategies
Ott TV strategiesOtt TV strategies
Ott TV strategies
 
IPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben Schwarz
IPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben SchwarzIPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben Schwarz
IPTV & OTT lessons from Europe for Latam operators - ABTA 2014 Ben Schwarz
 
OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014
OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014
OTT biz and tech challenges - (Innovation day, Cezke RadioKom) Prague nov 2014
 
Business of offload v01
Business of offload v01Business of offload v01
Business of offload v01
 
Gamining strategies for operators v2
Gamining strategies for operators v2Gamining strategies for operators v2
Gamining strategies for operators v2
 
Apple TV: Evolution or Revolution?
Apple TV: Evolution or Revolution?Apple TV: Evolution or Revolution?
Apple TV: Evolution or Revolution?
 
Social TV Opinion piece
Social TV Opinion pieceSocial TV Opinion piece
Social TV Opinion piece
 
Over the top: Operator Threat and Opportunity
Over the top: Operator Threat and OpportunityOver the top: Operator Threat and Opportunity
Over the top: Operator Threat and Opportunity
 
Identity in the Internet Age
Identity in the Internet Age Identity in the Internet Age
Identity in the Internet Age
 
Incendio backtobasics1-2007
Incendio backtobasics1-2007Incendio backtobasics1-2007
Incendio backtobasics1-2007
 
Piano didattico 2005
Piano didattico 2005Piano didattico 2005
Piano didattico 2005
 
Gaming strategies for TV operators Updated presentation
Gaming strategies for TV operators Updated presentation Gaming strategies for TV operators Updated presentation
Gaming strategies for TV operators Updated presentation
 
Книги о Заречном
Книги о ЗаречномКниги о Заречном
Книги о Заречном
 
Indonesia strategy! research
Indonesia strategy! researchIndonesia strategy! research
Indonesia strategy! research
 
Ultra HD Forum NAB 2016 Press Conference
Ultra HD Forum NAB 2016 Press ConferenceUltra HD Forum NAB 2016 Press Conference
Ultra HD Forum NAB 2016 Press Conference
 
Pathophysio of pain
Pathophysio of painPathophysio of pain
Pathophysio of pain
 
The role of satellite in OTT
The role of satellite in OTTThe role of satellite in OTT
The role of satellite in OTT
 

Similar to Monetising ott presenentation on ott and risk management. march 2015

Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Sumo Logic
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel AvivSecurity & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel AvivAmazon Web Services
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Shawn Nutley
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT ImplementationsTechWell
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud servicesComarch_Services
 
Web-of-Things and Services Security
Web-of-Things and Services SecurityWeb-of-Things and Services Security
Web-of-Things and Services SecurityOliver Pfaff
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at ScaleWinston Morton
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaHamilton Oliveira
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationITpreneurs
 
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013Amazon Web Services
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
Top cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxTop cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxinfosec train
 
Fortinet Solution Mapping with AWS Well-Architecture
Fortinet Solution Mapping with AWS Well-ArchitectureFortinet Solution Mapping with AWS Well-Architecture
Fortinet Solution Mapping with AWS Well-ArchitectureYitao Cen
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?Ulf Mattsson
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...Shah Sheikh
 
Hardening as a Part of a holistic Security Strategy (UPDATE)
Hardening as a Part of a holistic Security Strategy (UPDATE)Hardening as a Part of a holistic Security Strategy (UPDATE)
Hardening as a Part of a holistic Security Strategy (UPDATE)NoCodeHardening
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 

Similar to Monetising ott presenentation on ott and risk management. march 2015 (20)

Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
Continuous Compliance in the Cloud - Best Practices from Sumo Logic, Coalfire...
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel AvivSecurity & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
Sleeping well with cloud services
Sleeping well with cloud servicesSleeping well with cloud services
Sleeping well with cloud services
 
Web-of-Things and Services Security
Web-of-Things and Services SecurityWeb-of-Things and Services Security
Web-of-Things and Services Security
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK CertificationGetting Your IT Security Learners Ready for the Cloud with CCSK Certification
Getting Your IT Security Learners Ready for the Cloud with CCSK Certification
 
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
Top cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptxTop cybersecurity certifications in 2022.pptx
Top cybersecurity certifications in 2022.pptx
 
Fortinet Solution Mapping with AWS Well-Architecture
Fortinet Solution Mapping with AWS Well-ArchitectureFortinet Solution Mapping with AWS Well-Architecture
Fortinet Solution Mapping with AWS Well-Architecture
 
What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?What is a secure enterprise architecture roadmap?
What is a secure enterprise architecture roadmap?
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
DTS Solution - ISACA UAE Chapter - ISAFE 2014 - RU PWNED - Living a Life as a...
 
Hardening as a Part of a holistic Security Strategy (UPDATE)
Hardening as a Part of a holistic Security Strategy (UPDATE)Hardening as a Part of a holistic Security Strategy (UPDATE)
Hardening as a Part of a holistic Security Strategy (UPDATE)
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 

Recently uploaded

FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 

Recently uploaded (20)

FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 

Monetising ott presenentation on ott and risk management. march 2015

  • 1. Managing the security challenges presented by OTT Monetising OTT London March 26th 2015 Ben Schwarz - bs@ctoic.net
  • 2. Workshop agenda Security concerns may be considered ‘old hat’ to telecoms operators, we’ve always had them! However, the age of IoT and OTT delivery has changed this. In this workshop we will discuss YOUR OTT security concerns, and work to try and solve these, whilst also: – Identifying the drivers of concern amongst both operators and consumers of OTT security – is it all about privacy? – Determining to what extent security can delight customers in the age of IoT, despite the fact that early DRM systems were considered a hindrance – Establishing whether analytics can and should be run through the security system – Debating whether security should be connected, as OTT services are Ben Schwarz - bs@ctoic.net
  • 3. Some security challenges • Speed up provisioning • Increase agility to adapt to new threats • Develop and maintain ever deeper expertise • Improve Cost effectiveness • Don’t miss the Analytics boat • Adapt security to evolving risk level (inc. during a single session) Ben Schwarz - bs@ctoic.net
  • 4. DRM at the turn of the century Ben Schwarz - bs@ctoic.net
  • 5. But DRM must also be … • About making users’ lives easier – Addressing privacy concerns – Facilitating sharing, testing/tasting • For managing & promoting Digital Rights – The original goal of DRM • Connected – experience continuity, adaptability • Security domains are merging – E.g. pay TV and Smart Home, … Ben Schwarz - bs@ctoic.net
  • 6. So what is Security? • It depends who you ask: – Authentication, Authorization, Rights management – Deterrent, preventive, detective, corrective – Encryption & protection? – Emergency response? Processes ? • Security / identity / Privacy – Why is there still a plethora of password management companies out there? • Despite SSO, authentication still needs work and Identity theft still righty scares people Ben Schwarz - bs@ctoic.net
  • 7. Physical Conceptual Contextual Logical Component An IT Architects view on security Ben Schwarz - bs@ctoic.net
  • 8. Physical or Virtual Cloud Component A pragmatist pay TV view Ben Schwarz - bs@ctoic.net
  • 9. Server infrastructure Content creation Distribution / broadcast Service consumption Content Storage So where does security come in for OTT delivery of pay TV Ben Schwarz - bs@ctoic.net Security domain 1 Security domain 2 Security domain 3 Security domain 4
  • 10. Security and product lifecycles Design Build TestSpecify Establish security requirements Identify Key threats Remove unsafe features Analyze risk vs. security Incident response plan Training Run Ben Schwarz - bs@ctoic.net
  • 11. Real-world and digital resources Content security Authorization Authentication Analytics Rights management Ben Schwarz - bs@ctoic.net
  • 12. Content security Authorization Analytics Rights management Authentication 1 4 Start VoD session 2 … 6 5 3 Content store Big data Analytics Fully in- house Fully outsourced In-house &/or outsourced Entitlements database Subscriber managemen t system Abstraction layer The importance of an abstraction layer Components can be delocalized as required Ben Schwarz - bs@ctoic.net
  • 13. Does OTT change risk? • In an OTT environment, the content protection risks themselves are similar, only the impact of a breach can be greater. • When operator aggregates an OTT service through their controlled infrastructure (e.g. Netflix) the aggregator carrier little or no risk. • Whether OTT or not the risk on user data has much longer-term impact than the risk on content. Ben Schwarz - bs@ctoic.net